diff --git a/cpematch/00/0021B4B9-8EBF-44FC-BB8D-846F6EAE5D17.json b/cpematch/00/0021B4B9-8EBF-44FC-BB8D-846F6EAE5D17.json new file mode 100644 index 00000000000..759e34abea6 --- /dev/null +++ b/cpematch/00/0021B4B9-8EBF-44FC-BB8D-846F6EAE5D17.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "0021B4B9-8EBF-44FC-BB8D-846F6EAE5D17", "criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.10.0", "versionEndExcluding": "2.10.8", "lastModified": "2025-01-09T16:58:26.927", "cpeLastModified": "2025-01-09T16:58:26.927", "created": "2025-01-09T16:58:26.927", "status": "Active", "matches": [{"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.10.0:-:*:*:*:*:*:*", "cpeNameId": "7575A1BB-1B52-4628-B6E3-675B9432D354"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.10.0:rc1:*:*:*:*:*:*", "cpeNameId": "DC7D46E2-DB9F-4D20-9CDB-FDD240D02111"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.10.0:rc2:*:*:*:*:*:*", "cpeNameId": "5AB03DEC-E40F-4374-9473-01EA6C6E963B"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.10.0:rc3:*:*:*:*:*:*", "cpeNameId": "0DBD3DDC-0EBD-4C0A-9D32-25857896F0F8"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.10.0:rc4:*:*:*:*:*:*", "cpeNameId": "AAD5E4AC-F17D-483C-B2B6-C2C8F489EE79"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.10.0:rc5:*:*:*:*:*:*", "cpeNameId": "F08E19C6-71D6-426E-90BE-0B78965A314A"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.10.1:*:*:*:*:*:*:*", "cpeNameId": "F6666086-0BF6-4B2E-B76E-1CFC21DC292F"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.10.2:*:*:*:*:*:*:*", "cpeNameId": "D266E278-0698-47AA-946D-123EC14B72DA"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.10.3:*:*:*:*:*:*:*", "cpeNameId": "DB4A2CC7-52CB-4612-8F65-9C8FE9CCF246"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.10.4:*:*:*:*:*:*:*", "cpeNameId": "737050B3-D8C6-46FC-9CE5-A7609875C496"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.10.5:*:*:*:*:*:*:*", "cpeNameId": "D1BE553C-AA64-4AF5-AF1C-DAB9A3BD3562"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.10.6:*:*:*:*:*:*:*", "cpeNameId": "5CC5370A-2C53-467E-BDB3-78034123504C"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.10.7:*:*:*:*:*:*:*", "cpeNameId": "9EC1DE12-C439-45FD-AD43-2EE8DE0EF0CF"}]}} \ No newline at end of file diff --git a/cpematch/03/03386EEC-BB89-4FD6-A10A-3326F073C415.json b/cpematch/03/03386EEC-BB89-4FD6-A10A-3326F073C415.json new file mode 100644 index 00000000000..8d375bb092e --- /dev/null +++ b/cpematch/03/03386EEC-BB89-4FD6-A10A-3326F073C415.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "03386EEC-BB89-4FD6-A10A-3326F073C415", "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.0", "versionEndExcluding": "5.4.287", "lastModified": "2025-01-09T18:01:55.903", "cpeLastModified": "2025-01-09T18:01:55.903", "created": "2025-01-09T18:01:55.903", "status": "Active", "matches": [{"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:*:*:*:*:*:*:*", "cpeNameId": "F1A9DC6E-F2B2-49B8-967F-B40F23FAFB7E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:-:*:*:*:*:*:*", "cpeNameId": "68861FE5-8011-45EC-81E6-CAD841D55D3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:rc1:*:*:*:*:*:*", "cpeNameId": "C4BD32F7-499E-4227-AF6D-59072E60F157"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:rc2:*:*:*:*:*:*", "cpeNameId": "DD1A0E3E-284D-4F8D-BF08-4AE49A833CC9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:rc3:*:*:*:*:*:*", "cpeNameId": "2445098F-589D-4D79-8677-4B95F63C151A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:rc4:*:*:*:*:*:*", "cpeNameId": "2D923219-DCF7-4DC8-AE44-20988AA062A0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:rc5:*:*:*:*:*:*", "cpeNameId": "02886709-FD0A-4947-8146-A318E301776F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:rc6:*:*:*:*:*:*", "cpeNameId": "03288CF7-0A3E-48CB-BBA7-F9EE8ABBC436"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:rc7:*:*:*:*:*:*", "cpeNameId": "7FDFAB88-77F1-48D7-ADBF-0E44ECE86EBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.1:*:*:*:*:*:*:*", "cpeNameId": "D72D410B-8C2E-4851-99A3-F77FBECB7192"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.2:*:*:*:*:*:*:*", "cpeNameId": "985EBB6A-4987-4667-B8DE-311EBD874180"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.3:*:*:*:*:*:*:*", "cpeNameId": "DC64E4B7-3DB1-4E70-8BCC-CDECB8D31362"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.4:*:*:*:*:*:*:*", "cpeNameId": "B277C12A-C8A3-4E99-B157-821EF02AAD43"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.5:*:*:*:*:*:*:*", "cpeNameId": "D7759414-6475-4870-B8D1-EC7CC9251787"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.6:*:*:*:*:*:*:*", "cpeNameId": "4FD20397-5105-42E9-A718-85812EC83A0C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.7:*:*:*:*:*:*:*", "cpeNameId": "3E7A5DCA-0363-44FE-B21B-17BD8D97542B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.8:*:*:*:*:*:*:*", "cpeNameId": "FD8EA77C-B293-4769-962F-F04BF5671CE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.9:*:*:*:*:*:*:*", "cpeNameId": "50FF6FD7-302E-4015-82D5-647A4C6330EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.10:*:*:*:*:*:*:*", "cpeNameId": "AF3FD6C7-DA7B-4070-92DE-6B670AD96588"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.11:*:*:*:*:*:*:*", "cpeNameId": "BDB9CFFC-3980-48D5-94A2-7B8BB9141797"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.12:*:*:*:*:*:*:*", "cpeNameId": "479AF2D1-C2BD-4C9A-A595-737A34153CA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.13:*:*:*:*:*:*:*", "cpeNameId": "567ACE3B-A900-44C1-8E1A-CED4090B1BE8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.14:*:*:*:*:*:*:*", "cpeNameId": "F3477A97-8034-4BB5-9E2D-1401A7346F7A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.15:*:*:*:*:*:*:*", "cpeNameId": "06CFCE19-7968-4803-BB10-B0FC75D8CD98"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.16:*:*:*:*:*:*:*", "cpeNameId": "75E407ED-7B92-420D-81F5-62766D1CB144"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.17:*:*:*:*:*:*:*", "cpeNameId": "F5B8EAB8-B0FA-4766-9008-A04B31F2A44B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.18:*:*:*:*:*:*:*", "cpeNameId": "E04C3C10-48FE-466C-A251-7862AF2EAE03"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.19:*:*:*:*:*:*:*", "cpeNameId": "2F0ADCFD-FCE8-4617-BEB1-7FA793BC11E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.20:*:*:*:*:*:*:*", "cpeNameId": "BDDC588A-C797-45AC-A0BB-DAD27E22B169"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.21:*:*:*:*:*:*:*", "cpeNameId": "ADFBAC21-4341-4D67-BA2C-832D6C60DAE0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:*:*:*:*:*:*:*", "cpeNameId": "54A3A8C8-F682-431C-B4CD-1F0A788869DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:-:*:*:*:*:*:*", "cpeNameId": "67CBC5E4-B5FE-477E-A138-EDED2966BE18"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:rc1:*:*:*:*:*:*", "cpeNameId": "F39A244D-E0F0-4DCC-AD7F-E15708AB2EC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:rc2:*:*:*:*:*:*", "cpeNameId": "77CA693C-812E-4A6E-A089-665FDADA5C0A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:rc3:*:*:*:*:*:*", "cpeNameId": "DFDA10B2-0129-4B2C-A521-15357B8A1915"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:rc4:*:*:*:*:*:*", "cpeNameId": "757115D8-A302-4C43-8E3D-147732BC8D76"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:rc5:*:*:*:*:*:*", "cpeNameId": "D945FFB9-09EC-432E-8ADC-8DD7BF1425D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:rc6:*:*:*:*:*:*", "cpeNameId": "D49F9C63-A58E-4B0D-BEF2-747DC11400DE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:rc7:*:*:*:*:*:*", "cpeNameId": "41B60E1E-725B-49BB-BAD2-49F4782B541B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.1:*:*:*:*:*:*:*", "cpeNameId": "9208299B-C868-470C-AB8C-3A30CC019E6E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.2:*:*:*:*:*:*:*", "cpeNameId": "2D16B549-05AC-4BA5-82C1-4427346FCCF4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.3:*:*:*:*:*:*:*", "cpeNameId": "5431B6CE-299C-491D-92AD-1A8D9072719B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.4:*:*:*:*:*:*:*", "cpeNameId": "F26D0108-392B-453D-9A12-FCF4079344BE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.5:*:*:*:*:*:*:*", "cpeNameId": "F897824B-28D1-4016-9917-A2A1797B62D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.6:*:*:*:*:*:*:*", "cpeNameId": "C9CA624B-39C9-4830-B160-05E7FCF09D31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.7:*:*:*:*:*:*:*", "cpeNameId": "994E581F-695C-4184-8A34-1E9FE8B84F93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.8:*:*:*:*:*:*:*", "cpeNameId": "D33D7A54-7ACE-438C-9ECC-1E06D0C93588"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.9:*:*:*:*:*:*:*", "cpeNameId": "48DFF9BD-88B8-48DB-950E-281038152F6F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.10:*:*:*:*:*:*:*", "cpeNameId": "12542ACC-E1CB-47D7-AFC8-0B24BB2F7DA4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.11:*:*:*:*:*:*:*", "cpeNameId": "CDDEA9C3-FB0A-4C54-AF83-BBE40DFE29A3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.12:*:*:*:*:*:*:*", "cpeNameId": "E4ACF724-E5E7-4B3E-9457-E52CF676CBB5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.13:*:*:*:*:*:*:*", "cpeNameId": "DB88B940-85D4-4644-8772-90F42B7DC544"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.14:*:*:*:*:*:*:*", "cpeNameId": "F60C9252-9886-478D-9343-2232B706DA06"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.15:*:*:*:*:*:*:*", "cpeNameId": "6868170C-EE5E-4A7F-A201-B854E66C0240"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.16:*:*:*:*:*:*:*", "cpeNameId": "42B36DEC-CDB3-4CA4-9DB4-24F1A6FD275E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.17:*:*:*:*:*:*:*", "cpeNameId": "878CFEA9-CB28-4BFA-8360-D439385AD5BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.18:*:*:*:*:*:*:*", "cpeNameId": "64D36E7C-F03D-4C82-A5FA-2884D5544CAC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.19:*:*:*:*:*:*:*", "cpeNameId": "30EEE361-F28F-4B03-ADEE-CF34BB6BE917"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.20:*:*:*:*:*:*:*", "cpeNameId": "C4D5E875-B03B-40D6-88EA-0F26A8C86E29"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.21:*:*:*:*:*:*:*", "cpeNameId": "E5EE3A38-80F6-4427-ADDD-DE8598A449C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2:*:*:*:*:*:*:*", "cpeNameId": "708DF5F1-3FC2-4692-8628-23A2BCD56CDC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2:-:*:*:*:*:*:*", "cpeNameId": "4A9A1D62-6315-4B91-BEC9-AF9EF6F6FDAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2:rc1:*:*:*:*:*:*", "cpeNameId": "84163FF3-5555-41C3-B321-35C2D89A6854"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2:rc2:*:*:*:*:*:*", "cpeNameId": "F7A55C0A-44F2-4CD3-8A0F-9CFECF21F0D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2:rc3:*:*:*:*:*:*", "cpeNameId": "A5798A8D-D141-4085-B19B-9D32403E837C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2:rc4:*:*:*:*:*:*", "cpeNameId": "6AD74851-D9E8-4C2D-9E0E-176FF60A600D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.1:*:*:*:*:*:*:*", "cpeNameId": "7E156392-773D-4495-A4CE-F5D843C5FEBF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.2:*:*:*:*:*:*:*", "cpeNameId": "A11D4292-91CC-4F12-AF01-769D20986BC1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.3:*:*:*:*:*:*:*", "cpeNameId": "DF31FE84-23CC-48CD-BACC-C2F5879023E9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.4:*:*:*:*:*:*:*", "cpeNameId": "CDF894F7-EB7A-4A0E-AC8F-F87B6AFE4311"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.5:*:*:*:*:*:*:*", "cpeNameId": "992ABD6A-693C-4DB3-B023-B37D66796BD0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.6:*:*:*:*:*:*:*", "cpeNameId": "D8674307-6283-4A09-BF4E-3FACDF808289"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.7:*:*:*:*:*:*:*", "cpeNameId": "12B6C6F1-32F2-4C0F-82EA-492CBC7185D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.8:*:*:*:*:*:*:*", "cpeNameId": "0541FF1A-3588-4B1B-971D-7EBAEBD703EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.9:*:*:*:*:*:*:*", "cpeNameId": "E3FD35AB-B680-4EED-BCAB-106AAC3E9E46"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.10:*:*:*:*:*:*:*", "cpeNameId": "0A60430B-1D1E-43B4-BEEA-190D558DD6E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.11:*:*:*:*:*:*:*", "cpeNameId": "E35007C9-A8F4-4E0B-B996-627F9F3CA3A9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.12:*:*:*:*:*:*:*", "cpeNameId": "EF4B624E-6F70-4C9B-A9DE-2C711C45053A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.13:*:*:*:*:*:*:*", "cpeNameId": "48762B71-2980-485A-843C-0566FDA8F7AD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.14:*:*:*:*:*:*:*", "cpeNameId": "25A6C343-6D24-43CB-966C-DD6A57DB8AD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.15:*:*:*:*:*:*:*", "cpeNameId": "A6E25845-65F8-4B58-8B1F-645850B981D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.16:*:*:*:*:*:*:*", "cpeNameId": "FD154B36-EEE2-45F4-B035-738854DB8463"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.17:*:*:*:*:*:*:*", "cpeNameId": "BD8F511F-9901-411A-A340-71B7A714411E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.18:*:*:*:*:*:*:*", "cpeNameId": "747B8381-BCB7-48A7-99E3-3660A9FBF3F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.19:*:*:*:*:*:*:*", "cpeNameId": "035E9DE8-63BA-4EC7-8425-1EE27BA8CE55"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.20:*:*:*:*:*:*:*", "cpeNameId": "1E4CDC34-80B7-4F05-BB90-6C2714A0FA8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.21:*:*:*:*:*:*:*", "cpeNameId": "68BFF46E-9B1A-4A4C-B03C-587844610AFB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3:*:*:*:*:*:*:*", "cpeNameId": "21F5CD7B-AC95-4D78-9757-99093ED2094B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3:-:*:*:*:*:*:*", "cpeNameId": "961A0592-0690-4383-AA0C-FF52F896EA74"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3:rc1:*:*:*:*:*:*", "cpeNameId": "C67AB208-B2AD-4B21-BB6B-C839E0874C9B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.1:*:*:*:*:*:*:*", "cpeNameId": "81E3B88A-DC72-457D-BCCE-F773A198FFFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.2:*:*:*:*:*:*:*", "cpeNameId": "E64FB740-133B-4AAA-A2DC-2198C0F58D1B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.3:*:*:*:*:*:*:*", "cpeNameId": "D5F4E9B2-BB7B-425C-80D9-06AFBED0D808"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.4:*:*:*:*:*:*:*", "cpeNameId": "49D5583E-E8A9-4897-A2C6-AE3481D580DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.5:*:*:*:*:*:*:*", "cpeNameId": "25187C15-1C36-41FB-A90F-2385F6A9C349"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.6:*:*:*:*:*:*:*", "cpeNameId": "8409B0CA-6F72-4643-8146-ABEF90EE2DB3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.7:*:*:*:*:*:*:*", "cpeNameId": "17F798CD-1EC1-40BC-B535-9A41768D5BA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.8:*:*:*:*:*:*:*", "cpeNameId": "9025DD8F-91D2-404E-969C-2BEF62B5FF8F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.9:*:*:*:*:*:*:*", "cpeNameId": "E66D9744-32E2-4BF8-84B0-8E0A85F62F53"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.10:*:*:*:*:*:*:*", "cpeNameId": "EA942BE3-366A-463B-8C3C-A4C36C894385"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.11:*:*:*:*:*:*:*", "cpeNameId": "69C576AC-72FD-4696-9426-3E2D8F97B7AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.12:*:*:*:*:*:*:*", "cpeNameId": "F20292FB-DDAA-4331-8CCC-E0339B6E309F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.13:*:*:*:*:*:*:*", "cpeNameId": "CF1EC873-6878-4EF3-B478-3A435984B295"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.14:*:*:*:*:*:*:*", "cpeNameId": "76ECB189-F757-45C4-AB63-BC7499A4E9D6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.15:*:*:*:*:*:*:*", "cpeNameId": "37721982-4E3D-40B1-AC6A-DBDA2DD9E489"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.16:*:*:*:*:*:*:*", "cpeNameId": "06812A7C-411D-4A39-9158-D4B8B43A8D7B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.17:*:*:*:*:*:*:*", "cpeNameId": "E8C9CCC6-3D5B-43E5-BE69-3BF8A3DFDE96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.18:*:*:*:*:*:*:*", "cpeNameId": "37BCD5D2-D0A2-44E6-8375-F98117F02B9B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:*:*:*:*:*:*:*", "cpeNameId": "30F8A912-AEBA-4E8E-A946-D5FF48283C90"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:-:*:*:*:*:*:*", "cpeNameId": "38597FA2-E6FA-4060-A67D-C2441E02BC11"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:rc1:*:*:*:*:*:*", "cpeNameId": "0381F214-3BC5-4D07-A22F-18E0C97C33D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:rc2:*:*:*:*:*:*", "cpeNameId": "7058D69E-78BC-4917-A2ED-2D9A20503F8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:rc3:*:*:*:*:*:*", "cpeNameId": "A581FE35-F56F-44A9-B6AD-3900F6C4E830"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:rc4:*:*:*:*:*:*", "cpeNameId": "09E1C6F8-674B-4766-9267-69F9D2584B2B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:rc5:*:*:*:*:*:*", "cpeNameId": "D8331CE4-CE6E-45D2-9267-688218C5FA66"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:rc6:*:*:*:*:*:*", "cpeNameId": "E25FA831-4D9A-43A0-8520-18B2B425CC89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:rc7:*:*:*:*:*:*", "cpeNameId": "B36308F6-FE14-40AE-836F-ADE4A02943B1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.0:rc1:*:*:*:*:*:*", "cpeNameId": "1AD9C3F6-3A0B-4AA0-8B15-3E5F14BF88CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.0:rc2:*:*:*:*:*:*", "cpeNameId": "02FEACE2-E424-4F2E-938B-464CBB64228B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.0:rc6:*:*:*:*:*:*", "cpeNameId": "9E511445-4E4D-44ED-A39F-BF79061A44B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.1:*:*:*:*:*:*:*", "cpeNameId": "1C281E83-7893-4458-9E7C-BC2E857281DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.2:*:*:*:*:*:*:*", "cpeNameId": "A3D762F0-7229-48BE-A593-90AF341A2B12"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.3:*:*:*:*:*:*:*", "cpeNameId": "FB304A30-43E2-4CB7-BDF6-D02968DE2769"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.4:*:*:*:*:*:*:*", "cpeNameId": "283FA41E-5A43-4BFF-B51A-D1FB18F8DE7D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.5:*:*:*:*:*:*:*", "cpeNameId": "02511C03-2EB5-4DDD-B4D5-F46566461307"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.6:*:*:*:*:*:*:*", "cpeNameId": "EE95F16F-BFE6-4880-80BE-0F30ED1E944A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.7:*:*:*:*:*:*:*", "cpeNameId": "FAEE1F59-C796-4E59-B6FB-5D16B39695BA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.8:*:*:*:*:*:*:*", "cpeNameId": "3D6FE7E7-6008-4B70-9614-B6F2C599131E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.9:*:*:*:*:*:*:*", "cpeNameId": "99B2EAA8-667C-487F-B0BF-3710995B951E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.10:*:*:*:*:*:*:*", "cpeNameId": "6FDA9090-C62C-4030-BB12-A0112FDCBF5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.11:*:*:*:*:*:*:*", "cpeNameId": "91DB3188-8E8C-4940-82C3-530F1FCF342A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.12:*:*:*:*:*:*:*", "cpeNameId": "4227319D-32DC-46E1-BB7E-9457C1F4F2C2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.13:*:*:*:*:*:*:*", "cpeNameId": "9E0E22BD-ED8B-4F4F-A0F1-402B94D84DD3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.14:*:*:*:*:*:*:*", "cpeNameId": "501029E0-B4D2-4145-8B1D-D1101340CBF1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.15:*:*:*:*:*:*:*", "cpeNameId": "7C3BE561-3C2B-4784-ACAE-960E3788F8A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.16:*:*:*:*:*:*:*", "cpeNameId": "01AC5F1D-CFD1-4B99-B90D-3A7F9E7C4F83"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.17:*:*:*:*:*:*:*", "cpeNameId": "3DAB053F-F9CF-47D5-BE1B-7C31F90B290F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.18:*:*:*:*:*:*:*", "cpeNameId": "73C26194-FDEA-45E7-80A8-65515A3AAF8F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.19:*:*:*:*:*:*:*", "cpeNameId": "7FC45267-94B3-49F5-B69F-5AE3AB28E1A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.20:*:*:*:*:*:*:*", "cpeNameId": "5ACE9C2C-D667-4936-BB37-72D8117CCBEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.21:*:*:*:*:*:*:*", "cpeNameId": "4CE3E880-139D-4507-BCFE-1624D74B0C80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.22:*:*:*:*:*:*:*", "cpeNameId": "DAC48916-1563-4077-A414-ADB689B1FDBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.23:*:*:*:*:*:*:*", "cpeNameId": "F322D1AA-8286-430D-B02A-5BDDB8C1122A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.24:*:*:*:*:*:*:*", "cpeNameId": "63EA159A-C722-4C17-A32E-20026026B727"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.25:*:*:*:*:*:*:*", "cpeNameId": "DF965E16-45D2-4E37-A24E-D362554D1F8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.26:*:*:*:*:*:*:*", "cpeNameId": "1066FD9A-2313-40A4-A0B2-9C0263C26982"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.27:*:*:*:*:*:*:*", "cpeNameId": "6EC9BCEC-2231-455C-B28D-0DF13CB13479"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.28:*:*:*:*:*:*:*", "cpeNameId": "64D65D7E-E68D-49A1-AA45-CEFE1DBC20D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.29:*:*:*:*:*:*:*", "cpeNameId": "1ADDA3E8-2C58-47CD-A70D-DA04F3A431F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.30:*:*:*:*:*:*:*", "cpeNameId": "EF04CFE2-5DF9-4DE0-8E8F-FB4786456345"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.31:*:*:*:*:*:*:*", "cpeNameId": "8000B946-CAAE-4883-9745-A61904A0247A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.32:*:*:*:*:*:*:*", "cpeNameId": "770B138D-EB04-4F3A-8FA6-3637A3683AEF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.33:*:*:*:*:*:*:*", "cpeNameId": "0B322150-1C25-4F57-844C-BF85420500E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.34:*:*:*:*:*:*:*", "cpeNameId": "DD3EDA18-4BBD-4AD7-9661-5D47B62F591E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.35:*:*:*:*:*:*:*", "cpeNameId": "9C73DBB9-FC61-4E93-B2B0-955791097636"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.36:*:*:*:*:*:*:*", "cpeNameId": "0289901E-E986-443D-A30B-ED22F06A7638"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.37:*:*:*:*:*:*:*", "cpeNameId": "4F5E4958-95CD-4C22-BD8B-3794C74CCD47"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.38:*:*:*:*:*:*:*", "cpeNameId": "EB2A8683-5741-4161-8109-B7788AD97247"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.39:*:*:*:*:*:*:*", "cpeNameId": "8EF7B26D-4943-4DCC-9D59-0AADBEDDAED8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.40:*:*:*:*:*:*:*", "cpeNameId": "E32CC068-8B1A-45C4-8AB0-278C5A74B61C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.41:*:*:*:*:*:*:*", "cpeNameId": "6916813D-E2BF-4D74-BE79-EACD1ED1AFAC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.42:*:*:*:*:*:*:*", "cpeNameId": "9CA95178-D4D4-44FD-AC62-CA6CC68A8D65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.43:*:*:*:*:*:*:*", "cpeNameId": "F95E6F47-0F75-41A3-B478-1F34A602D7EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.44:*:*:*:*:*:*:*", "cpeNameId": "09B818EE-5D8B-4728-8FBA-4C46A9233AEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.45:*:*:*:*:*:*:*", "cpeNameId": "C340CD96-6163-499E-960C-F8C77A190CA7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.46:*:*:*:*:*:*:*", "cpeNameId": "D56E537C-FBC5-4C9C-ACEB-0265AB8DA1BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.47:*:*:*:*:*:*:*", "cpeNameId": "4F62EACD-F957-4121-A129-5514BED8A209"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.48:*:*:*:*:*:*:*", "cpeNameId": "8A9A30F9-762F-496F-B154-FAA7F5B35201"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.49:*:*:*:*:*:*:*", "cpeNameId": "588B838C-6578-4616-850F-59E58692EB1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.50:*:*:*:*:*:*:*", "cpeNameId": "88925256-EBA9-4999-B534-02A3F1514E8B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.51:*:*:*:*:*:*:*", "cpeNameId": "CB3ED166-B1C8-458D-8D95-8D03C00A669E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.52:*:*:*:*:*:*:*", "cpeNameId": "5C242B7B-208A-43C7-BA04-79E1F6E1C5FF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.53:*:*:*:*:*:*:*", "cpeNameId": "D9F0FC36-D6FA-408D-8921-009B98466D10"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.54:*:*:*:*:*:*:*", "cpeNameId": "496B7A05-51DC-43DC-890F-86578ED35874"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.55:*:*:*:*:*:*:*", "cpeNameId": "D015DA7D-CDFF-4FC4-924C-541E663FCC4E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.56:*:*:*:*:*:*:*", "cpeNameId": "B853157A-8731-436A-979A-BA2871A3CF9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.57:*:*:*:*:*:*:*", "cpeNameId": "FF8B97BB-61A3-4CAB-BE7B-A6EA63D575F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.58:*:*:*:*:*:*:*", "cpeNameId": "58F8F42F-DE39-4963-BBCD-2AF4B13B8152"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.59:*:*:*:*:*:*:*", "cpeNameId": "D20CCD61-4FC1-4E23-A134-0B93A8099C3C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.60:*:*:*:*:*:*:*", "cpeNameId": "C66ED101-4E13-4838-901E-A73F76499BBD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.61:*:*:*:*:*:*:*", "cpeNameId": "F4125335-934B-4535-9983-3E2BA61E96F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.62:*:*:*:*:*:*:*", "cpeNameId": "A583E905-8A22-42B5-9D96-B51FFD0614FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.63:*:*:*:*:*:*:*", "cpeNameId": "6D54EE82-FEC8-449B-B648-C736D4E26388"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.64:*:*:*:*:*:*:*", "cpeNameId": "AD9F8955-6D21-4FE1-B814-B7B5B6E51C1D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.65:*:*:*:*:*:*:*", "cpeNameId": "AA1F4832-E754-48FF-90A7-C83B71865F79"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.66:*:*:*:*:*:*:*", "cpeNameId": "7FA63DB7-AF4D-4ADA-AA62-E7E780629C01"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.67:*:*:*:*:*:*:*", "cpeNameId": "68125684-9408-4FF0-9691-78CE2C43472D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.68:*:*:*:*:*:*:*", "cpeNameId": "887CCD5A-CC1E-4F61-9A22-33CD3DB9590E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.69:*:*:*:*:*:*:*", "cpeNameId": "79E482C6-C081-4307-920F-E0C4DA650C4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.70:*:*:*:*:*:*:*", "cpeNameId": "BDBD2808-2754-4C34-81D4-C944911306CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.71:*:*:*:*:*:*:*", "cpeNameId": "33A308BB-8E22-4AD8-BDA8-3711554B706D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.72:*:*:*:*:*:*:*", "cpeNameId": "DD3870C8-2652-4D75-AAE0-3CEF3CF665D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.73:*:*:*:*:*:*:*", "cpeNameId": "44142F88-98AA-4496-B640-6FA14C77CEC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.74:*:*:*:*:*:*:*", "cpeNameId": "AF5903C8-5637-45BD-9A92-AEAFA81D93BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.75:*:*:*:*:*:*:*", "cpeNameId": "DACFFC27-6EB1-4433-B9F3-E58F2C6FB2B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.76:*:*:*:*:*:*:*", "cpeNameId": "55971333-67C2-40F0-AA0C-3382C5622911"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.77:*:*:*:*:*:*:*", "cpeNameId": "3BEED01C-4CCB-4958-8E29-DCC951578EF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.78:*:*:*:*:*:*:*", "cpeNameId": "4F171F41-EFAC-4188-B720-4C6840AF4261"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.79:*:*:*:*:*:*:*", "cpeNameId": "284FEF7C-A0D0-4494-8F98-9129D6A58041"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.80:*:*:*:*:*:*:*", "cpeNameId": "DD648053-6D4E-41CB-9113-66151119FDA0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.81:*:*:*:*:*:*:*", "cpeNameId": "82E37ED2-64A7-4300-BF90-20AF181B6F97"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.82:*:*:*:*:*:*:*", "cpeNameId": "AF69E066-55C4-4A86-B15F-BA9549CEB5AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.83:*:*:*:*:*:*:*", "cpeNameId": "D1721424-8F46-4939-A665-4621D22D7279"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.84:*:*:*:*:*:*:*", "cpeNameId": "E27F0C29-711F-4838-8481-F932273C9034"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.85:*:*:*:*:*:*:*", "cpeNameId": "087A9FF9-13D3-4192-A81A-FD3D742FAAEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.86:*:*:*:*:*:*:*", "cpeNameId": "24FE8157-16DC-4670-81B5-B35131D0D3E3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.87:*:*:*:*:*:*:*", "cpeNameId": "FEA33B3F-6CB7-4138-A92A-AD3C8258FC74"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.88:*:*:*:*:*:*:*", "cpeNameId": "6D4674AC-D1BA-41F6-B9B7-E276352BEDA6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.89:*:*:*:*:*:*:*", "cpeNameId": "D416D23A-A4AE-4C6A-926A-202ED3167667"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.90:*:*:*:*:*:*:*", "cpeNameId": "5CE1A537-5A52-474B-AAF0-E0A7D2952B45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.91:*:*:*:*:*:*:*", "cpeNameId": "F5999482-9471-4351-B0B3-0DB7907B9CED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.92:*:*:*:*:*:*:*", "cpeNameId": "C97C06E4-2C93-436C-ABA6-15AA6599A35A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.93:*:*:*:*:*:*:*", "cpeNameId": "1031888B-A914-4DC7-A6E9-392CCC45A76E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.94:*:*:*:*:*:*:*", "cpeNameId": "404206E9-E734-42FC-900E-BD6E0A8A4461"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.95:*:*:*:*:*:*:*", "cpeNameId": "511842CB-909F-4861-8D7C-28B54497BF86"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.96:*:*:*:*:*:*:*", "cpeNameId": "A9657041-BEE6-4EE8-94AD-4447DDE7D048"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.97:*:*:*:*:*:*:*", "cpeNameId": "0A9E3B65-5FB8-4A6A-A2D8-CA2453AF07EC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.98:*:*:*:*:*:*:*", "cpeNameId": "22048CDC-DCAC-4609-95F0-929AEE830465"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.99:*:*:*:*:*:*:*", "cpeNameId": "627DBE54-010D-4F1C-9001-CC5E02BF3050"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.100:*:*:*:*:*:*:*", "cpeNameId": "938FECE2-6792-451E-8311-7E3E38A036FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.101:*:*:*:*:*:*:*", "cpeNameId": "5432BFDA-778D-4E2E-A1D3-CBED78826AD4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.102:*:*:*:*:*:*:*", "cpeNameId": "3AA63EBE-68D6-44E3-BAF2-581B3E42DA43"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.103:*:*:*:*:*:*:*", "cpeNameId": "82A4E722-C3C7-437B-97C7-010E4E7FB1F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.104:*:*:*:*:*:*:*", "cpeNameId": "FEF2BA89-9777-4690-A1E0-5A9539F19063"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.105:*:*:*:*:*:*:*", "cpeNameId": "0FEBCB84-25C5-4B8F-84AD-2840655A9CB7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.106:*:*:*:*:*:*:*", "cpeNameId": "CA4865C8-CD0B-4624-B878-C160F5793EBF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.107:*:*:*:*:*:*:*", "cpeNameId": "8CD6838F-3F26-49B5-9826-3481D09DD0FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.108:*:*:*:*:*:*:*", "cpeNameId": "F925DF95-F46A-41A4-A0D4-FF783FAAF1AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.109:*:*:*:*:*:*:*", "cpeNameId": "2CEDA5AF-C713-4643-B009-513BA2E3C74D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.110:*:*:*:*:*:*:*", "cpeNameId": "A53BF0C3-2C50-4301-8616-02277328F4BF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.111:*:*:*:*:*:*:*", "cpeNameId": "CC8637E1-FDE1-40A6-BE9A-64596A91042E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.112:*:*:*:*:*:*:*", "cpeNameId": "A29F5C22-296D-438A-A22F-7F59BD3C77A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.113:*:*:*:*:*:*:*", "cpeNameId": "42237EE2-4AF1-49D8-8C47-53936F3F6D15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.114:*:*:*:*:*:*:*", "cpeNameId": "DF5875E7-C829-41E7-B637-7C7FD45469B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.115:*:*:*:*:*:*:*", "cpeNameId": "9EEEB133-6D86-45B8-8F2E-4CD7E1677D4D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.116:*:*:*:*:*:*:*", "cpeNameId": "EFB125EB-E097-459C-BB6C-8CA683495E49"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.117:*:*:*:*:*:*:*", "cpeNameId": "8AB69237-A001-4D78-B1DC-05E19113CAEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.118:*:*:*:*:*:*:*", "cpeNameId": "F529F470-E283-4E30-A94D-9155B2F4D0E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.119:*:*:*:*:*:*:*", "cpeNameId": "E393B29E-8B63-4003-9C92-11923EDDF4FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.120:*:*:*:*:*:*:*", "cpeNameId": "9142B8C8-A1A2-4597-9736-08F85EA6DF0A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.121:*:*:*:*:*:*:*", "cpeNameId": "6ED37745-F2C8-4CAB-B848-E3F1D5B92D5A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.122:*:*:*:*:*:*:*", "cpeNameId": "73345EA5-BC19-481D-9E8D-BC43F1B2A009"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.123:*:*:*:*:*:*:*", "cpeNameId": "D1B464F3-C13B-4562-9A1D-9A52A83F8CE4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.124:*:*:*:*:*:*:*", "cpeNameId": "E7237F6D-DA3F-4755-97C0-72C41F937096"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.125:*:*:*:*:*:*:*", "cpeNameId": "EF179B39-F479-4FF0-9853-5C41F4138C80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.126:*:*:*:*:*:*:*", "cpeNameId": "D623E6BE-F45C-4E2D-83EB-883633218B57"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.127:*:*:*:*:*:*:*", "cpeNameId": "7634F69F-587C-4861-B1E1-2F144582DD36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.128:*:*:*:*:*:*:*", "cpeNameId": "23B07FF3-3EC0-487F-B76D-C86CBF6426EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.129:*:*:*:*:*:*:*", "cpeNameId": "E3AB773D-5743-4A09-AB6F-139D852B344E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.130:*:*:*:*:*:*:*", "cpeNameId": "1C0588B6-8690-46A5-AE2E-73E7BF0CACDB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.131:*:*:*:*:*:*:*", "cpeNameId": "AF351F54-8187-410D-86F1-B3F82AD2ED55"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.132:*:*:*:*:*:*:*", "cpeNameId": "067199B5-CFA0-4568-BA4D-6288A392D99C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.133:*:*:*:*:*:*:*", "cpeNameId": "CF1D7CCF-56EB-4D68-AED7-D187649BA593"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.134:*:*:*:*:*:*:*", "cpeNameId": "5446FBC8-EDD6-449D-B4FC-7C9C2679FDE4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.135:*:*:*:*:*:*:*", "cpeNameId": "3B8D2DC6-E618-4E03-ABF0-0BD7B4B8EB69"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.136:*:*:*:*:*:*:*", "cpeNameId": "94473DCF-880F-4134-9004-72FB278A583E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.137:*:*:*:*:*:*:*", "cpeNameId": "F3AE7B24-62E3-4995-B088-1484F2073EEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.138:*:*:*:*:*:*:*", "cpeNameId": "17D753C7-C945-4B66-AA44-7CA3F4512771"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.139:*:*:*:*:*:*:*", "cpeNameId": "60F84A69-CC41-4E35-BED3-8967F672C006"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.140:*:*:*:*:*:*:*", "cpeNameId": "704BA190-B269-4E2E-B176-2E609688075D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.141:*:*:*:*:*:*:*", "cpeNameId": "FEF922EA-398E-42BB-A3D4-617330FE8BA5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.142:*:*:*:*:*:*:*", "cpeNameId": "E13D9FC4-EA1C-4834-A8DD-9F8B32080526"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.143:*:*:*:*:*:*:*", "cpeNameId": "2749EF98-5412-46F6-8D49-0EDD6A58E528"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.144:*:*:*:*:*:*:*", "cpeNameId": "1CBA264D-9620-40D3-A6E9-BDD0378FBBE4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.145:*:*:*:*:*:*:*", "cpeNameId": "9753CAB1-3E31-4FB0-8901-B66F68248C4B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.146:*:*:*:*:*:*:*", "cpeNameId": "D6BBAA0A-DC53-4541-A7C9-02B7CC882C6F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.147:*:*:*:*:*:*:*", "cpeNameId": "75DD6B1D-A210-439C-BB15-5A9857869B4C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.148:*:*:*:*:*:*:*", "cpeNameId": "83C33FEE-E6EE-42A4-B71C-36B017ADA254"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.149:*:*:*:*:*:*:*", "cpeNameId": "7594839C-A015-437B-843D-443C74240AFC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.150:*:*:*:*:*:*:*", "cpeNameId": "85681E7B-7D21-4391-88BB-F24FCC85B69E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.151:*:*:*:*:*:*:*", "cpeNameId": "CAD0E871-57D4-4E39-B8BE-B48B56E383AD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.152:*:*:*:*:*:*:*", "cpeNameId": "8B9FBF3A-7807-4307-AA5A-AFB027788A0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.153:*:*:*:*:*:*:*", "cpeNameId": "45B35B38-1583-4FDE-A76C-F489FC1661B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.154:*:*:*:*:*:*:*", "cpeNameId": "B5CBD335-2006-441B-B668-D4C4E5361E92"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.155:*:*:*:*:*:*:*", "cpeNameId": "1BB865B8-A4BD-46DC-8C13-31A508A1C470"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.156:*:*:*:*:*:*:*", "cpeNameId": "020363CE-5C5B-427C-A15C-F5C1C1975467"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.157:*:*:*:*:*:*:*", "cpeNameId": "941EBBFB-C6F1-48D5-9B2B-CA5C89D87AAE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.158:*:*:*:*:*:*:*", "cpeNameId": "C6F4FAFB-B2D4-4C6A-A2FD-279349D1B6B8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.159:*:*:*:*:*:*:*", "cpeNameId": "D6E8DC84-DA54-45C7-A50D-CB982342FBA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.160:*:*:*:*:*:*:*", "cpeNameId": "B06561F9-9A69-45F5-8E38-E4ACD6603562"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.161:*:*:*:*:*:*:*", "cpeNameId": "387585D8-ED6F-4F42-B695-CBEE28059C70"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.162:*:*:*:*:*:*:*", "cpeNameId": "D3B66B2E-4E69-4FA5-8B87-289E005FDE04"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.163:*:*:*:*:*:*:*", "cpeNameId": "5EE4932A-8EC9-4F83-B39E-43949583A002"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.164:*:*:*:*:*:*:*", "cpeNameId": "23613ABA-9AF6-4994-BEA5-72EADE59E05D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.165:*:*:*:*:*:*:*", "cpeNameId": "274A8333-1FF8-4D90-9F8F-6ED87E4D38C2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.166:*:*:*:*:*:*:*", "cpeNameId": "D2E5BB0E-741E-4F29-A740-36E5944DA22E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.167:*:*:*:*:*:*:*", "cpeNameId": "A0D34177-A31C-4A31-95EC-FC51AAFDCCA4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.168:*:*:*:*:*:*:*", "cpeNameId": "91D62EB4-F2E8-490E-B95E-8795D3419321"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.169:*:*:*:*:*:*:*", "cpeNameId": "D07F44B5-8B12-4624-806B-3926EE9DFEC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.170:*:*:*:*:*:*:*", "cpeNameId": "F96D2A95-B029-4CF9-B156-05CF4447C703"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.171:*:*:*:*:*:*:*", "cpeNameId": "8ECD8767-3374-4B80-A15B-F5238068915B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.172:*:*:*:*:*:*:*", "cpeNameId": "360CFD8E-8542-4074-A12A-DBA9971EA65B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.173:*:*:*:*:*:*:*", "cpeNameId": "E8C8A6D8-B27B-4F5B-8E51-61E11B3F215F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.174:*:*:*:*:*:*:*", "cpeNameId": "15A35FE0-6FEE-41DC-8BF0-6915C879C270"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.175:*:*:*:*:*:*:*", "cpeNameId": "37C5FB0A-CA6D-4613-8A8B-A18D0FDA6F64"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.176:*:*:*:*:*:*:*", "cpeNameId": "FFE0EDBC-A325-48BA-ACB3-9F8D08670377"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.177:*:*:*:*:*:*:*", "cpeNameId": "E5195C74-6E40-48DB-B840-6064E935C3EE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.178:*:*:*:*:*:*:*", "cpeNameId": "12D64B6B-F676-44EF-9DC6-C177E27260EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.179:*:*:*:*:*:*:*", "cpeNameId": "A05ECB81-2B19-4D35-8D1F-4434137A84DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.180:*:*:*:*:*:*:*", "cpeNameId": "9C361490-6959-42D0-BCC4-83D577D132F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.181:*:*:*:*:*:*:*", "cpeNameId": "D0326F99-0B11-462B-8D94-064C0A3241B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.182:*:*:*:*:*:*:*", "cpeNameId": "D15195DE-63BF-4173-905B-E7D6FA91CA75"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.183:*:*:*:*:*:*:*", "cpeNameId": "68713BB8-A777-453A-A8DF-73D9D7BF2E85"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.184:*:*:*:*:*:*:*", "cpeNameId": "4CAD090F-0814-485B-8E21-4D47722887FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.185:*:*:*:*:*:*:*", "cpeNameId": "9959172B-D94C-4CB9-BF46-DD313AA048F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.186:*:*:*:*:*:*:*", "cpeNameId": "24962B43-D41C-4D08-B761-2DC8B7CA6266"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.187:*:*:*:*:*:*:*", "cpeNameId": "38C0DBA3-BE34-4386-9A2E-157382F3225A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.188:*:*:*:*:*:*:*", "cpeNameId": "7ACF7B19-A720-4BA7-BED3-568CC376C778"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.189:*:*:*:*:*:*:*", "cpeNameId": "B7B05048-9CFF-419B-86B0-EE2F56B47B83"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.190:*:*:*:*:*:*:*", "cpeNameId": "BAE9F693-4B6C-4E3E-A9A0-511AE8544242"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.191:*:*:*:*:*:*:*", "cpeNameId": "9D62345B-E1AE-4963-B5CF-35F5162E8801"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.192:*:*:*:*:*:*:*", "cpeNameId": "B355E118-131B-406B-B4BA-152ECC8A3BBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.193:*:*:*:*:*:*:*", "cpeNameId": "F03D2948-9154-4DBA-BACE-7C345323033A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.194:*:*:*:*:*:*:*", "cpeNameId": "FBCB3E35-2179-4C11-AB45-FF4ED4FDF319"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.195:*:*:*:*:*:*:*", "cpeNameId": "C3EE187D-F47C-4715-9DB8-E907435E01EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.196:*:*:*:*:*:*:*", "cpeNameId": "0C0A8C7F-62FD-4514-AA66-564CAADC6E45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.197:*:*:*:*:*:*:*", "cpeNameId": "B3CE9D05-5F55-4B0E-B305-0A3B005018DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.198:*:*:*:*:*:*:*", "cpeNameId": "2317D623-D839-407E-A14E-F5F852B84FEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.199:*:*:*:*:*:*:*", "cpeNameId": "EB66E33F-BA65-49D7-B9EA-4A98B64ACC4E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.200:*:*:*:*:*:*:*", "cpeNameId": "011BFD26-2596-4913-9424-0AECA7030C16"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.201:*:*:*:*:*:*:*", "cpeNameId": "D4ACDED5-7B2F-49A2-A926-D916CFDB0C63"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.202:*:*:*:*:*:*:*", "cpeNameId": "B7F9F37A-7A22-49AD-A0B1-F71767104083"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.203:*:*:*:*:*:*:*", "cpeNameId": "2AD7A4A5-2505-4B4D-8783-F0A51E6A046A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.204:*:*:*:*:*:*:*", "cpeNameId": "95FA5A9A-3EEF-40F7-A80B-F714544B33EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.205:*:*:*:*:*:*:*", "cpeNameId": "2E6CB57E-4C3F-42E5-B9FB-AB8280BE7A6F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.206:*:*:*:*:*:*:*", "cpeNameId": "7676F080-CF07-4DA1-AF8D-9EF7B716A3E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.207:*:*:*:*:*:*:*", "cpeNameId": "825F2314-2B15-4F76-B6CD-5C9DADC5BE95"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.208:*:*:*:*:*:*:*", "cpeNameId": "7B6DA918-9935-4683-A67B-08144DD82180"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.209:*:*:*:*:*:*:*", "cpeNameId": "95865082-502B-4EAF-BB46-FF14CB436ACA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.210:*:*:*:*:*:*:*", "cpeNameId": "E291ACF9-9E86-4E1E-BCB5-E208F959C0B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.211:*:*:*:*:*:*:*", "cpeNameId": "0A1A262D-D3CD-49B4-84ED-3064C2FED37A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.212:*:*:*:*:*:*:*", "cpeNameId": "57B76811-C4C0-4A91-A8EF-F37450F7F017"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.213:*:*:*:*:*:*:*", "cpeNameId": "205B4275-EF2F-4D30-9EC3-8E0571547292"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.214:*:*:*:*:*:*:*", "cpeNameId": "F5586B8B-CDBF-434C-A994-8D07A0DDB39C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.215:*:*:*:*:*:*:*", "cpeNameId": "D37B51B4-57EC-4373-9428-3C3D4A29208F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.216:*:*:*:*:*:*:*", "cpeNameId": "398941C0-8C2C-41F5-A1C9-9585DAC725E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.217:*:*:*:*:*:*:*", "cpeNameId": "7B403008-68BC-4E2D-9684-EA7D660D620C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.218:*:*:*:*:*:*:*", "cpeNameId": "FEE28F9A-4B9B-44F3-96E9-B98FB0AC8528"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.219:*:*:*:*:*:*:*", "cpeNameId": "2AF545DD-D84F-46B2-AA73-55A6B4659260"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.220:*:*:*:*:*:*:*", "cpeNameId": "A062E707-3089-4A1F-A78C-D2B8FF520A2B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.221:*:*:*:*:*:*:*", "cpeNameId": "CE524691-6654-439A-ACAC-6B617AF5AF1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.222:*:*:*:*:*:*:*", "cpeNameId": "7ACB644E-9AED-4BE0-AA14-66A4391EC095"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.223:*:*:*:*:*:*:*", "cpeNameId": "FF39B72D-B1B2-4DC2-B709-C6693BC9A5E7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.224:*:*:*:*:*:*:*", "cpeNameId": "517DC3B4-3906-44AE-8AA5-EF2587DBDC72"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.225:*:*:*:*:*:*:*", "cpeNameId": "BF5626A2-7798-4612-B4A5-BA04E42E0BED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.226:*:*:*:*:*:*:*", "cpeNameId": "F43E60E1-E9FB-44BC-BC12-DE00249731EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.227:*:*:*:*:*:*:*", "cpeNameId": "640CDE67-2025-448F-AA11-6B110B29D2A5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.228:*:*:*:*:*:*:*", "cpeNameId": "D2FA83FC-CF87-4E06-B474-4EEF45D68215"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.229:*:*:*:*:*:*:*", "cpeNameId": "66BF34B9-77D9-4194-A0B7-B4475B335F2E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.230:*:*:*:*:*:*:*", "cpeNameId": "299E37F1-CADB-4659-916C-6212694A18E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.231:*:*:*:*:*:*:*", "cpeNameId": "6485B4A3-B4A4-4051-BF33-D2CE21DA64EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.232:*:*:*:*:*:*:*", "cpeNameId": "B4F3A62A-C3EE-48BD-B70D-61471639DC9C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.233:*:*:*:*:*:*:*", "cpeNameId": "69E1C22D-523B-4340-A48B-2DB4BEB9248F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.234:*:*:*:*:*:*:*", "cpeNameId": "9F851704-26CF-4676-8855-D74AF799B382"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.235:*:*:*:*:*:*:*", "cpeNameId": "7C708908-5963-46DC-B508-3A5F7499055C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.236:*:*:*:*:*:*:*", "cpeNameId": "6C87ADCB-B88B-4DFA-992F-26B4947C3458"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.237:*:*:*:*:*:*:*", "cpeNameId": "6BB385D9-D9D8-470E-89CE-902222E39ADC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.238:*:*:*:*:*:*:*", "cpeNameId": "B4DAD459-71A8-44A5-861A-1BAF66749233"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.239:*:*:*:*:*:*:*", "cpeNameId": "1897BE2D-B7E6-4886-8CAC-C6AE563CBEE5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.240:*:*:*:*:*:*:*", "cpeNameId": "CE8BA9F0-78BC-4495-801A-2D41AC5B3187"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.241:*:*:*:*:*:*:*", "cpeNameId": "A5EC3DC7-E2C0-431A-A2EC-B6C3828C4BCA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.242:*:*:*:*:*:*:*", "cpeNameId": "E7DD7787-5F9A-4EB3-80D5-122199BE1430"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.243:*:*:*:*:*:*:*", "cpeNameId": "CEA6083C-45E3-459C-A5E7-04CABE3258FF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.244:*:*:*:*:*:*:*", "cpeNameId": "A046118E-2030-4FA1-AB54-FA3166B389EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.245:*:*:*:*:*:*:*", "cpeNameId": "798F9326-D8B4-47C7-A887-279D9837B680"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.246:*:*:*:*:*:*:*", "cpeNameId": "95624FFF-60D2-4964-9EBB-A6AFA64F213D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.247:*:*:*:*:*:*:*", "cpeNameId": "29DEE5F4-3ADD-4E88-9187-7135A238F9C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.248:*:*:*:*:*:*:*", "cpeNameId": "8E8D2C97-D48F-4BD9-BED5-88EE4813F6E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.249:*:*:*:*:*:*:*", "cpeNameId": "5A1E1612-3E81-4021-9A85-34B86AFBC77C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.250:*:*:*:*:*:*:*", "cpeNameId": "EA54F6F0-C64D-41B4-A582-92D43FDD3CB2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.251:*:*:*:*:*:*:*", "cpeNameId": "1B17D69F-3CC2-4B00-B2D5-A4434E4C2402"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.252:*:*:*:*:*:*:*", "cpeNameId": "AAC99975-FBC6-439C-B9E6-011CABDAE8F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.253:*:*:*:*:*:*:*", "cpeNameId": "5375B4A1-C18E-453D-9179-672CB459B0D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.254:*:*:*:*:*:*:*", "cpeNameId": "730B192E-0CAB-41AE-8EE8-57F381628032"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.255:*:*:*:*:*:*:*", "cpeNameId": "59A6D935-0EBF-4499-A8F9-5BB002FF5417"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.256:*:*:*:*:*:*:*", "cpeNameId": "60604FAE-6D70-4DF3-9A88-CC3F6A614F58"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.257:*:*:*:*:*:*:*", "cpeNameId": "28E9A455-1593-4AF5-9451-B313D622E813"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.258:*:*:*:*:*:*:*", "cpeNameId": "B5718D89-967C-42C8-AA82-C97D345B3B10"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.259:*:*:*:*:*:*:*", "cpeNameId": "87BB858F-8D92-452F-B51C-12ACE0798353"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.260:*:*:*:*:*:*:*", "cpeNameId": "AE07B665-D693-4561-A9B4-9932CD77333B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.261:*:*:*:*:*:*:*", "cpeNameId": "EF86313B-7F46-43B8-8338-AE692B75A0A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.262:*:*:*:*:*:*:*", "cpeNameId": "E1B563A5-0659-4D95-89A0-8FCC2A436214"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.263:*:*:*:*:*:*:*", "cpeNameId": "8D53F67C-F067-4BF8-AE22-78A1176571BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.264:*:*:*:*:*:*:*", "cpeNameId": "7111A17A-1784-4740-B976-38B722A838CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.265:*:*:*:*:*:*:*", "cpeNameId": "2D41AA24-795C-4C26-8A5A-D07B59EBD394"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.266:*:*:*:*:*:*:*", "cpeNameId": "A97784BF-DCF7-40A8-87DA-0CB401BEC707"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.267:*:*:*:*:*:*:*", "cpeNameId": "073D9BD8-4FBC-4DF6-8017-37FB83733D26"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.268:*:*:*:*:*:*:*", "cpeNameId": "91DAF395-305E-4836-A12C-1E2377F31FA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.269:*:*:*:*:*:*:*", "cpeNameId": "5FCE10E6-EC75-4696-82C2-8958D55E379A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.270:*:*:*:*:*:*:*", "cpeNameId": "431FAE79-4814-471C-ADD1-50E98CA62255"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.271:*:*:*:*:*:*:*", "cpeNameId": "90DCF88A-E713-42F3-9D1E-2CCCAA5074ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.272:*:*:*:*:*:*:*", "cpeNameId": "6B454F24-35C3-4974-86AC-E42EC930E187"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.273:*:*:*:*:*:*:*", "cpeNameId": "02AE5EE4-8747-4828-AC90-7DC0689482DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.274:*:*:*:*:*:*:*", "cpeNameId": "F006D7E9-C3E7-43D0-BFF9-1905CC924F0E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.275:*:*:*:*:*:*:*", "cpeNameId": "81C1BF7F-E953-42D0-965C-B5F736085500"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.276:*:*:*:*:*:*:*", "cpeNameId": "CFCF98F3-408F-4FB9-B097-3CE467D5C047"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.277:*:*:*:*:*:*:*", "cpeNameId": "8B64B495-66D8-4EE8-9391-2078D025F252"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.278:*:*:*:*:*:*:*", "cpeNameId": "25928F5C-D970-404D-B6CB-E3DFCD7EC853"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.279:*:*:*:*:*:*:*", "cpeNameId": "478BD5C9-EF9A-4FBB-9BCF-DF23EA8F3492"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.280:*:*:*:*:*:*:*", "cpeNameId": "9513977F-A95A-4F0F-AADE-B21201231052"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.281:*:*:*:*:*:*:*", "cpeNameId": "14DBE587-6D62-4B91-BC57-0C84D152E7EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.282:*:*:*:*:*:*:*", "cpeNameId": "6057E10C-DE66-4645-A2B5-44203C31F784"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.283:*:*:*:*:*:*:*", "cpeNameId": "951347D3-550A-41E6-B000-E2D716A96A20"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.284:*:*:*:*:*:*:*", "cpeNameId": "5979A8F6-3B9D-4C0C-8C75-9FA49E82A345"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.285:*:*:*:*:*:*:*", "cpeNameId": "F1278C94-D023-48BF-A6D6-36D0DF76CFF3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.286:*:*:*:*:*:*:*", "cpeNameId": "7E65B46E-A161-4126-9E85-B9F5B4C0005D"}]}} \ No newline at end of file diff --git a/cpematch/0A/0A5C5D20-B557-4CF7-B701-4C0F6609517B.json b/cpematch/0A/0A5C5D20-B557-4CF7-B701-4C0F6609517B.json new file mode 100644 index 00000000000..57f61627f84 --- /dev/null +++ b/cpematch/0A/0A5C5D20-B557-4CF7-B701-4C0F6609517B.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "0A5C5D20-B557-4CF7-B701-4C0F6609517B", "criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.4", "versionEndExcluding": "13.10.5", "lastModified": "2025-01-09T16:52:24.090", "cpeLastModified": "2025-01-09T16:52:24.090", "created": "2025-01-09T16:52:24.090", "status": "Active", "matches": [{"cpeName": "cpe:2.3:a:xwiki:xwiki:6.4:-:*:*:*:*:*:*", "cpeNameId": "623B94D6-3EDC-47A2-AA2F-9D1E0488AC68"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:6.4:milestone1:*:*:*:*:*:*", "cpeNameId": "FB010985-5D7A-4818-8A3B-D8CAFE491C95"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:6.4:milestone2:*:*:*:*:*:*", "cpeNameId": "05A94B93-7E6E-49DF-9C6C-F1DE8981C557"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:6.4:milestone3:*:*:*:*:*:*", "cpeNameId": "186A146C-44D6-4F7F-93A4-B124A9C55682"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:6.4:rc1:*:*:*:*:*:*", "cpeNameId": "4F883F9E-91F4-4C0E-B4AD-CF4467503FB8"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:6.4.1:*:*:*:*:*:*:*", "cpeNameId": "62A886E4-1FA9-4F6D-B318-42863F9EBCD0"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:6.4.2:*:*:*:*:*:*:*", "cpeNameId": "3B137FFC-DF8B-45AD-97F9-7E0C020C6054"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:6.4.3:*:*:*:*:*:*:*", "cpeNameId": "E9C1580C-FC89-4ECA-8592-DB21763A7835"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:6.4.4:*:*:*:*:*:*:*", "cpeNameId": "244C0BB4-F202-404B-9D8B-3BE6A9FBBE50"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:6.4.5:*:*:*:*:*:*:*", "cpeNameId": "2F61BF11-A6DC-4C9B-BFCD-BF937C79CEC7"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:6.4.6:*:*:*:*:*:*:*", "cpeNameId": "50479468-5380-4A3D-A416-4A63B4D80FBB"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:6.4.7:*:*:*:*:*:*:*", "cpeNameId": "A64386CB-D9BD-4B5C-8490-B32857CBD7BE"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:6.4.8:*:*:*:*:*:*:*", "cpeNameId": "7B9E24A5-1B79-479E-9FFF-048825F2C2C2"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.0:-:*:*:*:*:*:*", "cpeNameId": "1E62FC39-B6E2-4A33-ACDE-A18A7539CB27"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.0:milestone1:*:*:*:*:*:*", "cpeNameId": "23AB45E6-2BC3-47EB-BD4F-C155FBE4396B"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.0:milestone2:*:*:*:*:*:*", "cpeNameId": "8A49790A-8E75-448D-8034-432B0F440197"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.0:rc1:*:*:*:*:*:*", "cpeNameId": "C4B4A87A-FC69-412A-B145-FAF15DAAAA4F"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.0.1:*:*:*:*:*:*:*", "cpeNameId": "8E6665F6-CFCB-490B-8519-D6F5410DA0AF"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.1:-:*:*:*:*:*:*", "cpeNameId": "B8DEA6AD-9198-434A-9328-2D57EED213C0"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.1:milestone1:*:*:*:*:*:*", "cpeNameId": "9A548563-15F9-492B-B9B0-54138B15A34D"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.1:milestone2:*:*:*:*:*:*", "cpeNameId": "519F131A-FDEF-473C-841E-5760B1936C5B"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.1:rc1:*:*:*:*:*:*", "cpeNameId": "F50A1BE2-BA74-4411-850A-5E0DA7F13974"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.1.1:*:*:*:*:*:*:*", "cpeNameId": "6B887CAB-133F-486F-965F-93B23AB93688"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.1.2:*:*:*:*:*:*:*", "cpeNameId": "1FF32224-90FD-460E-9C11-FCD64B3ECE6C"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.1.3:*:*:*:*:*:*:*", "cpeNameId": "329380C9-0C26-4013-9C09-FCA5AED654E9"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.1.4:*:*:*:*:*:*:*", "cpeNameId": "8DF00086-8F5A-4AC2-A5BC-7E0C501B5FD7"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.2:*:*:*:*:*:*:*", "cpeNameId": "A366A6DD-AC70-473D-91F0-D6FCB05D02BB"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.2:-:*:*:*:*:*:*", "cpeNameId": "5E872CB1-228F-44B2-B9AB-CF5D34C8127F"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.2:milestone1:*:*:*:*:*:*", "cpeNameId": "28E9B788-669E-4814-8BD1-4884D134A38D"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.2:milestone2:*:*:*:*:*:*", "cpeNameId": "72AC8071-9CCC-4FE5-84F4-B93B4B0B9D0B"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.2:milestone3:*:*:*:*:*:*", "cpeNameId": "3913A8C5-C4F8-4541-9884-23ED4ECF3450"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.2:rc1:*:*:*:*:*:*", "cpeNameId": "3DD04CD7-BFAA-4378-931A-3B25F97AD553"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.3:-:*:*:*:*:*:*", "cpeNameId": "F54E5576-D1C3-4E1C-A0DE-451DA094DF18"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.3:milestone1:*:*:*:*:*:*", "cpeNameId": "9AB26561-7AA8-4368-9483-D2BD16BB8868"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.3:milestone2:*:*:*:*:*:*", "cpeNameId": "68F08746-0F8A-4985-841B-2B605D63E444"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.3:rc1:*:*:*:*:*:*", "cpeNameId": "08D4572D-5A3D-46B9-991E-F320EA443DC0"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.4:-:*:*:*:*:*:*", "cpeNameId": "01BEF97A-4CDF-489D-8FA4-F603F9C2E194"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.4:milestone1:*:*:*:*:*:*", "cpeNameId": "D11A70D6-6A1F-424D-A986-C903A03C9A41"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.4:milestone2:*:*:*:*:*:*", "cpeNameId": "61B7AA72-55D0-4D96-AAA2-6E8B87944EB4"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.4:rc1:*:*:*:*:*:*", "cpeNameId": "4A103771-BE63-424B-93FB-D5798C817FA4"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.4.1:*:*:*:*:*:*:*", "cpeNameId": "A715FC2A-9558-444D-A75C-518C65AA4016"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.4.2:*:*:*:*:*:*:*", "cpeNameId": "A9D5A5BE-F406-426B-84A8-A79B53B7C3B6"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.4.3:*:*:*:*:*:*:*", "cpeNameId": "A0B3AEA3-FB8F-40C4-9080-4EA00DE9B62E"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.4.4:*:*:*:*:*:*:*", "cpeNameId": "79DA1ED0-2E1E-49AA-8A45-94C496F4B3A6"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.4.5:*:*:*:*:*:*:*", "cpeNameId": "9704567C-4211-4BB1-A6E6-57F33106AED3"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.4.6:*:*:*:*:*:*:*", "cpeNameId": "A8A6538D-8AEC-4D08-BBC9-890431785B19"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.0:-:*:*:*:*:*:*", "cpeNameId": "BFB20586-DEFA-4EE6-97EE-D2CD8C9BA536"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.0:milestone1:*:*:*:*:*:*", "cpeNameId": "0A93C71E-FEE4-4D75-8A00-DA2D0B71B51A"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.0:milestone2:*:*:*:*:*:*", "cpeNameId": "34CDBF32-25A8-4E8D-BDE6-4F63BC7AF524"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.0:rc1:*:*:*:*:*:*", "cpeNameId": "08E6BC11-7B2D-4FFF-B962-7F55621DDF0C"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.1:-:*:*:*:*:*:*", "cpeNameId": "815E5325-4439-48C2-BBC3-1C237293CBDC"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.1:milestone1:*:*:*:*:*:*", "cpeNameId": "D83CC12B-F6B0-4267-BCF0-84BF75EE3F26"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.1:milestone2:*:*:*:*:*:*", "cpeNameId": "E4B0C520-6C2B-4FB0-9C22-F388F0EE947C"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.1:rc1:*:*:*:*:*:*", "cpeNameId": "81AAE56A-8A3E-4151-B4CC-D729DCA4DD64"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.2:-:*:*:*:*:*:*", "cpeNameId": "AB8BBA60-DDFB-4642-99EA-60C290A999B0"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.2:milestone1:*:*:*:*:*:*", "cpeNameId": "8CBEA74D-6895-4F81-BF00-F0A202F6CE69"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.2:milestone2:*:*:*:*:*:*", "cpeNameId": "1539DDC0-B935-4BD6-820A-0641FFB00A71"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.2:rc1:*:*:*:*:*:*", "cpeNameId": "E817E3EF-A19B-497B-AF80-295DE2773B7F"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.2.1:*:*:*:*:*:*:*", "cpeNameId": "B1CFC964-FA5D-4BF2-BAAF-043F04FD1115"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.2.2:*:*:*:*:*:*:*", "cpeNameId": "82FF491C-21D9-41E1-9FBC-532F1135AC81"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.3:*:*:*:*:*:*:*", "cpeNameId": "320EDC7E-CDB5-4DC0-B893-202F4EBABD1B"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.3:-:*:*:*:*:*:*", "cpeNameId": "7FECCED0-27D2-4385-B14E-1278DD8776A2"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.3:milestone1:*:*:*:*:*:*", "cpeNameId": "7A4020DA-9EC4-4DF6-A6EB-9D6D2305F780"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.3:milestone2:*:*:*:*:*:*", "cpeNameId": "AE23115C-78BE-4127-851E-14B4E5B348E7"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.3:rc1:*:*:*:*:*:*", "cpeNameId": "98B388FD-87A5-4A53-BC72-EB17CDB9680B"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.4:*:*:*:*:*:*:*", "cpeNameId": "ACF0C663-6379-440A-857E-16A07FDB90FD"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.4:-:*:*:*:*:*:*", "cpeNameId": "2D5D2F1A-7507-4568-83BA-D221A3AAC48E"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.4:rc1:*:*:*:*:*:*", "cpeNameId": "6A7EEE53-69F6-42BE-80AA-DE1F80263C5D"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.4.1:*:*:*:*:*:*:*", "cpeNameId": "B208C495-C8CF-4966-BB95-29D55006C641"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.4.2:*:*:*:*:*:*:*", "cpeNameId": "73224942-CB08-4453-82DC-267186DD0CD0"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.4.3:*:*:*:*:*:*:*", "cpeNameId": "6F715E27-018C-400F-A7B0-D105B8F0E88F"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.4.4:*:*:*:*:*:*:*", "cpeNameId": "B1D8197B-2997-44D5-8E69-A231E92D8AE5"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.4.5:*:*:*:*:*:*:*", "cpeNameId": "968F41A7-114C-42C3-BAAE-35305FF8CCEB"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.4.6:*:*:*:*:*:*:*", "cpeNameId": "4F9E6E9D-C4EC-468F-8FE9-07061510C974"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.0:*:*:*:*:*:*:*", "cpeNameId": "FD41C60F-710A-4238-93AD-EB280D041F1F"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.0:-:*:*:*:*:*:*", "cpeNameId": "4969ED73-939C-4F6F-A8E4-A5F3DF4F232C"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.0:rc1:*:*:*:*:*:*", "cpeNameId": "14C29E18-D92F-4A2D-BAD8-AE30B2E3EAB4"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.1:*:*:*:*:*:*:*", "cpeNameId": "F2BC4B5A-351B-4358-ABBB-3CB03A18AA7B"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.1:-:*:*:*:*:*:*", "cpeNameId": "293A03D3-1932-49A9-A9E4-7BEA12E73A5E"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.1:rc1:*:*:*:*:*:*", "cpeNameId": "7C04471F-33B6-470F-8325-60469891D42E"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.1.1:*:*:*:*:*:*:*", "cpeNameId": "0DA236A9-F469-4C5F-A366-D4FE28EF4CD9"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.1.2:*:*:*:*:*:*:*", "cpeNameId": "88DFF219-0CE8-4600-861F-F7FF8AE100D2"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.2:*:*:*:*:*:*:*", "cpeNameId": "1E8F5102-1E21-412F-A554-46FE38B6BED1"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.2:-:*:*:*:*:*:*", "cpeNameId": "B8458313-5231-4AEC-8CF6-4AC30C9991D9"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.2:rc1:*:*:*:*:*:*", "cpeNameId": "3CD900C4-8764-47D7-89BA-CB96A1FC1CCD"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.3:*:*:*:*:*:*:*", "cpeNameId": "E282B176-8DFE-4577-95FF-C53C1FDD98FA"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.3:-:*:*:*:*:*:*", "cpeNameId": "9FE77D7D-79CA-43C0-B8C7-9EF03C4930A2"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.3:rc1:*:*:*:*:*:*", "cpeNameId": "F420EE3E-F31E-4689-9C2F-307E1A0E88A9"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.3.1:*:*:*:*:*:*:*", "cpeNameId": "A9FA65E4-2665-4979-B235-57BB8F83D3A6"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.4:*:*:*:*:*:*:*", "cpeNameId": "C2423DBF-3740-4957-BE94-6291248E7CBB"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.4:-:*:*:*:*:*:*", "cpeNameId": "70A92F6E-B0E5-4C0F-92AD-E514D5CB709E"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.4:rc1:*:*:*:*:*:*", "cpeNameId": "1AF9DBEA-7198-4891-9411-CD471FF8549E"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.5:*:*:*:*:*:*:*", "cpeNameId": "45F60E3E-9D08-4B3A-8BE4-F0AF5F6E3E89"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.5:-:*:*:*:*:*:*", "cpeNameId": "EC1112B9-C681-40EA-BBCA-5B1DE42D83D5"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.5:rc1:*:*:*:*:*:*", "cpeNameId": "88D955FB-E683-4F91-89B2-6C0D4FF5A161"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.5.1:*:*:*:*:*:*:*", "cpeNameId": "FB87AE99-EBC4-419E-BB0E-A20B9AAFD49D"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.6:*:*:*:*:*:*:*", "cpeNameId": "430AF1A8-5AE9-4121-8363-A31958C7D113"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.6:-:*:*:*:*:*:*", "cpeNameId": "6E98F335-8A8B-41E9-B684-5DDCA272ADB3"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.6:rc1:*:*:*:*:*:*", "cpeNameId": "8306AE1D-B02E-4E7A-B088-B1535ECC4F73"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.7:*:*:*:*:*:*:*", "cpeNameId": "1FC4AF58-DDDF-4B44-AEB5-6A2D037515C6"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.7:-:*:*:*:*:*:*", "cpeNameId": "F07702A0-71E2-4A8C-9A61-603514BF1C2D"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.7:rc1:*:*:*:*:*:*", "cpeNameId": "F89FBB5F-1226-445B-B7FA-9F9E84D3691F"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.8:*:*:*:*:*:*:*", "cpeNameId": "4886BBB8-6F5F-4E6C-A3A0-739F35F00D60"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.8:-:*:*:*:*:*:*", "cpeNameId": "35F0F07F-4A10-401A-A4EF-16810E5BB07C"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.8:rc1:*:*:*:*:*:*", "cpeNameId": "92BC1891-B1E4-47DE-A961-C931279C4EC5"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.8.1:*:*:*:*:*:*:*", "cpeNameId": "95F33F86-A26E-4C58-927E-BF1B414397C8"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.9:*:*:*:*:*:*:*", "cpeNameId": "36A9D50D-D166-4B78-A150-4A815FB9E32A"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.9:-:*:*:*:*:*:*", "cpeNameId": "31031631-944C-432F-A9E7-B682E34AF010"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.9:rc2:*:*:*:*:*:*", "cpeNameId": "8F00E72C-C580-4461-96E6-825BAE54E340"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.10:*:*:*:*:*:*:*", "cpeNameId": "766B0A07-5A77-4AA1-BA1A-29F176D7E715"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.10:-:*:*:*:*:*:*", "cpeNameId": "3A23E36E-C6DE-4D1F-BB3F-4D7F9214B607"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.10:rc1:*:*:*:*:*:*", "cpeNameId": "33BAC252-FC9E-4C72-B774-FC78A2F1D176"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.10.1:*:*:*:*:*:*:*", "cpeNameId": "CB3D358C-729D-4E4F-B59C-211F8BD5F3DE"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.11:*:*:*:*:*:*:*", "cpeNameId": "DF1A52C9-91AC-4EB8-97D0-6ADC1CCAF4F7"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.11:-:*:*:*:*:*:*", "cpeNameId": "54C17EE9-4C0C-440D-B7F9-D24CAF23AD99"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.11:rc1:*:*:*:*:*:*", "cpeNameId": "EE123F68-36B1-45BC-A94E-CF229A425253"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.11.1:*:*:*:*:*:*:*", "cpeNameId": "DAB7F751-5105-4278-93AA-110060FF96AF"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.11.2:*:*:*:*:*:*:*", "cpeNameId": "677B3C7B-42BA-4A54-B60E-070CB9DAE0D3"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.11.3:*:*:*:*:*:*:*", "cpeNameId": "F31D51CA-749C-4D76-B232-9B01D69E2353"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.11.4:*:*:*:*:*:*:*", "cpeNameId": "D5664907-8D66-46C2-A97D-BA79C8792F8B"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.11.5:*:*:*:*:*:*:*", "cpeNameId": "7F567CB5-A8E3-4FBB-A531-C7985585CFCA"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.11.6:*:*:*:*:*:*:*", "cpeNameId": "F07E7631-28A0-4BA2-8DB5-B5B7493143B7"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.11.7:*:*:*:*:*:*:*", "cpeNameId": "84846FA2-71C5-42BF-854C-F7E1346289B0"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.11.8:*:*:*:*:*:*:*", "cpeNameId": "38281604-2487-4EA9-8DA7-3D288B13FA2B"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.11.9:*:*:*:*:*:*:*", "cpeNameId": "BC928E86-8FA0-409D-BF12-D0D8D414DBC5"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.0:*:*:*:*:*:*:*", "cpeNameId": "DCF293F6-BD5B-462F-B335-3DE035D7791E"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.1:*:*:*:*:*:*:*", "cpeNameId": "4C737026-F857-466C-B67F-1BD94D48A933"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.1:-:*:*:*:*:*:*", "cpeNameId": "D8800AA9-1072-4F55-B1EA-0FDBB13EF1A2"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.1:rc1:*:*:*:*:*:*", "cpeNameId": "439D79AE-8D93-452D-BD87-4E139B43A539"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.2:*:*:*:*:*:*:*", "cpeNameId": "7C043B12-C1E9-4182-B897-3632E2D2E4EC"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.3:*:*:*:*:*:*:*", "cpeNameId": "FE85C15C-8DF1-40D2-BF4C-7F354BB8C115"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.4:*:*:*:*:*:*:*", "cpeNameId": "B277492F-953D-4F02-A453-DCE64BC06DFC"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.4:-:*:*:*:*:*:*", "cpeNameId": "8CE13672-CD09-4380-B2D5-7D92D8CCF670"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.4:rc1:*:*:*:*:*:*", "cpeNameId": "24640DB7-15D4-4C00-8F65-62EF52B23E91"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.5:*:*:*:*:*:*:*", "cpeNameId": "5FE363A5-58A4-4480-932C-F8704BA0596F"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.5:-:*:*:*:*:*:*", "cpeNameId": "3A807660-792E-4FE2-BA35-1E29D33C3110"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.5:rc1:*:*:*:*:*:*", "cpeNameId": "83E24C08-680D-4B41-A49B-6BE73418BBC1"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.6:*:*:*:*:*:*:*", "cpeNameId": "A0C0D228-6AB9-43AC-9AE0-3265E437531C"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.6:-:*:*:*:*:*:*", "cpeNameId": "1B6D8A3C-3576-440B-AF64-94E225434A17"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.6:rc1:*:*:*:*:*:*", "cpeNameId": "1C862649-17C4-4DA3-8351-D055E4CEB1B8"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.6.1:*:*:*:*:*:*:*", "cpeNameId": "54EFA885-450A-44FB-A1D4-7540C38DF10A"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.7:*:*:*:*:*:*:*", "cpeNameId": "EBE1EF96-63E5-49EF-8DFB-730A455C7E29"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.7:-:*:*:*:*:*:*", "cpeNameId": "9622AA0F-5E47-4984-A732-78E7E7B931A9"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.7:rc1:*:*:*:*:*:*", "cpeNameId": "A5736D85-2F86-4E79-8011-FD25596280BF"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.7.1:*:*:*:*:*:*:*", "cpeNameId": "0D9DD8C8-3A46-4163-AA43-A7A21A0D2C19"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.8:-:*:*:*:*:*:*", "cpeNameId": "E36E5662-2625-43C6-B7F2-BBECE6B60AF0"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.8:rc1:*:*:*:*:*:*", "cpeNameId": "D2CE643C-B910-4EC5-B9DE-B6D83DBA81B7"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.8.1:*:*:*:*:*:*:*", "cpeNameId": "34F9C2BE-E763-4D6B-9F22-529EC9145F70"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.8.2:*:*:*:*:*:*:*", "cpeNameId": "1E7E695D-F080-46A7-B370-6EDA8F8037D1"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.8.3:*:*:*:*:*:*:*", "cpeNameId": "AA445C15-A7FF-4B84-B7A4-AD197F47B4DB"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.9:*:*:*:*:*:*:*", "cpeNameId": "33289941-300D-47D4-B97A-B20825F516E9"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.10:-:*:*:*:*:*:*", "cpeNameId": "4C302A3E-D96A-4AEA-8543-70AB63648E61"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.10:rc1:*:*:*:*:*:*", "cpeNameId": "D5EC857E-D3DB-4A92-85CD-CDCB1AF87E58"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.11:-:*:*:*:*:*:*", "cpeNameId": "9B2B18AC-368F-474D-85C2-F3C48A9DF65A"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.11:rc1:*:*:*:*:*:*", "cpeNameId": "5E5A0F4F-B34E-4809-8C5D-F1125AE819A3"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.11.1:*:*:*:*:*:*:*", "cpeNameId": "F91F9371-7A41-427F-A8F1-9F698320B6EF"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.11.2:*:*:*:*:*:*:*", "cpeNameId": "F6789C57-6A4F-4863-9A5D-01386BF404C9"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.11.3:*:*:*:*:*:*:*", "cpeNameId": "E0CCE02F-3C0F-4EF6-BCAA-C52285E996EB"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.11.4:*:*:*:*:*:*:*", "cpeNameId": "C11F9FDB-E920-4A4C-8998-342C49FE369F"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.11.5:*:*:*:*:*:*:*", "cpeNameId": "E24CC058-C80F-4CE6-B8D8-39F8E65E90B6"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.11.6:*:*:*:*:*:*:*", "cpeNameId": "82547A7F-7543-485A-8002-CBC9D29C5A87"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.11.7:*:*:*:*:*:*:*", "cpeNameId": "5C1B9970-9569-40D1-A2AA-A906970187E5"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.11.8:*:*:*:*:*:*:*", "cpeNameId": "10B11BE8-CFE5-4578-97BF-BBBF653B092A"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.11.9:*:*:*:*:*:*:*", "cpeNameId": "3668F7C7-16CE-4445-8446-F1F511DCE343"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.11.10:*:*:*:*:*:*:*", "cpeNameId": "A86C6673-7624-4229-8963-5FDD4E46149D"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.11.11:*:*:*:*:*:*:*", "cpeNameId": "A2E8764F-2F01-4670-A9BB-751E2C57B06E"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.0:*:*:*:*:*:*:*", "cpeNameId": "5C6E2F70-0A69-46E6-B4EA-64E8FB074A63"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.0.1:*:*:*:*:*:*:*", "cpeNameId": "B4EA9F69-61E9-4797-9B89-26179F230ADD"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.0.2:*:*:*:*:*:*:*", "cpeNameId": "778D7927-5D1A-42AA-BE25-B704AA4B97BE"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.0.3:*:*:*:*:*:*:*", "cpeNameId": "3D515A90-8796-4D01-8D4C-B139B4E3F48E"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.1:-:*:*:*:*:*:*", "cpeNameId": "B191E3EA-1D24-4CAC-96BC-ABB3DDC971F0"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.1:rc1:*:*:*:*:*:*", "cpeNameId": "1AC54C7D-3C1D-489D-B700-7DCFA5CD2CD7"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.2:-:*:*:*:*:*:*", "cpeNameId": "72980028-DFD2-44BF-B40A-838B18D492A1"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.2:rc1:*:*:*:*:*:*", "cpeNameId": "3F318D79-D10C-4426-A39A-2A9BC73F6F07"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.3:*:*:*:*:*:*:*", "cpeNameId": "C49A5941-2E29-489C-BB71-2A572E009D6A"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.3:-:*:*:*:*:*:*", "cpeNameId": "1F0BC9E9-F208-4F42-972E-6057B27C19E6"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.3:rc1:*:*:*:*:*:*", "cpeNameId": "D534E56E-648B-4AD6-B9D2-94607D12ACD9"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.3.1:*:*:*:*:*:*:*", "cpeNameId": "84434996-447F-4C7F-8AD9-55C194F73566"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.3.2:*:*:*:*:*:*:*", "cpeNameId": "ACC7EE57-2FCC-498D-B32F-C66A5717FADD"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.3.3:*:*:*:*:*:*:*", "cpeNameId": "8B55699F-8928-4579-990E-AA7241E529A6"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.3.4:*:*:*:*:*:*:*", "cpeNameId": "1AB4A4C8-B2D7-42E4-9C0F-EDEDE74D2458"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.3.5:*:*:*:*:*:*:*", "cpeNameId": "97E17B21-C88E-4610-B950-983B7246B455"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.3.6:*:*:*:*:*:*:*", "cpeNameId": "48A2054F-3C85-473F-BC4C-8FD46533EE09"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.3.7:*:*:*:*:*:*:*", "cpeNameId": "31C000F2-ADB1-4CDA-A609-66977E2D5627"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.4:-:*:*:*:*:*:*", "cpeNameId": "688E6B30-FB1C-4D48-A9A3-549CD3E01387"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.4:rc1:*:*:*:*:*:*", "cpeNameId": "D0D09B3F-D8E0-44F5-9BE2-4473051B2338"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.5:-:*:*:*:*:*:*", "cpeNameId": "AAFC532B-674E-475C-8A91-00A6DC83C1C7"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.5:rc1:*:*:*:*:*:*", "cpeNameId": "39BF7C30-21C7-468D-9DD1-CA14C749B12A"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.6:-:*:*:*:*:*:*", "cpeNameId": "A75200F3-C25B-4628-BB7A-222BAB17FB00"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.6:rc1:*:*:*:*:*:*", "cpeNameId": "7CED6F58-3B96-443D-9F2E-82879D76F428"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.6.1:*:*:*:*:*:*:*", "cpeNameId": "0F744922-FC92-4C37-BAEF-2A951EBCC680"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.7:-:*:*:*:*:*:*", "cpeNameId": "9D36783D-A49D-4A66-856F-068AEFC4DD32"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.7:rc1:*:*:*:*:*:*", "cpeNameId": "C0BFADB6-3A48-423E-9E99-967B165D0CEA"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.8:*:*:*:*:*:*:*", "cpeNameId": "507DF180-36DD-4544-BEE3-23E36F2DDD3D"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.8:-:*:*:*:*:*:*", "cpeNameId": "96E39521-1EAE-4D1D-B6FC-EAB6C1A12430"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.8:milestone1:*:*:*:*:*:*", "cpeNameId": "7B67D964-48C7-44BE-9BAF-17EF20BACDEE"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.8:rc1:*:*:*:*:*:*", "cpeNameId": "FCE9468F-2EEB-409E-8359-D906B619FCD6"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.8.1:*:*:*:*:*:*:*", "cpeNameId": "0DF573BE-DEFF-4CB6-96F4-CADE73893F35"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.9:*:*:*:*:*:*:*", "cpeNameId": "E510B285-CD0C-4EEC-97AE-F245EEC511D6"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.10:*:*:*:*:*:*:*", "cpeNameId": "8D5CD1D1-2F5C-4FE3-A92F-E70B59E37267"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.10.1:*:*:*:*:*:*:*", "cpeNameId": "A774D0CB-8332-4956-B735-053406D878D5"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.10.2:*:*:*:*:*:*:*", "cpeNameId": "2967EF03-4549-4671-9BB8-837376341204"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.10.3:*:*:*:*:*:*:*", "cpeNameId": "881AF951-3149-4728-84D8-0F96E69FAC79"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.10.4:*:*:*:*:*:*:*", "cpeNameId": "3421D6A2-AA2D-487A-B532-B134877D2101"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.10.5:*:*:*:*:*:*:*", "cpeNameId": "AF4E41BD-8EDA-44FD-B6BD-B4CC1F0CB235"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.10.6:*:*:*:*:*:*:*", "cpeNameId": "97F6BCC0-6101-4D71-9072-A76E57CFAB8A"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.10.7:*:*:*:*:*:*:*", "cpeNameId": "EEB33FEE-3C59-4CD2-BFA6-D7DB86421ECA"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.10.8:*:*:*:*:*:*:*", "cpeNameId": "39029A2E-C2B3-4A29-8DD2-A10659B58FBD"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.10.10:*:*:*:*:*:*:*", "cpeNameId": "FC6DCFD6-2AA7-4084-A813-B4B6282ADECB"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.10.11:*:*:*:*:*:*:*", "cpeNameId": "31C0315A-89FA-4727-992A-E086865F6DD8"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.10.12:*:*:*:*:*:*:*", "cpeNameId": "FF9B2F67-7834-48A0-9DA8-F714AA4F5419"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.10.13:*:*:*:*:*:*:*", "cpeNameId": "E0BDD868-26C3-41FA-B863-5A95AD7C4ABD"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.0:-:*:*:*:*:*:*", "cpeNameId": "2DB416B3-46EB-47C8-8A45-A17AFF5D53DC"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.0:rc1:*:*:*:*:*:*", "cpeNameId": "6908E728-2985-4601-805E-0A705CCD9E17"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.0.0:*:*:*:*:*:*:*", "cpeNameId": "C943013F-7747-4C3D-A340-0DACD107482D"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.1:-:*:*:*:*:*:*", "cpeNameId": "A59A31DC-91FE-4A9B-8500-39AF5528634D"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.1:rc1:*:*:*:*:*:*", "cpeNameId": "7C45DB23-7900-4386-9EFD-3B57F85CBBA3"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.2:*:*:*:*:*:*:*", "cpeNameId": "091DFBE1-1617-469C-B993-476120E10ADE"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.2.1:*:*:*:*:*:*:*", "cpeNameId": "99113DBE-9F92-479F-A2C1-8DF9B83AE98B"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.3:-:*:*:*:*:*:*", "cpeNameId": "AED49754-EDB3-4676-892D-45968A0EE2E9"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.3:rc1:*:*:*:*:*:*", "cpeNameId": "2D877340-50E1-4084-9AF3-20BF86B3A1F0"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.4:-:*:*:*:*:*:*", "cpeNameId": "A506A548-3F0D-4081-9DBA-00D7098DDC6D"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.4:rc1:*:*:*:*:*:*", "cpeNameId": "7BA7BE09-6593-4A56-BEDB-F330B1E5A31A"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.5:-:*:*:*:*:*:*", "cpeNameId": "F492EE89-51ED-42B7-9A84-82A486D793E1"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.5:rc1:*:*:*:*:*:*", "cpeNameId": "4531B5B9-E368-4C67-800E-029F33C075E7"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.5.1:*:*:*:*:*:*:*", "cpeNameId": "0E950185-A253-4949-9A06-5FE5399059B2"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.6:*:*:*:*:*:*:*", "cpeNameId": "B880CDCC-5362-41B6-93F3-2C2C69336668"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.6.1:*:*:*:*:*:*:*", "cpeNameId": "BB542D8C-E345-4657-B084-76C05595DA4F"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.6.2:*:*:*:*:*:*:*", "cpeNameId": "8A113ED1-2833-4EF9-92D6-37DB844AD846"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.6.3:*:*:*:*:*:*:*", "cpeNameId": "F1F899AE-162A-4E7B-99F5-A693446B181B"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.6.4:*:*:*:*:*:*:*", "cpeNameId": "DBC79D63-F806-4C15-8C5D-3CD1EDDC3B40"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.6.5:*:*:*:*:*:*:*", "cpeNameId": "25EDCC90-716B-4B7B-81E2-7A667A44EAD1"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.6.6:*:*:*:*:*:*:*", "cpeNameId": "7B5E7299-C57C-42ED-9447-EDF493AC71A3"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.6.7:*:*:*:*:*:*:*", "cpeNameId": "DB5125FA-D1D8-43A3-AA18-E9E02DD7F579"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.6.8:*:*:*:*:*:*:*", "cpeNameId": "A442E0FF-BD4D-4666-B684-7839BA8C2AA8"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.7:-:*:*:*:*:*:*", "cpeNameId": "9EF92353-FC63-4F2D-A563-F4818348D120"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.7:rc1:*:*:*:*:*:*", "cpeNameId": "7D29E593-47E6-4F83-8FAC-FBD5A42FE836"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.7.1:*:*:*:*:*:*:*", "cpeNameId": "23025C07-94A7-4586-97A3-37F301897A75"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.8:-:*:*:*:*:*:*", "cpeNameId": "F7890A6C-5C45-42FF-8566-F2B54B631AD7"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.8:rc1:*:*:*:*:*:*", "cpeNameId": "656F2875-EDAA-4A86-9E07-4110B8BC2E5E"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.9:-:*:*:*:*:*:*", "cpeNameId": "ED0BFD3F-638C-4126-AA8D-A5990AA600CE"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.9:rc1:*:*:*:*:*:*", "cpeNameId": "1F694770-2B89-44F2-BFD6-50843FA591D8"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.10:*:*:*:*:*:*:*", "cpeNameId": "1557F4EE-DE2F-4373-83DD-3D07E58D2123"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.10.1:*:*:*:*:*:*:*", "cpeNameId": "F73BF9B7-C70F-463E-9DF7-9B431018A1B7"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.10.2:*:*:*:*:*:*:*", "cpeNameId": "0B7F1102-6FA1-4082-AACF-E60FD8966374"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.10.3:*:*:*:*:*:*:*", "cpeNameId": "81D2690B-A376-4C7B-9BB7-6F2FDBF0514A"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.10.4:*:*:*:*:*:*:*", "cpeNameId": "DD01B4B4-A824-4741-9226-C8871560CC8E"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.10.5:*:*:*:*:*:*:*", "cpeNameId": "FFBB708D-8782-435D-B55C-EF8780F1A819"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.10.6:*:*:*:*:*:*:*", "cpeNameId": "801265DA-87A6-45B2-B4F7-18D6D44A52FD"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.10.7:*:*:*:*:*:*:*", "cpeNameId": "3B8579D2-B049-4BAF-AD9A-4FCD4ACDF3C2"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.10.8:*:*:*:*:*:*:*", "cpeNameId": "685EB785-B523-42B1-8F3D-2D5C73D2FB4D"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.10.9:*:*:*:*:*:*:*", "cpeNameId": "5F4587A8-1663-4BA3-86C0-4CD43DD0D7E7"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.10.10:*:*:*:*:*:*:*", "cpeNameId": "5CC180F7-0871-4265-AEB4-979390F0E191"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.10.11:*:*:*:*:*:*:*", "cpeNameId": "B7DFF136-5876-4EF4-AEFC-E72934745CBE"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.0:*:*:*:*:*:*:*", "cpeNameId": "031BBFCF-C3D9-4BBA-860D-6D09F7DE0CF1"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.1:-:*:*:*:*:*:*", "cpeNameId": "5609204E-0EEC-471C-948B-271FA00CEE51"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.1:rc1:*:*:*:*:*:*", "cpeNameId": "DABE0596-F4CC-4318-AE21-5A20B9A707F9"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.2:*:*:*:*:*:*:*", "cpeNameId": "E5F5E9F2-37C3-4E17-8070-9753DC368F2C"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.2:rc1:*:*:*:*:*:*", "cpeNameId": "61397454-ECB3-4ED4-B567-D70CAA319B3A"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.3:*:*:*:*:*:*:*", "cpeNameId": "B18265DA-C6F6-49B0-AF6D-D5ACB0333CE5"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.4:*:*:*:*:*:*:*", "cpeNameId": "ACAF8BE5-4000-4E19-ACDF-3FAF9490802C"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.4.1:*:*:*:*:*:*:*", "cpeNameId": "58C03EC0-003A-43FB-B861-0770A9ABC88A"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.4.2:*:*:*:*:*:*:*", "cpeNameId": "2129D1A3-F574-499B-86F0-E854DD28AECE"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.4.3:*:*:*:*:*:*:*", "cpeNameId": "4997FF7E-E602-4301-949F-A438EC554E71"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.4.4:*:*:*:*:*:*:*", "cpeNameId": "8CB62363-107F-49F3-BCF1-B019FB05D845"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.4.5:*:*:*:*:*:*:*", "cpeNameId": "B986DC4B-D59D-4CF8-B90D-A54488CFDDD9"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.4.6:*:*:*:*:*:*:*", "cpeNameId": "1BA53368-A8A1-4D89-99B4-8AA4881A569E"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.4.7:*:*:*:*:*:*:*", "cpeNameId": "C14A2289-1A0E-481D-8271-0E7590B9B666"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.5:*:*:*:*:*:*:*", "cpeNameId": "0D94FCD6-4A84-4E02-BDD6-82E4EC450517"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.6:*:*:*:*:*:*:*", "cpeNameId": "AAE5AD73-73D3-4A03-8EB1-C52071CA369C"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.7:*:*:*:*:*:*:*", "cpeNameId": "AAC1B214-80A3-455D-94A4-15091590989E"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.8:*:*:*:*:*:*:*", "cpeNameId": "360D025B-0F14-4891-9DFF-2C9845C6C40A"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.9:*:*:*:*:*:*:*", "cpeNameId": "5381019F-EF70-4F5C-B73E-9853090A465B"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.9:-:*:*:*:*:*:*", "cpeNameId": "6FC792DD-43C1-4348-A69B-16040EE0D014"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.9:rc1:*:*:*:*:*:*", "cpeNameId": "5806FD30-A4F2-474B-9721-B51FA67D325B"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.10:*:*:*:*:*:*:*", "cpeNameId": "60BC88E4-42EE-4501-AE47-026D11DA53ED"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.10:-:*:*:*:*:*:*", "cpeNameId": "7915D205-A813-4945-BA31-479D59805A10"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.10.1:*:*:*:*:*:*:*", "cpeNameId": "68344075-1679-4551-AA46-4E10976D007D"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.10.2:*:*:*:*:*:*:*", "cpeNameId": "3F99A2CF-1F21-4F30-AEC6-4757D57E3B23"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.10.3:*:*:*:*:*:*:*", "cpeNameId": "0A60D729-42DB-4EE4-8946-E90F2EBF1289"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.10.4:*:*:*:*:*:*:*", "cpeNameId": "047152F4-9E85-48BF-91A7-E525237302E5"}]}} \ No newline at end of file diff --git a/cpematch/0D/0D0201BC-8FE0-40F7-8B89-5C95436F9B17.json b/cpematch/0D/0D0201BC-8FE0-40F7-8B89-5C95436F9B17.json new file mode 100644 index 00000000000..5dafacf0608 --- /dev/null +++ b/cpematch/0D/0D0201BC-8FE0-40F7-8B89-5C95436F9B17.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "0D0201BC-8FE0-40F7-8B89-5C95436F9B17", "criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*", "versionStartIncluding": "15.6", "versionEndExcluding": "15.10.1", "lastModified": "2025-01-09T16:41:58.223", "cpeLastModified": "2025-01-09T16:41:58.223", "created": "2025-01-09T16:41:58.223", "status": "Active", "matches": [{"cpeName": "cpe:2.3:a:xwiki:xwiki:15.6:-:*:*:*:*:*:*", "cpeNameId": "A04E3B37-B6AA-49FE-AE4D-FD93157D6DA4"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:15.6:rc1:*:*:*:*:*:*", "cpeNameId": "44DD263C-8657-40D6-8EC4-CC1DF83BE3F6"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:15.7:rc1:*:*:*:*:*:*", "cpeNameId": "D3C676B3-8BAA-4C6D-B97C-6FCACE070E4E"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:15.8:*:*:*:*:*:*:*", "cpeNameId": "59B87F70-BEE7-4256-AFDC-80B14B31CC86"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:15.9:-:*:*:*:*:*:*", "cpeNameId": "C44861EA-AB3D-4A0B-93F8-14E3899524FC"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:15.9:rc1:*:*:*:*:*:*", "cpeNameId": "12A6C2C0-94C1-4232-86B8-FC187810B026"}]}} \ No newline at end of file diff --git a/cpematch/17/170CE181-04FD-471C-B2DC-3AAB0E1175D2.json b/cpematch/17/170CE181-04FD-471C-B2DC-3AAB0E1175D2.json new file mode 100644 index 00000000000..499790c41fb --- /dev/null +++ b/cpematch/17/170CE181-04FD-471C-B2DC-3AAB0E1175D2.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "170CE181-04FD-471C-B2DC-3AAB0E1175D2", "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.9", "versionEndExcluding": "6.1.120", "lastModified": "2025-01-09T17:50:19.937", "cpeLastModified": "2025-01-09T17:50:19.937", "created": "2025-01-09T17:50:19.937", "status": "Active", "matches": [{"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:*:*:*:*:*:*:*", "cpeNameId": "72D7C54B-6ED2-4DCE-A67F-C71FB93A5823"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:-:*:*:*:*:*:*", "cpeNameId": "12D10173-3DCE-40E4-9B99-B6C7A7454106"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:rc1:*:*:*:*:*:*", "cpeNameId": "DBD96821-B70D-475C-A38B-8416AC3576D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:rc2:*:*:*:*:*:*", "cpeNameId": "221A17CE-03D4-4662-924E-23E6426BB693"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:rc3:*:*:*:*:*:*", "cpeNameId": "5B3F2BE9-697B-4E5D-93D6-2127CE19550C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:rc4:*:*:*:*:*:*", "cpeNameId": "AD35E83C-A016-47F3-8D62-9C4A0306FAD4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:rc5:*:*:*:*:*:*", "cpeNameId": "E166DE00-D241-44A0-B75B-F067310B6FEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:rc6:*:*:*:*:*:*", "cpeNameId": "65CAACB6-7E01-48F5-98DF-E1923A3F01C5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:rc7:*:*:*:*:*:*", "cpeNameId": "F12E246D-AC32-42AB-A20F-5B54C2FFC059"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:rc8:*:*:*:*:*:*", "cpeNameId": "9896B1C6-0127-4248-A9D1-ABB07588F87A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.0:*:*:*:*:*:*:*", "cpeNameId": "C477CC26-17BE-46DA-8B9D-218D8AA51AD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.1:*:*:*:*:*:*:*", "cpeNameId": "8AF8815B-4FEF-483D-9CF9-C8BDDD29308D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.2:*:*:*:*:*:*:*", "cpeNameId": "A36A1BD4-0C74-4284-99A4-A53FEE3C8D65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.3:*:*:*:*:*:*:*", "cpeNameId": "AF59D9D7-96F7-41F7-8125-50592CE96BFF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.4:*:*:*:*:*:*:*", "cpeNameId": "CDB03998-BA6F-4F00-83F7-B54515BA4725"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.5:*:*:*:*:*:*:*", "cpeNameId": "0F83014C-CE37-47EA-9906-94AA2FED7DD9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.6:*:*:*:*:*:*:*", "cpeNameId": "2DACA082-8E91-493D-890B-FF9A78EEBC9A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.7:*:*:*:*:*:*:*", "cpeNameId": "8823DC1A-2E25-4E13-9F8F-E347154A7F72"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.8:*:*:*:*:*:*:*", "cpeNameId": "60679951-3906-4497-8CBC-8891BEE953B6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.9:*:*:*:*:*:*:*", "cpeNameId": "76030A2F-567A-493B-BD6C-09DB84455253"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.10:*:*:*:*:*:*:*", "cpeNameId": "527F6E5F-FDE0-4BEF-AB6F-9EAC1F6F6978"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.11:*:*:*:*:*:*:*", "cpeNameId": "CE3D179E-83C1-4BAE-8CB1-DE413B7901D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.12:*:*:*:*:*:*:*", "cpeNameId": "BD502B1D-8E7D-4AD4-9011-E616315740C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.13:*:*:*:*:*:*:*", "cpeNameId": "4A96891C-E4D8-4BBD-8C3A-8BEC1EDD6DF7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.14:*:*:*:*:*:*:*", "cpeNameId": "049B9559-3317-43D0-BB9E-2008182328D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.15:*:*:*:*:*:*:*", "cpeNameId": "3BAD5668-2640-4602-9837-07D764990011"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.16:*:*:*:*:*:*:*", "cpeNameId": "B76E758C-F23C-4E81-8D89-6B3C331DF70A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.17:*:*:*:*:*:*:*", "cpeNameId": "558B0C0A-04D6-41D1-AED9-4D16159FAA64"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.18:*:*:*:*:*:*:*", "cpeNameId": "BC3F9201-BBD4-48C1-9254-14DDCC7A6B7E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.19:*:*:*:*:*:*:*", "cpeNameId": "E8A01AF1-8E23-40E5-A956-AF00A7A47BA0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.20:*:*:*:*:*:*:*", "cpeNameId": "2CAF46F1-2D12-41FC-ABF2-C6F56A9CE410"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.21:*:*:*:*:*:*:*", "cpeNameId": "7A2DC702-A782-4D15-9435-ACC0778F3FB3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.22:*:*:*:*:*:*:*", "cpeNameId": "D2916473-F575-4728-B2EC-60EE62AB8BF7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.23:*:*:*:*:*:*:*", "cpeNameId": "B6409273-5794-4B9E-BDD5-7FCFCF339511"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.24:*:*:*:*:*:*:*", "cpeNameId": "2893EFED-04F5-42B0-96B4-FB29EEFAA9EE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.25:*:*:*:*:*:*:*", "cpeNameId": "F1EC5B2F-8765-464D-A5A2-DEF282D3576A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.26:*:*:*:*:*:*:*", "cpeNameId": "CE231956-F740-4AA4-9750-A9F1E16C7429"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.27:*:*:*:*:*:*:*", "cpeNameId": "B08B4A4D-A673-49B9-9809-6C8EB2D8CCFA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.28:*:*:*:*:*:*:*", "cpeNameId": "25127A10-99C3-4B29-9037-752644FEDAA3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.29:*:*:*:*:*:*:*", "cpeNameId": "7C9B9FDE-13EC-442C-A753-05D753AF7F2F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.30:*:*:*:*:*:*:*", "cpeNameId": "60DFABB9-1C9B-4A43-8A5D-4B51C46D6CF2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.31:*:*:*:*:*:*:*", "cpeNameId": "55547C90-57BE-4B48-80BC-5248CF85A54D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.32:*:*:*:*:*:*:*", "cpeNameId": "4FEC2A07-6C9E-4B57-9F1D-A8C7A2531042"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.33:*:*:*:*:*:*:*", "cpeNameId": "3A3CC360-6DB0-4058-A637-BEA9F10F3ECC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.34:*:*:*:*:*:*:*", "cpeNameId": "74A4841B-22B2-45B0-A608-52579D2983E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.35:*:*:*:*:*:*:*", "cpeNameId": "F5D48DE7-BCE0-4195-B8E2-E3A8C9884647"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.36:*:*:*:*:*:*:*", "cpeNameId": "15A99A35-647E-4AFF-B6E2-0652FE1F9FFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.37:*:*:*:*:*:*:*", "cpeNameId": "51FDBF94-6126-4C97-9650-6902E77C1811"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.38:*:*:*:*:*:*:*", "cpeNameId": "9A7EA0F2-DFB9-4CF2-82D8-F5C569BA5CD7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.39:*:*:*:*:*:*:*", "cpeNameId": "6C245624-3821-4A71-8682-AB66074B82B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.40:*:*:*:*:*:*:*", "cpeNameId": "DD0E98E7-27A5-4BDD-8907-53DA5C31F7A0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.41:*:*:*:*:*:*:*", "cpeNameId": "C879D912-54D4-4C73-91B2-500D49230B7A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.42:*:*:*:*:*:*:*", "cpeNameId": "85E02B17-E410-42FE-A83B-B8B4E7EBB532"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.43:*:*:*:*:*:*:*", "cpeNameId": "56E7B421-D6F4-45BB-A4A7-37AA444554F7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.44:*:*:*:*:*:*:*", "cpeNameId": "146F13C7-D0C9-4829-99CB-36C12B673BF9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.45:*:*:*:*:*:*:*", "cpeNameId": "1BC5E0A8-84C0-44E1-9DFD-5C633FD66E42"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.46:*:*:*:*:*:*:*", "cpeNameId": "965C07B8-7491-41D5-BFFF-C2DC61675475"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.47:*:*:*:*:*:*:*", "cpeNameId": "6F99B518-6BC7-4B89-8C2F-2A61C8F1A66C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.48:*:*:*:*:*:*:*", "cpeNameId": "1654578E-2D00-498E-9EF1-D64BBBBA7070"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.49:*:*:*:*:*:*:*", "cpeNameId": "BC5CCADF-5DEA-4540-8D2F-478F3175DA62"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.50:*:*:*:*:*:*:*", "cpeNameId": "67B5EA2D-9D68-4247-8C79-6F92FD8D39F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.51:*:*:*:*:*:*:*", "cpeNameId": "62B20DEB-030A-4CED-93BC-3F6F4D5AD54B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.52:*:*:*:*:*:*:*", "cpeNameId": "66BDA9E0-B507-4116-9FFC-6DBFE79A3CD4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.53:*:*:*:*:*:*:*", "cpeNameId": "76AB10DC-B6FD-4E05-A1E6-09C04A8A1B13"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.54:*:*:*:*:*:*:*", "cpeNameId": "6461BBE3-2AAA-4975-A75F-F561D3C1B753"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.55:*:*:*:*:*:*:*", "cpeNameId": "957D4BA7-C0CC-482D-8844-03AEBFE9F966"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.56:*:*:*:*:*:*:*", "cpeNameId": "4B6981FD-9D76-418C-BC72-EC1900EA9C04"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.57:*:*:*:*:*:*:*", "cpeNameId": "22E939B7-D460-4BE9-9529-0E26B53304B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.58:*:*:*:*:*:*:*", "cpeNameId": "CC981857-5731-4095-92A2-D10F6F27F85E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.59:*:*:*:*:*:*:*", "cpeNameId": "EB3A0428-3B0E-4608-9D96-AC0687921B92"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.60:*:*:*:*:*:*:*", "cpeNameId": "F1134646-1E83-459B-9E11-B1893162D4B6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.61:*:*:*:*:*:*:*", "cpeNameId": "01F91BC8-9830-49E4-AFCA-5910983AFA96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.62:*:*:*:*:*:*:*", "cpeNameId": "C5611992-8FA6-489D-B4C7-9871472702C4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.63:*:*:*:*:*:*:*", "cpeNameId": "B7E52E14-5B55-4458-9BB8-5A1718BAD459"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.64:*:*:*:*:*:*:*", "cpeNameId": "8407449D-67A3-4594-9340-03C4A009828C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.65:*:*:*:*:*:*:*", "cpeNameId": "0B393B17-93FA-4A1F-AF33-86AFA723BC6C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.66:*:*:*:*:*:*:*", "cpeNameId": "3F002BC4-16F2-44FB-842E-7F1CDBA7D2D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.67:*:*:*:*:*:*:*", "cpeNameId": "AD88F263-F5B8-4027-A433-B33EB293F8C7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.68:*:*:*:*:*:*:*", "cpeNameId": "998A1D28-491B-49AF-BEBA-0B7C55016EDB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.69:*:*:*:*:*:*:*", "cpeNameId": "C00A621D-4F1D-4AD8-BE42-3E584F545757"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.70:*:*:*:*:*:*:*", "cpeNameId": "4A8C8214-FDDA-4A1B-9520-756DE05E1C8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.71:*:*:*:*:*:*:*", "cpeNameId": "69E6FBB1-D0B6-486C-B905-54D292ED0BBF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.72:*:*:*:*:*:*:*", "cpeNameId": "04D7688B-E9C8-4CA0-9564-06136BD00399"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.73:*:*:*:*:*:*:*", "cpeNameId": "A11B2E7E-F239-49F6-9B0A-EB897B935734"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.74:*:*:*:*:*:*:*", "cpeNameId": "09B990BA-BB96-40E6-936B-A42138DA410E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.75:*:*:*:*:*:*:*", "cpeNameId": "EE93F1AB-E1B2-4D42-8482-FC0D5232EDCF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.76:*:*:*:*:*:*:*", "cpeNameId": "E094CC04-C34E-45D2-B7BD-8344494F2AF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.77:*:*:*:*:*:*:*", "cpeNameId": "A7AD03A1-2D39-498C-B6FC-6288DFE6A0B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.78:*:*:*:*:*:*:*", "cpeNameId": "C7332F79-76CA-466E-974C-6D94B2028E83"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.79:*:*:*:*:*:*:*", "cpeNameId": "4C7E0132-E639-4C9E-ACD4-E68A1D16EE27"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.80:*:*:*:*:*:*:*", "cpeNameId": "0BA2A075-D652-4220-80D3-765F2E0F1248"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.81:*:*:*:*:*:*:*", "cpeNameId": "6D6C7CFE-7944-44FE-B8D0-13A87E781C59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.82:*:*:*:*:*:*:*", "cpeNameId": "BD198E06-E1B2-48AD-8236-1026D62FF668"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.83:*:*:*:*:*:*:*", "cpeNameId": "9E1B704D-FA55-4EE9-93AE-345D9CEC178C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.84:*:*:*:*:*:*:*", "cpeNameId": "2AD133E5-08E3-4456-9D3E-E2E42247222A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.85:*:*:*:*:*:*:*", "cpeNameId": "A038FF7C-6591-418B-89B7-AA36E91E4693"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.86:*:*:*:*:*:*:*", "cpeNameId": "17A55453-113E-4F83-9477-C3B94C21751D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.87:*:*:*:*:*:*:*", "cpeNameId": "64DA4194-F0DF-4AC6-A84F-00718C1D262B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.88:*:*:*:*:*:*:*", "cpeNameId": "19541D86-197B-4F32-9541-1ED6128DD8D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.89:*:*:*:*:*:*:*", "cpeNameId": "08118401-AEBB-4CE7-B76D-3017139D0153"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.90:*:*:*:*:*:*:*", "cpeNameId": "DEC38CAA-D49A-4D73-9E8B-92DD13268405"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.91:*:*:*:*:*:*:*", "cpeNameId": "B8923DAF-E99E-4721-B537-489F9195A78E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.92:*:*:*:*:*:*:*", "cpeNameId": "6979C8A1-9270-4687-9A67-0EDF32FB5003"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.93:*:*:*:*:*:*:*", "cpeNameId": "B30A094A-C263-431D-89B2-B54478A622BA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.94:*:*:*:*:*:*:*", "cpeNameId": "DC1C8AC1-972B-4950-AFAE-B2D68A94E1B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.95:*:*:*:*:*:*:*", "cpeNameId": "62FF165D-2752-4AB8-B3B9-CD8FBFABD3DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.96:*:*:*:*:*:*:*", "cpeNameId": "A0B93A29-FEE2-4EA3-87E8-DF6419F51030"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.97:*:*:*:*:*:*:*", "cpeNameId": "3C34F07E-8DBA-4D82-B8FE-1AFEEF9B2BF9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.98:*:*:*:*:*:*:*", "cpeNameId": "AAB29E6F-C210-4EA2-B2F8-5E1B2041B0B2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.99:*:*:*:*:*:*:*", "cpeNameId": "75652929-F44D-4DF1-8757-F7A8C10D9793"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.100:*:*:*:*:*:*:*", "cpeNameId": "C1AB8FB2-09C2-4A4F-B4EE-E581035E270E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.101:*:*:*:*:*:*:*", "cpeNameId": "0FCB52E4-4EA8-4555-B9A1-EEB1056DC5B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.102:*:*:*:*:*:*:*", "cpeNameId": "57C00F3F-2CEE-4A7F-947F-7A53CA00E52A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.103:*:*:*:*:*:*:*", "cpeNameId": "16CB7735-79B7-4335-8184-6D29A5C85840"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.104:*:*:*:*:*:*:*", "cpeNameId": "8ED9B3BD-8DDA-4465-BF33-9291986917AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.105:*:*:*:*:*:*:*", "cpeNameId": "3400C155-68D5-4DD8-807C-1EF4A4E1BB32"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.106:*:*:*:*:*:*:*", "cpeNameId": "A8B564E7-8A6F-466F-BC53-1B839D9FD3DE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.107:*:*:*:*:*:*:*", "cpeNameId": "F648ABD4-CD53-42CE-9C51-DFBD245FACB4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.108:*:*:*:*:*:*:*", "cpeNameId": "23D39FA8-42FB-43B7-92C7-D831548A0935"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.109:*:*:*:*:*:*:*", "cpeNameId": "5B96FEF9-EE49-4B1F-A218-B141E954CFD2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.110:*:*:*:*:*:*:*", "cpeNameId": "5A3CA9E6-CACE-4937-96F4-B8D45D43AAD2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.111:*:*:*:*:*:*:*", "cpeNameId": "B7084F8D-AD91-4EF1-9901-21AB7E8239CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.112:*:*:*:*:*:*:*", "cpeNameId": "3E544363-B63B-44C1-9F2E-597BE9EF2E65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.113:*:*:*:*:*:*:*", "cpeNameId": "B1C84F8A-2DA9-41BE-872B-B00A297AEA2D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.114:*:*:*:*:*:*:*", "cpeNameId": "6F69AA79-57C2-4B8E-9F8D-5AAFACAD0248"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.115:*:*:*:*:*:*:*", "cpeNameId": "FD6D4727-C95F-4515-8D4A-9D6FDC28C793"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.116:*:*:*:*:*:*:*", "cpeNameId": "01BC52F7-3028-480F-8E37-52A7715AC90A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.117:*:*:*:*:*:*:*", "cpeNameId": "60A7B794-E16E-477D-A4C1-ECA62111DC18"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.118:*:*:*:*:*:*:*", "cpeNameId": "F663FEC6-B040-4A0E-A396-83008CF0ABAB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.119:*:*:*:*:*:*:*", "cpeNameId": "BEFDB30B-BCC5-47F0-B733-2E581725D18A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.120:*:*:*:*:*:*:*", "cpeNameId": "4C86DF14-070B-4C3D-A141-31F7FCA61C34"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.121:*:*:*:*:*:*:*", "cpeNameId": "E3406F7B-D836-49DD-8EFE-AE315BBB19FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.122:*:*:*:*:*:*:*", "cpeNameId": "DB62435E-44D2-471D-BA63-8E6FAE8D278F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.123:*:*:*:*:*:*:*", "cpeNameId": "C28E5075-1E51-43C2-BC69-1E248F152A9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.124:*:*:*:*:*:*:*", "cpeNameId": "76B2228F-19B1-4B9B-9F0F-9DC7CE0DDEFB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.125:*:*:*:*:*:*:*", "cpeNameId": "0B3C0A1E-4727-4E70-8AB9-240A38FA2C5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.126:*:*:*:*:*:*:*", "cpeNameId": "78A85D5F-28F1-456B-A1F2-F73FCDCD8442"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.127:*:*:*:*:*:*:*", "cpeNameId": "07FFD4BD-5B60-41C7-818B-C3AB067ABCF8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.128:*:*:*:*:*:*:*", "cpeNameId": "B2882FB9-CA5D-4C93-BB74-931D3EC95036"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.129:*:*:*:*:*:*:*", "cpeNameId": "1CBF16B6-7148-41A0-8BDF-BAD70ECB2360"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.130:*:*:*:*:*:*:*", "cpeNameId": "F106F4F0-7318-4685-A521-D45D280E0BF8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.131:*:*:*:*:*:*:*", "cpeNameId": "81304DDD-B706-4473-9635-1659080883DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.132:*:*:*:*:*:*:*", "cpeNameId": "EB41A9BB-D88D-49F1-83CD-523699801BF2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.133:*:*:*:*:*:*:*", "cpeNameId": "F8E3204C-6023-4133-9A7F-43F9D2AB144D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.134:*:*:*:*:*:*:*", "cpeNameId": "2A36AD35-A964-4C7A-B1D8-0F78188EE2DE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.135:*:*:*:*:*:*:*", "cpeNameId": "8FAABE9A-8B07-4930-85A9-6616D502F568"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.136:*:*:*:*:*:*:*", "cpeNameId": "9D0664AA-A1FB-4ED3-913B-8390C5192A5A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.137:*:*:*:*:*:*:*", "cpeNameId": "668A5320-81CD-4C09-AE34-9EAAB732DBBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.138:*:*:*:*:*:*:*", "cpeNameId": "3FB2B6F3-F840-47ED-A6BD-2BCA441B6108"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.139:*:*:*:*:*:*:*", "cpeNameId": "9F422368-B0CB-4DD5-BC42-60E4BECD4404"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.140:*:*:*:*:*:*:*", "cpeNameId": "3D3E1A1F-0BED-4FE6-9E2F-745C782AFCB5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.141:*:*:*:*:*:*:*", "cpeNameId": "DACB210F-4E23-4FFE-B706-5889289531D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.142:*:*:*:*:*:*:*", "cpeNameId": "781F8D80-4176-4FC3-9B77-A1BB0C88AC65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.143:*:*:*:*:*:*:*", "cpeNameId": "1F4415C4-3002-4A32-A992-54DC73CAF533"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.144:*:*:*:*:*:*:*", "cpeNameId": "7089C196-FD3C-4675-9BE6-2666C406C5D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.145:*:*:*:*:*:*:*", "cpeNameId": "9590F0EF-8260-4B9F-B66C-3E184AC93E63"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.146:*:*:*:*:*:*:*", "cpeNameId": "4FA1CA12-EB95-48B5-98F3-953859E43ED5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.147:*:*:*:*:*:*:*", "cpeNameId": "ED73D0A6-55DA-4D5B-BA38-9BCD74613827"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.148:*:*:*:*:*:*:*", "cpeNameId": "BD154522-4E63-4FB9-ABC2-77F7850B502B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.149:*:*:*:*:*:*:*", "cpeNameId": "E765B3E4-E2B5-42A5-94AD-5E3D3283B7B2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.150:*:*:*:*:*:*:*", "cpeNameId": "AAC26F5B-06AE-49E2-8FE8-17D01ABD1BEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.151:*:*:*:*:*:*:*", "cpeNameId": "91B291A8-CD84-4201-93AD-4B7981CEBDBC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.152:*:*:*:*:*:*:*", "cpeNameId": "A13E73C3-8219-4909-B7FB-312605EFE682"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.153:*:*:*:*:*:*:*", "cpeNameId": "3439519B-F130-44DB-8EF6-C65A2EF5AF5C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.154:*:*:*:*:*:*:*", "cpeNameId": "B93C5FAB-C686-4B8C-B0D5-20C03F3847DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.155:*:*:*:*:*:*:*", "cpeNameId": "F241AC0B-B446-45F4-9A2E-B4B259F4F173"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.156:*:*:*:*:*:*:*", "cpeNameId": "93A18F08-8AD4-4FD2-9A02-E58939D514FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.157:*:*:*:*:*:*:*", "cpeNameId": "334BC1BD-BCDE-4017-930B-8E2E3685773A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.158:*:*:*:*:*:*:*", "cpeNameId": "27100D3E-E3D1-4917-959E-CF6C9CB4838A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.159:*:*:*:*:*:*:*", "cpeNameId": "E9B9F90B-EDBF-452D-9EED-5906465EC142"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.160:*:*:*:*:*:*:*", "cpeNameId": "4B9782F4-75EF-407A-A270-6B9F10B3AB61"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.161:*:*:*:*:*:*:*", "cpeNameId": "4E536BAB-E89A-4298-A620-65E2EA131D54"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.162:*:*:*:*:*:*:*", "cpeNameId": "0234E459-D46E-4FF6-97A0-78C8D0C1413F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.163:*:*:*:*:*:*:*", "cpeNameId": "5672A718-38DA-42BD-8D94-C44CB7EB5B0D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.164:*:*:*:*:*:*:*", "cpeNameId": "7F359B5A-FC0F-4AC9-B676-EE99B7ACF987"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.165:*:*:*:*:*:*:*", "cpeNameId": "C12A4D9B-491F-4FCD-8F98-ACE8680C3DB9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.166:*:*:*:*:*:*:*", "cpeNameId": "A616B27B-8D52-4876-B9DA-49AE47E47B14"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.167:*:*:*:*:*:*:*", "cpeNameId": "A9FB1FBC-3EAC-4068-95C6-A8449AA30236"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.168:*:*:*:*:*:*:*", "cpeNameId": "56F2978B-DD10-4874-9226-22B3EF53C34A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.169:*:*:*:*:*:*:*", "cpeNameId": "77DCE15B-B6AA-4BFA-9B0E-2A4AA9751AA5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.170:*:*:*:*:*:*:*", "cpeNameId": "5B59BFDD-BD40-46BB-BA2E-0AAD30C6906C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.171:*:*:*:*:*:*:*", "cpeNameId": "2BE79BFF-5683-4CA6-B2C9-6001FD77BC99"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.172:*:*:*:*:*:*:*", "cpeNameId": "50BE4FDF-F0EE-4CC4-837F-576E3E212A2F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.173:*:*:*:*:*:*:*", "cpeNameId": "96A6E180-7005-48FA-A98B-DC22F7815B81"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.174:*:*:*:*:*:*:*", "cpeNameId": "F6CD2092-770F-4F3E-9661-06699D965D76"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.175:*:*:*:*:*:*:*", "cpeNameId": "EBF1E1E4-AD08-4B18-9F12-B4EEE194638D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.176:*:*:*:*:*:*:*", "cpeNameId": "6A0486A1-F99F-4E4B-AC39-C12F5D674339"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.177:*:*:*:*:*:*:*", "cpeNameId": "DF9B41BC-B6C2-48AC-9AEE-67A846D344A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.178:*:*:*:*:*:*:*", "cpeNameId": "C2E8FEC6-59E1-4AF4-94EE-7A676B5A2C82"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.179:*:*:*:*:*:*:*", "cpeNameId": "60FF0BF4-4505-484E-8152-B3514FCF95F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.180:*:*:*:*:*:*:*", "cpeNameId": "5DAFDB50-AB4D-4F94-B465-07D40DA4AFE9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.181:*:*:*:*:*:*:*", "cpeNameId": "4CBFF0C0-9773-47CF-AD66-EE00279272C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.182:*:*:*:*:*:*:*", "cpeNameId": "BB407A40-747A-4CF3-8A14-8296DBB7BF38"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.183:*:*:*:*:*:*:*", "cpeNameId": "1386612C-94AB-4DD6-90F9-23D697BD76FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.184:*:*:*:*:*:*:*", "cpeNameId": "0476CD76-2D3E-45FA-88DB-83DA9330CD85"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.185:*:*:*:*:*:*:*", "cpeNameId": "5964859C-6BA3-4286-B050-83960EF7EF71"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.186:*:*:*:*:*:*:*", "cpeNameId": "CC9E8E7E-93FE-4DB7-AF1B-8F7E63CBA37F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.187:*:*:*:*:*:*:*", "cpeNameId": "223FEF84-695D-44FF-9C33-47F8CBFDD953"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.188:*:*:*:*:*:*:*", "cpeNameId": "0CE412FB-E60A-4DFB-8094-EFBE693FF4A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.189:*:*:*:*:*:*:*", "cpeNameId": "501D8AD1-97D7-49C1-B512-061538B8F73F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.190:*:*:*:*:*:*:*", "cpeNameId": "0A2332E6-CC09-486E-A662-9766D623BF34"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.191:*:*:*:*:*:*:*", "cpeNameId": "EDEFF704-F4A6-4282-9428-DEFEFEB4A93A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.192:*:*:*:*:*:*:*", "cpeNameId": "1181DE8F-7EE2-4EC3-8F84-8B313F65047A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.193:*:*:*:*:*:*:*", "cpeNameId": "78EF3A83-66F1-40F3-9C3C-25AFF40BE88C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.194:*:*:*:*:*:*:*", "cpeNameId": "8D611766-BB3A-4528-B1CE-74CB0EAE4467"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.195:*:*:*:*:*:*:*", "cpeNameId": "0C729423-E12A-4F19-9753-94CE465C6283"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.196:*:*:*:*:*:*:*", "cpeNameId": "8F11E143-CE43-4B63-BE73-0A33CD99110D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.197:*:*:*:*:*:*:*", "cpeNameId": "FEB027DD-E13F-4A38-876F-9AFB1E0BE409"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.198:*:*:*:*:*:*:*", "cpeNameId": "6737850B-DE08-4472-B2C7-F60DCDB95CBE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.199:*:*:*:*:*:*:*", "cpeNameId": "C6EA9B80-7284-47CF-954F-EEA349A002FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.200:*:*:*:*:*:*:*", "cpeNameId": "C33F1CE0-023E-4BD6-A32C-2AD5847A9797"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.201:*:*:*:*:*:*:*", "cpeNameId": "FE090B8A-1060-42D0-BB85-D17C7A299D65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.202:*:*:*:*:*:*:*", "cpeNameId": "7F50D385-2E96-471F-B48A-36C222DED1F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.203:*:*:*:*:*:*:*", "cpeNameId": "243CF5E0-1BA3-4C09-830B-F3E5CAE77985"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.204:*:*:*:*:*:*:*", "cpeNameId": "571B9EE4-5DD5-4B3C-842F-B230D4577C98"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.205:*:*:*:*:*:*:*", "cpeNameId": "55A5490D-D0D4-4F11-80E6-6CF300B18FF8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.206:*:*:*:*:*:*:*", "cpeNameId": "97286FA5-0BCE-42D1-A0D7-1B4AD3F78A31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.207:*:*:*:*:*:*:*", "cpeNameId": "C54631BB-ABC0-4711-A5EE-CCFA9870260F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.208:*:*:*:*:*:*:*", "cpeNameId": "0939F707-4609-42F2-B906-3FC03BBAC7A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.209:*:*:*:*:*:*:*", "cpeNameId": "257E4F1B-512E-4A55-9819-3A0A0EFC431F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.210:*:*:*:*:*:*:*", "cpeNameId": "6214CC75-234D-4219-9F50-28E5D54F6661"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.210-1:*:*:*:*:*:*:*", "cpeNameId": "11E87954-7E16-41C9-A673-08D5FD40B194"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.211:*:*:*:*:*:*:*", "cpeNameId": "F95B5FE1-6964-4158-9066-9B148AA7C8AD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.212:*:*:*:*:*:*:*", "cpeNameId": "E0268D70-A7DC-4B52-AE6F-C459A59F0CF9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.213:*:*:*:*:*:*:*", "cpeNameId": "51275AB0-D417-4CE6-8847-B338B340E913"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.214:*:*:*:*:*:*:*", "cpeNameId": "50D2F1EA-0B29-4FDB-8221-BD3C1A800B1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.215:*:*:*:*:*:*:*", "cpeNameId": "12A80615-D31E-44C9-A367-355599328039"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.216:*:*:*:*:*:*:*", "cpeNameId": "A38157E4-F68B-4E60-AF7E-FD7BF9F0E6A0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.217:*:*:*:*:*:*:*", "cpeNameId": "BC328F65-1554-4FF9-A440-C6A6DC08971F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.218:*:*:*:*:*:*:*", "cpeNameId": "E7E67420-ABB7-4AB3-8A93-EF6DEFFB08CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.219:*:*:*:*:*:*:*", "cpeNameId": "0176C290-5F23-4D25-90E0-CFC2FD39785E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.220:*:*:*:*:*:*:*", "cpeNameId": "D89672F3-3069-4FA7-876C-5486351A4210"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.221:*:*:*:*:*:*:*", "cpeNameId": "1C4FC865-E82F-4AAA-BDB2-48CBAF2CEDDB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.222:*:*:*:*:*:*:*", "cpeNameId": "E9641D38-4E53-4C16-9DCB-1ABEAB859051"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.223:*:*:*:*:*:*:*", "cpeNameId": "7D0DB446-81CF-48A4-8FDF-82DB13F9EEFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.224:*:*:*:*:*:*:*", "cpeNameId": "A36C68E0-7DAF-47AE-84CE-355D19D2A184"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.225:*:*:*:*:*:*:*", "cpeNameId": "1A4AF8D7-ABBC-406D-8A9B-6064D1C0FB3A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.226:*:*:*:*:*:*:*", "cpeNameId": "DB3D137C-BAFE-4A08-A5F6-CF9CE3ECF4BA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.227:*:*:*:*:*:*:*", "cpeNameId": "AE161CD5-8D27-4A12-B17B-D329F43349D6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.228:*:*:*:*:*:*:*", "cpeNameId": "0723CFAE-5DBC-4043-AF8F-0C597B0CEAB3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.229:*:*:*:*:*:*:*", "cpeNameId": "D47DB171-26CB-4971-9D2A-7E6B574DCB33"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.230:*:*:*:*:*:*:*", "cpeNameId": "5FFE79E1-68FA-45D6-81A7-DC9AEA1554EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.231:*:*:*:*:*:*:*", "cpeNameId": "2CF57430-4909-48C5-967D-3DB6853FAAFC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.232:*:*:*:*:*:*:*", "cpeNameId": "6BFB7AAB-A1B4-403E-A26B-F14B8FD509C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.233:*:*:*:*:*:*:*", "cpeNameId": "31E31C3B-F769-4B65-AC62-A281A99ECA2D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.234:*:*:*:*:*:*:*", "cpeNameId": "6CFE18B9-2BF3-4BDA-9A19-9A8F945F039F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.235:*:*:*:*:*:*:*", "cpeNameId": "3EF2F123-9B38-401A-81CD-DCDF786F1FBC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.236:*:*:*:*:*:*:*", "cpeNameId": "0B4E0DD4-C051-4F64-B333-B896B86813D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.237:*:*:*:*:*:*:*", "cpeNameId": "57C1E65F-0E87-4296-B131-25A82A0A9667"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.238:*:*:*:*:*:*:*", "cpeNameId": "2BD9177D-1F32-4B5A-A11F-F779CC665C49"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.239:*:*:*:*:*:*:*", "cpeNameId": "737F1344-63A8-42A5-BD48-891A8E17769A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.240:*:*:*:*:*:*:*", "cpeNameId": "E1BAD9D3-D0F2-42CC-93A3-F5B6A1CEC9D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.241:*:*:*:*:*:*:*", "cpeNameId": "CA99B95F-7BBC-40BE-AA68-6A10CE2C8D4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.242:*:*:*:*:*:*:*", "cpeNameId": "A93EB856-783D-4DF9-8387-0BD4C09F9AD0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.243:*:*:*:*:*:*:*", "cpeNameId": "48503212-F9A6-4AB5-8DE9-374622582C15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.244:*:*:*:*:*:*:*", "cpeNameId": "C8F1F3B2-9299-403A-8118-461511F3F50B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.245:*:*:*:*:*:*:*", "cpeNameId": "197B1275-A4E8-4582-ACE2-4C5C5C8C5474"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.246:*:*:*:*:*:*:*", "cpeNameId": "9B64D972-8C44-4B79-9E76-8ECDEBCEBC0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.247:*:*:*:*:*:*:*", "cpeNameId": "5754042A-B1DB-4AD4-B388-76DE9263DC67"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.248:*:*:*:*:*:*:*", "cpeNameId": "2E8BDAA4-D539-42BA-B41E-4EF7C8979B48"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.249:*:*:*:*:*:*:*", "cpeNameId": "03C647CD-10CD-446B-BE6E-3D76C120F364"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.250:*:*:*:*:*:*:*", "cpeNameId": "2F217035-1A6D-43B9-A24D-6F8990190B31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.251:*:*:*:*:*:*:*", "cpeNameId": "4B197B49-5F9B-4B96-B12A-2B471778F13C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.252:*:*:*:*:*:*:*", "cpeNameId": "2481C266-83AA-4815-8405-7C2734A77FB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.253:*:*:*:*:*:*:*", "cpeNameId": "93A07E06-FA31-4E3F-9DAB-CB3846386198"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.254:*:*:*:*:*:*:*", "cpeNameId": "A1AF307F-312C-4040-8F95-9ED0230288F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.255:*:*:*:*:*:*:*", "cpeNameId": "38C39A6F-9AE7-4CB6-B524-1E1F10665007"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.256:*:*:*:*:*:*:*", "cpeNameId": "97AFE000-934E-495E-90DA-C6B13B3C2585"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.257:*:*:*:*:*:*:*", "cpeNameId": "9A1B0076-9309-4165-84AB-3C627316F802"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.258:*:*:*:*:*:*:*", "cpeNameId": "02108CDE-7848-47AA-AC02-43FF6B596975"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.259:*:*:*:*:*:*:*", "cpeNameId": "1C0EC444-2A66-4716-AC4A-4660ECFC5619"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.260:*:*:*:*:*:*:*", "cpeNameId": "FEE507B5-A54C-4EBD-BD63-4CC37CE9C472"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.261:*:*:*:*:*:*:*", "cpeNameId": "D30AE27B-C292-40B5-9296-B58140B669F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.262:*:*:*:*:*:*:*", "cpeNameId": "381C2F4E-4F46-4C12-9112-0A0F60A2F50E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.263:*:*:*:*:*:*:*", "cpeNameId": "D3492ED4-57AE-495F-9627-20898D0BB155"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.264:*:*:*:*:*:*:*", "cpeNameId": "BC81C283-32BE-483A-8017-C90388AE2515"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.265:*:*:*:*:*:*:*", "cpeNameId": "47C4B68F-6562-41A2-B6BA-1E3C60FA2FA1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.266:*:*:*:*:*:*:*", "cpeNameId": "7DE0121E-5AD4-4D6C-8406-2FB7D997F256"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.267:*:*:*:*:*:*:*", "cpeNameId": "6A265E87-7736-450B-8A3C-93FC8AA776C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.268:*:*:*:*:*:*:*", "cpeNameId": "2640A395-FEBD-4AD6-9FC8-4D8D1A906F80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.269:*:*:*:*:*:*:*", "cpeNameId": "64CF3CC1-31A9-467A-847E-F03C704256C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.270:*:*:*:*:*:*:*", "cpeNameId": "6030D6B8-14B2-476D-9275-AF6F52DD4DD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.271:*:*:*:*:*:*:*", "cpeNameId": "BD41D072-F5AF-42E0-9922-B331CB051449"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.272:*:*:*:*:*:*:*", "cpeNameId": "E0212CDC-E613-4B2A-9B60-16D962136AFF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.273:*:*:*:*:*:*:*", "cpeNameId": "452DD917-1B22-4F9B-A9AA-5FD1F9F2C442"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.274:*:*:*:*:*:*:*", "cpeNameId": "6AD4B227-D8D4-42C9-B310-ADA3F37B72BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.275:*:*:*:*:*:*:*", "cpeNameId": "EFE5E55E-9BCB-44E1-BC58-3DF14B515429"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.276:*:*:*:*:*:*:*", "cpeNameId": "10D3145D-E10C-4590-833C-0AE554FF7897"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.277:*:*:*:*:*:*:*", "cpeNameId": "B01C199E-6C8B-4BFA-9DA9-7B1905680626"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.278:*:*:*:*:*:*:*", "cpeNameId": "762C856E-6757-4DFB-A512-B6F03DDC8929"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.279:*:*:*:*:*:*:*", "cpeNameId": "169A9512-5C6F-478E-B16E-82D181C58A97"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.280:*:*:*:*:*:*:*", "cpeNameId": "F8BC9746-521D-4801-AC1D-66A84A780A65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.281:*:*:*:*:*:*:*", "cpeNameId": "1B8D8A00-4E6C-4CD0-8BC5-6EB8BE73B529"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.282:*:*:*:*:*:*:*", "cpeNameId": "5B93AA93-ABD4-45F5-B571-4CAE3CEC6AF9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.283:*:*:*:*:*:*:*", "cpeNameId": "E46991B0-6A28-4411-AF4A-EAF75291B8A5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.284:*:*:*:*:*:*:*", "cpeNameId": "21984D32-DD5B-488B-83DB-77BD0A122405"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.285:*:*:*:*:*:*:*", "cpeNameId": "D0B6234C-571C-42EE-8FD1-334921F4F502"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.286:*:*:*:*:*:*:*", "cpeNameId": "C969671F-1264-4233-B73B-570A481B64CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.287:*:*:*:*:*:*:*", "cpeNameId": "2053D2FF-B750-4B7E-BDFA-2A0F276F15C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.288:*:*:*:*:*:*:*", "cpeNameId": "B221B69F-8204-49BA-8AF4-AFF146D46FB8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.289:*:*:*:*:*:*:*", "cpeNameId": "C8142E09-6E61-4652-A9DA-38072F891A96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.290:*:*:*:*:*:*:*", "cpeNameId": "A534AF2A-A909-45A6-B7E3-A4B2F782CC92"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.291:*:*:*:*:*:*:*", "cpeNameId": "53B57317-723A-4E6B-AAB3-71676106E4CC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.292:*:*:*:*:*:*:*", "cpeNameId": "15CCD6EA-C7F2-47C2-82F4-52F075759660"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.293:*:*:*:*:*:*:*", "cpeNameId": "F1E6DE51-B3AA-4790-A531-9AE7F458DEB1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.294:*:*:*:*:*:*:*", "cpeNameId": "DAEAC0AB-0B68-4970-987B-C7670A6BD22E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.295:*:*:*:*:*:*:*", "cpeNameId": "3187B482-8D58-434C-8E34-EF7AF68AB006"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.296:*:*:*:*:*:*:*", "cpeNameId": "FDE4B426-ED64-449F-9B09-0CD8EA2FFD26"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.297:*:*:*:*:*:*:*", "cpeNameId": "998E67F4-C650-4407-9C7C-339B164FCD92"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.298:*:*:*:*:*:*:*", "cpeNameId": "60CE826D-94F2-441E-A37E-85C4FCD86554"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.299:*:*:*:*:*:*:*", "cpeNameId": "3D327ABE-B8D3-4496-9A9C-62C030CC90D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.300:*:*:*:*:*:*:*", "cpeNameId": "51E9D896-6DD7-4163-81B4-3F44CAD9A2C2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.301:*:*:*:*:*:*:*", "cpeNameId": "D1D112AB-4F07-4CD9-94D4-185B7830316F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.302:*:*:*:*:*:*:*", "cpeNameId": "9BBA920A-1DC4-48A6-B0B6-E31D342537FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.303:*:*:*:*:*:*:*", "cpeNameId": "B039FA99-E67A-409B-A18E-E6BD888E7439"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.304:*:*:*:*:*:*:*", "cpeNameId": "55859E55-03E7-4B8A-BDF6-31710F02863F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.305:*:*:*:*:*:*:*", "cpeNameId": "5ECFC1EA-4DCB-4381-8066-52D9EF210ED7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.306:*:*:*:*:*:*:*", "cpeNameId": "F85A14FE-ADE4-44AB-9DB7-E2D9BE784326"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.307:*:*:*:*:*:*:*", "cpeNameId": "31BE7E06-85C8-422D-945A-0699DDCDD577"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.308:*:*:*:*:*:*:*", "cpeNameId": "394979DD-B2FE-4F43-A635-4BA1953944CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.309:*:*:*:*:*:*:*", "cpeNameId": "079C35C6-0C73-475F-B35D-BAA4318FAB25"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.310:*:*:*:*:*:*:*", "cpeNameId": "85C1B276-0232-4F9E-BCB1-271209082177"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.311:*:*:*:*:*:*:*", "cpeNameId": "5DE9B94E-2F63-48F3-9EE3-29F97357808B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.312:*:*:*:*:*:*:*", "cpeNameId": "472662F2-3E14-450F-A806-E44B1B6C57C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.313:*:*:*:*:*:*:*", "cpeNameId": "4151B004-BFC1-434B-8DD7-7D6857831591"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.314:*:*:*:*:*:*:*", "cpeNameId": "5EB1843D-66B2-4766-B25D-291A2DD4B43F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.315:*:*:*:*:*:*:*", "cpeNameId": "5AC67AE7-DE1E-4329-9E98-1266CDFDCD3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.316:*:*:*:*:*:*:*", "cpeNameId": "665EDCA8-FBE2-48C3-B2A2-E44620F9321A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.317:*:*:*:*:*:*:*", "cpeNameId": "53E4605F-2DAF-436F-9B66-5C9483E4B0F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.318:*:*:*:*:*:*:*", "cpeNameId": "19FF749F-D1B2-4608-A238-B6FD9202A31E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.319:*:*:*:*:*:*:*", "cpeNameId": "D160B5B1-B754-4FD1-ABBE-5CF8AC941935"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.320:*:*:*:*:*:*:*", "cpeNameId": "442FB5A9-9102-48F4-B63A-684FAFCEEF6C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.321:*:*:*:*:*:*:*", "cpeNameId": "34EB7DA8-8A3B-4710-B39F-268F72709105"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.322:*:*:*:*:*:*:*", "cpeNameId": "EC519279-B76A-42BE-B6CB-8C0418032372"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.323:*:*:*:*:*:*:*", "cpeNameId": "3F56BE42-4A5B-4EED-B538-EB93D1692BD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.324:*:*:*:*:*:*:*", "cpeNameId": "CD51D183-BC77-4CA5-B961-ED0F3C008967"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.325:*:*:*:*:*:*:*", "cpeNameId": "F160C172-25E9-49B4-A253-58D8E6AE0914"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.326:*:*:*:*:*:*:*", "cpeNameId": "7B3900FD-154B-4A5B-9A6B-5609E9113274"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.327:*:*:*:*:*:*:*", "cpeNameId": "EA753912-D612-4583-9A1A-3DAA2466D1D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.328:*:*:*:*:*:*:*", "cpeNameId": "8F78B7BB-07DA-4FD5-97CB-2A1C3B38ADA9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.329:*:*:*:*:*:*:*", "cpeNameId": "5D01F5BD-260A-45C9-A220-1B1F1ED05BAC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.330:*:*:*:*:*:*:*", "cpeNameId": "4757B741-0579-4F0D-93B6-4152C0ACEDE7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.331:*:*:*:*:*:*:*", "cpeNameId": "49CB08ED-A588-4C13-AF4E-B76BA560B121"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.332:*:*:*:*:*:*:*", "cpeNameId": "B235999E-D6AC-40F3-84C5-8CB6F78213C9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.333:*:*:*:*:*:*:*", "cpeNameId": "A1FD2FA3-E019-47DA-B601-7CF78944A798"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.334:*:*:*:*:*:*:*", "cpeNameId": "EB3381CD-67DB-4D53-BDEE-811E30F95A1A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.335:*:*:*:*:*:*:*", "cpeNameId": "4E77A679-0C67-4691-B514-917657B01A5A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.336:*:*:*:*:*:*:*", "cpeNameId": "16E4641A-47F6-442F-AE88-17E4B987E3CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.337:*:*:*:*:*:*:*", "cpeNameId": "641CDB5F-54CC-425A-B656-9A9B58A08FBF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10:*:*:*:*:*:*:*", "cpeNameId": "801F7D56-009B-4A66-A380-891D1C09EC0E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10:-:*:*:*:*:*:*", "cpeNameId": "737F8B22-35BD-4355-8726-CAB10284B0F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10:rc1:*:*:*:*:*:*", "cpeNameId": "378C4500-0CC7-4110-8E02-B8B89064CB59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10:rc2:*:*:*:*:*:*", "cpeNameId": "C3B39C83-E8E1-4DA7-8251-F2092C6B05D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10:rc3:*:*:*:*:*:*", "cpeNameId": "78D16190-2359-4F43-9816-2080B1827AC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10:rc4:*:*:*:*:*:*", "cpeNameId": "B8C99710-34D3-4AB2-B2D2-09F4B84AE4E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10:rc5:*:*:*:*:*:*", "cpeNameId": "4322E527-2823-41C7-85A2-7B41C74EAC58"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.1:*:*:*:*:*:*:*", "cpeNameId": "9C33CAE9-C906-493D-AE83-630F775358ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.2:*:*:*:*:*:*:*", "cpeNameId": "8F61A3BF-4522-4622-947D-00D359B55176"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.3:*:*:*:*:*:*:*", "cpeNameId": "1EB67AD1-84CA-4A13-838D-BCCA096F8A43"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.4:*:*:*:*:*:*:*", "cpeNameId": "F0EF9085-D82D-451F-B3AF-70E38633405F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.5:*:*:*:*:*:*:*", "cpeNameId": "13FE2FB3-6377-4579-8372-ED7D7601F139"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.6:*:*:*:*:*:*:*", "cpeNameId": "CAD06591-0516-4D81-B575-F6C582AFFDEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.7:*:*:*:*:*:*:*", "cpeNameId": "02EB240A-C24B-44BD-86EA-60D23F353699"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.8:*:*:*:*:*:*:*", "cpeNameId": "7F10C5D0-46D5-462D-8ADC-2E4E5916E34D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.9:*:*:*:*:*:*:*", "cpeNameId": "2FAAEF0C-02F6-4CB5-8452-2ADB5F96602C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.10:*:*:*:*:*:*:*", "cpeNameId": "597FA1BA-E530-477E-8B32-7A767ABD9779"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.11:*:*:*:*:*:*:*", "cpeNameId": "BB2F91B5-234B-4006-B083-4DCB240C7735"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.12:*:*:*:*:*:*:*", "cpeNameId": "86A9E5EB-A7B2-4551-96C3-D2F96B8807EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.13:*:*:*:*:*:*:*", "cpeNameId": "07E25F8D-B2C9-4E32-8DB7-B0B700EF87B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.14:*:*:*:*:*:*:*", "cpeNameId": "B72B8BC5-A491-423C-B3B3-49C3878062F4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.15:*:*:*:*:*:*:*", "cpeNameId": "92F730C1-4118-47C8-8077-34E9367D198C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.16:*:*:*:*:*:*:*", "cpeNameId": "340A6F80-AECA-45F2-A8C0-E75A51ADEB17"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.17:*:*:*:*:*:*:*", "cpeNameId": "5245DF5B-3563-44B6-B5AD-9E7AC85D8CE9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:*:*:*:*:*:*:*", "cpeNameId": "7DAEC1AA-D9DB-4969-8835-19DE5562750C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:-:*:*:*:*:*:*", "cpeNameId": "53233DB2-D8A4-4392-B5B9-43F109778BC0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:rc1:*:*:*:*:*:*", "cpeNameId": "F67207B1-581C-4560-A1BA-FBCC51A59367"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:rc2:*:*:*:*:*:*", "cpeNameId": "FBAE195B-6447-49D4-AAAA-D595A811677F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:rc3:*:*:*:*:*:*", "cpeNameId": "0491309A-660F-444C-89A9-FFE1FA1A9B79"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:rc4:*:*:*:*:*:*", "cpeNameId": "35274394-863C-4A7D-9EFB-B49A5900A33C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:rc5:*:*:*:*:*:*", "cpeNameId": "5779025A-A7C7-40BE-840B-EE69D3D1BE62"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:rc6:*:*:*:*:*:*", "cpeNameId": "0E052BC2-1D38-4E80-9D23-889E827E597C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:rc7:*:*:*:*:*:*", "cpeNameId": "DF4B5805-B18E-4733-9A8B-135508008D0A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.1:*:*:*:*:*:*:*", "cpeNameId": "0A040921-C942-4FE5-A49A-A55F24A8D54C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.2:*:*:*:*:*:*:*", "cpeNameId": "97AF733F-A86E-41A1-832C-CC20306F11FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.3:*:*:*:*:*:*:*", "cpeNameId": "5CC1CF35-345D-45F8-BF5C-6B9C6B9696B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.4:*:*:*:*:*:*:*", "cpeNameId": "137C1EF2-A31B-431E-8F29-546D88139D13"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.5:*:*:*:*:*:*:*", "cpeNameId": "BD008082-6870-4CE0-BC04-1001F619E011"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.6:*:*:*:*:*:*:*", "cpeNameId": "E4F8E539-321B-4263-BB4B-20AAF31088D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.7:*:*:*:*:*:*:*", "cpeNameId": "A93CF5C7-A951-446B-ADFD-4A099F87A003"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.8:*:*:*:*:*:*:*", "cpeNameId": "32373BAD-CD72-44AE-883B-2AAD48A81497"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.9:*:*:*:*:*:*:*", "cpeNameId": "D22968FC-60EE-4D07-B61E-8216515FDA3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.10:*:*:*:*:*:*:*", "cpeNameId": "278604F1-EE00-4BCD-8B4F-D52B1E83CC03"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.11:*:*:*:*:*:*:*", "cpeNameId": "C182B41E-1285-49CD-8537-F2B2BE11E5A6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.12:*:*:*:*:*:*:*", "cpeNameId": "AEDE877D-D8A5-4365-9354-355C5BDBF8D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12:*:*:*:*:*:*:*", "cpeNameId": "0975E1F0-0E5F-445B-BBAC-66294DC99443"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12:-:*:*:*:*:*:*", "cpeNameId": "DF7473CD-B405-4E90-9185-B9E682AB2EA8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12:rc1:*:*:*:*:*:*", "cpeNameId": "3704C17E-765C-494D-ABF4-6687AD9DCA2B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12:rc2:*:*:*:*:*:*", "cpeNameId": "576FB04F-8AE6-459C-B9B7-4B161AA533C9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12:rc3:*:*:*:*:*:*", "cpeNameId": "D1CC9AD0-BCFB-47FF-A991-F2D8D4241D7A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12:rc4:*:*:*:*:*:*", "cpeNameId": "5B131271-8353-4F4D-A802-6231F77D62F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12:rc5:*:*:*:*:*:*", "cpeNameId": "3871B8EE-EE4B-43DD-9B39-DAE15494AEF2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12:rc6:*:*:*:*:*:*", "cpeNameId": "2F22DBF5-138B-4E06-97A9-D48EE51DAD9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.1:*:*:*:*:*:*:*", "cpeNameId": "69B0A1AF-BDD2-4852-B63D-E4BF55573CAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.2:*:*:*:*:*:*:*", "cpeNameId": "654BD99C-D40D-4573-A72F-D135048F0BD6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.3:*:*:*:*:*:*:*", "cpeNameId": "2DFD73EB-B731-43EF-A6D9-0777823AA9ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.4:*:*:*:*:*:*:*", "cpeNameId": "50296B03-0A9B-497E-85CE-EDBABB8603B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.5:*:*:*:*:*:*:*", "cpeNameId": "184D3B86-723B-43AE-9B33-91CAD47275F7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.6:*:*:*:*:*:*:*", "cpeNameId": "2538F421-8C36-4DA8-8D4A-20811D6843BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.7:*:*:*:*:*:*:*", "cpeNameId": "E8D1E4A0-A0B2-4B0B-988F-984BF74D3B99"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.8:*:*:*:*:*:*:*", "cpeNameId": "43B25D3D-1D5D-4E14-A5CE-69FB57B0230D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.9:*:*:*:*:*:*:*", "cpeNameId": "BD4E83AA-561D-49FA-9703-CFF03AA235A3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.10:*:*:*:*:*:*:*", "cpeNameId": "109315CC-209F-40BF-A5E1-C307A1F780DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.11:*:*:*:*:*:*:*", "cpeNameId": "69494478-22B3-4371-B7C7-0558CDD786C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.12:*:*:*:*:*:*:*", "cpeNameId": "56632064-D578-4D87-9DF8-C06F096ABDFC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.13:*:*:*:*:*:*:*", "cpeNameId": "97C936CC-FC5C-4A0B-9F4A-BC253561E90D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.14:*:*:*:*:*:*:*", "cpeNameId": "0C13DFDE-0149-4EB6-9BA0-F62AC6FE5586"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13:*:*:*:*:*:*:*", "cpeNameId": "63D7AE43-6B91-47A7-9E3E-58B08ACEE5CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13:-:*:*:*:*:*:*", "cpeNameId": "94A3FF49-65AE-46A5-AF47-00094F5AF3E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13:rc1:*:*:*:*:*:*", "cpeNameId": "C5C9AA2D-4C67-496E-AE87-863FA0E9B8CE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13:rc2:*:*:*:*:*:*", "cpeNameId": "25E5D931-E147-4A6A-AD81-9AF12D4DCAB6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13:rc3:*:*:*:*:*:*", "cpeNameId": "853B280B-EC80-4D50-8494-0D3FBEF98F78"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13:rc4:*:*:*:*:*:*", "cpeNameId": "823B55ED-26FF-4111-A479-E477AAE70FF1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13:rc5:*:*:*:*:*:*", "cpeNameId": "8B7F3844-CA39-422C-8449-06CF8AD6672B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13:rc6:*:*:*:*:*:*", "cpeNameId": "9ECB08C7-B61F-415B-8091-4F5B47F8085F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.1:*:*:*:*:*:*:*", "cpeNameId": "226B0AC1-B943-40C0-8426-4BB9B25A2FBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.2:*:*:*:*:*:*:*", "cpeNameId": "101CC84F-1E9F-4945-AC58-F1A89AC868FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.3:*:*:*:*:*:*:*", "cpeNameId": "943EB2FE-E2B5-4056-8432-2E21A07AAE5A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.4:*:*:*:*:*:*:*", "cpeNameId": "30F2FA91-0299-4CF0-904F-CEB63D8421F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.5:*:*:*:*:*:*:*", "cpeNameId": "8A5862FC-697A-49B3-B018-683F56E40C33"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.6:*:*:*:*:*:*:*", "cpeNameId": "9907DA49-FBB8-4EA6-A3D3-D395343A6635"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.7:*:*:*:*:*:*:*", "cpeNameId": "2928EAC1-58D0-4D06-9080-D744192ED843"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.8:*:*:*:*:*:*:*", "cpeNameId": "69790995-A09C-4859-B6AF-6FD626D2F615"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.9:*:*:*:*:*:*:*", "cpeNameId": "AD833379-4556-4DFD-A670-98EE76636A5B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.10:*:*:*:*:*:*:*", "cpeNameId": "1D010FB8-D849-4388-8D10-74F4D6F59D3C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.11:*:*:*:*:*:*:*", "cpeNameId": "F659B20D-E773-4DEA-86E5-9914230B1A15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.12:*:*:*:*:*:*:*", "cpeNameId": "B779CDC3-8957-4B5C-8D66-00A277A1B3F4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.13:*:*:*:*:*:*:*", "cpeNameId": "EAC315D4-E0E0-41C8-A95B-AB5E895BFBBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.14:*:*:*:*:*:*:*", "cpeNameId": "1819E47A-069B-419A-8EF6-C9313A397178"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.15:*:*:*:*:*:*:*", "cpeNameId": "027145FE-2731-49DA-86A8-1D2FBC9FB086"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.16:*:*:*:*:*:*:*", "cpeNameId": "ECD3B257-E717-4928-B0C1-A784E553B3E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14:*:*:*:*:*:*:*", "cpeNameId": "A931E9A5-97C5-409C-A3BA-5FEC11A2C622"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.1:*:*:*:*:*:*:*", "cpeNameId": "C5A24D81-DC61-4E8E-A883-70A89D049530"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.2:*:*:*:*:*:*:*", "cpeNameId": "4E26113D-F6B7-453F-9387-E01F3FB22E21"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.3:*:*:*:*:*:*:*", "cpeNameId": "814EF758-607B-40CC-BE23-CE70074F76CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.4:*:*:*:*:*:*:*", "cpeNameId": "6720BFE9-C0EE-48BF-9DF5-EF2216114FA3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.5:*:*:*:*:*:*:*", "cpeNameId": "6AF9B2CB-A700-4D4B-99BD-68F8B1B60D27"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.6:*:*:*:*:*:*:*", "cpeNameId": "9FB8CFED-3C93-41CD-AA03-2B6383630B83"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.7:*:*:*:*:*:*:*", "cpeNameId": "2A024E18-8E2D-43F7-953C-15A11490F277"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.8:*:*:*:*:*:*:*", "cpeNameId": "B316EADE-3506-4B78-84D7-59222A7EA27C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.9:*:*:*:*:*:*:*", "cpeNameId": "22C19B12-730A-4C18-9414-277A199CDB44"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.10:*:*:*:*:*:*:*", "cpeNameId": "1C9ACEF0-E248-4B66-AF0C-F323FF758671"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.11:*:*:*:*:*:*:*", "cpeNameId": "CFE32D5E-B63B-4BBD-AF35-835F694D1946"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.12:*:*:*:*:*:*:*", "cpeNameId": "51A5C92D-0CAD-4718-8BD9-70AD3BF3ED1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.13:*:*:*:*:*:*:*", "cpeNameId": "70614E00-337E-4E52-9FD8-20E1C106B5DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.14:*:*:*:*:*:*:*", "cpeNameId": "6930B9C7-4CC9-4DCA-B201-2D9E690BFE80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.15:*:*:*:*:*:*:*", "cpeNameId": "9B2631F3-F6FE-4791-823F-695BE2F12D47"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.16:*:*:*:*:*:*:*", "cpeNameId": "092E3E03-A335-4443-8BED-47DDB83C5FA0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.17:*:*:*:*:*:*:*", "cpeNameId": "36D93C96-FC7E-4D4F-883E-3AF5A2FA3000"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.18:*:*:*:*:*:*:*", "cpeNameId": "7A290C14-ED57-4B9F-91FF-0FC4AAC9A1F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.19:*:*:*:*:*:*:*", "cpeNameId": "A8688970-830A-43D1-B07D-6013A971EC79"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.20:*:*:*:*:*:*:*", "cpeNameId": "17B788D0-A567-43B8-82A9-8FF9366015A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.21:*:*:*:*:*:*:*", "cpeNameId": "78A2B7F8-B9DE-4C98-A44D-EF1B61256567"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.22:*:*:*:*:*:*:*", "cpeNameId": "72C09BB8-DCC8-45E8-B7B5-993CFE154338"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.23:*:*:*:*:*:*:*", "cpeNameId": "D4585EAB-400F-4EDF-9DED-1F8CBD5B744F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.24:*:*:*:*:*:*:*", "cpeNameId": "FEFD7885-1EE8-416D-B7FE-8E11083ED450"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.25:*:*:*:*:*:*:*", "cpeNameId": "62184EBD-8376-48E6-BDA6-33DA7DA4DE55"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.26:*:*:*:*:*:*:*", "cpeNameId": "4E0A62E4-D6E6-472F-B7EB-0863D2CB2043"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.27:*:*:*:*:*:*:*", "cpeNameId": "B36914F3-9F0C-48F1-B721-8451FA606F40"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.28:*:*:*:*:*:*:*", "cpeNameId": "5406494D-C3A0-424C-A739-DF138E8457FA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.29:*:*:*:*:*:*:*", "cpeNameId": "2E069436-B02E-4F1D-BBFF-7C67DCBB1978"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.30:*:*:*:*:*:*:*", "cpeNameId": "0C8564AC-CE4D-4B8F-8588-CB6F8162FC34"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.31:*:*:*:*:*:*:*", "cpeNameId": "08176301-EEF5-439E-99BF-EB6055095F3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.32:*:*:*:*:*:*:*", "cpeNameId": "5050DE72-C59B-428C-B676-CD6A69950413"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.33:*:*:*:*:*:*:*", "cpeNameId": "6EF37D93-2185-4C48-932B-64AE54920BF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.34:*:*:*:*:*:*:*", "cpeNameId": "CD6EEA39-F27B-4E2F-ABF7-B979F9A60D16"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.35:*:*:*:*:*:*:*", "cpeNameId": "9601934D-422D-478C-932B-0B723ECF1AC8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.36:*:*:*:*:*:*:*", "cpeNameId": "117B9343-7A2A-4CF2-A3FC-5CF339397B49"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.37:*:*:*:*:*:*:*", "cpeNameId": "3DAF6A51-D407-4CAF-A800-E8C601AF7A88"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.38:*:*:*:*:*:*:*", "cpeNameId": "D818B0AA-263A-4AD4-8F30-D01F9F103771"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.39:*:*:*:*:*:*:*", "cpeNameId": "19410F95-E22A-4EA0-A64F-7334B338C559"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.40:*:*:*:*:*:*:*", "cpeNameId": "4C39B4AE-1893-4D41-A20B-E4DA4F05B12E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.41:*:*:*:*:*:*:*", "cpeNameId": "9E6243E5-7BAA-4061-BA98-AE3335BA90DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.42:*:*:*:*:*:*:*", "cpeNameId": "5289A6EE-1D01-4F96-806C-1843A14FDEF2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.43:*:*:*:*:*:*:*", "cpeNameId": "9ABCDB72-25A8-46CD-A422-35ADA558EF68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.44:*:*:*:*:*:*:*", "cpeNameId": "574EC3B6-21A3-47E9-9858-3CA9EF533E67"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.45:*:*:*:*:*:*:*", "cpeNameId": "38485FA4-4F72-4663-A066-8D01D3863321"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.46:*:*:*:*:*:*:*", "cpeNameId": "764D933F-58C1-48E3-9907-B0DDE1A4F8AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.47:*:*:*:*:*:*:*", "cpeNameId": "AE54A178-E51B-452A-9C64-DA3A3CC946AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.48:*:*:*:*:*:*:*", "cpeNameId": "B535E7F9-6273-497C-8D1E-27FC9FAECD72"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.49:*:*:*:*:*:*:*", "cpeNameId": "83203827-63F4-47AE-A1CA-217858D53769"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.50:*:*:*:*:*:*:*", "cpeNameId": "194931EE-DDB3-420C-9AF7-EC5AFD5D6E28"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.51:*:*:*:*:*:*:*", "cpeNameId": "6DBC9273-6F1D-497F-9664-184028BD6B4D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.52:*:*:*:*:*:*:*", "cpeNameId": "214855D8-7634-45D4-B464-65EDD37AF850"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.53:*:*:*:*:*:*:*", "cpeNameId": "67B2569B-44C2-4049-BDA4-2E773A4E29F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.54:*:*:*:*:*:*:*", "cpeNameId": "9EBDE6FE-5FF2-4F2D-B58A-25094E85BFB1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.55:*:*:*:*:*:*:*", "cpeNameId": "D0B5F04E-862B-490F-8305-60B811F4E6F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.56:*:*:*:*:*:*:*", "cpeNameId": "B668AD3F-F0E8-4A26-879B-046F18DD8A36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.57:*:*:*:*:*:*:*", "cpeNameId": "E16FC742-4DBD-4DB4-B969-9C064D464FE5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.58:*:*:*:*:*:*:*", "cpeNameId": "8B062B81-0F55-4FF6-B94C-C877DFA0E50B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.59:*:*:*:*:*:*:*", "cpeNameId": "3CEEC1DF-CF5C-4C9D-ADB4-671659A81424"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.60:*:*:*:*:*:*:*", "cpeNameId": "25D77D6D-411A-415B-9B4C-71C7DA916873"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.61:*:*:*:*:*:*:*", "cpeNameId": "65E712DB-951C-492B-A315-827459B80E5E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.62:*:*:*:*:*:*:*", "cpeNameId": "F11F0C93-C51B-4199-B8B7-D7B81A103E8C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.63:*:*:*:*:*:*:*", "cpeNameId": "35923443-2E09-4624-9DEE-9ACF12EAB448"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.64:*:*:*:*:*:*:*", "cpeNameId": "205E064B-A0B3-4DC9-A4F9-FA48BB6D7666"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.65:*:*:*:*:*:*:*", "cpeNameId": "B0E66BBD-FF9B-4FE2-955E-363B2426AAA4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.66:*:*:*:*:*:*:*", "cpeNameId": "65FADA8B-3BAE-4B74-805D-40121FF01EAF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.67:*:*:*:*:*:*:*", "cpeNameId": "8796300B-8BBD-4767-B13C-A04AA0BB6FEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.68:*:*:*:*:*:*:*", "cpeNameId": "EA1F0EFF-1D54-4D41-8791-38459690E25B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.69:*:*:*:*:*:*:*", "cpeNameId": "609603AF-3EA9-4959-BF95-65681DD73429"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.70:*:*:*:*:*:*:*", "cpeNameId": "626D150A-609E-46A3-9B99-2B5517D68FCF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.71:*:*:*:*:*:*:*", "cpeNameId": "54045011-3CF7-4D72-B47A-67352BD27C9B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.72:*:*:*:*:*:*:*", "cpeNameId": "A4A18A3C-C9E0-4640-A815-B4F19017E986"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.73:*:*:*:*:*:*:*", "cpeNameId": "101552E2-98D5-490C-8507-D8F3CD5E74CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.74:*:*:*:*:*:*:*", "cpeNameId": "306A3E6C-2907-416C-966D-810515DBCCCB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.75:*:*:*:*:*:*:*", "cpeNameId": "BAAF7099-2145-41D0-8529-A6065254637F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.76:*:*:*:*:*:*:*", "cpeNameId": "DDCDF175-DC63-49EC-A7AD-9BFEFE5527E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.77:*:*:*:*:*:*:*", "cpeNameId": "38B40852-28A0-490F-B4DC-3980A9C5B421"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.78:*:*:*:*:*:*:*", "cpeNameId": "6E17FF7C-84D2-4931-992C-A5E7ED78834F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.79:*:*:*:*:*:*:*", "cpeNameId": "BB0E9999-4D82-493C-98BB-FE9D9A569DED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.80:*:*:*:*:*:*:*", "cpeNameId": "4AC211FC-04A6-4405-9635-D73ECD955418"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.81:*:*:*:*:*:*:*", "cpeNameId": "92E16615-DDD7-4E66-8BF6-BAA740D2F0C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.82:*:*:*:*:*:*:*", "cpeNameId": "F7A93940-0210-4AD1-B8DD-329E01CF07C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.83:*:*:*:*:*:*:*", "cpeNameId": "31B6D10B-87F4-4EDC-B7B1-FD01674BF26E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.84:*:*:*:*:*:*:*", "cpeNameId": "4275466A-03C1-421C-A4B0-21B518067550"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.85:*:*:*:*:*:*:*", "cpeNameId": "CA858139-E95A-4FEE-B89B-63F8951AC6C5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.86:*:*:*:*:*:*:*", "cpeNameId": "E4F4C982-7F3B-45B2-84AB-3A0EA7B17608"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.87:*:*:*:*:*:*:*", "cpeNameId": "2343FBFC-440A-404C-BFBA-0C17D3A7A7DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.88:*:*:*:*:*:*:*", "cpeNameId": "D7E1A205-815C-4D28-8BA2-9BC9500AD4A7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.89:*:*:*:*:*:*:*", "cpeNameId": "39F2F19A-FB5E-4866-BAE2-356D068B45BA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.90:*:*:*:*:*:*:*", "cpeNameId": "50AD92DB-6E21-4AA8-9E00-052B90A9965E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.91:*:*:*:*:*:*:*", "cpeNameId": "F8DE7403-3DFA-4DEE-8780-A0DA10BF9528"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.92:*:*:*:*:*:*:*", "cpeNameId": "39EF80A8-F19C-4BE8-8D66-7C5CD424B4D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.93:*:*:*:*:*:*:*", "cpeNameId": "E5500E0F-C99A-4502-99E6-7981CA795BF2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.94:*:*:*:*:*:*:*", "cpeNameId": "74932CAC-8FBF-4367-9392-6D00F8FFFB99"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.95:*:*:*:*:*:*:*", "cpeNameId": "8101D71E-8866-4E44-879C-0C5B12D7EBE7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.96:*:*:*:*:*:*:*", "cpeNameId": "E3C79F48-C929-4535-A410-136A4CC98F26"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.97:*:*:*:*:*:*:*", "cpeNameId": "1BD7D338-728B-43EB-91A4-6827CD29192C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.98:*:*:*:*:*:*:*", "cpeNameId": "86B2C93A-A003-4AAA-AE7C-CD209F2063B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.99:*:*:*:*:*:*:*", "cpeNameId": "6A43476F-D00F-4E25-8FAC-647EEE0EDFF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.100:*:*:*:*:*:*:*", "cpeNameId": "4E019C3A-D2DB-457F-A70E-5E03CCA91476"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.101:*:*:*:*:*:*:*", "cpeNameId": "A73A2FC0-DC50-499F-A148-78FA51F8D760"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.102:*:*:*:*:*:*:*", "cpeNameId": "127E7A89-5961-457D-8BF7-4164707E025E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.103:*:*:*:*:*:*:*", "cpeNameId": "388373C0-5D21-45F9-BF7E-5E60B4E7318F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.104:*:*:*:*:*:*:*", "cpeNameId": "3B19EA98-6B97-4A3A-B3B0-DC182A51617F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.105:*:*:*:*:*:*:*", "cpeNameId": "EAF98B09-69E7-48C1-8B69-3AD3E29E5A2E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.106:*:*:*:*:*:*:*", "cpeNameId": "A2582828-CCCE-4D12-85D5-3A1F343C7E00"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.107:*:*:*:*:*:*:*", "cpeNameId": "AD5EA444-4A0C-4A51-A8BE-F15FE36EE0C5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.108:*:*:*:*:*:*:*", "cpeNameId": "F94B9FE0-697B-41B7-B791-B9A0C4D86168"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.109:*:*:*:*:*:*:*", "cpeNameId": "4F0FBDC5-4177-425F-ADF6-C57C3DCA5D4D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.110:*:*:*:*:*:*:*", "cpeNameId": "2D6859E3-FCB4-477E-845A-80388AC62521"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.111:*:*:*:*:*:*:*", "cpeNameId": "E63E0425-D6C3-4773-A69C-D9033B050A0E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.112:*:*:*:*:*:*:*", "cpeNameId": "B5B44EDD-66B1-47B4-BAAE-38DE4AECC0A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.113:*:*:*:*:*:*:*", "cpeNameId": "2F7F63C6-E1D8-40B9-A3BE-99A553814F5A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.114:*:*:*:*:*:*:*", "cpeNameId": "A3653829-0B32-4838-90F0-B2CCC32580DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.115:*:*:*:*:*:*:*", "cpeNameId": "758316DC-FEB4-4F05-994B-AE0A555D7AEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.116:*:*:*:*:*:*:*", "cpeNameId": "CEA596C8-E6AD-4C8C-BF8F-FEBF1BF73E80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.117:*:*:*:*:*:*:*", "cpeNameId": "D09DC33D-889B-4BA3-8311-057DCB5EB7D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.118:*:*:*:*:*:*:*", "cpeNameId": "446206CE-87D2-402D-8451-4F63D75B6CB6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.119:*:*:*:*:*:*:*", "cpeNameId": "CF788798-2DF1-4253-AA76-8B021DB84887"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.120:*:*:*:*:*:*:*", "cpeNameId": "7A8CE9D2-54CD-4BDA-AF50-12C170DC6E2E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.121:*:*:*:*:*:*:*", "cpeNameId": "08EAEBAF-0EC2-48A1-9B20-586269492003"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.122:*:*:*:*:*:*:*", "cpeNameId": "7E12FC79-A932-4613-A0E6-6E78D0916FC4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.123:*:*:*:*:*:*:*", "cpeNameId": "CEC4835E-515C-49EA-93A4-45ED21306EC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.124:*:*:*:*:*:*:*", "cpeNameId": "B8B08C25-A0CC-4BCB-BCC8-DF667EE56E09"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.125:*:*:*:*:*:*:*", "cpeNameId": "9FE63906-4FDE-46B8-A606-E814C0F6F44B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.126:*:*:*:*:*:*:*", "cpeNameId": "18D0E785-E281-4C1B-AAAB-1941B6652595"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.127:*:*:*:*:*:*:*", "cpeNameId": "F885AC80-EECE-4DD5-8FFB-6F71501CF7A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.128:*:*:*:*:*:*:*", "cpeNameId": "E98D93BF-9F5C-4817-B9A4-1EC01D911361"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.129:*:*:*:*:*:*:*", "cpeNameId": "0381E0F9-379F-4991-8218-0D49695A485C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.130:*:*:*:*:*:*:*", "cpeNameId": "70367F10-ACD6-4508-ACB5-DAC961B2DAD6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.131:*:*:*:*:*:*:*", "cpeNameId": "98C623C6-03CD-485B-BF39-D31296742AEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.132:*:*:*:*:*:*:*", "cpeNameId": "1E482272-30CF-4AC1-8D89-2594468F7D4B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.133:*:*:*:*:*:*:*", "cpeNameId": "111B8E60-2201-4175-8DF6-9254703F20FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.134:*:*:*:*:*:*:*", "cpeNameId": "E359DA12-908D-4DCE-863E-3FF8641CC7C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.135:*:*:*:*:*:*:*", "cpeNameId": "27A8264E-B347-4F33-8DB6-D654A8DF7008"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.136:*:*:*:*:*:*:*", "cpeNameId": "DFC17EF5-FF88-4BBE-AD7A-B6EF53741144"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.137:*:*:*:*:*:*:*", "cpeNameId": "DE9E6429-1CD7-4FA0-A2BB-9F73CFFA4AE6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.138:*:*:*:*:*:*:*", "cpeNameId": "3E2F69CE-601A-4558-820F-4D2101BC6DAA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.139:*:*:*:*:*:*:*", "cpeNameId": "AED13A18-393D-4413-80E6-5C8C1912C64C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.140:*:*:*:*:*:*:*", "cpeNameId": "DCCD3A03-0FA0-497E-938A-D4877C862C7D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.141:*:*:*:*:*:*:*", "cpeNameId": "A984AB3D-A744-45E7-B863-AFCE9F3BCA8D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.142:*:*:*:*:*:*:*", "cpeNameId": "8BA42A60-B968-4658-A593-5D6D1CDC2DD7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.143:*:*:*:*:*:*:*", "cpeNameId": "F1883261-CF7A-4133-BA12-E5A3648FFCD2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.144:*:*:*:*:*:*:*", "cpeNameId": "2ECB0A40-9134-477D-A33D-D1A21FD1D853"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.145:*:*:*:*:*:*:*", "cpeNameId": "37AD964D-982C-4491-9DD8-9BBEFB703649"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.146:*:*:*:*:*:*:*", "cpeNameId": "60D01110-32CE-4174-8305-9CC98A7954A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.147:*:*:*:*:*:*:*", "cpeNameId": "3C59A1B8-E591-4781-87FE-6652A4B865BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.148:*:*:*:*:*:*:*", "cpeNameId": "E3589E83-AB61-4638-83A5-4FCCDCF12939"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.149:*:*:*:*:*:*:*", "cpeNameId": "43561658-86C5-4F33-9BA9-959238156461"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.150:*:*:*:*:*:*:*", "cpeNameId": "65A8F7B6-A62D-4F12-BE5C-81E2C46F2C39"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.151:*:*:*:*:*:*:*", "cpeNameId": "359D1CB2-7092-4050-8BDE-EA9B90C2A4A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.152:*:*:*:*:*:*:*", "cpeNameId": "DCBA08B5-D75B-4EA4-8EB2-976C5EE5208C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.153:*:*:*:*:*:*:*", "cpeNameId": "AEF73713-2A2E-4202-9FAF-35F9007DC67F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.154:*:*:*:*:*:*:*", "cpeNameId": "F56CAAD2-0A98-4C49-948C-A58C81AF2136"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.155:*:*:*:*:*:*:*", "cpeNameId": "7293A6A3-0953-4BC3-8754-E3521CDDC181"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.156:*:*:*:*:*:*:*", "cpeNameId": "040458A8-9C8A-4F54-8667-DF55833A9D9B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.157:*:*:*:*:*:*:*", "cpeNameId": "47EEEBD8-F966-4731-84CE-95B543D1E665"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.158:*:*:*:*:*:*:*", "cpeNameId": "D8DD8154-1F2C-4E1F-8425-674EA9F33061"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.159:*:*:*:*:*:*:*", "cpeNameId": "23573A67-0200-408D-A6D3-92BB482B239E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.160:*:*:*:*:*:*:*", "cpeNameId": "DB501200-6B09-4237-92DA-8410374E41AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.161:*:*:*:*:*:*:*", "cpeNameId": "1654CFEE-4797-444C-BF7B-36E36EEFB3FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.162:*:*:*:*:*:*:*", "cpeNameId": "F7A73AFA-30D2-4C43-9A25-E516BB6077BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.163:*:*:*:*:*:*:*", "cpeNameId": "152842F1-FD0B-41B7-8361-62DC24194B9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.164:*:*:*:*:*:*:*", "cpeNameId": "1FB6E4A7-E49F-4CB2-B797-CDA9A3EE41F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.165:*:*:*:*:*:*:*", "cpeNameId": "86C98595-98AD-4914-BA7E-7D2EEEBDEEEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.166:*:*:*:*:*:*:*", "cpeNameId": "3A749A85-B1AF-45E0-952F-F07A3315F2B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.167:*:*:*:*:*:*:*", "cpeNameId": "F739A8BA-2722-4D43-8EE3-F0940D5C9962"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.168:*:*:*:*:*:*:*", "cpeNameId": "BA729078-2FD8-494D-80A0-A21A9C8A780C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.169:*:*:*:*:*:*:*", "cpeNameId": "B09E3BA3-FAE1-417D-802E-9FF6A63314CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.170:*:*:*:*:*:*:*", "cpeNameId": "A6354C45-5002-4677-94F6-2585EA37B4A0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.171:*:*:*:*:*:*:*", "cpeNameId": "E3DC59EC-5BDD-4E67-979E-ACF532D0AA0F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.172:*:*:*:*:*:*:*", "cpeNameId": "2915DD1D-0036-4591-921F-4ED4D6E543BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.173:*:*:*:*:*:*:*", "cpeNameId": "6AAAB0B0-C78E-4876-9C2D-5CF3FC83C87B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.174:*:*:*:*:*:*:*", "cpeNameId": "7F586C21-5084-4F3B-A5E2-20ABD2E73301"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.175:*:*:*:*:*:*:*", "cpeNameId": "31C57C02-B17B-45AC-BD33-BA14F2D2F960"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.176:*:*:*:*:*:*:*", "cpeNameId": "495DC903-2104-4E7A-ABDD-044701BEC0AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.177:*:*:*:*:*:*:*", "cpeNameId": "54ECE57B-46D2-4B43-88BA-72DFCC784626"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.178:*:*:*:*:*:*:*", "cpeNameId": "DF1994DB-64D8-449F-AB63-959905FDBED5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.179:*:*:*:*:*:*:*", "cpeNameId": "E998A6CB-5B6B-4698-93F8-60ADA5915CED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.180:*:*:*:*:*:*:*", "cpeNameId": "5780A3A7-D6D2-4597-8E20-64CAEBB9BEC5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.181:*:*:*:*:*:*:*", "cpeNameId": "943B03F2-38B3-48CF-AB60-B0CDCD3232D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.182:*:*:*:*:*:*:*", "cpeNameId": "DE1702E0-9C72-4E22-AD85-B4FF3F08BF12"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.183:*:*:*:*:*:*:*", "cpeNameId": "B448350B-6E82-4C55-BF6C-3416AA6DD09D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.184:*:*:*:*:*:*:*", "cpeNameId": "93D45017-75AC-4F34-B44B-BD725073C783"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.185:*:*:*:*:*:*:*", "cpeNameId": "17EE5023-DA86-42AA-80B8-0E03A8786DBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.186:*:*:*:*:*:*:*", "cpeNameId": "5083CC39-913E-47F4-8D17-DA2A4B3BDB38"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.187:*:*:*:*:*:*:*", "cpeNameId": "A9B26E5E-5D06-4AEE-B95C-BCCCF71E3C2A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.188:*:*:*:*:*:*:*", "cpeNameId": "F61DC571-CA27-43B5-B92E-FF49B2FA5128"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.189:*:*:*:*:*:*:*", "cpeNameId": "39A82CEC-EA57-4F55-AE22-EA9FF7F22411"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.190:*:*:*:*:*:*:*", "cpeNameId": "5C08BEA0-0968-4A2C-90A7-FBBC18870CB4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.191:*:*:*:*:*:*:*", "cpeNameId": "27C0FEC1-829C-410C-B37C-44CBE22D2714"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.192:*:*:*:*:*:*:*", "cpeNameId": "AAE8B6F5-BBF2-4EE5-BFF8-D3E64F6C7544"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.193:*:*:*:*:*:*:*", "cpeNameId": "B75C3C61-1456-4A7E-8175-FEBFECBD8887"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.194:*:*:*:*:*:*:*", "cpeNameId": "64CFCF85-0DB0-4BC3-9BAF-7752E969C6FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.195:*:*:*:*:*:*:*", "cpeNameId": "07D6C56C-CBC4-4E2B-BF3C-298D326A2515"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.196:*:*:*:*:*:*:*", "cpeNameId": "617F7A9C-A4AF-46E1-9B60-654F691A1ACA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.197:*:*:*:*:*:*:*", "cpeNameId": "D1BB57B0-9ED1-49CA-BAF9-9F32E751C423"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.198:*:*:*:*:*:*:*", "cpeNameId": "DFF76FFC-A6CE-4BCA-8BDA-A708D8CA524F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.199:*:*:*:*:*:*:*", "cpeNameId": "8D62E5E5-B08E-4B46-AFA9-9C11A8F2088C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.200:*:*:*:*:*:*:*", "cpeNameId": "4C6DC033-8105-45EB-8B7C-8AD380243F77"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.201:*:*:*:*:*:*:*", "cpeNameId": "02618C38-B7E6-468C-A240-77183CD793ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.202:*:*:*:*:*:*:*", "cpeNameId": "B133CCC3-3525-44C9-9BA6-07731081AF3B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.203:*:*:*:*:*:*:*", "cpeNameId": "2040E6FD-3C1D-4922-8A3E-D93B2024A64F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.204:*:*:*:*:*:*:*", "cpeNameId": "FC48B609-0A74-4ADF-BE7A-8E5A929FF9B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.205:*:*:*:*:*:*:*", "cpeNameId": "2D66C248-5CA3-46AF-819D-8EDC819E5DEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.206:*:*:*:*:*:*:*", "cpeNameId": "0EC2FE2D-3784-41D9-AD97-154F8E9D485A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.207:*:*:*:*:*:*:*", "cpeNameId": "890C3442-53E3-4F78-A62B-2A3DF161993D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.208:*:*:*:*:*:*:*", "cpeNameId": "3CFC3FF9-ABA7-4471-B42B-31B08DB57404"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.209:*:*:*:*:*:*:*", "cpeNameId": "62582930-FD26-41A5-A063-51CCE542611E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.210:*:*:*:*:*:*:*", "cpeNameId": "F0B251D3-1C8A-4EE4-BC8C-798633A46547"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.211:*:*:*:*:*:*:*", "cpeNameId": "6D317823-F155-4FD8-B745-D6A2CA0DCF4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.212:*:*:*:*:*:*:*", "cpeNameId": "93A1BCA4-151B-4C62-9321-C36060232635"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.213:*:*:*:*:*:*:*", "cpeNameId": "2A1F44F0-ED1D-4627-AFDD-52246F44FCA8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.214:*:*:*:*:*:*:*", "cpeNameId": "630134DA-8836-4D64-A8DB-C952FD0879B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.215:*:*:*:*:*:*:*", "cpeNameId": "F647FD73-A1BD-4519-96EF-BC5962B49049"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.216:*:*:*:*:*:*:*", "cpeNameId": "84F052BA-7078-4E5C-AF40-2E298CEBAA0D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.217:*:*:*:*:*:*:*", "cpeNameId": "8586BB5B-5356-497E-8039-D4718A8D233E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.218:*:*:*:*:*:*:*", "cpeNameId": "A7103A90-E7B5-46AC-B508-F3888B37524D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.219:*:*:*:*:*:*:*", "cpeNameId": "AAEF1C1C-6618-417A-A3EE-8BB6EB63F1C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.220:*:*:*:*:*:*:*", "cpeNameId": "00A3991D-98AC-4422-9B19-3B2515EF7B06"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.221:*:*:*:*:*:*:*", "cpeNameId": "CC8EF11A-F131-442A-B0F4-0810D38EB89E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.222:*:*:*:*:*:*:*", "cpeNameId": "E9CDB672-F2E0-42B9-8F20-B3BCAF324A36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.223:*:*:*:*:*:*:*", "cpeNameId": "1AC50DA1-BA05-43A5-A50F-8EF350DD96D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.224:*:*:*:*:*:*:*", "cpeNameId": "42E73115-25A7-4EDF-9402-81BA0AC8B470"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.225:*:*:*:*:*:*:*", "cpeNameId": "85B8548F-576C-442E-A2EA-30CFF43407AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.226:*:*:*:*:*:*:*", "cpeNameId": "3794F34E-4B0D-487C-890D-884AA41EF6D7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.227:*:*:*:*:*:*:*", "cpeNameId": "29337989-0DC4-4B35-BA5F-E157DAAD1557"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.228:*:*:*:*:*:*:*", "cpeNameId": "7F43F714-4550-416B-B228-EEF6FC8B1716"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.229:*:*:*:*:*:*:*", "cpeNameId": "9AC44F08-C276-4E15-811B-8CC5010672D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.230:*:*:*:*:*:*:*", "cpeNameId": "8EEDFC00-6778-4242-87AA-1BF8B788A7AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.231:*:*:*:*:*:*:*", "cpeNameId": "4F7C7BF1-9231-4FA0-A31F-A8A21DF8388E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.232:*:*:*:*:*:*:*", "cpeNameId": "B76B39F5-A59B-4C38-9381-5BCB6A78AC30"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.233:*:*:*:*:*:*:*", "cpeNameId": "97DA7801-C4EB-49B8-BCB6-B53FB848E2A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.234:*:*:*:*:*:*:*", "cpeNameId": "B249D0C2-FF7F-48DC-AF81-4B69D6844B27"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.235:*:*:*:*:*:*:*", "cpeNameId": "6B01EB29-4E04-41BD-BC2A-10619B7D39E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.236:*:*:*:*:*:*:*", "cpeNameId": "C81712BA-4FF9-4DD1-AD12-BABC49E8A004"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.237:*:*:*:*:*:*:*", "cpeNameId": "2EA256E4-3D89-4EEB-91B7-FFF529E84CAA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.238:*:*:*:*:*:*:*", "cpeNameId": "A0E92899-D97F-498F-8124-94BF18838682"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.239:*:*:*:*:*:*:*", "cpeNameId": "E4088748-A84D-4D3C-A8F9-479DB4DFEAAF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.240:*:*:*:*:*:*:*", "cpeNameId": "EBEBA8E4-803E-4EF0-A3EA-295960568227"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.241:*:*:*:*:*:*:*", "cpeNameId": "07C3F8E4-4820-447B-8D85-5297B73BD561"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.242:*:*:*:*:*:*:*", "cpeNameId": "EE853DB7-F2DA-4461-926E-E8586C8B9769"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.243:*:*:*:*:*:*:*", "cpeNameId": "EFB0DC56-2543-4A76-B959-03F1D12AFF46"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.244:*:*:*:*:*:*:*", "cpeNameId": "F491B8F2-2AEC-4382-9095-6C6C933316B2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.245:*:*:*:*:*:*:*", "cpeNameId": "EA198FA8-3EC5-458B-8210-D4176F4D2991"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.246:*:*:*:*:*:*:*", "cpeNameId": "45949E40-A94B-4C31-8110-9EB5F16CFA74"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.247:*:*:*:*:*:*:*", "cpeNameId": "D6CA348F-100D-4CB7-884C-05BCD92C93AD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.248:*:*:*:*:*:*:*", "cpeNameId": "774EFE10-D2D0-4C23-ACFC-AD61E9765BA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.249:*:*:*:*:*:*:*", "cpeNameId": "1B531DDE-03EC-4C95-B0DD-C316CE378AD8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.250:*:*:*:*:*:*:*", "cpeNameId": "7105F9F5-3435-481E-B46A-BE6F3AA78446"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.251:*:*:*:*:*:*:*", "cpeNameId": "CCB75783-8321-4164-9877-0AF392D531FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.252:*:*:*:*:*:*:*", "cpeNameId": "14D27D39-5785-461D-A4F7-46F07A67342D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.253:*:*:*:*:*:*:*", "cpeNameId": "3F9F5FE6-B76D-4F70-9F2D-0C647C026561"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.254:*:*:*:*:*:*:*", "cpeNameId": "0C15C6BC-2A46-4556-B847-17B7CA0F4DE3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.255:*:*:*:*:*:*:*", "cpeNameId": "F4FA95EA-4D16-4C6E-86D9-1D0E95E8AD42"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.256:*:*:*:*:*:*:*", "cpeNameId": "41A5A246-0D51-4C1E-A781-DA73D49C53B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.257:*:*:*:*:*:*:*", "cpeNameId": "339FB596-B009-493F-8DA9-19A69E175ED5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.258:*:*:*:*:*:*:*", "cpeNameId": "CCF5717D-F04D-4048-94EA-C4E7A4C45F95"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.259:*:*:*:*:*:*:*", "cpeNameId": "2A03EFB0-FD68-478A-B718-5D411878D8BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.260:*:*:*:*:*:*:*", "cpeNameId": "DA6AC544-7494-4683-83E9-D59AF89B5401"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.261:*:*:*:*:*:*:*", "cpeNameId": "5C4BFBA7-A9B0-425B-AE4F-0C6ED6E21759"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.262:*:*:*:*:*:*:*", "cpeNameId": "345ED523-FD6D-489D-ADBE-FC738A8816C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.263:*:*:*:*:*:*:*", "cpeNameId": "99653F61-52E2-4A51-80F3-C48F7059918B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.264:*:*:*:*:*:*:*", "cpeNameId": "424A4C5C-FB0F-4FCD-8D64-4EF4B44C04DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.265:*:*:*:*:*:*:*", "cpeNameId": "8C58D077-E378-4DA8-8AEA-9B41A26CCF78"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.266:*:*:*:*:*:*:*", "cpeNameId": "FF1979DA-6280-4D83-87A2-76F9B51A484B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.267:*:*:*:*:*:*:*", "cpeNameId": "9316876F-BD99-4370-B45A-622A21A1C234"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.268:*:*:*:*:*:*:*", "cpeNameId": "7364C13D-4E86-45D4-93CE-F8A77D11245E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.269:*:*:*:*:*:*:*", "cpeNameId": "A91EF74E-716D-4D53-B818-CE1FFA90561B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.270:*:*:*:*:*:*:*", "cpeNameId": "9F8B9A50-D4BF-455B-ACAE-9773F80690D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.271:*:*:*:*:*:*:*", "cpeNameId": "14B3F541-9955-4712-A8B1-4394A3D11DAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.272:*:*:*:*:*:*:*", "cpeNameId": "994323DF-37C1-48B8-BF6D-CF726E6ADED2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.273:*:*:*:*:*:*:*", "cpeNameId": "5794FF97-3D47-47A1-9934-DF5587AD915B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.274:*:*:*:*:*:*:*", "cpeNameId": "C853072E-5EC8-483D-A2CA-4AD2297E51FF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.275:*:*:*:*:*:*:*", "cpeNameId": "98009745-52F2-4846-B454-E90321008CFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.276:*:*:*:*:*:*:*", "cpeNameId": "9A192DE3-8954-4CE7-A200-FBCAE1BFF0D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.277:*:*:*:*:*:*:*", "cpeNameId": "651E5F82-D722-4636-B41C-17ECB9F614AD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.278:*:*:*:*:*:*:*", "cpeNameId": "8A8873EE-B55C-4EFF-8885-329450882E8B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.279:*:*:*:*:*:*:*", "cpeNameId": "CEC23D4D-DCBC-4269-904F-EB1829C48B4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.280:*:*:*:*:*:*:*", "cpeNameId": "6670595A-51D0-4860-A97D-CEF230135DCF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.281:*:*:*:*:*:*:*", "cpeNameId": "C6198A8B-6286-4E96-8629-D7C35E60DB89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.282:*:*:*:*:*:*:*", "cpeNameId": "E3D67109-1796-404D-8308-A39BF1338C3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.283:*:*:*:*:*:*:*", "cpeNameId": "D630C6EC-A2AB-480D-AA68-544966BFD6AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.284:*:*:*:*:*:*:*", "cpeNameId": "6BD57B4C-7ECD-41B1-9631-C1BFBBD6B049"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.285:*:*:*:*:*:*:*", "cpeNameId": "C8FCDB6A-75F8-4B62-A698-D9943A805CBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.286:*:*:*:*:*:*:*", "cpeNameId": "BA369E82-203F-4291-9419-56F1E4A53D15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.287:*:*:*:*:*:*:*", "cpeNameId": "A544C41E-F4FC-4293-A3D6-B5F91E5EF1A7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.288:*:*:*:*:*:*:*", "cpeNameId": "A0BDF59E-7C92-443B-B035-B250F80E4DC9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.289:*:*:*:*:*:*:*", "cpeNameId": "73D2125C-A474-417B-B135-1903D427F538"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.290:*:*:*:*:*:*:*", "cpeNameId": "477BA94B-EB37-4234-BA72-469682042745"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.291:*:*:*:*:*:*:*", "cpeNameId": "F1E29F38-68F3-4CEE-8AD5-828E7C63ED7A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.292:*:*:*:*:*:*:*", "cpeNameId": "6829F830-B295-4BEA-9037-EAE6C6D83D45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.293:*:*:*:*:*:*:*", "cpeNameId": "22CF6A05-5745-4A7F-8559-702E9C3C8830"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.294:*:*:*:*:*:*:*", "cpeNameId": "A36397CA-8253-443A-BEB3-EB7F21F084D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.295:*:*:*:*:*:*:*", "cpeNameId": "9597112C-DEE5-4DE7-A87B-A8CA716B2212"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.296:*:*:*:*:*:*:*", "cpeNameId": "98F92400-37C0-40CA-A0A7-AE36BA845F6B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.297:*:*:*:*:*:*:*", "cpeNameId": "48BF44DC-C00D-4964-B152-341BACB0F556"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.298:*:*:*:*:*:*:*", "cpeNameId": "0E913D3C-18EF-4895-98ED-42C69A1C76B2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.299:*:*:*:*:*:*:*", "cpeNameId": "B8D13EF3-4ECA-4429-8BE2-175CA0247B11"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.300:*:*:*:*:*:*:*", "cpeNameId": "4D091AD8-D0D7-4EBA-814C-88E1BA8374F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.301:*:*:*:*:*:*:*", "cpeNameId": "B1830564-E39A-448F-950A-1B20281BB3B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.302:*:*:*:*:*:*:*", "cpeNameId": "8EA0AAA8-D9AB-47A4-84B1-733B8A5685BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.303:*:*:*:*:*:*:*", "cpeNameId": "8271E5F1-FC03-47FC-9102-A0491D04E4A6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.304:*:*:*:*:*:*:*", "cpeNameId": "8A6B6167-7ED8-4001-BBE1-60520A1507D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.305:*:*:*:*:*:*:*", "cpeNameId": "D314E91D-4DB8-4F05-A3E9-D0AD324F2B40"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.306:*:*:*:*:*:*:*", "cpeNameId": "5DE889B3-0BAD-4FA8-9450-7ADAEA53BCB6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.307:*:*:*:*:*:*:*", "cpeNameId": "0A1ACC8A-123F-4239-8F9D-9DBB85D19A60"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.308:*:*:*:*:*:*:*", "cpeNameId": "2C104BF2-78BD-46F5-A42B-8A7737F08831"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.309:*:*:*:*:*:*:*", "cpeNameId": "3AB452D7-1B5C-4AEC-BA48-88EAE679521A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.310:*:*:*:*:*:*:*", "cpeNameId": "A2B6D891-8756-47AC-BB50-74EED68F5348"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.311:*:*:*:*:*:*:*", "cpeNameId": "CD98624C-BF2D-4AD5-8DC6-23C0376ADEDE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.312:*:*:*:*:*:*:*", "cpeNameId": "A353C4E5-BCD5-404E-BA32-E44D42939E26"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.313:*:*:*:*:*:*:*", "cpeNameId": "EA493CF9-9392-46DA-B897-F85D4EF3B00E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.314:*:*:*:*:*:*:*", "cpeNameId": "50DDF9BB-6311-4505-AA6A-6240E950DD68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.315:*:*:*:*:*:*:*", "cpeNameId": "6929ED83-8C13-41A6-9C4A-CA1F36116442"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.316:*:*:*:*:*:*:*", "cpeNameId": "41B4751B-1E9E-493B-AE0D-BF29E6317911"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.317:*:*:*:*:*:*:*", "cpeNameId": "8DAAD8CA-4620-48BE-95E9-9623F7AACD63"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.318:*:*:*:*:*:*:*", "cpeNameId": "2C0D3085-6703-41F9-81D9-28EA3A593F9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.319:*:*:*:*:*:*:*", "cpeNameId": "A439957C-0CFF-4BDF-A644-00A2602DF673"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.320:*:*:*:*:*:*:*", "cpeNameId": "3EDC01DA-28BA-4672-A0BE-8B3346F51F19"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.321:*:*:*:*:*:*:*", "cpeNameId": "77BA70B4-3A94-4325-BDC1-22564AF064F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.322:*:*:*:*:*:*:*", "cpeNameId": "0743F164-F7F4-485E-AFB7-35D7DC7455E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.323:*:*:*:*:*:*:*", "cpeNameId": "5FDB4BD5-157B-43B7-BA06-8C5FF941542F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.324:*:*:*:*:*:*:*", "cpeNameId": "DE4432A7-318F-4B7B-8CEB-9FA31468CC36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.325:*:*:*:*:*:*:*", "cpeNameId": "80F87AA1-DAEE-4931-ADF7-4183B893D8F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.326:*:*:*:*:*:*:*", "cpeNameId": "5C25C636-C95F-4E94-AC85-5E684E14069F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.327:*:*:*:*:*:*:*", "cpeNameId": "ED6E0851-1828-44F8-BF12-233B8E28DBC8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.328:*:*:*:*:*:*:*", "cpeNameId": "976DF29A-943C-4C28-A071-DA2911DEDECE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.329:*:*:*:*:*:*:*", "cpeNameId": "3EE5D34F-9BBA-4FBA-9157-A4A9FA953C68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.330:*:*:*:*:*:*:*", "cpeNameId": "27711BD8-D761-4F4F-8330-FB1150982CCD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.331:*:*:*:*:*:*:*", "cpeNameId": "CBD4F61B-627B-4ACC-B743-57C302AB29F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.332:*:*:*:*:*:*:*", "cpeNameId": "E5247303-B19B-42F3-B1F1-DED50AB8E3CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.333:*:*:*:*:*:*:*", "cpeNameId": "F7C8E776-3213-4F39-9637-25902C283906"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.334:*:*:*:*:*:*:*", "cpeNameId": "D9008EE6-5CED-451D-8E36-07626739C582"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.335:*:*:*:*:*:*:*", "cpeNameId": "3F094A53-6652-4404-AE4C-3CCA8BE6BAC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.336:*:*:*:*:*:*:*", "cpeNameId": "8540A828-6A7F-499A-9F47-861E278F7001"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:*:*:*:*:*:*:*", "cpeNameId": "D44D12DF-CC78-4ADD-AA64-D1FF33FCFC11"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:-:*:*:*:*:*:*", "cpeNameId": "82324BC8-B6FA-4FD7-B301-3CAA806DF77D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:rc1:*:*:*:*:*:*", "cpeNameId": "710D7761-A5EC-4338-BBC6-1EA829347DD9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:rc2:*:*:*:*:*:*", "cpeNameId": "A9B4765F-04DB-41A9-9BDC-D9EBC8A916CE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:rc3:*:*:*:*:*:*", "cpeNameId": "6D023E11-92E4-4DC4-A704-A653569DEF7E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:rc4:*:*:*:*:*:*", "cpeNameId": "BE180D29-2D25-4945-85F5-4FF1B61A755F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:rc5:*:*:*:*:*:*", "cpeNameId": "B550A739-A864-4C04-8B4F-DB875CCE5876"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:rc6:*:*:*:*:*:*", "cpeNameId": "EE7802F2-4421-4A8F-A5E7-10ABA30BB95D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:rc7:*:*:*:*:*:*", "cpeNameId": "913B33F6-C76A-415E-978B-DFE69DD12443"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.1:*:*:*:*:*:*:*", "cpeNameId": "885FF46B-AF78-41E0-9992-134FC5483062"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.2:*:*:*:*:*:*:*", "cpeNameId": "417EF125-85BE-4436-8270-385A03FBF5DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.3:*:*:*:*:*:*:*", "cpeNameId": "A60F0159-BE82-4549-A156-D0C420BCD669"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.4:*:*:*:*:*:*:*", "cpeNameId": "205719B0-36E0-490F-A726-DBF0A18C7B6D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.5:*:*:*:*:*:*:*", "cpeNameId": "F6FC9B68-7A46-413B-B2F2-B96FC679293B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.6:*:*:*:*:*:*:*", "cpeNameId": "860DB2BE-F0BD-4E93-ACAF-73AB5A4287EC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.7:*:*:*:*:*:*:*", "cpeNameId": "72F15093-84F6-4F64-AD90-9C0B8534002F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.8:*:*:*:*:*:*:*", "cpeNameId": "1241D778-09B7-41CF-A7F0-3F33365EAEEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.9:*:*:*:*:*:*:*", "cpeNameId": "85AF8455-0705-4C7B-A8D7-C827098D3CBC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.10:*:*:*:*:*:*:*", "cpeNameId": "59B6BDD9-9094-469D-B556-347EAFFAC84A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.11:*:*:*:*:*:*:*", "cpeNameId": "195BB390-1666-4C78-8E5E-E8BB8F7CD6C7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.12:*:*:*:*:*:*:*", "cpeNameId": "4611F4AE-C544-40B2-BAB0-4D75918253B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.13:*:*:*:*:*:*:*", "cpeNameId": "174828D2-1D1F-4A0F-9D4A-3D6CEEB670A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.14:*:*:*:*:*:*:*", "cpeNameId": "4A9AF5EF-2143-422E-9406-12394AE6F056"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.15:*:*:*:*:*:*:*", "cpeNameId": "0ED2B63D-794A-436E-98B2-8BB1746F8E37"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.16:*:*:*:*:*:*:*", "cpeNameId": "A3EE611D-A161-44D4-B8BC-3D77C35AC1DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.17:*:*:*:*:*:*:*", "cpeNameId": "77C22DEA-C18D-4F57-A5B2-D9432480F6F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.18:*:*:*:*:*:*:*", "cpeNameId": "98BC40B2-34EE-44D0-AD07-D41DA8D98FEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:*:*:*:*:*:*:*", "cpeNameId": "CE47DAE6-002F-46BE-8496-FC478C0B0928"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:-:*:*:*:*:*:*", "cpeNameId": "96F106B5-E746-4DE6-BCEB-07F1F572960D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:rc:*:*:*:*:*:*", "cpeNameId": "C0F0B475-896B-4239-8475-5B90B74BE05E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:rc1:*:*:*:*:*:*", "cpeNameId": "206EC973-ED2E-49E1-A4AC-54F7D30DD628"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:rc2:*:*:*:*:*:*", "cpeNameId": "AAD4C356-7CE1-4A45-96FE-6D75643AB293"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:rc3:*:*:*:*:*:*", "cpeNameId": "4BFA1B60-7E55-4547-8B4B-AFC1256015D6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:rc4:*:*:*:*:*:*", "cpeNameId": "78E3876E-D2C3-49BA-BE26-2066849638AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:rc5:*:*:*:*:*:*", "cpeNameId": "B9536FB8-C7B1-4C28-82CD-8D8150E7BCCB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:rc6:*:*:*:*:*:*", "cpeNameId": "BEC1B244-1D7B-47BC-A1BB-6F95945EA2C7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:rc7:*:*:*:*:*:*", "cpeNameId": "1D3A9DBB-AF78-4A75-A55E-C851D1277498"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.1:*:*:*:*:*:*:*", "cpeNameId": "C1BE1F09-D07F-4AE4-9764-73721620F745"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.2:*:*:*:*:*:*:*", "cpeNameId": "563DD6A5-BEDD-437A-BAD5-981FD66FAA1A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.3:*:*:*:*:*:*:*", "cpeNameId": "6DC9ED49-7975-48B1-B630-06680709899F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.4:*:*:*:*:*:*:*", "cpeNameId": "39F925A0-630B-4CBF-9BFC-C40C0E81BFA8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.5:*:*:*:*:*:*:*", "cpeNameId": "A0E5D15C-E27F-4B55-9668-078BA5CCD7AA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.6:*:*:*:*:*:*:*", "cpeNameId": "6DE6DECA-3142-43DA-B930-A48EAFF9CED3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.7:*:*:*:*:*:*:*", "cpeNameId": "0438E224-2F8A-4089-BF5E-D7763A431E39"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.8:*:*:*:*:*:*:*", "cpeNameId": "0814DBD3-2193-40B5-8CE1-5C992D4C59C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.9:*:*:*:*:*:*:*", "cpeNameId": "C75890A0-5944-4BB6-B44B-83FDDA55308A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.10:*:*:*:*:*:*:*", "cpeNameId": "50932CE7-4BA6-4944-839E-800831391197"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.11:*:*:*:*:*:*:*", "cpeNameId": "21B4D5C0-665E-4B96-8A71-F84E2731725A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.12:*:*:*:*:*:*:*", "cpeNameId": "26861D80-6855-42B4-A2C5-5A5314C63454"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.13:*:*:*:*:*:*:*", "cpeNameId": "161AE6FB-AF4F-4A02-A235-9BA4D3A8BFE7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.14:*:*:*:*:*:*:*", "cpeNameId": "04DDF552-0DBA-4D2D-97A9-05F348E45E2D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.15:*:*:*:*:*:*:*", "cpeNameId": "8D8D509C-F3B3-4D99-AE7B-85ACE6CDCE9A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.16:*:*:*:*:*:*:*", "cpeNameId": "F62EAE49-6093-4A2A-AEDC-DB4D450BCDCF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.17:*:*:*:*:*:*:*", "cpeNameId": "D4A046F1-9970-4BC2-A4F8-E58871919793"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.18:*:*:*:*:*:*:*", "cpeNameId": "9A7D44E8-1ABB-4FCA-900F-63CF5B432394"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:*:*:*:*:*:*:*", "cpeNameId": "3F9A62D1-EC46-4586-BF5B-075E503B34AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:-:*:*:*:*:*:*", "cpeNameId": "1355298F-E180-4ACE-BE37-E4671C6D87FA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:rc1:*:*:*:*:*:*", "cpeNameId": "869F2A88-8ECA-4277-8EF8-04722B6397F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:rc2:*:*:*:*:*:*", "cpeNameId": "E213D2C7-56A5-4CDB-9FFA-D562EBE66B32"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:rc3:*:*:*:*:*:*", "cpeNameId": "23DCE750-11FB-46DF-B936-8AEAE54EDCF1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:rc4:*:*:*:*:*:*", "cpeNameId": "95518E21-4F70-4E7F-8A5E-41A71733B838"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:rc5:*:*:*:*:*:*", "cpeNameId": "86A613D5-2EDD-46C6-BD54-6EE7E0BD677F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:rc6:*:*:*:*:*:*", "cpeNameId": "7ACCD69E-0ADE-4675-919A-6ADCADB4E243"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:rc7:*:*:*:*:*:*", "cpeNameId": "0CDA0188-9155-4355-B8E0-EC98BCA4D106"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.1:*:*:*:*:*:*:*", "cpeNameId": "8AFFDBAA-464C-4017-8E0B-80E70560BD9C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.2:*:*:*:*:*:*:*", "cpeNameId": "A00BC577-2BDB-4CB9-A918-5EFA87297409"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.3:*:*:*:*:*:*:*", "cpeNameId": "D03EB1B1-6645-4442-9A5B-084C2C086199"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.4:*:*:*:*:*:*:*", "cpeNameId": "4321A1DC-4069-4924-ADAF-060727BD410C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.5:*:*:*:*:*:*:*", "cpeNameId": "6E0A1034-4FFA-4B8B-BA2F-DDDF74911FD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.6:*:*:*:*:*:*:*", "cpeNameId": "0DA7186B-D3B7-4E95-B66E-8FF81C72BC75"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.7:*:*:*:*:*:*:*", "cpeNameId": "2F936CBB-766A-4DFB-A60A-72F1A37577EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.8:*:*:*:*:*:*:*", "cpeNameId": "CB3F392D-0A8A-4D3E-8E62-9E7FD830F988"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.9:*:*:*:*:*:*:*", "cpeNameId": "D1A962D5-849E-4799-B4E2-58BF062A8E35"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.10:*:*:*:*:*:*:*", "cpeNameId": "358D2C77-1EDB-44D7-914F-C1B93B184AE2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.11:*:*:*:*:*:*:*", "cpeNameId": "1B36CCD2-6734-4F62-887B-0B29DEAB8948"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.12:*:*:*:*:*:*:*", "cpeNameId": "939C2382-3F25-4D16-B047-662EF7362D14"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.13:*:*:*:*:*:*:*", "cpeNameId": "4787E970-6703-4A4A-8A25-2A6DF37E9115"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.14:*:*:*:*:*:*:*", "cpeNameId": "D9DE2C08-37BB-4B4E-9CC9-257FB5D0CC55"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.15:*:*:*:*:*:*:*", "cpeNameId": "56CA0D63-01A8-4C7D-9285-0FE01EE5A4CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.16:*:*:*:*:*:*:*", "cpeNameId": "0EB823BC-6F14-4123-AFE3-5BD35C06053B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.17:*:*:*:*:*:*:*", "cpeNameId": "8DB0A362-21DC-463F-8741-7983D7091926"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.18:*:*:*:*:*:*:*", "cpeNameId": "D52B62A2-3084-4DC4-A603-BCAC0CE52FEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.19:*:*:*:*:*:*:*", "cpeNameId": "A5AE9508-CB21-4232-B63E-532C504349B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:*:*:*:*:*:*:*", "cpeNameId": "817415B8-9A60-4887-9222-0D9F02CFB071"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:-:*:*:*:*:*:*", "cpeNameId": "8835D366-AAEA-40BE-A53D-C0C034420403"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:rc1:*:*:*:*:*:*", "cpeNameId": "2213E83B-F249-4DA4-A296-9AE97B5995D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:rc2:*:*:*:*:*:*", "cpeNameId": "48BFC151-DD12-4AA8-860C-CC88EC732BFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:rc3:*:*:*:*:*:*", "cpeNameId": "9FA2195C-1574-4F87-9EBF-C6C98F88BAFF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:rc4:*:*:*:*:*:*", "cpeNameId": "67BF2AB1-0C74-4B1F-8E1C-B1D82E89DDB4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:rc5:*:*:*:*:*:*", "cpeNameId": "AE91D0F4-8012-4BAC-A0C6-BB99AD9D2E46"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:rc6:*:*:*:*:*:*", "cpeNameId": "1766D430-184A-4072-B189-A1497C75D6BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:rc7:*:*:*:*:*:*", "cpeNameId": "CAA30654-34CD-4B4F-B233-29B87ED2FBB8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:rc8:*:*:*:*:*:*", "cpeNameId": "00096540-8FA8-46CA-BB68-93B1C5272D2D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.0:*:*:*:*:*:*:*", "cpeNameId": "A009147C-ACF6-4854-AAE6-3A23AE21C4CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.0-193.el8:*:*:*:*:*:*:*", "cpeNameId": "FCA98709-2F68-4E1B-9430-7D7166871698"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.1:*:*:*:*:*:*:*", "cpeNameId": "13793707-6FDB-4423-A8E6-2ADC8BD61C3A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.2:*:*:*:*:*:*:*", "cpeNameId": "EAB280BE-E42E-47BD-BC9B-9EE32D6C2A40"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.3:*:*:*:*:*:*:*", "cpeNameId": "587AE0EF-5106-4CEA-9358-2D066510D151"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.4:*:*:*:*:*:*:*", "cpeNameId": "A3318DEA-3BE2-4302-BC9B-A034934F9D1D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.5:*:*:*:*:*:*:*", "cpeNameId": "6DFCE771-61CC-4086-9ABA-D355FF8F3148"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.6:*:*:*:*:*:*:*", "cpeNameId": "445E159B-AA55-48BD-93C7-2B930AD4EB83"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.7:*:*:*:*:*:*:*", "cpeNameId": "B27A8950-AB89-4120-80DA-B349652A523D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.8:*:*:*:*:*:*:*", "cpeNameId": "8E631816-CFC2-4D77-AE17-D796C455F715"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.9:*:*:*:*:*:*:*", "cpeNameId": "8FD85D0C-385D-488A-A090-32B066B8C2EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.10:*:*:*:*:*:*:*", "cpeNameId": "FEEDBD99-9EB3-41AF-815C-571AF46B5D85"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.11:*:*:*:*:*:*:*", "cpeNameId": "7E7CBF51-E6C8-46E1-8DD3-CFBAB87EA47B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.12:*:*:*:*:*:*:*", "cpeNameId": "F965D923-D9D7-4EF1-B1FB-07EA2FEEBE31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.13:*:*:*:*:*:*:*", "cpeNameId": "E5834B3F-3734-4FEB-9440-7AE8BE96EBB5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.14:*:*:*:*:*:*:*", "cpeNameId": "09696490-5ABF-48D2-823F-C1822003B392"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.15:*:*:*:*:*:*:*", "cpeNameId": "E6911EAC-4DB4-41E9-9401-B4226373EE5A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.16:*:*:*:*:*:*:*", "cpeNameId": "AC125B64-72FD-4946-B3A7-663299025809"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.17:*:*:*:*:*:*:*", "cpeNameId": "EF3569D5-2C62-4458-974E-918A784BD62A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.18:*:*:*:*:*:*:*", "cpeNameId": "1FA907F8-0BCB-4507-8714-DC1D5781D42D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.19:*:*:*:*:*:*:*", "cpeNameId": "942860D3-A3FF-4932-A6FB-9459A59644BE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.20:*:*:*:*:*:*:*", "cpeNameId": "EC116A00-67FF-4F9B-9B3B-EFB39878E41F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:*:*:*:*:*:*:*", "cpeNameId": "A3163086-ED2B-4462-9265-6F1DCEAB4D54"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:-:*:*:*:*:*:*", "cpeNameId": "057CC752-CE29-466B-827D-3930C41F1C3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:rc1:*:*:*:*:*:*", "cpeNameId": "AFC357CC-56A5-4555-959A-34F88351D81B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:rc2:*:*:*:*:*:*", "cpeNameId": "ED61D354-4BB9-4D66-87FB-86662D7B6B12"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:rc3:*:*:*:*:*:*", "cpeNameId": "A84469B4-B1DD-4DED-AC99-EA9C2CA93CF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:rc4:*:*:*:*:*:*", "cpeNameId": "EE659E91-B594-49B5-BC25-C4BAB3BE192E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:rc5:*:*:*:*:*:*", "cpeNameId": "2B7349C1-F08A-44E5-8FB8-3F2804E5A07F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:rc6:*:*:*:*:*:*", "cpeNameId": "EB37BD16-E204-41BE-ADE4-01B875CBE896"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:rc7:*:*:*:*:*:*", "cpeNameId": "745C3308-0D37-4503-B9FD-1C7A675E7C3A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:rc8:*:*:*:*:*:*", "cpeNameId": "C09DBABE-8232-4196-8C42-2D4509AD02FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.1:*:*:*:*:*:*:*", "cpeNameId": "CBFE536A-5936-4037-A140-B381A09E0313"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.2:*:*:*:*:*:*:*", "cpeNameId": "E7375DDA-E673-4CB3-9A7A-751E0A34FC42"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.3:*:*:*:*:*:*:*", "cpeNameId": "99F55D5C-293A-4F8A-8C8C-D324BECF805D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.4:*:*:*:*:*:*:*", "cpeNameId": "C61FC074-FB83-48ED-8299-CF0565B28BF0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.5:*:*:*:*:*:*:*", "cpeNameId": "813A19FD-6C0F-442D-BD13-D924AAB177A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.6:*:*:*:*:*:*:*", "cpeNameId": "5387070B-08B1-4B14-ABD0-845D0DD8F84B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.7:*:*:*:*:*:*:*", "cpeNameId": "E39CE6E9-2A15-486F-881E-000CEB221CFC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.8:*:*:*:*:*:*:*", "cpeNameId": "3951D003-9ACB-4530-AD87-BA6495862F19"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.9:*:*:*:*:*:*:*", "cpeNameId": "16722D4A-04DC-40F0-B6BE-19B503E6F896"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.10:*:*:*:*:*:*:*", "cpeNameId": "1F88CB52-D7B5-4946-A367-45DE35034F51"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.11:*:*:*:*:*:*:*", "cpeNameId": "77B502BA-B846-4C9C-A8CE-3EF988CECC92"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.12:*:*:*:*:*:*:*", "cpeNameId": "23451725-61D8-4924-88FD-F296F0BB0BDD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.13:*:*:*:*:*:*:*", "cpeNameId": "2647DBE8-332D-4420-A7FE-971F97D450E5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.14:*:*:*:*:*:*:*", "cpeNameId": "EC80AF58-D2F3-439F-8A3D-0333C832805C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.15:*:*:*:*:*:*:*", "cpeNameId": "5FF48FD7-42B6-446C-9142-C46F87307A23"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.16:*:*:*:*:*:*:*", "cpeNameId": "27DD882E-6137-45D8-95CA-46E0A0E9D546"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.17:*:*:*:*:*:*:*", "cpeNameId": "3D79ECA3-B493-4422-B61B-F9D8725540BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.18:*:*:*:*:*:*:*", "cpeNameId": "D815E2B8-DD92-47E3-A1C3-E9B7859ED848"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.19:*:*:*:*:*:*:*", "cpeNameId": "3ED97E59-18F8-4970-8DCF-108DB66C0B64"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.20:*:*:*:*:*:*:*", "cpeNameId": "F5B56565-8277-4435-81A3-14A07CD1CFB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.21:*:*:*:*:*:*:*", "cpeNameId": "08DEF207-BE10-4D38-B198-E0E81A7D8DD8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.22:*:*:*:*:*:*:*", "cpeNameId": "6406E989-2DA9-4473-8A19-F34C0AA0A101"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.23:*:*:*:*:*:*:*", "cpeNameId": "BAB4A7B7-201A-49DD-8CEA-C8276A386DB5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.24:*:*:*:*:*:*:*", "cpeNameId": "C1807F8B-4224-4C20-A7E6-A1A37CFE804C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.25:*:*:*:*:*:*:*", "cpeNameId": "BC055247-93EC-4557-97C5-3F2476EE0F15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.26:*:*:*:*:*:*:*", "cpeNameId": "7D6369DC-902C-4BC1-A26D-C5C913143EB6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.26.1:*:*:*:*:*:*:*", "cpeNameId": "8C01371D-728D-41FF-8EDB-479FFEB181A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.27:*:*:*:*:*:*:*", "cpeNameId": "A32084B7-D6A4-4F74-B282-DDB6DEF0C5AA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.28:*:*:*:*:*:*:*", "cpeNameId": "E0A0C51F-ED33-48CF-927D-0CA8970B6D1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.29:*:*:*:*:*:*:*", "cpeNameId": "21FF2212-87CD-409F-8FA3-A36D8AA94607"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.30:*:*:*:*:*:*:*", "cpeNameId": "429E0577-DB63-4580-8B2F-9F00743EB4B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.31:*:*:*:*:*:*:*", "cpeNameId": "3371D4B5-E4D9-483E-AA24-B99A03C20991"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.32:*:*:*:*:*:*:*", "cpeNameId": "316A0495-6409-4E82-A2FF-2A3158DF6020"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.33:*:*:*:*:*:*:*", "cpeNameId": "2ADFFFEE-80CB-4EF8-8893-D1D2CDBF2687"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.34:*:*:*:*:*:*:*", "cpeNameId": "D3C47B41-3976-412A-877C-08C558B67F17"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.35:*:*:*:*:*:*:*", "cpeNameId": "C12B86A6-026B-4109-9E3B-5A334A73871F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.36:*:*:*:*:*:*:*", "cpeNameId": "855C5C5D-CC69-4629-9D55-4E25F1346965"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.37:*:*:*:*:*:*:*", "cpeNameId": "35B14A6C-CDA5-4E1F-B6C6-4E8305D32DFB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.38:*:*:*:*:*:*:*", "cpeNameId": "9CB2A48B-F8FC-47BE-9DF4-2B95585425F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.39:*:*:*:*:*:*:*", "cpeNameId": "E6A1D1E0-0373-4295-897D-C7E699C018E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.40:*:*:*:*:*:*:*", "cpeNameId": "970D15E0-EE86-4AAB-9840-3CD713AEF03B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.41:*:*:*:*:*:*:*", "cpeNameId": "0B47B7E6-5110-44D8-BDEA-4080A6A28FCF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.42:*:*:*:*:*:*:*", "cpeNameId": "2FF8D63B-85F6-43EC-B69F-231ECF7D0312"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.43:*:*:*:*:*:*:*", "cpeNameId": "935B8487-6BDD-4FFF-9F7E-00A86BB69CDD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.44:*:*:*:*:*:*:*", "cpeNameId": "48F99607-CA4F-4629-A68D-4349153DF423"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.45:*:*:*:*:*:*:*", "cpeNameId": "1CFB073B-B310-49DC-893B-B46DE6336F4E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.46:*:*:*:*:*:*:*", "cpeNameId": "8F2CA065-9492-44F8-9C69-B151B71803CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.47:*:*:*:*:*:*:*", "cpeNameId": "65D05643-4760-4FC5-97A3-BC5CCCA46CE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.48:*:*:*:*:*:*:*", "cpeNameId": "805F2CFA-C623-43A6-BA75-8A677011B7C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.49:*:*:*:*:*:*:*", "cpeNameId": "E9B45E20-6F1C-4909-95E4-17956AB05513"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.50:*:*:*:*:*:*:*", "cpeNameId": "02565DD0-1F69-44F5-9710-F4559686BCB5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.51:*:*:*:*:*:*:*", "cpeNameId": "4A2A0E35-E26F-470C-8293-E71B0D280E37"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.52:*:*:*:*:*:*:*", "cpeNameId": "E4259B27-55AA-4906-A88E-2F156833874F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.53:*:*:*:*:*:*:*", "cpeNameId": "2399AB59-0AAB-45C3-9359-778E0CEF66FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.54:*:*:*:*:*:*:*", "cpeNameId": "46C3AEDA-6F26-4416-BF76-1FEBBD354F3F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.55:*:*:*:*:*:*:*", "cpeNameId": "10F1A367-B071-4F9A-A2CB-0C7FF216A216"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.56:*:*:*:*:*:*:*", "cpeNameId": "DF3D3A29-EB49-483C-9737-67E18806F753"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.57:*:*:*:*:*:*:*", "cpeNameId": "D79FAF76-5403-4082-95B6-702810120DAA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.58:*:*:*:*:*:*:*", "cpeNameId": "93DF7061-A282-4290-9D97-63ACC7575826"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.59:*:*:*:*:*:*:*", "cpeNameId": "88CB7AC8-7CAA-4947-8578-AB8B5A9C7D8C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.60:*:*:*:*:*:*:*", "cpeNameId": "8B9A9641-54E1-40FE-AD41-551002220084"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.61:*:*:*:*:*:*:*", "cpeNameId": "04A60F34-73F7-49AB-AB09-1083721DE784"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.62:*:*:*:*:*:*:*", "cpeNameId": "D4A637B9-0057-4393-A19F-69879DA1CA8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.63:*:*:*:*:*:*:*", "cpeNameId": "AF1FE2CD-7236-4965-952B-6F172159373C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.64:*:*:*:*:*:*:*", "cpeNameId": "7D1F715A-1A92-4ECE-85BB-0CC907BEDD91"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.65:*:*:*:*:*:*:*", "cpeNameId": "4116C6D8-AF20-48AF-8ADA-0506911A3459"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.66:*:*:*:*:*:*:*", "cpeNameId": "4388B248-80C6-4086-B1E6-4CEE1BF7602F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.67:*:*:*:*:*:*:*", "cpeNameId": "50EF8BC5-16C3-4AD8-A2D1-1A2608CD7374"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.68:*:*:*:*:*:*:*", "cpeNameId": "5D10408F-E5C0-40B2-A497-3E71FB6DD431"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.69:*:*:*:*:*:*:*", "cpeNameId": "10504EA1-D9B1-44C8-A9EC-B8D32AAFCF5B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.70:*:*:*:*:*:*:*", "cpeNameId": "AA9003D3-8912-4A70-8B69-3F2F345FFD89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.71:*:*:*:*:*:*:*", "cpeNameId": "233CCC29-E4BB-4DAD-9F45-CEC77425C279"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.72:*:*:*:*:*:*:*", "cpeNameId": "B3336506-E63D-491E-B756-15C59D0B0EAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.73:*:*:*:*:*:*:*", "cpeNameId": "57449032-831C-45A0-9FE9-E630FB005BEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.74:*:*:*:*:*:*:*", "cpeNameId": "27086504-19AA-48F8-AAC3-FE71072F4AC6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.75:*:*:*:*:*:*:*", "cpeNameId": "858F7980-5197-42DE-B55C-CA706999F200"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.76:*:*:*:*:*:*:*", "cpeNameId": "31423569-8FBC-411E-9F95-9820746128BE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.77:*:*:*:*:*:*:*", "cpeNameId": "D3EB9447-CCF7-4803-ABBB-15477850C76B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.78:*:*:*:*:*:*:*", "cpeNameId": "68BD1635-2CE6-464F-B32D-D0AE25DEB9E5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.79:*:*:*:*:*:*:*", "cpeNameId": "8FFF3C74-22E6-4418-AD93-AA773E549428"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.80:*:*:*:*:*:*:*", "cpeNameId": "721DC148-9BCB-4B12-88AA-0BAF3A380C77"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.81:*:*:*:*:*:*:*", "cpeNameId": "9D3ED37A-08C8-4430-BB0A-EFA6D1AF1D5C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.82:*:*:*:*:*:*:*", "cpeNameId": "00536E1F-7C8D-4DDC-8629-ABE2B4EDA61B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.83:*:*:*:*:*:*:*", "cpeNameId": "6877CB77-34C0-4B45-BED7-7966B69D89F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.84:*:*:*:*:*:*:*", "cpeNameId": "614F4D67-484D-488A-8DB5-9FF8F939927B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.85:*:*:*:*:*:*:*", "cpeNameId": "C3D19825-51CE-43E1-904C-1344DB3775A9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.86:*:*:*:*:*:*:*", "cpeNameId": "2C509040-DF4B-4BD3-8428-4BB9ED4D3BEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.87:*:*:*:*:*:*:*", "cpeNameId": "4455DE42-A354-4EF5-A49A-345954CD65EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.88:*:*:*:*:*:*:*", "cpeNameId": "0F57DC5F-F143-44EE-9037-3BBF9BF3A1E7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.89:*:*:*:*:*:*:*", "cpeNameId": "D4475A2E-E667-4618-A347-10EC5EA6657D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.90:*:*:*:*:*:*:*", "cpeNameId": "2C94A5E1-6EC8-4F69-8C81-18BA6B3E22CC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.91:*:*:*:*:*:*:*", "cpeNameId": "31EE797A-51CC-46B2-B768-1FA25A37706D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.92:*:*:*:*:*:*:*", "cpeNameId": "4748A9ED-7812-4451-81CD-B75547B3C532"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.93:*:*:*:*:*:*:*", "cpeNameId": "119FC260-DEC1-4E63-AF81-2F3360E78EB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.94:*:*:*:*:*:*:*", "cpeNameId": "25A22D4C-1973-4287-B791-87F903F64B97"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.95:*:*:*:*:*:*:*", "cpeNameId": "ACD2D3C9-BA85-4EEE-9A65-FE83E3495315"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.96:*:*:*:*:*:*:*", "cpeNameId": "3B169D06-CA15-4A4A-980A-A056E6C81881"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.97:*:*:*:*:*:*:*", "cpeNameId": "A18ABB80-25F6-4328-B68F-A3B4B23763E4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.98:*:*:*:*:*:*:*", "cpeNameId": "F8BEC111-87BF-4B6C-BBF6-62EE9A763119"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.99:*:*:*:*:*:*:*", "cpeNameId": "2CE59324-24EA-46B0-939D-BA1815313EA7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.100:*:*:*:*:*:*:*", "cpeNameId": "86C29F08-DF43-426C-9E23-1E3416463DBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.101:*:*:*:*:*:*:*", "cpeNameId": "81DE128C-6A1B-4676-A99B-58B77482593A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.102:*:*:*:*:*:*:*", "cpeNameId": "FDA36DFA-EE0A-4DEE-B7C2-A2AF9F84E0CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.103:*:*:*:*:*:*:*", "cpeNameId": "FE71C8C4-8159-49DC-87F0-4A98BEA448C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.104:*:*:*:*:*:*:*", "cpeNameId": "35D6D06A-7705-4EA0-9209-55B7ED61E83A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.105:*:*:*:*:*:*:*", "cpeNameId": "B2DA3294-00F2-4509-A8B2-0F53D69F2B36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.106:*:*:*:*:*:*:*", "cpeNameId": "D337E554-D6A9-4CFC-9985-F670B7654434"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.107:*:*:*:*:*:*:*", "cpeNameId": "FE52DA4B-3ACB-4510-AA7A-9CCFE25E5B87"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.108:*:*:*:*:*:*:*", "cpeNameId": "82BED585-BBDF-41AE-B925-D4CA36F697BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.109:*:*:*:*:*:*:*", "cpeNameId": "C1526792-F597-4674-B998-9A4FF075956E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.110:*:*:*:*:*:*:*", "cpeNameId": "B48E2837-F8E0-42BA-A7D2-B9EA5A770E1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.111:*:*:*:*:*:*:*", "cpeNameId": "B52E1607-47C2-4AD5-95D0-F35A901E5D3F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.112:*:*:*:*:*:*:*", "cpeNameId": "0CDD6E73-775F-49CF-A3D6-E9054EB43D36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.113:*:*:*:*:*:*:*", "cpeNameId": "8A144377-4D4C-48F7-80AB-A8B50F86D132"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.114:*:*:*:*:*:*:*", "cpeNameId": "4B6DF9A7-218F-435C-A5AB-61A5575D9DBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.115:*:*:*:*:*:*:*", "cpeNameId": "8D64C2A7-DF73-481A-8A55-790CD5DABBC0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.116:*:*:*:*:*:*:*", "cpeNameId": "36E4D70D-9E0D-44AC-9CE9-168111BE078D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.117:*:*:*:*:*:*:*", "cpeNameId": "BFF2F68A-DA2E-4118-A4CB-E7FA7C719C97"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.118:*:*:*:*:*:*:*", "cpeNameId": "B8DEB967-1BA5-43BA-B659-5AC369F5527B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.118-2:*:*:*:*:*:*:*", "cpeNameId": "8BDE7B9C-7D49-4FB9-9095-89B0FD601AC4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.119:*:*:*:*:*:*:*", "cpeNameId": "1EBD0B5F-457A-4365-B3B0-45E4C0B21B93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.120:*:*:*:*:*:*:*", "cpeNameId": "0C712977-921D-4FD3-BCBB-6F4A86AA7594"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.121:*:*:*:*:*:*:*", "cpeNameId": "0D8947E0-FBE1-424F-BA96-F5A83CF87A3E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.122:*:*:*:*:*:*:*", "cpeNameId": "A79D9A4E-58CD-4825-9EC3-0B0499C90BF3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.123:*:*:*:*:*:*:*", "cpeNameId": "A61315CE-EC4F-4734-8B07-9670C7DAF959"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.124:*:*:*:*:*:*:*", "cpeNameId": "8B2AB2CC-ED8F-40C0-A027-7A93B70D0ABF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.125:*:*:*:*:*:*:*", "cpeNameId": "DF0EBF12-4078-42F7-A92B-5D54056AE5EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.126:*:*:*:*:*:*:*", "cpeNameId": "A2A07202-24D9-4929-93CE-AD808F353C60"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.127:*:*:*:*:*:*:*", "cpeNameId": "1AB674F5-1B69-4DE7-AF61-50787A69A5D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.128:*:*:*:*:*:*:*", "cpeNameId": "3D2F68B8-736E-4899-9B1B-ED6E8DE6CF3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.129:*:*:*:*:*:*:*", "cpeNameId": "76CD5FC7-448D-4F20-864B-3567B07D1B56"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.130:*:*:*:*:*:*:*", "cpeNameId": "C61BEEDC-1AA7-4453-9C1F-1B61D1EA024F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.131:*:*:*:*:*:*:*", "cpeNameId": "418276D9-F035-4B0B-BCCB-D5FB488D5B31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.132:*:*:*:*:*:*:*", "cpeNameId": "C5D35F68-0A1C-44A4-952A-DDDF21BC09EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.133:*:*:*:*:*:*:*", "cpeNameId": "1F548D92-C48B-4886-A2B3-6E74E8E0F55B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.134:*:*:*:*:*:*:*", "cpeNameId": "F20B9429-FA58-466C-9DFA-9E806AF804B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.135:*:*:*:*:*:*:*", "cpeNameId": "36A1C0D1-63B5-4817-8BA5-C60D3D6B6B38"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.136:*:*:*:*:*:*:*", "cpeNameId": "33C1E0F9-16D2-4829-A3BE-88C14FF70938"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.137:*:*:*:*:*:*:*", "cpeNameId": "C7C55512-FBE6-47D5-8A7A-BBD5577D17E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.138:*:*:*:*:*:*:*", "cpeNameId": "769005B9-5005-411C-B4EE-CF0C62490EF8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.139:*:*:*:*:*:*:*", "cpeNameId": "06D197F7-661E-4C49-B099-4545C422C7A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.140:*:*:*:*:*:*:*", "cpeNameId": "776A104E-F94D-406D-BF76-9B11C3365D7A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.141:*:*:*:*:*:*:*", "cpeNameId": "5035E747-DEF4-4DA3-83CF-5BD2A6A9A54A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.142:*:*:*:*:*:*:*", "cpeNameId": "D4080EBB-DEB7-4E16-BE55-BEFAFB7E93E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.143:*:*:*:*:*:*:*", "cpeNameId": "853BB9C3-4467-4FD8-9A46-E2009C5F4357"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.144:*:*:*:*:*:*:*", "cpeNameId": "2AEB23BA-8389-4940-B626-9E7DAF29822D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.145:*:*:*:*:*:*:*", "cpeNameId": "84991F4A-4107-48A6-8D6E-D85F2EF55EBF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.146:*:*:*:*:*:*:*", "cpeNameId": "7A9370E6-CF76-4989-9368-76B2E434A857"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.147:*:*:*:*:*:*:*", "cpeNameId": "DEE46645-5E8C-4F37-BCD0-322E77397F59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.148:*:*:*:*:*:*:*", "cpeNameId": "2093C809-0485-44CC-B0ED-5C2B7DBFEA99"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.149:*:*:*:*:*:*:*", "cpeNameId": "98DAC7B2-8F21-49EF-B53B-23B8A22A8975"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.150:*:*:*:*:*:*:*", "cpeNameId": "E28A93DC-B824-4692-A0F3-B5CAB77B3A48"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.151:*:*:*:*:*:*:*", "cpeNameId": "365D8293-E1BC-4F24-A5FF-B7E12943EE70"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.152:*:*:*:*:*:*:*", "cpeNameId": "FFEFA6D6-3D07-4911-A0D8-3C7A27A95143"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.153:*:*:*:*:*:*:*", "cpeNameId": "051C7A5C-25A0-408C-AFFA-19DB17B0DFE2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.154:*:*:*:*:*:*:*", "cpeNameId": "34798860-1C32-431D-8095-4D25E900D047"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.155:*:*:*:*:*:*:*", "cpeNameId": "BCB220C7-6880-4054-B512-91A8A5F683CE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.156:*:*:*:*:*:*:*", "cpeNameId": "3DDC9F23-49BA-42AE-9251-D0DE0DEF8DD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.157:*:*:*:*:*:*:*", "cpeNameId": "B65EAD3A-8DA1-40A2-B14F-C3D61E19D592"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.158:*:*:*:*:*:*:*", "cpeNameId": "D8A0F47B-9F15-4DC9-9134-C2410BF8E55E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.159:*:*:*:*:*:*:*", "cpeNameId": "FD07FFAC-9B06-43E9-A1AE-F085B99D2A65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.160:*:*:*:*:*:*:*", "cpeNameId": "B6133234-102E-4B8C-A0F0-E9E1538BD098"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.161:*:*:*:*:*:*:*", "cpeNameId": "E03ADD0A-1D87-4772-BE21-A5ED5FC96BE8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.162:*:*:*:*:*:*:*", "cpeNameId": "39EDA362-7B7A-4D97-B8FB-B7B9696B05E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.163:*:*:*:*:*:*:*", "cpeNameId": "6D54CD36-C5A1-437B-85B6-B59A45D1E007"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.164:*:*:*:*:*:*:*", "cpeNameId": "00F1FD43-244A-4CC2-B16C-BC98C99FBB27"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.165:*:*:*:*:*:*:*", "cpeNameId": "D34CA2D9-09FB-473B-9C0F-0C392B3132F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.166:*:*:*:*:*:*:*", "cpeNameId": "4AE874DA-0375-4E7E-84DC-BCAB385B5C30"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.167:*:*:*:*:*:*:*", "cpeNameId": "DD93F0EB-9B9D-4F5B-BDE0-F0F251381EB2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.168:*:*:*:*:*:*:*", "cpeNameId": "D28DA286-D5D2-40D2-82CA-FC8C79CC5F23"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.169:*:*:*:*:*:*:*", "cpeNameId": "8A84A955-ECC0-4B19-B09D-5BB422561099"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.170:*:*:*:*:*:*:*", "cpeNameId": "79343991-197E-4074-A17D-DA9A050EED4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.171:*:*:*:*:*:*:*", "cpeNameId": "BD8EBDB7-7226-4A65-8E8E-74D5A3F671B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.172:*:*:*:*:*:*:*", "cpeNameId": "0CA2E704-2400-4391-9D42-637DC8C25BED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.173:*:*:*:*:*:*:*", "cpeNameId": "8A6A2923-E6F6-4B77-9F0E-BA6FD58DE8D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.174:*:*:*:*:*:*:*", "cpeNameId": "18805724-EB20-4960-8D96-D7D17DDBDE30"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.175:*:*:*:*:*:*:*", "cpeNameId": "5BD11FEB-E163-4734-823A-A784C4C6FE9A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.176:*:*:*:*:*:*:*", "cpeNameId": "960EB99C-0D42-4892-9989-4473683490E4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.177:*:*:*:*:*:*:*", "cpeNameId": "5A04EB31-D67D-4DF0-81D6-D2EB42FCDCD2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.178:*:*:*:*:*:*:*", "cpeNameId": "B2F1908E-4EA9-490A-A154-8B4621189CAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.179:*:*:*:*:*:*:*", "cpeNameId": "66E97557-5D46-4DEB-B1DE-C668E5B8B3FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.180:*:*:*:*:*:*:*", "cpeNameId": "9979A105-8BA0-4AE2-BDFB-7D79DE2FBBFB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.181:*:*:*:*:*:*:*", "cpeNameId": "90E6E2D5-7A6D-4E95-9A52-FF7B9A8A2441"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.182:*:*:*:*:*:*:*", "cpeNameId": "69A2955B-EC3D-41AF-978F-CBFBC556F92D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.183:*:*:*:*:*:*:*", "cpeNameId": "D3F33DDF-A839-49B6-B3B8-EEACA952A9E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.184:*:*:*:*:*:*:*", "cpeNameId": "19F1F05C-A087-44E8-983E-2EB143DC1D8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.185:*:*:*:*:*:*:*", "cpeNameId": "F145BE0F-E7F0-442E-BDA7-C63C7E168E2B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.186:*:*:*:*:*:*:*", "cpeNameId": "B4D0C3FD-6476-413B-BF42-8C2641E289AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.187:*:*:*:*:*:*:*", "cpeNameId": "8D0F70F4-570E-4C9E-B51B-42BB544A72EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.188:*:*:*:*:*:*:*", "cpeNameId": "780D6AF4-4E15-4413-832E-0F50248A4B0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.189:*:*:*:*:*:*:*", "cpeNameId": "20F1C4AC-ECCF-4001-8CEA-457D8E6BDE3E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.190:*:*:*:*:*:*:*", "cpeNameId": "2CCC5886-AA10-470F-B2E9-B38438848CD2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.191:*:*:*:*:*:*:*", "cpeNameId": "0E0DFF46-8703-4A82-B4CB-DD923D09ACA8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.192:*:*:*:*:*:*:*", "cpeNameId": "3456DA2C-41BD-4021-B3F4-C0C7EFBA35B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.193:*:*:*:*:*:*:*", "cpeNameId": "44D8482E-577B-4B3E-A84D-A1FA11CE744D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.194:*:*:*:*:*:*:*", "cpeNameId": "278C5BBE-D4E2-43AC-B338-0B4C819B16FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.195:*:*:*:*:*:*:*", "cpeNameId": "30A50973-7C58-419D-8FED-111FD1615CD3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.196:*:*:*:*:*:*:*", "cpeNameId": "68839FE1-F3CD-49BF-902D-28A47A024FC8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.197:*:*:*:*:*:*:*", "cpeNameId": "8C685C52-5BE6-4D58-BBE3-AE69FF1B758C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.198:*:*:*:*:*:*:*", "cpeNameId": "2F461C57-E447-4647-BFFC-C44767B5CDEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.199:*:*:*:*:*:*:*", "cpeNameId": "65EF0724-0838-446F-85BC-A51CDD060978"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.200:*:*:*:*:*:*:*", "cpeNameId": "16752BB9-187D-48B0-8E87-D676FF91C631"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.201:*:*:*:*:*:*:*", "cpeNameId": "2BDCFC6A-E39A-4AD7-ABFA-5F15BDB22286"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.202:*:*:*:*:*:*:*", "cpeNameId": "CD1E47CB-CE3F-4154-8131-133CE38302D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.203:*:*:*:*:*:*:*", "cpeNameId": "73D48406-40CE-4D07-B08C-6C6ED58D13A3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.204:*:*:*:*:*:*:*", "cpeNameId": "6231157D-84BB-46D9-B0CF-AAF2FD31D3C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.205:*:*:*:*:*:*:*", "cpeNameId": "253E528A-1462-4B93-9978-C23C7DD14FF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.206:*:*:*:*:*:*:*", "cpeNameId": "2233D818-CCDB-4166-901F-29D032F730AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.207:*:*:*:*:*:*:*", "cpeNameId": "25D133DF-5D1B-46EA-9019-C81A1623C74D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.208:*:*:*:*:*:*:*", "cpeNameId": "1172736D-6A80-4AD1-B861-43797791A6F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.209:*:*:*:*:*:*:*", "cpeNameId": "FD71CF2C-F734-4E31-AAB7-41AC133EBFDA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.210:*:*:*:*:*:*:*", "cpeNameId": "2BA3CAE2-A53E-4516-9E32-DCF40D28A710"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.211:*:*:*:*:*:*:*", "cpeNameId": "50B9C1D0-7B42-43CC-9103-A96EA1B8D3B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.212:*:*:*:*:*:*:*", "cpeNameId": "D12B8C79-B286-47EA-86E0-4C415154600F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.213:*:*:*:*:*:*:*", "cpeNameId": "C90B250E-D388-459F-91FF-19CF7A6292AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.214:*:*:*:*:*:*:*", "cpeNameId": "EE578B4A-6420-46EA-8C33-994379131EB6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.215:*:*:*:*:*:*:*", "cpeNameId": "5581DCBE-D268-477A-AA1F-B4204F1CE309"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.216:*:*:*:*:*:*:*", "cpeNameId": "4633CDC1-D620-43BD-A59B-1CCE17C70740"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.217:*:*:*:*:*:*:*", "cpeNameId": "62DDB6C3-A7A1-466E-A101-6FE1AA552C94"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.218:*:*:*:*:*:*:*", "cpeNameId": "F6798282-7FF8-43E0-8B9D-1A9BDB0E3E48"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.219:*:*:*:*:*:*:*", "cpeNameId": "57D287C6-0EF3-4B47-A893-F3712CC12478"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.220:*:*:*:*:*:*:*", "cpeNameId": "A0B09A4E-2318-48CE-810F-84F2E721D722"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.221:*:*:*:*:*:*:*", "cpeNameId": "0F3D6297-A92E-479B-91F3-4162BFDC9184"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.222:*:*:*:*:*:*:*", "cpeNameId": "14FFED1D-629A-428E-A473-8327DB224D64"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.223:*:*:*:*:*:*:*", "cpeNameId": "9625BCC9-FBBE-42C7-82C2-F7D75F866E53"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.224:*:*:*:*:*:*:*", "cpeNameId": "D5BC9FF8-1337-4A3B-A66C-CC31C701B22C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.225:*:*:*:*:*:*:*", "cpeNameId": "2ED5BE75-F496-47BA-B521-36F6844FFE01"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.226:*:*:*:*:*:*:*", "cpeNameId": "02E6B2D5-DA63-4574-90D7-15F7EAA70DA1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.227:*:*:*:*:*:*:*", "cpeNameId": "EB84BCF0-8987-46AC-9E6F-D9E17DEFD1D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.228:*:*:*:*:*:*:*", "cpeNameId": "7ACE67A9-9EAD-4AB0-A99D-F37993392E37"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.229:*:*:*:*:*:*:*", "cpeNameId": "ED71AA15-673C-416E-9CAF-3440D41A1E22"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.230:*:*:*:*:*:*:*", "cpeNameId": "CB9E000D-CEAE-488E-B9F7-756EF13ECBE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.231:*:*:*:*:*:*:*", "cpeNameId": "F79CB637-6B2C-46DC-BD81-8B0583AAC33C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.232:*:*:*:*:*:*:*", "cpeNameId": "6CDDD19B-7E18-4A0E-AC09-B86E9401F516"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.233:*:*:*:*:*:*:*", "cpeNameId": "3EF64EBF-557B-4AB2-B2E5-0D03035197DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.234:*:*:*:*:*:*:*", "cpeNameId": "9E2D001E-2282-4A78-AB00-B37189C8CD59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.235:*:*:*:*:*:*:*", "cpeNameId": "31A795CF-5B8E-4B6C-94DC-3B37A8423823"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.236:*:*:*:*:*:*:*", "cpeNameId": "813866EF-11A3-41D9-9735-ECFEFCDBA1AD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.237:*:*:*:*:*:*:*", "cpeNameId": "C0F81506-A565-4F17-BEC9-1B54FAD059CC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.238:*:*:*:*:*:*:*", "cpeNameId": "1509FEA6-FA47-46C8-A117-8913CCFDB5AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.239:*:*:*:*:*:*:*", "cpeNameId": "C05A4F03-15E3-4C08-8958-6A057F7911B8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.240:*:*:*:*:*:*:*", "cpeNameId": "4EAF2417-3F1E-446A-AD33-77B21AE04E06"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.241:*:*:*:*:*:*:*", "cpeNameId": "8FFB9F0D-3B6F-494F-89AC-EAC4438C0B1C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.242:*:*:*:*:*:*:*", "cpeNameId": "A27EEF03-9001-4C7D-B063-C1FE8FC05EE0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.243:*:*:*:*:*:*:*", "cpeNameId": "529CAB2E-5F5C-4699-BC48-E93341EE6B67"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.244:*:*:*:*:*:*:*", "cpeNameId": "9FF0D590-EAB2-4B36-BBE2-008A4E800722"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.245:*:*:*:*:*:*:*", "cpeNameId": "590BFECB-A2B4-4C3F-9017-6D565899E1F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.246:*:*:*:*:*:*:*", "cpeNameId": "CB0BB20C-811F-4B9B-B827-3A42CA5539D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.247:*:*:*:*:*:*:*", "cpeNameId": "B532E91C-FEBE-4C29-B9C7-E899AF134D48"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.248:*:*:*:*:*:*:*", "cpeNameId": "8222442A-C4EC-45CD-9A4C-76E562756CBE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.249:*:*:*:*:*:*:*", "cpeNameId": "444D84A8-CE8F-4BE2-A463-B4E693104BA6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.250:*:*:*:*:*:*:*", "cpeNameId": "7243A073-0900-4470-98B8-FE5839442E3F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.251:*:*:*:*:*:*:*", "cpeNameId": "B4EAB6D9-28E2-45CD-BE10-5EF905373AF3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.252:*:*:*:*:*:*:*", "cpeNameId": "CF09CCB5-9276-41A3-8330-8037A633B793"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.253:*:*:*:*:*:*:*", "cpeNameId": "9BB592D7-81CC-4DE7-9256-FAE66467FFD7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.254:*:*:*:*:*:*:*", "cpeNameId": "C78BD176-2DFC-4BAE-95C1-3A495252A65A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.255:*:*:*:*:*:*:*", "cpeNameId": "2AF01112-197B-43DE-9BF8-940F1114DC73"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.256:*:*:*:*:*:*:*", "cpeNameId": "220C4EBF-9B86-4AB1-AD37-100994B4606D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.257:*:*:*:*:*:*:*", "cpeNameId": "34F7CCEF-8221-4005-A144-93D314E39C81"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.258:*:*:*:*:*:*:*", "cpeNameId": "19A0EB8D-1846-4C52-BEEA-F6CC1691C50C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.259:*:*:*:*:*:*:*", "cpeNameId": "B6F4132F-B9B0-4168-98D7-23FCCBDD4034"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.260:*:*:*:*:*:*:*", "cpeNameId": "E7F6FAE1-DF95-48E5-94D9-C505AF592766"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.261:*:*:*:*:*:*:*", "cpeNameId": "3BCD7AF9-57AB-41EC-99D4-59DD6DCA3703"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.262:*:*:*:*:*:*:*", "cpeNameId": "64A647E0-3291-4C17-9D9A-2BC6DDF24E90"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.263:*:*:*:*:*:*:*", "cpeNameId": "1BCAE71C-8745-49B7-BE6F-5CB2A8D517AF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.264:*:*:*:*:*:*:*", "cpeNameId": "7C4D53E7-3844-4706-815D-BD08282AF4B8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.265:*:*:*:*:*:*:*", "cpeNameId": "F18EF476-4996-436A-B878-1F7704C4BA6B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.266:*:*:*:*:*:*:*", "cpeNameId": "6318BBB0-A46C-48AE-9E42-7F578BCE43DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.267:*:*:*:*:*:*:*", "cpeNameId": "70B14EE0-CF5D-4C62-9890-766155C47DAE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.268:*:*:*:*:*:*:*", "cpeNameId": "ABF8E5BF-203F-406C-9375-6A59B113BBD9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.269:*:*:*:*:*:*:*", "cpeNameId": "B09A3D45-168E-4202-99BC-79DFB2B525C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.270:*:*:*:*:*:*:*", "cpeNameId": "145FF0A9-3D06-4565-8889-49C01832E864"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.271:*:*:*:*:*:*:*", "cpeNameId": "5433BF7F-2B40-4A88-BD8A-74EBE7EAE74C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.272:*:*:*:*:*:*:*", "cpeNameId": "28BF7326-B002-4098-96DB-D8FADE599CA5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.273:*:*:*:*:*:*:*", "cpeNameId": "94E36506-E573-4DEA-888B-744D1C8405D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.274:*:*:*:*:*:*:*", "cpeNameId": "2A72354A-578E-4F14-93EB-43F27D1576A9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.275:*:*:*:*:*:*:*", "cpeNameId": "426D0CBB-8FB3-41BC-A8A9-A736E70DAC53"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.276:*:*:*:*:*:*:*", "cpeNameId": "25BF6B74-B708-44E5-9B77-A5D761C23F46"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.277:*:*:*:*:*:*:*", "cpeNameId": "DAAAE94E-0CB1-45F6-B0C3-F635B18E632E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.278:*:*:*:*:*:*:*", "cpeNameId": "7B05EE50-A29E-4B6E-A5EE-9BCAA71189B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.279:*:*:*:*:*:*:*", "cpeNameId": "499DEB1C-5D4D-4BE5-8C11-6FD0625F2C36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.280:*:*:*:*:*:*:*", "cpeNameId": "82BC603A-39C9-4AF9-825C-D60073FD89E9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.281:*:*:*:*:*:*:*", "cpeNameId": "AA26E4CE-A2EC-4364-B383-EE0D9C01E0FF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.282:*:*:*:*:*:*:*", "cpeNameId": "A71BD6DD-9C99-4280-9CE6-2317277093B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.283:*:*:*:*:*:*:*", "cpeNameId": "96B8EF49-D308-498E-9453-CCDEDFD6F1CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.284:*:*:*:*:*:*:*", "cpeNameId": "635FD61D-F2A4-4489-AD75-12D1139945DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.285:*:*:*:*:*:*:*", "cpeNameId": "8211CA20-56DB-414D-A7EB-61321EA0634F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.286:*:*:*:*:*:*:*", "cpeNameId": "186F5E6F-D0A3-4136-9F39-956426280FC1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.287:*:*:*:*:*:*:*", "cpeNameId": "236744C4-C218-40C5-8C9E-9072697D85E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.288:*:*:*:*:*:*:*", "cpeNameId": "971D0042-FFBE-4691-ABAD-B3165231CA50"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.289:*:*:*:*:*:*:*", "cpeNameId": "6FAF8454-2869-4D87-979E-9A4D4DD049B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.290:*:*:*:*:*:*:*", "cpeNameId": "5EEE72A7-AE8B-416E-86F4-C879A022DD84"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.291:*:*:*:*:*:*:*", "cpeNameId": "178F9E75-B366-4C4F-9935-07403284159E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.292:*:*:*:*:*:*:*", "cpeNameId": "BFB882D2-DC9B-4211-9265-594F1FEE3D8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.293:*:*:*:*:*:*:*", "cpeNameId": "F181ED04-D2A3-4E9C-B80D-F57C0617297B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.294:*:*:*:*:*:*:*", "cpeNameId": "8AFA87B0-C839-4A7F-961B-ABE5CA349819"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.295:*:*:*:*:*:*:*", "cpeNameId": "9BFFCA5D-A751-449A-B8AB-2D26A90AFBE3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.296:*:*:*:*:*:*:*", "cpeNameId": "7247CC3C-3671-4C0D-AD87-559BEDAAEBC5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.297:*:*:*:*:*:*:*", "cpeNameId": "498B3288-2A00-4DB0-8426-A5FD866506EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.298:*:*:*:*:*:*:*", "cpeNameId": "D6251071-E7F2-4748-9DF7-27FCA27BD552"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.299:*:*:*:*:*:*:*", "cpeNameId": "03440F15-FEB8-42BC-BD63-6E954F0750DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.300:*:*:*:*:*:*:*", "cpeNameId": "E4568623-9282-496E-AA3F-E3E790BDFC1F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.301:*:*:*:*:*:*:*", "cpeNameId": "7CB5DA04-B4B0-4349-85B2-1342A953EED9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.302:*:*:*:*:*:*:*", "cpeNameId": "A3F297C6-A6AB-4C5F-9821-76E8E3411796"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.303:*:*:*:*:*:*:*", "cpeNameId": "8B892759-81F1-45AE-A7F5-2D0641A039E4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.304:*:*:*:*:*:*:*", "cpeNameId": "0936A133-FA0A-44C7-AE7F-5C4C1B16DDD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.305:*:*:*:*:*:*:*", "cpeNameId": "FC874434-AC4D-41A1-8B43-757808B2C957"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.306:*:*:*:*:*:*:*", "cpeNameId": "49CE5CB3-4BA8-41AF-B5EB-9C17E66E0423"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.307:*:*:*:*:*:*:*", "cpeNameId": "A8607B67-F6D3-4684-ADDC-CBACCC6DA92C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.308:*:*:*:*:*:*:*", "cpeNameId": "A4130D9C-E192-4437-A85F-6D04F21F2922"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.309:*:*:*:*:*:*:*", "cpeNameId": "B5E4DA49-77F3-4693-90B0-FC8C2C38F402"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.310:*:*:*:*:*:*:*", "cpeNameId": "2E6D4833-8E6A-45E4-A620-2BE985362CF2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.311:*:*:*:*:*:*:*", "cpeNameId": "79DA4B1F-6BE0-40B0-8496-6499C590D8F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.312:*:*:*:*:*:*:*", "cpeNameId": "0268D7D3-1545-4DC8-A418-AA77BC04C9E7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.313:*:*:*:*:*:*:*", "cpeNameId": "3B30BB14-4B29-4EC6-A810-DC776B5C6E34"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.314:*:*:*:*:*:*:*", "cpeNameId": "369CEBAF-43F1-4E56-B6B9-C0057CF18CB9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.315:*:*:*:*:*:*:*", "cpeNameId": "D1C8EC15-FFB1-440F-9EEA-2F306393A1EE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.316:*:*:*:*:*:*:*", "cpeNameId": "7D65AEC1-209F-4CE2-A5FA-4D3FB56FD265"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.317:*:*:*:*:*:*:*", "cpeNameId": "E9C2D84D-3412-4889-868B-AEA2AD1982C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.318:*:*:*:*:*:*:*", "cpeNameId": "BFC397A0-62B9-4BCF-8907-501A3CDF1CD6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.319:*:*:*:*:*:*:*", "cpeNameId": "ACE5B4F6-6FB3-41D2-AA6D-E2586039CC21"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.320:*:*:*:*:*:*:*", "cpeNameId": "3FDC48E9-0721-483D-A020-FEF09F03EA18"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.321:*:*:*:*:*:*:*", "cpeNameId": "8D6E7C06-CA6C-4909-90F2-2FC40A514CF9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.322:*:*:*:*:*:*:*", "cpeNameId": "D7FA71FA-20D6-4321-80E4-B25B40B76038"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.323:*:*:*:*:*:*:*", "cpeNameId": "B72EE284-1EC1-4237-813A-3E67D1F179F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.324:*:*:*:*:*:*:*", "cpeNameId": "43FA688C-7739-40FD-976B-5FACDDE03C7F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.325:*:*:*:*:*:*:*", "cpeNameId": "1EC6A2D9-C8EB-4DAE-8A58-A9B47A8DA4B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20:*:*:*:*:*:*:*", "cpeNameId": "8C67D194-B1D7-4051-AA33-92C51027DFD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20:-:*:*:*:*:*:*", "cpeNameId": "FD6751D9-F3BF-44A1-96E9-14200EFB10F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20:rc1:*:*:*:*:*:*", "cpeNameId": "2E165BBB-7ACE-4705-A561-4148FDEA5546"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20:rc2:*:*:*:*:*:*", "cpeNameId": "F1D314A9-1DF2-4F05-A2AC-A4E19C87344D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20:rc3:*:*:*:*:*:*", "cpeNameId": "62C17388-85F5-4B5C-8B00-C7E8FD35347D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20:rc4:*:*:*:*:*:*", "cpeNameId": "6CC936D0-B763-4020-BC02-D86893FAEDA5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20:rc5:*:*:*:*:*:*", "cpeNameId": "5502C362-1E75-45CF-A175-41ADAD728EC1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.1:*:*:*:*:*:*:*", "cpeNameId": "30D0FBCC-5241-4766-BF83-F895B210AEFF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.2:*:*:*:*:*:*:*", "cpeNameId": "19FD564F-6544-473E-AE92-E9F3A34A3915"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.3:*:*:*:*:*:*:*", "cpeNameId": "440CABC7-91B1-45F6-A7D0-7D651E83E4C4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.4:*:*:*:*:*:*:*", "cpeNameId": "687316F0-7676-4930-B35C-65F5785ACDB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.5:*:*:*:*:*:*:*", "cpeNameId": "08A1755A-6A9C-46E0-AF0D-114FBF5AD672"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.6:*:*:*:*:*:*:*", "cpeNameId": "E20224EA-90C0-488A-A112-50B24770FB18"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.7:*:*:*:*:*:*:*", "cpeNameId": "C7DC8B10-AA07-4A31-B69D-1F80B66B87A5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.8:*:*:*:*:*:*:*", "cpeNameId": "8308368B-FBD0-47FF-BBB5-31B3F2137230"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.9:*:*:*:*:*:*:*", "cpeNameId": "C6D9451D-8272-441F-BE73-D603AD128A54"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.10:*:*:*:*:*:*:*", "cpeNameId": "1A7CEC42-FD0B-42FC-8535-425F343C800B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.11:*:*:*:*:*:*:*", "cpeNameId": "24C953F7-E916-4832-8B61-7E38B4DC8D3E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.12:*:*:*:*:*:*:*", "cpeNameId": "5C414ABD-B2DB-462C-8158-C8BBD94F140B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.13:*:*:*:*:*:*:*", "cpeNameId": "585B3F97-9003-4712-BA9E-79321E91B741"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.14:*:*:*:*:*:*:*", "cpeNameId": "53CB87AA-41C1-46DC-9856-CA45D75B0014"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.15:*:*:*:*:*:*:*", "cpeNameId": "A15CF5B3-5D88-4D8E-AD1F-7713BEB5C30F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.16:*:*:*:*:*:*:*", "cpeNameId": "C046C34D-86F8-4C72-9ADC-FA20CEE3F445"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.17:*:*:*:*:*:*:*", "cpeNameId": "4F253460-0D25-4B15-BEFB-2C9D38696714"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:*:*:*:*:*:*:*", "cpeNameId": "F1A9DC6E-F2B2-49B8-967F-B40F23FAFB7E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:-:*:*:*:*:*:*", "cpeNameId": "68861FE5-8011-45EC-81E6-CAD841D55D3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:rc1:*:*:*:*:*:*", "cpeNameId": "C4BD32F7-499E-4227-AF6D-59072E60F157"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:rc2:*:*:*:*:*:*", "cpeNameId": "DD1A0E3E-284D-4F8D-BF08-4AE49A833CC9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:rc3:*:*:*:*:*:*", "cpeNameId": "2445098F-589D-4D79-8677-4B95F63C151A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:rc4:*:*:*:*:*:*", "cpeNameId": "2D923219-DCF7-4DC8-AE44-20988AA062A0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:rc5:*:*:*:*:*:*", "cpeNameId": "02886709-FD0A-4947-8146-A318E301776F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:rc6:*:*:*:*:*:*", "cpeNameId": "03288CF7-0A3E-48CB-BBA7-F9EE8ABBC436"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:rc7:*:*:*:*:*:*", "cpeNameId": "7FDFAB88-77F1-48D7-ADBF-0E44ECE86EBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.1:*:*:*:*:*:*:*", "cpeNameId": "D72D410B-8C2E-4851-99A3-F77FBECB7192"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.2:*:*:*:*:*:*:*", "cpeNameId": "985EBB6A-4987-4667-B8DE-311EBD874180"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.3:*:*:*:*:*:*:*", "cpeNameId": "DC64E4B7-3DB1-4E70-8BCC-CDECB8D31362"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.4:*:*:*:*:*:*:*", "cpeNameId": "B277C12A-C8A3-4E99-B157-821EF02AAD43"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.5:*:*:*:*:*:*:*", "cpeNameId": "D7759414-6475-4870-B8D1-EC7CC9251787"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.6:*:*:*:*:*:*:*", "cpeNameId": "4FD20397-5105-42E9-A718-85812EC83A0C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.7:*:*:*:*:*:*:*", "cpeNameId": "3E7A5DCA-0363-44FE-B21B-17BD8D97542B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.8:*:*:*:*:*:*:*", "cpeNameId": "FD8EA77C-B293-4769-962F-F04BF5671CE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.9:*:*:*:*:*:*:*", "cpeNameId": "50FF6FD7-302E-4015-82D5-647A4C6330EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.10:*:*:*:*:*:*:*", "cpeNameId": "AF3FD6C7-DA7B-4070-92DE-6B670AD96588"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.11:*:*:*:*:*:*:*", "cpeNameId": "BDB9CFFC-3980-48D5-94A2-7B8BB9141797"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.12:*:*:*:*:*:*:*", "cpeNameId": "479AF2D1-C2BD-4C9A-A595-737A34153CA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.13:*:*:*:*:*:*:*", "cpeNameId": "567ACE3B-A900-44C1-8E1A-CED4090B1BE8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.14:*:*:*:*:*:*:*", "cpeNameId": "F3477A97-8034-4BB5-9E2D-1401A7346F7A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.15:*:*:*:*:*:*:*", "cpeNameId": "06CFCE19-7968-4803-BB10-B0FC75D8CD98"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.16:*:*:*:*:*:*:*", "cpeNameId": "75E407ED-7B92-420D-81F5-62766D1CB144"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.17:*:*:*:*:*:*:*", "cpeNameId": "F5B8EAB8-B0FA-4766-9008-A04B31F2A44B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.18:*:*:*:*:*:*:*", "cpeNameId": "E04C3C10-48FE-466C-A251-7862AF2EAE03"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.19:*:*:*:*:*:*:*", "cpeNameId": "2F0ADCFD-FCE8-4617-BEB1-7FA793BC11E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.20:*:*:*:*:*:*:*", "cpeNameId": "BDDC588A-C797-45AC-A0BB-DAD27E22B169"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.21:*:*:*:*:*:*:*", "cpeNameId": "ADFBAC21-4341-4D67-BA2C-832D6C60DAE0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:*:*:*:*:*:*:*", "cpeNameId": "54A3A8C8-F682-431C-B4CD-1F0A788869DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:-:*:*:*:*:*:*", "cpeNameId": "67CBC5E4-B5FE-477E-A138-EDED2966BE18"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:rc1:*:*:*:*:*:*", "cpeNameId": "F39A244D-E0F0-4DCC-AD7F-E15708AB2EC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:rc2:*:*:*:*:*:*", "cpeNameId": "77CA693C-812E-4A6E-A089-665FDADA5C0A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:rc3:*:*:*:*:*:*", "cpeNameId": "DFDA10B2-0129-4B2C-A521-15357B8A1915"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:rc4:*:*:*:*:*:*", "cpeNameId": "757115D8-A302-4C43-8E3D-147732BC8D76"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:rc5:*:*:*:*:*:*", "cpeNameId": "D945FFB9-09EC-432E-8ADC-8DD7BF1425D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:rc6:*:*:*:*:*:*", "cpeNameId": "D49F9C63-A58E-4B0D-BEF2-747DC11400DE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:rc7:*:*:*:*:*:*", "cpeNameId": "41B60E1E-725B-49BB-BAD2-49F4782B541B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.1:*:*:*:*:*:*:*", "cpeNameId": "9208299B-C868-470C-AB8C-3A30CC019E6E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.2:*:*:*:*:*:*:*", "cpeNameId": "2D16B549-05AC-4BA5-82C1-4427346FCCF4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.3:*:*:*:*:*:*:*", "cpeNameId": "5431B6CE-299C-491D-92AD-1A8D9072719B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.4:*:*:*:*:*:*:*", "cpeNameId": "F26D0108-392B-453D-9A12-FCF4079344BE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.5:*:*:*:*:*:*:*", "cpeNameId": "F897824B-28D1-4016-9917-A2A1797B62D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.6:*:*:*:*:*:*:*", "cpeNameId": "C9CA624B-39C9-4830-B160-05E7FCF09D31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.7:*:*:*:*:*:*:*", "cpeNameId": "994E581F-695C-4184-8A34-1E9FE8B84F93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.8:*:*:*:*:*:*:*", "cpeNameId": "D33D7A54-7ACE-438C-9ECC-1E06D0C93588"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.9:*:*:*:*:*:*:*", "cpeNameId": "48DFF9BD-88B8-48DB-950E-281038152F6F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.10:*:*:*:*:*:*:*", "cpeNameId": "12542ACC-E1CB-47D7-AFC8-0B24BB2F7DA4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.11:*:*:*:*:*:*:*", "cpeNameId": "CDDEA9C3-FB0A-4C54-AF83-BBE40DFE29A3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.12:*:*:*:*:*:*:*", "cpeNameId": "E4ACF724-E5E7-4B3E-9457-E52CF676CBB5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.13:*:*:*:*:*:*:*", "cpeNameId": "DB88B940-85D4-4644-8772-90F42B7DC544"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.14:*:*:*:*:*:*:*", "cpeNameId": "F60C9252-9886-478D-9343-2232B706DA06"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.15:*:*:*:*:*:*:*", "cpeNameId": "6868170C-EE5E-4A7F-A201-B854E66C0240"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.16:*:*:*:*:*:*:*", "cpeNameId": "42B36DEC-CDB3-4CA4-9DB4-24F1A6FD275E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.17:*:*:*:*:*:*:*", "cpeNameId": "878CFEA9-CB28-4BFA-8360-D439385AD5BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.18:*:*:*:*:*:*:*", "cpeNameId": "64D36E7C-F03D-4C82-A5FA-2884D5544CAC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.19:*:*:*:*:*:*:*", "cpeNameId": "30EEE361-F28F-4B03-ADEE-CF34BB6BE917"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.20:*:*:*:*:*:*:*", "cpeNameId": "C4D5E875-B03B-40D6-88EA-0F26A8C86E29"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.21:*:*:*:*:*:*:*", "cpeNameId": "E5EE3A38-80F6-4427-ADDD-DE8598A449C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2:*:*:*:*:*:*:*", "cpeNameId": "708DF5F1-3FC2-4692-8628-23A2BCD56CDC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2:-:*:*:*:*:*:*", "cpeNameId": "4A9A1D62-6315-4B91-BEC9-AF9EF6F6FDAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2:rc1:*:*:*:*:*:*", "cpeNameId": "84163FF3-5555-41C3-B321-35C2D89A6854"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2:rc2:*:*:*:*:*:*", "cpeNameId": "F7A55C0A-44F2-4CD3-8A0F-9CFECF21F0D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2:rc3:*:*:*:*:*:*", "cpeNameId": "A5798A8D-D141-4085-B19B-9D32403E837C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2:rc4:*:*:*:*:*:*", "cpeNameId": "6AD74851-D9E8-4C2D-9E0E-176FF60A600D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.1:*:*:*:*:*:*:*", "cpeNameId": "7E156392-773D-4495-A4CE-F5D843C5FEBF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.2:*:*:*:*:*:*:*", "cpeNameId": "A11D4292-91CC-4F12-AF01-769D20986BC1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.3:*:*:*:*:*:*:*", "cpeNameId": "DF31FE84-23CC-48CD-BACC-C2F5879023E9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.4:*:*:*:*:*:*:*", "cpeNameId": "CDF894F7-EB7A-4A0E-AC8F-F87B6AFE4311"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.5:*:*:*:*:*:*:*", "cpeNameId": "992ABD6A-693C-4DB3-B023-B37D66796BD0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.6:*:*:*:*:*:*:*", "cpeNameId": "D8674307-6283-4A09-BF4E-3FACDF808289"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.7:*:*:*:*:*:*:*", "cpeNameId": "12B6C6F1-32F2-4C0F-82EA-492CBC7185D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.8:*:*:*:*:*:*:*", "cpeNameId": "0541FF1A-3588-4B1B-971D-7EBAEBD703EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.9:*:*:*:*:*:*:*", "cpeNameId": "E3FD35AB-B680-4EED-BCAB-106AAC3E9E46"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.10:*:*:*:*:*:*:*", "cpeNameId": "0A60430B-1D1E-43B4-BEEA-190D558DD6E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.11:*:*:*:*:*:*:*", "cpeNameId": "E35007C9-A8F4-4E0B-B996-627F9F3CA3A9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.12:*:*:*:*:*:*:*", "cpeNameId": "EF4B624E-6F70-4C9B-A9DE-2C711C45053A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.13:*:*:*:*:*:*:*", "cpeNameId": "48762B71-2980-485A-843C-0566FDA8F7AD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.14:*:*:*:*:*:*:*", "cpeNameId": "25A6C343-6D24-43CB-966C-DD6A57DB8AD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.15:*:*:*:*:*:*:*", "cpeNameId": "A6E25845-65F8-4B58-8B1F-645850B981D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.16:*:*:*:*:*:*:*", "cpeNameId": "FD154B36-EEE2-45F4-B035-738854DB8463"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.17:*:*:*:*:*:*:*", "cpeNameId": "BD8F511F-9901-411A-A340-71B7A714411E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.18:*:*:*:*:*:*:*", "cpeNameId": "747B8381-BCB7-48A7-99E3-3660A9FBF3F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.19:*:*:*:*:*:*:*", "cpeNameId": "035E9DE8-63BA-4EC7-8425-1EE27BA8CE55"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.20:*:*:*:*:*:*:*", "cpeNameId": "1E4CDC34-80B7-4F05-BB90-6C2714A0FA8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.21:*:*:*:*:*:*:*", "cpeNameId": "68BFF46E-9B1A-4A4C-B03C-587844610AFB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3:*:*:*:*:*:*:*", "cpeNameId": "21F5CD7B-AC95-4D78-9757-99093ED2094B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3:-:*:*:*:*:*:*", "cpeNameId": "961A0592-0690-4383-AA0C-FF52F896EA74"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3:rc1:*:*:*:*:*:*", "cpeNameId": "C67AB208-B2AD-4B21-BB6B-C839E0874C9B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.1:*:*:*:*:*:*:*", "cpeNameId": "81E3B88A-DC72-457D-BCCE-F773A198FFFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.2:*:*:*:*:*:*:*", "cpeNameId": "E64FB740-133B-4AAA-A2DC-2198C0F58D1B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.3:*:*:*:*:*:*:*", "cpeNameId": "D5F4E9B2-BB7B-425C-80D9-06AFBED0D808"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.4:*:*:*:*:*:*:*", "cpeNameId": "49D5583E-E8A9-4897-A2C6-AE3481D580DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.5:*:*:*:*:*:*:*", "cpeNameId": "25187C15-1C36-41FB-A90F-2385F6A9C349"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.6:*:*:*:*:*:*:*", "cpeNameId": "8409B0CA-6F72-4643-8146-ABEF90EE2DB3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.7:*:*:*:*:*:*:*", "cpeNameId": "17F798CD-1EC1-40BC-B535-9A41768D5BA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.8:*:*:*:*:*:*:*", "cpeNameId": "9025DD8F-91D2-404E-969C-2BEF62B5FF8F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.9:*:*:*:*:*:*:*", "cpeNameId": "E66D9744-32E2-4BF8-84B0-8E0A85F62F53"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.10:*:*:*:*:*:*:*", "cpeNameId": "EA942BE3-366A-463B-8C3C-A4C36C894385"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.11:*:*:*:*:*:*:*", "cpeNameId": "69C576AC-72FD-4696-9426-3E2D8F97B7AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.12:*:*:*:*:*:*:*", "cpeNameId": "F20292FB-DDAA-4331-8CCC-E0339B6E309F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.13:*:*:*:*:*:*:*", "cpeNameId": "CF1EC873-6878-4EF3-B478-3A435984B295"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.14:*:*:*:*:*:*:*", "cpeNameId": "76ECB189-F757-45C4-AB63-BC7499A4E9D6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.15:*:*:*:*:*:*:*", "cpeNameId": "37721982-4E3D-40B1-AC6A-DBDA2DD9E489"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.16:*:*:*:*:*:*:*", "cpeNameId": "06812A7C-411D-4A39-9158-D4B8B43A8D7B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.17:*:*:*:*:*:*:*", "cpeNameId": "E8C9CCC6-3D5B-43E5-BE69-3BF8A3DFDE96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.18:*:*:*:*:*:*:*", "cpeNameId": "37BCD5D2-D0A2-44E6-8375-F98117F02B9B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:*:*:*:*:*:*:*", "cpeNameId": "30F8A912-AEBA-4E8E-A946-D5FF48283C90"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:-:*:*:*:*:*:*", "cpeNameId": "38597FA2-E6FA-4060-A67D-C2441E02BC11"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:rc1:*:*:*:*:*:*", "cpeNameId": "0381F214-3BC5-4D07-A22F-18E0C97C33D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:rc2:*:*:*:*:*:*", "cpeNameId": "7058D69E-78BC-4917-A2ED-2D9A20503F8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:rc3:*:*:*:*:*:*", "cpeNameId": "A581FE35-F56F-44A9-B6AD-3900F6C4E830"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:rc4:*:*:*:*:*:*", "cpeNameId": "09E1C6F8-674B-4766-9267-69F9D2584B2B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:rc5:*:*:*:*:*:*", "cpeNameId": "D8331CE4-CE6E-45D2-9267-688218C5FA66"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:rc6:*:*:*:*:*:*", "cpeNameId": "E25FA831-4D9A-43A0-8520-18B2B425CC89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:rc7:*:*:*:*:*:*", "cpeNameId": "B36308F6-FE14-40AE-836F-ADE4A02943B1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.0:rc1:*:*:*:*:*:*", "cpeNameId": "1AD9C3F6-3A0B-4AA0-8B15-3E5F14BF88CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.0:rc2:*:*:*:*:*:*", "cpeNameId": "02FEACE2-E424-4F2E-938B-464CBB64228B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.0:rc6:*:*:*:*:*:*", "cpeNameId": "9E511445-4E4D-44ED-A39F-BF79061A44B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.1:*:*:*:*:*:*:*", "cpeNameId": "1C281E83-7893-4458-9E7C-BC2E857281DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.2:*:*:*:*:*:*:*", "cpeNameId": "A3D762F0-7229-48BE-A593-90AF341A2B12"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.3:*:*:*:*:*:*:*", "cpeNameId": "FB304A30-43E2-4CB7-BDF6-D02968DE2769"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.4:*:*:*:*:*:*:*", "cpeNameId": "283FA41E-5A43-4BFF-B51A-D1FB18F8DE7D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.5:*:*:*:*:*:*:*", "cpeNameId": "02511C03-2EB5-4DDD-B4D5-F46566461307"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.6:*:*:*:*:*:*:*", "cpeNameId": "EE95F16F-BFE6-4880-80BE-0F30ED1E944A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.7:*:*:*:*:*:*:*", "cpeNameId": "FAEE1F59-C796-4E59-B6FB-5D16B39695BA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.8:*:*:*:*:*:*:*", "cpeNameId": "3D6FE7E7-6008-4B70-9614-B6F2C599131E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.9:*:*:*:*:*:*:*", "cpeNameId": "99B2EAA8-667C-487F-B0BF-3710995B951E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.10:*:*:*:*:*:*:*", "cpeNameId": "6FDA9090-C62C-4030-BB12-A0112FDCBF5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.11:*:*:*:*:*:*:*", "cpeNameId": "91DB3188-8E8C-4940-82C3-530F1FCF342A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.12:*:*:*:*:*:*:*", "cpeNameId": "4227319D-32DC-46E1-BB7E-9457C1F4F2C2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.13:*:*:*:*:*:*:*", "cpeNameId": "9E0E22BD-ED8B-4F4F-A0F1-402B94D84DD3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.14:*:*:*:*:*:*:*", "cpeNameId": "501029E0-B4D2-4145-8B1D-D1101340CBF1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.15:*:*:*:*:*:*:*", "cpeNameId": "7C3BE561-3C2B-4784-ACAE-960E3788F8A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.16:*:*:*:*:*:*:*", "cpeNameId": "01AC5F1D-CFD1-4B99-B90D-3A7F9E7C4F83"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.17:*:*:*:*:*:*:*", "cpeNameId": "3DAB053F-F9CF-47D5-BE1B-7C31F90B290F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.18:*:*:*:*:*:*:*", "cpeNameId": "73C26194-FDEA-45E7-80A8-65515A3AAF8F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.19:*:*:*:*:*:*:*", "cpeNameId": "7FC45267-94B3-49F5-B69F-5AE3AB28E1A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.20:*:*:*:*:*:*:*", "cpeNameId": "5ACE9C2C-D667-4936-BB37-72D8117CCBEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.21:*:*:*:*:*:*:*", "cpeNameId": "4CE3E880-139D-4507-BCFE-1624D74B0C80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.22:*:*:*:*:*:*:*", "cpeNameId": "DAC48916-1563-4077-A414-ADB689B1FDBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.23:*:*:*:*:*:*:*", "cpeNameId": "F322D1AA-8286-430D-B02A-5BDDB8C1122A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.24:*:*:*:*:*:*:*", "cpeNameId": "63EA159A-C722-4C17-A32E-20026026B727"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.25:*:*:*:*:*:*:*", "cpeNameId": "DF965E16-45D2-4E37-A24E-D362554D1F8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.26:*:*:*:*:*:*:*", "cpeNameId": "1066FD9A-2313-40A4-A0B2-9C0263C26982"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.27:*:*:*:*:*:*:*", "cpeNameId": "6EC9BCEC-2231-455C-B28D-0DF13CB13479"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.28:*:*:*:*:*:*:*", "cpeNameId": "64D65D7E-E68D-49A1-AA45-CEFE1DBC20D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.29:*:*:*:*:*:*:*", "cpeNameId": "1ADDA3E8-2C58-47CD-A70D-DA04F3A431F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.30:*:*:*:*:*:*:*", "cpeNameId": "EF04CFE2-5DF9-4DE0-8E8F-FB4786456345"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.31:*:*:*:*:*:*:*", "cpeNameId": "8000B946-CAAE-4883-9745-A61904A0247A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.32:*:*:*:*:*:*:*", "cpeNameId": "770B138D-EB04-4F3A-8FA6-3637A3683AEF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.33:*:*:*:*:*:*:*", "cpeNameId": "0B322150-1C25-4F57-844C-BF85420500E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.34:*:*:*:*:*:*:*", "cpeNameId": "DD3EDA18-4BBD-4AD7-9661-5D47B62F591E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.35:*:*:*:*:*:*:*", "cpeNameId": "9C73DBB9-FC61-4E93-B2B0-955791097636"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.36:*:*:*:*:*:*:*", "cpeNameId": "0289901E-E986-443D-A30B-ED22F06A7638"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.37:*:*:*:*:*:*:*", "cpeNameId": "4F5E4958-95CD-4C22-BD8B-3794C74CCD47"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.38:*:*:*:*:*:*:*", "cpeNameId": "EB2A8683-5741-4161-8109-B7788AD97247"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.39:*:*:*:*:*:*:*", "cpeNameId": "8EF7B26D-4943-4DCC-9D59-0AADBEDDAED8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.40:*:*:*:*:*:*:*", "cpeNameId": "E32CC068-8B1A-45C4-8AB0-278C5A74B61C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.41:*:*:*:*:*:*:*", "cpeNameId": "6916813D-E2BF-4D74-BE79-EACD1ED1AFAC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.42:*:*:*:*:*:*:*", "cpeNameId": "9CA95178-D4D4-44FD-AC62-CA6CC68A8D65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.43:*:*:*:*:*:*:*", "cpeNameId": "F95E6F47-0F75-41A3-B478-1F34A602D7EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.44:*:*:*:*:*:*:*", "cpeNameId": "09B818EE-5D8B-4728-8FBA-4C46A9233AEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.45:*:*:*:*:*:*:*", "cpeNameId": "C340CD96-6163-499E-960C-F8C77A190CA7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.46:*:*:*:*:*:*:*", "cpeNameId": "D56E537C-FBC5-4C9C-ACEB-0265AB8DA1BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.47:*:*:*:*:*:*:*", "cpeNameId": "4F62EACD-F957-4121-A129-5514BED8A209"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.48:*:*:*:*:*:*:*", "cpeNameId": "8A9A30F9-762F-496F-B154-FAA7F5B35201"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.49:*:*:*:*:*:*:*", "cpeNameId": "588B838C-6578-4616-850F-59E58692EB1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.50:*:*:*:*:*:*:*", "cpeNameId": "88925256-EBA9-4999-B534-02A3F1514E8B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.51:*:*:*:*:*:*:*", "cpeNameId": "CB3ED166-B1C8-458D-8D95-8D03C00A669E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.52:*:*:*:*:*:*:*", "cpeNameId": "5C242B7B-208A-43C7-BA04-79E1F6E1C5FF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.53:*:*:*:*:*:*:*", "cpeNameId": "D9F0FC36-D6FA-408D-8921-009B98466D10"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.54:*:*:*:*:*:*:*", "cpeNameId": "496B7A05-51DC-43DC-890F-86578ED35874"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.55:*:*:*:*:*:*:*", "cpeNameId": "D015DA7D-CDFF-4FC4-924C-541E663FCC4E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.56:*:*:*:*:*:*:*", "cpeNameId": "B853157A-8731-436A-979A-BA2871A3CF9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.57:*:*:*:*:*:*:*", "cpeNameId": "FF8B97BB-61A3-4CAB-BE7B-A6EA63D575F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.58:*:*:*:*:*:*:*", "cpeNameId": "58F8F42F-DE39-4963-BBCD-2AF4B13B8152"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.59:*:*:*:*:*:*:*", "cpeNameId": "D20CCD61-4FC1-4E23-A134-0B93A8099C3C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.60:*:*:*:*:*:*:*", "cpeNameId": "C66ED101-4E13-4838-901E-A73F76499BBD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.61:*:*:*:*:*:*:*", "cpeNameId": "F4125335-934B-4535-9983-3E2BA61E96F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.62:*:*:*:*:*:*:*", "cpeNameId": "A583E905-8A22-42B5-9D96-B51FFD0614FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.63:*:*:*:*:*:*:*", "cpeNameId": "6D54EE82-FEC8-449B-B648-C736D4E26388"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.64:*:*:*:*:*:*:*", "cpeNameId": "AD9F8955-6D21-4FE1-B814-B7B5B6E51C1D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.65:*:*:*:*:*:*:*", "cpeNameId": "AA1F4832-E754-48FF-90A7-C83B71865F79"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.66:*:*:*:*:*:*:*", "cpeNameId": "7FA63DB7-AF4D-4ADA-AA62-E7E780629C01"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.67:*:*:*:*:*:*:*", "cpeNameId": "68125684-9408-4FF0-9691-78CE2C43472D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.68:*:*:*:*:*:*:*", "cpeNameId": "887CCD5A-CC1E-4F61-9A22-33CD3DB9590E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.69:*:*:*:*:*:*:*", "cpeNameId": "79E482C6-C081-4307-920F-E0C4DA650C4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.70:*:*:*:*:*:*:*", "cpeNameId": "BDBD2808-2754-4C34-81D4-C944911306CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.71:*:*:*:*:*:*:*", "cpeNameId": "33A308BB-8E22-4AD8-BDA8-3711554B706D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.72:*:*:*:*:*:*:*", "cpeNameId": "DD3870C8-2652-4D75-AAE0-3CEF3CF665D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.73:*:*:*:*:*:*:*", "cpeNameId": "44142F88-98AA-4496-B640-6FA14C77CEC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.74:*:*:*:*:*:*:*", "cpeNameId": "AF5903C8-5637-45BD-9A92-AEAFA81D93BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.75:*:*:*:*:*:*:*", "cpeNameId": "DACFFC27-6EB1-4433-B9F3-E58F2C6FB2B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.76:*:*:*:*:*:*:*", "cpeNameId": "55971333-67C2-40F0-AA0C-3382C5622911"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.77:*:*:*:*:*:*:*", "cpeNameId": "3BEED01C-4CCB-4958-8E29-DCC951578EF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.78:*:*:*:*:*:*:*", "cpeNameId": "4F171F41-EFAC-4188-B720-4C6840AF4261"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.79:*:*:*:*:*:*:*", "cpeNameId": "284FEF7C-A0D0-4494-8F98-9129D6A58041"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.80:*:*:*:*:*:*:*", "cpeNameId": "DD648053-6D4E-41CB-9113-66151119FDA0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.81:*:*:*:*:*:*:*", "cpeNameId": "82E37ED2-64A7-4300-BF90-20AF181B6F97"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.82:*:*:*:*:*:*:*", "cpeNameId": "AF69E066-55C4-4A86-B15F-BA9549CEB5AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.83:*:*:*:*:*:*:*", "cpeNameId": "D1721424-8F46-4939-A665-4621D22D7279"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.84:*:*:*:*:*:*:*", "cpeNameId": "E27F0C29-711F-4838-8481-F932273C9034"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.85:*:*:*:*:*:*:*", "cpeNameId": "087A9FF9-13D3-4192-A81A-FD3D742FAAEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.86:*:*:*:*:*:*:*", "cpeNameId": "24FE8157-16DC-4670-81B5-B35131D0D3E3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.87:*:*:*:*:*:*:*", "cpeNameId": "FEA33B3F-6CB7-4138-A92A-AD3C8258FC74"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.88:*:*:*:*:*:*:*", "cpeNameId": "6D4674AC-D1BA-41F6-B9B7-E276352BEDA6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.89:*:*:*:*:*:*:*", "cpeNameId": "D416D23A-A4AE-4C6A-926A-202ED3167667"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.90:*:*:*:*:*:*:*", "cpeNameId": "5CE1A537-5A52-474B-AAF0-E0A7D2952B45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.91:*:*:*:*:*:*:*", "cpeNameId": "F5999482-9471-4351-B0B3-0DB7907B9CED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.92:*:*:*:*:*:*:*", "cpeNameId": "C97C06E4-2C93-436C-ABA6-15AA6599A35A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.93:*:*:*:*:*:*:*", "cpeNameId": "1031888B-A914-4DC7-A6E9-392CCC45A76E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.94:*:*:*:*:*:*:*", "cpeNameId": "404206E9-E734-42FC-900E-BD6E0A8A4461"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.95:*:*:*:*:*:*:*", "cpeNameId": "511842CB-909F-4861-8D7C-28B54497BF86"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.96:*:*:*:*:*:*:*", "cpeNameId": "A9657041-BEE6-4EE8-94AD-4447DDE7D048"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.97:*:*:*:*:*:*:*", "cpeNameId": "0A9E3B65-5FB8-4A6A-A2D8-CA2453AF07EC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.98:*:*:*:*:*:*:*", "cpeNameId": "22048CDC-DCAC-4609-95F0-929AEE830465"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.99:*:*:*:*:*:*:*", "cpeNameId": "627DBE54-010D-4F1C-9001-CC5E02BF3050"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.100:*:*:*:*:*:*:*", "cpeNameId": "938FECE2-6792-451E-8311-7E3E38A036FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.101:*:*:*:*:*:*:*", "cpeNameId": "5432BFDA-778D-4E2E-A1D3-CBED78826AD4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.102:*:*:*:*:*:*:*", "cpeNameId": "3AA63EBE-68D6-44E3-BAF2-581B3E42DA43"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.103:*:*:*:*:*:*:*", "cpeNameId": "82A4E722-C3C7-437B-97C7-010E4E7FB1F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.104:*:*:*:*:*:*:*", "cpeNameId": "FEF2BA89-9777-4690-A1E0-5A9539F19063"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.105:*:*:*:*:*:*:*", "cpeNameId": "0FEBCB84-25C5-4B8F-84AD-2840655A9CB7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.106:*:*:*:*:*:*:*", "cpeNameId": "CA4865C8-CD0B-4624-B878-C160F5793EBF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.107:*:*:*:*:*:*:*", "cpeNameId": "8CD6838F-3F26-49B5-9826-3481D09DD0FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.108:*:*:*:*:*:*:*", "cpeNameId": "F925DF95-F46A-41A4-A0D4-FF783FAAF1AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.109:*:*:*:*:*:*:*", "cpeNameId": "2CEDA5AF-C713-4643-B009-513BA2E3C74D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.110:*:*:*:*:*:*:*", "cpeNameId": "A53BF0C3-2C50-4301-8616-02277328F4BF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.111:*:*:*:*:*:*:*", "cpeNameId": "CC8637E1-FDE1-40A6-BE9A-64596A91042E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.112:*:*:*:*:*:*:*", "cpeNameId": "A29F5C22-296D-438A-A22F-7F59BD3C77A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.113:*:*:*:*:*:*:*", "cpeNameId": "42237EE2-4AF1-49D8-8C47-53936F3F6D15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.114:*:*:*:*:*:*:*", "cpeNameId": "DF5875E7-C829-41E7-B637-7C7FD45469B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.115:*:*:*:*:*:*:*", "cpeNameId": "9EEEB133-6D86-45B8-8F2E-4CD7E1677D4D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.116:*:*:*:*:*:*:*", "cpeNameId": "EFB125EB-E097-459C-BB6C-8CA683495E49"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.117:*:*:*:*:*:*:*", "cpeNameId": "8AB69237-A001-4D78-B1DC-05E19113CAEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.118:*:*:*:*:*:*:*", "cpeNameId": "F529F470-E283-4E30-A94D-9155B2F4D0E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.119:*:*:*:*:*:*:*", "cpeNameId": "E393B29E-8B63-4003-9C92-11923EDDF4FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.120:*:*:*:*:*:*:*", "cpeNameId": "9142B8C8-A1A2-4597-9736-08F85EA6DF0A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.121:*:*:*:*:*:*:*", "cpeNameId": "6ED37745-F2C8-4CAB-B848-E3F1D5B92D5A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.122:*:*:*:*:*:*:*", "cpeNameId": "73345EA5-BC19-481D-9E8D-BC43F1B2A009"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.123:*:*:*:*:*:*:*", "cpeNameId": "D1B464F3-C13B-4562-9A1D-9A52A83F8CE4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.124:*:*:*:*:*:*:*", "cpeNameId": "E7237F6D-DA3F-4755-97C0-72C41F937096"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.125:*:*:*:*:*:*:*", "cpeNameId": "EF179B39-F479-4FF0-9853-5C41F4138C80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.126:*:*:*:*:*:*:*", "cpeNameId": "D623E6BE-F45C-4E2D-83EB-883633218B57"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.127:*:*:*:*:*:*:*", "cpeNameId": "7634F69F-587C-4861-B1E1-2F144582DD36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.128:*:*:*:*:*:*:*", "cpeNameId": "23B07FF3-3EC0-487F-B76D-C86CBF6426EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.129:*:*:*:*:*:*:*", "cpeNameId": "E3AB773D-5743-4A09-AB6F-139D852B344E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.130:*:*:*:*:*:*:*", "cpeNameId": "1C0588B6-8690-46A5-AE2E-73E7BF0CACDB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.131:*:*:*:*:*:*:*", "cpeNameId": "AF351F54-8187-410D-86F1-B3F82AD2ED55"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.132:*:*:*:*:*:*:*", "cpeNameId": "067199B5-CFA0-4568-BA4D-6288A392D99C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.133:*:*:*:*:*:*:*", "cpeNameId": "CF1D7CCF-56EB-4D68-AED7-D187649BA593"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.134:*:*:*:*:*:*:*", "cpeNameId": "5446FBC8-EDD6-449D-B4FC-7C9C2679FDE4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.135:*:*:*:*:*:*:*", "cpeNameId": "3B8D2DC6-E618-4E03-ABF0-0BD7B4B8EB69"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.136:*:*:*:*:*:*:*", "cpeNameId": "94473DCF-880F-4134-9004-72FB278A583E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.137:*:*:*:*:*:*:*", "cpeNameId": "F3AE7B24-62E3-4995-B088-1484F2073EEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.138:*:*:*:*:*:*:*", "cpeNameId": "17D753C7-C945-4B66-AA44-7CA3F4512771"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.139:*:*:*:*:*:*:*", "cpeNameId": "60F84A69-CC41-4E35-BED3-8967F672C006"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.140:*:*:*:*:*:*:*", "cpeNameId": "704BA190-B269-4E2E-B176-2E609688075D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.141:*:*:*:*:*:*:*", "cpeNameId": "FEF922EA-398E-42BB-A3D4-617330FE8BA5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.142:*:*:*:*:*:*:*", "cpeNameId": "E13D9FC4-EA1C-4834-A8DD-9F8B32080526"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.143:*:*:*:*:*:*:*", "cpeNameId": "2749EF98-5412-46F6-8D49-0EDD6A58E528"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.144:*:*:*:*:*:*:*", "cpeNameId": "1CBA264D-9620-40D3-A6E9-BDD0378FBBE4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.145:*:*:*:*:*:*:*", "cpeNameId": "9753CAB1-3E31-4FB0-8901-B66F68248C4B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.146:*:*:*:*:*:*:*", "cpeNameId": "D6BBAA0A-DC53-4541-A7C9-02B7CC882C6F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.147:*:*:*:*:*:*:*", "cpeNameId": "75DD6B1D-A210-439C-BB15-5A9857869B4C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.148:*:*:*:*:*:*:*", "cpeNameId": "83C33FEE-E6EE-42A4-B71C-36B017ADA254"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.149:*:*:*:*:*:*:*", "cpeNameId": "7594839C-A015-437B-843D-443C74240AFC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.150:*:*:*:*:*:*:*", "cpeNameId": "85681E7B-7D21-4391-88BB-F24FCC85B69E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.151:*:*:*:*:*:*:*", "cpeNameId": "CAD0E871-57D4-4E39-B8BE-B48B56E383AD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.152:*:*:*:*:*:*:*", "cpeNameId": "8B9FBF3A-7807-4307-AA5A-AFB027788A0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.153:*:*:*:*:*:*:*", "cpeNameId": "45B35B38-1583-4FDE-A76C-F489FC1661B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.154:*:*:*:*:*:*:*", "cpeNameId": "B5CBD335-2006-441B-B668-D4C4E5361E92"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.155:*:*:*:*:*:*:*", "cpeNameId": "1BB865B8-A4BD-46DC-8C13-31A508A1C470"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.156:*:*:*:*:*:*:*", "cpeNameId": "020363CE-5C5B-427C-A15C-F5C1C1975467"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.157:*:*:*:*:*:*:*", "cpeNameId": "941EBBFB-C6F1-48D5-9B2B-CA5C89D87AAE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.158:*:*:*:*:*:*:*", "cpeNameId": "C6F4FAFB-B2D4-4C6A-A2FD-279349D1B6B8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.159:*:*:*:*:*:*:*", "cpeNameId": "D6E8DC84-DA54-45C7-A50D-CB982342FBA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.160:*:*:*:*:*:*:*", "cpeNameId": "B06561F9-9A69-45F5-8E38-E4ACD6603562"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.161:*:*:*:*:*:*:*", "cpeNameId": "387585D8-ED6F-4F42-B695-CBEE28059C70"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.162:*:*:*:*:*:*:*", "cpeNameId": "D3B66B2E-4E69-4FA5-8B87-289E005FDE04"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.163:*:*:*:*:*:*:*", "cpeNameId": "5EE4932A-8EC9-4F83-B39E-43949583A002"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.164:*:*:*:*:*:*:*", "cpeNameId": "23613ABA-9AF6-4994-BEA5-72EADE59E05D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.165:*:*:*:*:*:*:*", "cpeNameId": "274A8333-1FF8-4D90-9F8F-6ED87E4D38C2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.166:*:*:*:*:*:*:*", "cpeNameId": "D2E5BB0E-741E-4F29-A740-36E5944DA22E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.167:*:*:*:*:*:*:*", "cpeNameId": "A0D34177-A31C-4A31-95EC-FC51AAFDCCA4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.168:*:*:*:*:*:*:*", "cpeNameId": "91D62EB4-F2E8-490E-B95E-8795D3419321"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.169:*:*:*:*:*:*:*", "cpeNameId": "D07F44B5-8B12-4624-806B-3926EE9DFEC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.170:*:*:*:*:*:*:*", "cpeNameId": "F96D2A95-B029-4CF9-B156-05CF4447C703"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.171:*:*:*:*:*:*:*", "cpeNameId": "8ECD8767-3374-4B80-A15B-F5238068915B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.172:*:*:*:*:*:*:*", "cpeNameId": "360CFD8E-8542-4074-A12A-DBA9971EA65B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.173:*:*:*:*:*:*:*", "cpeNameId": "E8C8A6D8-B27B-4F5B-8E51-61E11B3F215F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.174:*:*:*:*:*:*:*", "cpeNameId": "15A35FE0-6FEE-41DC-8BF0-6915C879C270"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.175:*:*:*:*:*:*:*", "cpeNameId": "37C5FB0A-CA6D-4613-8A8B-A18D0FDA6F64"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.176:*:*:*:*:*:*:*", "cpeNameId": "FFE0EDBC-A325-48BA-ACB3-9F8D08670377"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.177:*:*:*:*:*:*:*", "cpeNameId": "E5195C74-6E40-48DB-B840-6064E935C3EE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.178:*:*:*:*:*:*:*", "cpeNameId": "12D64B6B-F676-44EF-9DC6-C177E27260EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.179:*:*:*:*:*:*:*", "cpeNameId": "A05ECB81-2B19-4D35-8D1F-4434137A84DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.180:*:*:*:*:*:*:*", "cpeNameId": "9C361490-6959-42D0-BCC4-83D577D132F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.181:*:*:*:*:*:*:*", "cpeNameId": "D0326F99-0B11-462B-8D94-064C0A3241B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.182:*:*:*:*:*:*:*", "cpeNameId": "D15195DE-63BF-4173-905B-E7D6FA91CA75"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.183:*:*:*:*:*:*:*", "cpeNameId": "68713BB8-A777-453A-A8DF-73D9D7BF2E85"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.184:*:*:*:*:*:*:*", "cpeNameId": "4CAD090F-0814-485B-8E21-4D47722887FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.185:*:*:*:*:*:*:*", "cpeNameId": "9959172B-D94C-4CB9-BF46-DD313AA048F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.186:*:*:*:*:*:*:*", "cpeNameId": "24962B43-D41C-4D08-B761-2DC8B7CA6266"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.187:*:*:*:*:*:*:*", "cpeNameId": "38C0DBA3-BE34-4386-9A2E-157382F3225A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.188:*:*:*:*:*:*:*", "cpeNameId": "7ACF7B19-A720-4BA7-BED3-568CC376C778"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.189:*:*:*:*:*:*:*", "cpeNameId": "B7B05048-9CFF-419B-86B0-EE2F56B47B83"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.190:*:*:*:*:*:*:*", "cpeNameId": "BAE9F693-4B6C-4E3E-A9A0-511AE8544242"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.191:*:*:*:*:*:*:*", "cpeNameId": "9D62345B-E1AE-4963-B5CF-35F5162E8801"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.192:*:*:*:*:*:*:*", "cpeNameId": "B355E118-131B-406B-B4BA-152ECC8A3BBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.193:*:*:*:*:*:*:*", "cpeNameId": "F03D2948-9154-4DBA-BACE-7C345323033A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.194:*:*:*:*:*:*:*", "cpeNameId": "FBCB3E35-2179-4C11-AB45-FF4ED4FDF319"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.195:*:*:*:*:*:*:*", "cpeNameId": "C3EE187D-F47C-4715-9DB8-E907435E01EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.196:*:*:*:*:*:*:*", "cpeNameId": "0C0A8C7F-62FD-4514-AA66-564CAADC6E45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.197:*:*:*:*:*:*:*", "cpeNameId": "B3CE9D05-5F55-4B0E-B305-0A3B005018DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.198:*:*:*:*:*:*:*", "cpeNameId": "2317D623-D839-407E-A14E-F5F852B84FEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.199:*:*:*:*:*:*:*", "cpeNameId": "EB66E33F-BA65-49D7-B9EA-4A98B64ACC4E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.200:*:*:*:*:*:*:*", "cpeNameId": "011BFD26-2596-4913-9424-0AECA7030C16"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.201:*:*:*:*:*:*:*", "cpeNameId": "D4ACDED5-7B2F-49A2-A926-D916CFDB0C63"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.202:*:*:*:*:*:*:*", "cpeNameId": "B7F9F37A-7A22-49AD-A0B1-F71767104083"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.203:*:*:*:*:*:*:*", "cpeNameId": "2AD7A4A5-2505-4B4D-8783-F0A51E6A046A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.204:*:*:*:*:*:*:*", "cpeNameId": "95FA5A9A-3EEF-40F7-A80B-F714544B33EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.205:*:*:*:*:*:*:*", "cpeNameId": "2E6CB57E-4C3F-42E5-B9FB-AB8280BE7A6F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.206:*:*:*:*:*:*:*", "cpeNameId": "7676F080-CF07-4DA1-AF8D-9EF7B716A3E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.207:*:*:*:*:*:*:*", "cpeNameId": "825F2314-2B15-4F76-B6CD-5C9DADC5BE95"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.208:*:*:*:*:*:*:*", "cpeNameId": "7B6DA918-9935-4683-A67B-08144DD82180"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.209:*:*:*:*:*:*:*", "cpeNameId": "95865082-502B-4EAF-BB46-FF14CB436ACA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.210:*:*:*:*:*:*:*", "cpeNameId": "E291ACF9-9E86-4E1E-BCB5-E208F959C0B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.211:*:*:*:*:*:*:*", "cpeNameId": "0A1A262D-D3CD-49B4-84ED-3064C2FED37A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.212:*:*:*:*:*:*:*", "cpeNameId": "57B76811-C4C0-4A91-A8EF-F37450F7F017"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.213:*:*:*:*:*:*:*", "cpeNameId": "205B4275-EF2F-4D30-9EC3-8E0571547292"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.214:*:*:*:*:*:*:*", "cpeNameId": "F5586B8B-CDBF-434C-A994-8D07A0DDB39C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.215:*:*:*:*:*:*:*", "cpeNameId": "D37B51B4-57EC-4373-9428-3C3D4A29208F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.216:*:*:*:*:*:*:*", "cpeNameId": "398941C0-8C2C-41F5-A1C9-9585DAC725E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.217:*:*:*:*:*:*:*", "cpeNameId": "7B403008-68BC-4E2D-9684-EA7D660D620C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.218:*:*:*:*:*:*:*", "cpeNameId": "FEE28F9A-4B9B-44F3-96E9-B98FB0AC8528"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.219:*:*:*:*:*:*:*", "cpeNameId": "2AF545DD-D84F-46B2-AA73-55A6B4659260"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.220:*:*:*:*:*:*:*", "cpeNameId": "A062E707-3089-4A1F-A78C-D2B8FF520A2B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.221:*:*:*:*:*:*:*", "cpeNameId": "CE524691-6654-439A-ACAC-6B617AF5AF1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.222:*:*:*:*:*:*:*", "cpeNameId": "7ACB644E-9AED-4BE0-AA14-66A4391EC095"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.223:*:*:*:*:*:*:*", "cpeNameId": "FF39B72D-B1B2-4DC2-B709-C6693BC9A5E7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.224:*:*:*:*:*:*:*", "cpeNameId": "517DC3B4-3906-44AE-8AA5-EF2587DBDC72"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.225:*:*:*:*:*:*:*", "cpeNameId": "BF5626A2-7798-4612-B4A5-BA04E42E0BED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.226:*:*:*:*:*:*:*", "cpeNameId": "F43E60E1-E9FB-44BC-BC12-DE00249731EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.227:*:*:*:*:*:*:*", "cpeNameId": "640CDE67-2025-448F-AA11-6B110B29D2A5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.228:*:*:*:*:*:*:*", "cpeNameId": "D2FA83FC-CF87-4E06-B474-4EEF45D68215"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.229:*:*:*:*:*:*:*", "cpeNameId": "66BF34B9-77D9-4194-A0B7-B4475B335F2E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.230:*:*:*:*:*:*:*", "cpeNameId": "299E37F1-CADB-4659-916C-6212694A18E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.231:*:*:*:*:*:*:*", "cpeNameId": "6485B4A3-B4A4-4051-BF33-D2CE21DA64EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.232:*:*:*:*:*:*:*", "cpeNameId": "B4F3A62A-C3EE-48BD-B70D-61471639DC9C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.233:*:*:*:*:*:*:*", "cpeNameId": "69E1C22D-523B-4340-A48B-2DB4BEB9248F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.234:*:*:*:*:*:*:*", "cpeNameId": "9F851704-26CF-4676-8855-D74AF799B382"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.235:*:*:*:*:*:*:*", "cpeNameId": "7C708908-5963-46DC-B508-3A5F7499055C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.236:*:*:*:*:*:*:*", "cpeNameId": "6C87ADCB-B88B-4DFA-992F-26B4947C3458"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.237:*:*:*:*:*:*:*", "cpeNameId": "6BB385D9-D9D8-470E-89CE-902222E39ADC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.238:*:*:*:*:*:*:*", "cpeNameId": "B4DAD459-71A8-44A5-861A-1BAF66749233"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.239:*:*:*:*:*:*:*", "cpeNameId": "1897BE2D-B7E6-4886-8CAC-C6AE563CBEE5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.240:*:*:*:*:*:*:*", "cpeNameId": "CE8BA9F0-78BC-4495-801A-2D41AC5B3187"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.241:*:*:*:*:*:*:*", "cpeNameId": "A5EC3DC7-E2C0-431A-A2EC-B6C3828C4BCA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.242:*:*:*:*:*:*:*", "cpeNameId": "E7DD7787-5F9A-4EB3-80D5-122199BE1430"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.243:*:*:*:*:*:*:*", "cpeNameId": "CEA6083C-45E3-459C-A5E7-04CABE3258FF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.244:*:*:*:*:*:*:*", "cpeNameId": "A046118E-2030-4FA1-AB54-FA3166B389EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.245:*:*:*:*:*:*:*", "cpeNameId": "798F9326-D8B4-47C7-A887-279D9837B680"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.246:*:*:*:*:*:*:*", "cpeNameId": "95624FFF-60D2-4964-9EBB-A6AFA64F213D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.247:*:*:*:*:*:*:*", "cpeNameId": "29DEE5F4-3ADD-4E88-9187-7135A238F9C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.248:*:*:*:*:*:*:*", "cpeNameId": "8E8D2C97-D48F-4BD9-BED5-88EE4813F6E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.249:*:*:*:*:*:*:*", "cpeNameId": "5A1E1612-3E81-4021-9A85-34B86AFBC77C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.250:*:*:*:*:*:*:*", "cpeNameId": "EA54F6F0-C64D-41B4-A582-92D43FDD3CB2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.251:*:*:*:*:*:*:*", "cpeNameId": "1B17D69F-3CC2-4B00-B2D5-A4434E4C2402"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.252:*:*:*:*:*:*:*", "cpeNameId": "AAC99975-FBC6-439C-B9E6-011CABDAE8F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.253:*:*:*:*:*:*:*", "cpeNameId": "5375B4A1-C18E-453D-9179-672CB459B0D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.254:*:*:*:*:*:*:*", "cpeNameId": "730B192E-0CAB-41AE-8EE8-57F381628032"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.255:*:*:*:*:*:*:*", "cpeNameId": "59A6D935-0EBF-4499-A8F9-5BB002FF5417"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.256:*:*:*:*:*:*:*", "cpeNameId": "60604FAE-6D70-4DF3-9A88-CC3F6A614F58"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.257:*:*:*:*:*:*:*", "cpeNameId": "28E9A455-1593-4AF5-9451-B313D622E813"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.258:*:*:*:*:*:*:*", "cpeNameId": "B5718D89-967C-42C8-AA82-C97D345B3B10"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.259:*:*:*:*:*:*:*", "cpeNameId": "87BB858F-8D92-452F-B51C-12ACE0798353"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.260:*:*:*:*:*:*:*", "cpeNameId": "AE07B665-D693-4561-A9B4-9932CD77333B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.261:*:*:*:*:*:*:*", "cpeNameId": "EF86313B-7F46-43B8-8338-AE692B75A0A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.262:*:*:*:*:*:*:*", "cpeNameId": "E1B563A5-0659-4D95-89A0-8FCC2A436214"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.263:*:*:*:*:*:*:*", "cpeNameId": "8D53F67C-F067-4BF8-AE22-78A1176571BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.264:*:*:*:*:*:*:*", "cpeNameId": "7111A17A-1784-4740-B976-38B722A838CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.265:*:*:*:*:*:*:*", "cpeNameId": "2D41AA24-795C-4C26-8A5A-D07B59EBD394"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.266:*:*:*:*:*:*:*", "cpeNameId": "A97784BF-DCF7-40A8-87DA-0CB401BEC707"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.267:*:*:*:*:*:*:*", "cpeNameId": "073D9BD8-4FBC-4DF6-8017-37FB83733D26"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.268:*:*:*:*:*:*:*", "cpeNameId": "91DAF395-305E-4836-A12C-1E2377F31FA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.269:*:*:*:*:*:*:*", "cpeNameId": "5FCE10E6-EC75-4696-82C2-8958D55E379A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.270:*:*:*:*:*:*:*", "cpeNameId": "431FAE79-4814-471C-ADD1-50E98CA62255"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.271:*:*:*:*:*:*:*", "cpeNameId": "90DCF88A-E713-42F3-9D1E-2CCCAA5074ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.272:*:*:*:*:*:*:*", "cpeNameId": "6B454F24-35C3-4974-86AC-E42EC930E187"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.273:*:*:*:*:*:*:*", "cpeNameId": "02AE5EE4-8747-4828-AC90-7DC0689482DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.274:*:*:*:*:*:*:*", "cpeNameId": "F006D7E9-C3E7-43D0-BFF9-1905CC924F0E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.275:*:*:*:*:*:*:*", "cpeNameId": "81C1BF7F-E953-42D0-965C-B5F736085500"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.276:*:*:*:*:*:*:*", "cpeNameId": "CFCF98F3-408F-4FB9-B097-3CE467D5C047"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.277:*:*:*:*:*:*:*", "cpeNameId": "8B64B495-66D8-4EE8-9391-2078D025F252"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.278:*:*:*:*:*:*:*", "cpeNameId": "25928F5C-D970-404D-B6CB-E3DFCD7EC853"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.279:*:*:*:*:*:*:*", "cpeNameId": "478BD5C9-EF9A-4FBB-9BCF-DF23EA8F3492"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.280:*:*:*:*:*:*:*", "cpeNameId": "9513977F-A95A-4F0F-AADE-B21201231052"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.281:*:*:*:*:*:*:*", "cpeNameId": "14DBE587-6D62-4B91-BC57-0C84D152E7EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.282:*:*:*:*:*:*:*", "cpeNameId": "6057E10C-DE66-4645-A2B5-44203C31F784"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.283:*:*:*:*:*:*:*", "cpeNameId": "951347D3-550A-41E6-B000-E2D716A96A20"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.284:*:*:*:*:*:*:*", "cpeNameId": "5979A8F6-3B9D-4C0C-8C75-9FA49E82A345"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.285:*:*:*:*:*:*:*", "cpeNameId": "F1278C94-D023-48BF-A6D6-36D0DF76CFF3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.286:*:*:*:*:*:*:*", "cpeNameId": "7E65B46E-A161-4126-9E85-B9F5B4C0005D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.297:*:*:*:*:*:*:*", "cpeNameId": "6DBCD7AC-F52A-4397-A3B8-8AFF7EF460FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5:*:*:*:*:*:*:*", "cpeNameId": "49DBB1C3-9AEF-4EC4-B62D-7D36F14EDFD9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5:-:*:*:*:*:*:*", "cpeNameId": "1F518EBF-1562-4E27-97CD-A3D668C77A8C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5:rc1:*:*:*:*:*:*", "cpeNameId": "5F85EA91-CF9D-413C-B2F0-C0DC16BF7928"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5:rc2:*:*:*:*:*:*", "cpeNameId": "B9A5A534-B718-4FFF-A889-D8A6EF731364"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5:rc3:*:*:*:*:*:*", "cpeNameId": "66795BCD-62BE-4EB7-B4C3-518EFDE1141E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5:rc4:*:*:*:*:*:*", "cpeNameId": "721CD8C6-1746-4BCA-B717-602990CE7D91"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5:rc5:*:*:*:*:*:*", "cpeNameId": "D4DCAF09-9CDF-4447-9167-4E76E661FBFA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5:rc6:*:*:*:*:*:*", "cpeNameId": "A393E2BB-4C21-483A-BD5E-5A4D6C03F2C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.0:*:*:*:*:*:*:*", "cpeNameId": "A2498E9A-09C4-421D-8C35-B607F76CA6D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.1:*:*:*:*:*:*:*", "cpeNameId": "F5C09E99-2653-42DE-8190-FF0FB4C94259"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.2:*:*:*:*:*:*:*", "cpeNameId": "0ED9D07A-5B08-4143-A891-7918475D27BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.3:*:*:*:*:*:*:*", "cpeNameId": "F033B4EC-A735-4E10-95EE-2AC9D67081EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.4:*:*:*:*:*:*:*", "cpeNameId": "9503CF12-7383-44DB-A50D-059A08956EC1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.5:*:*:*:*:*:*:*", "cpeNameId": "12D41A14-FC96-4874-B278-E57CFFCCC35F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.6:*:*:*:*:*:*:*", "cpeNameId": "733139E7-4729-4263-9BE9-4602D18C0307"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.7:*:*:*:*:*:*:*", "cpeNameId": "99D531E7-1606-42D1-AC48-03A258311B52"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.8:*:*:*:*:*:*:*", "cpeNameId": "DD45ED79-46BC-4D9E-BF13-2BCE447AB6AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.9:*:*:*:*:*:*:*", "cpeNameId": "EB76FD18-B13F-4423-B1AE-4D87EDCA59A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.10:*:*:*:*:*:*:*", "cpeNameId": "2D1E5A60-CACD-4B64-9771-8F27ECADF991"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.11:*:*:*:*:*:*:*", "cpeNameId": "D09F9D38-9B1B-40F3-89E6-C467A9247974"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.12:*:*:*:*:*:*:*", "cpeNameId": "0AFA53D6-C904-4260-A566-048D0DF14FE4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.13:*:*:*:*:*:*:*", "cpeNameId": "E3DD3225-582E-4CF7-9DEC-D58918ED5701"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.14:*:*:*:*:*:*:*", "cpeNameId": "6AA45C4C-C46A-4205-BE20-43DE712696D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.15:*:*:*:*:*:*:*", "cpeNameId": "01C8594F-1A7A-40E5-B6C3-F75CCFD1B7C9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.16:*:*:*:*:*:*:*", "cpeNameId": "32BF3DF9-BAC9-43EE-BA2B-BC53A137F299"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.17:*:*:*:*:*:*:*", "cpeNameId": "A6E18AD7-4B98-4E98-9C64-DF1A80536DCF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.18:*:*:*:*:*:*:*", "cpeNameId": "0E98522F-394C-4301-A85B-5E482CD4F4C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.19:*:*:*:*:*:*:*", "cpeNameId": "2A985199-F75F-4599-A95E-0AF97592DF71"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6:*:*:*:*:*:*:*", "cpeNameId": "D0B85891-4974-4AB3-834C-EC49CAAC82B8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6:-:*:*:*:*:*:*", "cpeNameId": "5174E1A3-A838-45BA-B4FA-AADFDF875FFC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6:rc1:*:*:*:*:*:*", "cpeNameId": "01524D2C-7501-4EC9-A0C3-A8F8B7D28FCF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6:rc2:*:*:*:*:*:*", "cpeNameId": "C6C932B1-DC39-43AD-A810-6F6BE4DC628C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6:rc3:*:*:*:*:*:*", "cpeNameId": "5AC13E72-7329-411C-8E43-AE91350E1984"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6:rc4:*:*:*:*:*:*", "cpeNameId": "E13CE8E0-4117-4CD6-B6DB-E9D85428FF27"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6:rc5:*:*:*:*:*:*", "cpeNameId": "F6F494A6-4576-4C86-AB89-78ABB06F8591"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.1:*:*:*:*:*:*:*", "cpeNameId": "7316EA10-E698-4056-9A73-CAEF10EF0D72"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.2:*:*:*:*:*:*:*", "cpeNameId": "F38E533D-F9F5-4B99-A2DF-23EE93C6716E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.3:*:*:*:*:*:*:*", "cpeNameId": "57E0290A-7943-4D3C-91E1-57110F6D698F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.4:*:*:*:*:*:*:*", "cpeNameId": "ABCD688B-6347-40A3-B19B-8D06DFA5A811"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.5:*:*:*:*:*:*:*", "cpeNameId": "05E67E62-01D6-4CAA-9BD2-5434427AD908"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.6:*:*:*:*:*:*:*", "cpeNameId": "AA5B4529-484F-4DB2-9ECF-181DDC0B2B86"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.7:*:*:*:*:*:*:*", "cpeNameId": "B2939052-3458-4C45-9A39-A1A835D29A02"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.7-1:*:*:*:*:*:*:*", "cpeNameId": "CDA63823-0948-48CE-9C3E-772A3FAF8386"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.8:*:*:*:*:*:*:*", "cpeNameId": "EC18E58B-1BFA-4C37-A35D-C17EBD6EE988"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.9:*:*:*:*:*:*:*", "cpeNameId": "BAD41340-BC92-4275-AAE6-6CD24B17CBA0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.10:*:*:*:*:*:*:*", "cpeNameId": "45C947BE-C438-4231-A0C2-28DA89A6C6B8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.11:*:*:*:*:*:*:*", "cpeNameId": "D285AD12-A45A-4F70-B4E2-29D2BDCABD83"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.12:*:*:*:*:*:*:*", "cpeNameId": "49E0F195-1D05-48F7-8E36-EACE60F54D21"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.13:*:*:*:*:*:*:*", "cpeNameId": "EAFD2DCB-733B-4E34-A1E5-9EC194692E96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.14:*:*:*:*:*:*:*", "cpeNameId": "228F9C86-B2C4-49E8-8171-FAE5C314C21A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.15:*:*:*:*:*:*:*", "cpeNameId": "4BF5012C-B142-489D-9B66-3FDFE7BB0686"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.16:*:*:*:*:*:*:*", "cpeNameId": "E46B8C4B-152A-4072-8544-3EF2CC90BC5C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.17:*:*:*:*:*:*:*", "cpeNameId": "16831F51-025C-481A-BB1B-F5A74E68D195"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.18:*:*:*:*:*:*:*", "cpeNameId": "6AFCEAAB-98C1-4E23-92CC-41C3103CED87"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.19:*:*:*:*:*:*:*", "cpeNameId": "D95E3BC5-BF59-4243-ADAA-4A70FEAB0042"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7:*:*:*:*:*:*:*", "cpeNameId": "D513E95A-293B-43E6-BB81-E30994D64488"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7:-:*:*:*:*:*:*", "cpeNameId": "EB1BB502-B09E-49F0-A7D2-A270EB7B6702"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7:rc1:*:*:*:*:*:*", "cpeNameId": "DAED72C2-F722-4E03-94CF-5CFC54AB3375"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7:rc2:*:*:*:*:*:*", "cpeNameId": "95928159-FAD7-4535-98AC-9BB8DE1BA8C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7:rc3:*:*:*:*:*:*", "cpeNameId": "BA4208E6-4ECB-4CC4-872B-9CCE02BCAE88"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7:rc4:*:*:*:*:*:*", "cpeNameId": "2203FB54-7292-4E7D-8AC5-AFF97AA62CB9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7:rc5:*:*:*:*:*:*", "cpeNameId": "F1565C19-81C0-4A57-840B-9A43914D232C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7:rc6:*:*:*:*:*:*", "cpeNameId": "F482AFCB-1119-4612-A3B3-6DCEA83454DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7:rc7:*:*:*:*:*:*", "cpeNameId": "0D9F6240-7FAF-46FE-93B6-5FDAF8026BB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.0:*:*:*:*:*:*:*", "cpeNameId": "7B2127FA-A707-4697-AD6B-CD155779E65D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.1:*:*:*:*:*:*:*", "cpeNameId": "1C140291-35F7-4777-9E23-B7CFD8361171"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.2:*:*:*:*:*:*:*", "cpeNameId": "B6DB2ACF-7055-4752-A880-931ECB34B58D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.3:*:*:*:*:*:*:*", "cpeNameId": "FFB09BE7-096E-4492-99AA-DB5504F4658B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.4:*:*:*:*:*:*:*", "cpeNameId": "1F1130BB-5BB2-48B5-849B-D111B75333D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.5:*:*:*:*:*:*:*", "cpeNameId": "A7DB133D-DDE7-4AE2-82AE-498E752AEA34"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.6:*:*:*:*:*:*:*", "cpeNameId": "92E0341D-5A2D-4CEA-A178-F8F3653CAA73"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.7:*:*:*:*:*:*:*", "cpeNameId": "63B4BA4D-2ED3-4979-AFB4-2317C7E3A1F4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.8:*:*:*:*:*:*:*", "cpeNameId": "1978F055-6B35-4431-A0FF-932F67E3E3AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.9:*:*:*:*:*:*:*", "cpeNameId": "F21A00EF-24CC-4632-90E7-67057A458DD9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.10:*:*:*:*:*:*:*", "cpeNameId": "D7F5F840-3660-45B8-A3C7-CB2AC7B95F6E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.11:*:*:*:*:*:*:*", "cpeNameId": "8E9708FA-F771-4BCB-AEC0-11556349160A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.12:*:*:*:*:*:*:*", "cpeNameId": "2A7711FD-E383-4D01-943D-9BAC425548D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.13:*:*:*:*:*:*:*", "cpeNameId": "6FB98443-3298-46FF-9819-3656A0E0A48D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.14:*:*:*:*:*:*:*", "cpeNameId": "05C7E01F-6097-4979-9807-A0ADE319D01F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.15:*:*:*:*:*:*:*", "cpeNameId": "8979AEB4-CADB-43E8-B3CE-C95CFEBF23EE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.16:*:*:*:*:*:*:*", "cpeNameId": "3DAB3E83-7F34-46E3-B14C-37C895CBE274"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.17:*:*:*:*:*:*:*", "cpeNameId": "8B4BF440-12E0-416D-8CAF-C07D04F07C2A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.18:*:*:*:*:*:*:*", "cpeNameId": "0D1B13B2-39EF-4E53-87CE-763DBA03DA05"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.19:*:*:*:*:*:*:*", "cpeNameId": "8CFCB3C4-4D44-4C18-BFCC-AD5FE0C06B4B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8:*:*:*:*:*:*:*", "cpeNameId": "07476EA3-FFDE-4B8C-912C-23138078B5EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8:-:*:*:*:*:*:*", "cpeNameId": "5178891D-6B7B-4263-879E-E69653C4D719"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8:rc1:*:*:*:*:*:*", "cpeNameId": "4BBEF5DE-A47A-4676-B324-008ABEC06865"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8:rc2:*:*:*:*:*:*", "cpeNameId": "3238D662-CCC8-4AB2-8157-A26CCE26D2D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8:rc3:*:*:*:*:*:*", "cpeNameId": "782D5463-6D0E-4C21-B4BA-5E91F105D4F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8:rc4:*:*:*:*:*:*", "cpeNameId": "C35E4C5D-1E1D-466F-A67C-2FC1F25CB430"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8:rc5:*:*:*:*:*:*", "cpeNameId": "83AAD5D5-4B05-4B36-9CE2-8200C3C961C5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8:rc6:*:*:*:*:*:*", "cpeNameId": "0E7ED941-6C90-4C40-8DB3-5E1B1B277E72"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.0:-:*:*:*:*:*:*", "cpeNameId": "5CF73E72-A891-4A42-9B0F-C7C9A5B8C8A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.0:rc1:*:*:*:*:*:*", "cpeNameId": "3A738E69-098D-4FCF-B7BD-4029B795DA7B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.0:rc2:*:*:*:*:*:*", "cpeNameId": "65ED0818-2628-4C3E-9153-7964EBEBE623"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.0:rc3:*:*:*:*:*:*", "cpeNameId": "B10D552F-439F-41F8-A37B-92C049C8DDFA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.0:rc4:*:*:*:*:*:*", "cpeNameId": "0C80D4FE-591B-4062-B4E0-034C8E6824DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.0:rc5:*:*:*:*:*:*", "cpeNameId": "A1FD0D8B-97CB-488B-B7CF-52C0CD54F200"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.0:rc6:*:*:*:*:*:*", "cpeNameId": "83533D12-466A-4B04-BC3A-1F3C5D8750B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.1:*:*:*:*:*:*:*", "cpeNameId": "C5B329AA-50C3-4D56-B10E-85876E2D6AFF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.2:*:*:*:*:*:*:*", "cpeNameId": "DA50D3B5-AE38-4686-B2AC-0C85E4CD89FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.3:*:*:*:*:*:*:*", "cpeNameId": "E54D1F8D-F883-4051-BF12-057D3F0FB128"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.4:*:*:*:*:*:*:*", "cpeNameId": "2A27C723-EFF7-416C-AFF2-D51C97DDE1DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.5:*:*:*:*:*:*:*", "cpeNameId": "4E4A5F0F-AE99-43F4-8003-657F1AC0AA93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.6:*:*:*:*:*:*:*", "cpeNameId": "57FFF781-B984-4F38-837E-255B22971C5F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.7:*:*:*:*:*:*:*", "cpeNameId": "ABBD5CFC-8A56-41FF-98BF-3F3DAF0F3841"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.8:*:*:*:*:*:*:*", "cpeNameId": "5DBF7892-0D9B-4153-9AAA-F72B0283A4A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.9:*:*:*:*:*:*:*", "cpeNameId": "6353E571-9A60-4036-B95E-2C814AAF7752"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.10:*:*:*:*:*:*:*", "cpeNameId": "EA57F68D-826E-43DB-A61A-DBE3B1C191C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.11:*:*:*:*:*:*:*", "cpeNameId": "80319CAF-347D-468D-B8FC-FD9C043FC4DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.12:*:*:*:*:*:*:*", "cpeNameId": "A5CE9EA4-85BD-43F3-8F6B-A09C25FD9167"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.13:*:*:*:*:*:*:*", "cpeNameId": "F91ADB87-9531-4398-BB0B-C063A074973B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.14:*:*:*:*:*:*:*", "cpeNameId": "7F82A887-A988-475B-9478-8CFCF7C3A704"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.15:*:*:*:*:*:*:*", "cpeNameId": "987E4679-4B40-4434-B0D7-3DEDAAB2F6BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.16:*:*:*:*:*:*:*", "cpeNameId": "9C363333-E73E-4B58-8D4C-37BD1D0B51C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.17:*:*:*:*:*:*:*", "cpeNameId": "27BE33C0-428F-4A80-A80B-BC74C075B66C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.18:*:*:*:*:*:*:*", "cpeNameId": "9EE86950-40B6-4663-8A3A-7E1D03696B0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9:*:*:*:*:*:*:*", "cpeNameId": "121E9A60-F4D2-433C-98BF-0AFA0E4A266F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.0:-:*:*:*:*:*:*", "cpeNameId": "469494B6-32FD-4685-BE2F-A210B6063294"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc1:*:*:*:*:*:*", "cpeNameId": "7F13BEF4-27D5-40F6-9765-358FD93E1792"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc2:*:*:*:*:*:*", "cpeNameId": "5ACD024B-F179-4BD5-BAAE-51108956284E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc3:*:*:*:*:*:*", "cpeNameId": "EB2E632F-62CB-44FF-8C0C-E0D47D05E493"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc4:*:*:*:*:*:*", "cpeNameId": "F87B3257-4230-45BA-9667-307E0A4904CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc5:*:*:*:*:*:*", "cpeNameId": "2CCEF2FF-6123-42D5-B8BB-D8E248F8843C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc6:*:*:*:*:*:*", "cpeNameId": "C025B18C-40C5-4D4E-83AC-6BFEA8EE6936"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.1:*:*:*:*:*:*:*", "cpeNameId": "44A6C28C-2EBF-4D99-AE8C-887010615909"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.2:*:*:*:*:*:*:*", "cpeNameId": "31CF2F4F-4453-4907-AA98-E8137382086D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.3:*:*:*:*:*:*:*", "cpeNameId": "F63DD037-0FDF-4CEC-8117-A3982CD33949"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.4:*:*:*:*:*:*:*", "cpeNameId": "5BEC457A-2479-43CE-98B2-71459DE758CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.5:*:*:*:*:*:*:*", "cpeNameId": "09C574BD-509E-420D-A4F1-3BD1C32E39C9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.6:*:*:*:*:*:*:*", "cpeNameId": "456FDC00-52BA-493A-B35B-CBB030B87FFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.7:*:*:*:*:*:*:*", "cpeNameId": "0C7FD0C5-7C16-45A5-AA4F-92609FC022D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.8:*:*:*:*:*:*:*", "cpeNameId": "C5131E57-D5F0-40F5-9D16-7C22AA4F9767"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.9:*:*:*:*:*:*:*", "cpeNameId": "D3CEA5D0-4D9E-4C39-87F9-BC90F5B770B8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.10:*:*:*:*:*:*:*", "cpeNameId": "76C03A6F-AF3B-4F19-95D9-F4150871865A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.11:*:*:*:*:*:*:*", "cpeNameId": "69578C8A-5886-441D-B835-5D0EDD95D146"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.12:*:*:*:*:*:*:*", "cpeNameId": "59581E9A-A564-46D2-B63E-4A838F09E213"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.13:*:*:*:*:*:*:*", "cpeNameId": "31137D81-EDA5-431E-BBA0-F1BA9752D0CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.14:*:*:*:*:*:*:*", "cpeNameId": "4D283523-B6B5-4CA3-A445-5FDA69F42FB9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.15:*:*:*:*:*:*:*", "cpeNameId": "0415500F-6FA8-4B11-BC14-0F8334371749"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.16:*:*:*:*:*:*:*", "cpeNameId": "086B2B23-E533-4D2E-9E90-0EC4BD2646EE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10:-:*:*:*:*:*:*", "cpeNameId": "2E1F1B79-2711-4459-B972-D3C83C48D2D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10:rc1:*:*:*:*:*:*", "cpeNameId": "4255DBFB-D157-45ED-BA6C-1BACB64A1623"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10:rc2:*:*:*:*:*:*", "cpeNameId": "C7BA0F25-7DD0-427A-A8FF-D5CCD17EA554"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10:rc4:*:*:*:*:*:*", "cpeNameId": "0962C2F4-E79A-4C61-8380-55EAAAD4AE1B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.0:-:*:*:*:*:*:*", "cpeNameId": "6B1D1EAB-0195-4F05-88FF-F862563F89FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.0:rc1:*:*:*:*:*:*", "cpeNameId": "EBBE0FA3-6C50-4C78-83C3-9BE6F9A064E3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.0:rc2:*:*:*:*:*:*", "cpeNameId": "E59C1055-110F-4E68-BB9C-8E3C564F72F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.0:rc3:*:*:*:*:*:*", "cpeNameId": "955307F1-B773-46C3-983A-DEA36FDEBCBD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.0:rc4:*:*:*:*:*:*", "cpeNameId": "4AC5F069-6642-4E36-ACF3-EE93FCEAC751"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.0:rc5:*:*:*:*:*:*", "cpeNameId": "EF537B63-6913-49CD-8CEB-A9B744FE8E4E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.1:*:*:*:*:*:*:*", "cpeNameId": "919C724B-829B-4250-B6F3-66C503930681"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.2:*:*:*:*:*:*:*", "cpeNameId": "7B9D0BBB-79E9-4CA5-81CF-2F8783866A20"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.3:*:*:*:*:*:*:*", "cpeNameId": "6F0C6AC0-1A96-4202-B3A4-42216BDC476C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.4:*:*:*:*:*:*:*", "cpeNameId": "59CCCD55-2025-4BD2-BB41-7FBF6B449783"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.5:*:*:*:*:*:*:*", "cpeNameId": "6BD60207-E9A0-4688-A2D3-3A68CAC97BFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.6:*:*:*:*:*:*:*", "cpeNameId": "54839987-2658-4873-BB81-585C8849EE8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.7:*:*:*:*:*:*:*", "cpeNameId": "FB32ECFD-B8DB-4422-83B4-7F26B1DCC763"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.8:*:*:*:*:*:*:*", "cpeNameId": "0FCF254D-C922-4F67-B85C-7247077BBF63"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.9:*:*:*:*:*:*:*", "cpeNameId": "2313CF18-EB32-4DB8-9B68-B24F46689725"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.10:*:*:*:*:*:*:*", "cpeNameId": "77C0418A-B48F-4E70-B71F-5030B901EC8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.11:*:*:*:*:*:*:*", "cpeNameId": "32769B56-4C74-41FE-A7D3-5D87006BE1B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.12:*:*:*:*:*:*:*", "cpeNameId": "C5244E7D-A816-42FD-80A2-22A1EBD41FA8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.13:*:*:*:*:*:*:*", "cpeNameId": "0E80BF7E-93CE-4658-854B-7EFB6AC17CEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.14:*:*:*:*:*:*:*", "cpeNameId": "BCB6377E-BAD8-4063-8DB2-A16392D24089"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.15:*:*:*:*:*:*:*", "cpeNameId": "09DAF5C5-3ADF-4BFB-B681-DEFAD2874241"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.16:*:*:*:*:*:*:*", "cpeNameId": "878924C9-1FEA-49D2-BB99-6AE2A8812570"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.17:*:*:*:*:*:*:*", "cpeNameId": "13722F1D-D730-4F7C-AB84-1267068EF08C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.18:*:*:*:*:*:*:*", "cpeNameId": "2A86DC03-D4AC-4EAE-88FE-54D103F5A3D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.19:*:*:*:*:*:*:*", "cpeNameId": "B833D784-AF50-4A28-88B3-B00A2ABA00D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.20:*:*:*:*:*:*:*", "cpeNameId": "EC92790E-8CEB-4EE7-9655-BE16A14BCAC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.21:*:*:*:*:*:*:*", "cpeNameId": "A0D9BB71-2049-4DEA-B438-0EE2AA9A09ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.22:*:*:*:*:*:*:*", "cpeNameId": "4F726530-1114-4DF2-956E-81715A37EE2A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.23:*:*:*:*:*:*:*", "cpeNameId": "6A9B3C74-81DE-4FDA-A058-89DD6494DD5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.24:*:*:*:*:*:*:*", "cpeNameId": "B98E61C1-1F45-4150-B477-FBFF4FAC3ED3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.25:*:*:*:*:*:*:*", "cpeNameId": "AEDF3A34-9D1B-4E78-9BC8-BFC839CBA294"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.26:*:*:*:*:*:*:*", "cpeNameId": "0B823FEF-0461-49A6-A380-1FCA2F2765FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.27:*:*:*:*:*:*:*", "cpeNameId": "494E65F5-4C04-45D6-830F-4EE9103EBB79"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.28:*:*:*:*:*:*:*", "cpeNameId": "83414679-66B4-40C0-B061-FF9FE1B23F95"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.29:*:*:*:*:*:*:*", "cpeNameId": "2EDD7AD5-8E29-4C05-B2B9-690CE6523AE8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.30:*:*:*:*:*:*:*", "cpeNameId": "F4A2F70D-4AEF-4F79-8BD3-2AAA3BED01E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.31:*:*:*:*:*:*:*", "cpeNameId": "6D4C13F5-4DC9-4498-B598-0C72F44C408F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.32:*:*:*:*:*:*:*", "cpeNameId": "0CC82644-C0F1-4FE3-BE00-1AA49A715186"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.33:*:*:*:*:*:*:*", "cpeNameId": "1CE00059-6557-4873-88DC-0D8989EA8352"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.34:*:*:*:*:*:*:*", "cpeNameId": "D681DBE9-23F8-4AB1-A4C6-73075E8753B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.35:*:*:*:*:*:*:*", "cpeNameId": "DA0FCEE1-0A6E-488B-A168-9885CE8A892B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.36:*:*:*:*:*:*:*", "cpeNameId": "8EC26158-07A8-4F5B-AED4-B1B247C7804F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.37:*:*:*:*:*:*:*", "cpeNameId": "AE2694A8-5857-4C19-81BE-E371A011643C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.38:*:*:*:*:*:*:*", "cpeNameId": "ABEB722B-6903-4915-B85C-1D2A05674826"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.39:*:*:*:*:*:*:*", "cpeNameId": "6AD9EBB8-8E60-4501-A44E-057A3BEEDA17"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.40:*:*:*:*:*:*:*", "cpeNameId": "F0D558A0-55C0-460B-BE39-F06AF16FAC31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.41:*:*:*:*:*:*:*", "cpeNameId": "275C969B-FC08-441F-BDBC-F24EC5810A99"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.42:*:*:*:*:*:*:*", "cpeNameId": "731A0F3B-A32B-4345-BE91-ABA294048D2A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.43:*:*:*:*:*:*:*", "cpeNameId": "3FE2BC04-D69F-4239-B3D8-17898AE1EC6E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.44:*:*:*:*:*:*:*", "cpeNameId": "575245F7-0BE3-4A47-A20F-0D1ECF247B3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.45:*:*:*:*:*:*:*", "cpeNameId": "4BC74ACC-355D-41FE-9D78-D50DD08425F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.46:*:*:*:*:*:*:*", "cpeNameId": "E63871AE-A0FC-41E1-B4AE-99FEA83DE6EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.47:*:*:*:*:*:*:*", "cpeNameId": "2D465F1B-9417-4099-9468-09D21B58EFE0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.48:*:*:*:*:*:*:*", "cpeNameId": "78FC9A7F-B877-4B4B-93C7-C5BAEB84BEF1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.49:*:*:*:*:*:*:*", "cpeNameId": "2343BB66-E088-4CAA-9458-F62F5624D1BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.50:*:*:*:*:*:*:*", "cpeNameId": "BED11231-C3C0-4B9A-A667-E96A5EB42728"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.51:*:*:*:*:*:*:*", "cpeNameId": "4BA151A6-3479-4D73-92A0-25D7D74DD76C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.52:*:*:*:*:*:*:*", "cpeNameId": "4CFCF22F-C2C8-46CA-A8C2-A6DB5AAD3670"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.53:*:*:*:*:*:*:*", "cpeNameId": "6326FFB7-116E-4FB8-B2C1-909CC3B6C3C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.54:*:*:*:*:*:*:*", "cpeNameId": "A7FDB1DD-DC8A-4424-A81A-37F8A0B2F1D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.55:*:*:*:*:*:*:*", "cpeNameId": "A9A96456-8676-4108-B958-7A0E3493F315"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.56:*:*:*:*:*:*:*", "cpeNameId": "7444E85B-6F15-4980-8721-5B0A708042E3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.57:*:*:*:*:*:*:*", "cpeNameId": "2D88C78E-CA4C-40A2-BF04-E487DE3D79C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.58:*:*:*:*:*:*:*", "cpeNameId": "D8167B04-7EDF-4F1B-B967-EFCDC6FB0D63"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.59:*:*:*:*:*:*:*", "cpeNameId": "66E8BCA7-8C84-42E6-A891-0840BE07CE79"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.60:*:*:*:*:*:*:*", "cpeNameId": "3FE27316-DB42-42B3-95E5-EBF8CB7498C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.61:*:*:*:*:*:*:*", "cpeNameId": "47AD2C14-A08F-4D75-960F-1D5C72EB1979"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.62:*:*:*:*:*:*:*", "cpeNameId": "E93FBE71-458B-4F4A-BA1E-153759B14744"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.63:*:*:*:*:*:*:*", "cpeNameId": "7FD84D94-2BA9-4552-9807-F06A66D760BA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.64:*:*:*:*:*:*:*", "cpeNameId": "9424301F-3046-46B4-863C-E887D542C94B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.65:*:*:*:*:*:*:*", "cpeNameId": "70F56D3D-6046-4B8E-961A-C9835F0B9090"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.66:*:*:*:*:*:*:*", "cpeNameId": "C4C18611-ABA7-482D-82FD-8CE9E3CBDB33"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.67:*:*:*:*:*:*:*", "cpeNameId": "0B905626-8718-42FB-9908-7573102CB541"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.68:*:*:*:*:*:*:*", "cpeNameId": "365DA1ED-E1C9-4A4C-9A38-54FDA5832296"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.69:*:*:*:*:*:*:*", "cpeNameId": "27BBA256-9FD8-4A99-A301-31761D2CB794"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.70:*:*:*:*:*:*:*", "cpeNameId": "3B7F8DF6-7523-4D9B-B7B7-10E77A9D132C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.71:*:*:*:*:*:*:*", "cpeNameId": "580454E1-93EE-4311-852E-4B749F7905DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.72:*:*:*:*:*:*:*", "cpeNameId": "1307A5B0-2E1A-48AD-A718-46BF09EA2F52"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.73:*:*:*:*:*:*:*", "cpeNameId": "33F6E183-DDDE-4425-86CB-91EFEA45EB7C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.74:*:*:*:*:*:*:*", "cpeNameId": "861EB0F3-ECA9-4F1B-8842-DB4EFB6A00A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.75:*:*:*:*:*:*:*", "cpeNameId": "2D8BE345-69E8-49AC-A829-8FE9A71E0570"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.76:*:*:*:*:*:*:*", "cpeNameId": "71972DCE-D514-471A-8C19-6F1266FBB229"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.77:*:*:*:*:*:*:*", "cpeNameId": "F8C0EEE1-9B24-411B-ADC9-740859F33B48"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.78:*:*:*:*:*:*:*", "cpeNameId": "A8B37EA6-CA2C-46D6-A181-278E5C31F0DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.79:*:*:*:*:*:*:*", "cpeNameId": "F27C5E99-159C-490C-AF32-50BE9563EB52"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.80:*:*:*:*:*:*:*", "cpeNameId": "17813E0B-D346-4177-8F05-9533B4C60865"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.81:*:*:*:*:*:*:*", "cpeNameId": "8D01EFE4-8A1B-4CCF-95E7-AC5A1539D62E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.82:*:*:*:*:*:*:*", "cpeNameId": "1F0FC27E-9086-4213-9CFE-FD6F1B9A4AF1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.83:*:*:*:*:*:*:*", "cpeNameId": "481F6A95-F56E-4D6D-854C-6F04ECBD66B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.84:*:*:*:*:*:*:*", "cpeNameId": "46CC33A3-5940-4D55-8E84-E73C3BD823F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.85:*:*:*:*:*:*:*", "cpeNameId": "2D2A56E7-26AC-4B25-B518-580C7B57B9AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.86:*:*:*:*:*:*:*", "cpeNameId": "74D61A28-F673-4952-8B5C-02F3C13CB122"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.87:*:*:*:*:*:*:*", "cpeNameId": "339A37D8-F764-445B-8DB3-84A8FAECE0E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.88:*:*:*:*:*:*:*", "cpeNameId": "D97DAA30-8EFA-4A17-BCF4-1DA94DEA4EDB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.89:*:*:*:*:*:*:*", "cpeNameId": "E27E4623-1A1D-4DFD-82DA-A2C5CC7F7697"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.90:*:*:*:*:*:*:*", "cpeNameId": "E504954E-D296-441C-873E-BB0A99B128A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.91:*:*:*:*:*:*:*", "cpeNameId": "972594C2-DBE3-4358-974A-4F4669143532"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.92:*:*:*:*:*:*:*", "cpeNameId": "844FF0AF-746F-460B-AF09-70F04AEFCF31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.93:*:*:*:*:*:*:*", "cpeNameId": "0759AD27-6E8F-4FB0-86A0-581270987FC8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.94:*:*:*:*:*:*:*", "cpeNameId": "4762F42E-1EB4-43B9-B4C6-FED6BD72F8F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.95:*:*:*:*:*:*:*", "cpeNameId": "3AB26935-F86A-4944-AB5E-2030498A5150"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.96:*:*:*:*:*:*:*", "cpeNameId": "1F32FA33-C031-4CB3-9FE9-5B8F2AB4F0DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.97:*:*:*:*:*:*:*", "cpeNameId": "EA2A46B2-E9A8-4939-B34C-305DADC1E706"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.98:*:*:*:*:*:*:*", "cpeNameId": "6F40D4DA-5127-4F65-B450-DACBFF729694"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.99:*:*:*:*:*:*:*", "cpeNameId": "4ACCE8A9-B038-41D4-853D-6FFCC67C6B64"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.100:*:*:*:*:*:*:*", "cpeNameId": "7BC07033-922F-4E00-9A7F-A9799C0665BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.101:*:*:*:*:*:*:*", "cpeNameId": "63A5156F-CEE7-4BF7-8421-892C0A117BFF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.102:*:*:*:*:*:*:*", "cpeNameId": "FE32C7D9-7BCC-4896-9D3A-954D3A175242"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.103:*:*:*:*:*:*:*", "cpeNameId": "0E21CE22-A7B8-4F83-BEE7-6672AE3A2C44"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.104:*:*:*:*:*:*:*", "cpeNameId": "A4E75A55-DB3C-43F3-AA43-A04380CB435A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.105:*:*:*:*:*:*:*", "cpeNameId": "217BD320-E966-48FB-A3DA-EAC81FBA3D02"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.106:*:*:*:*:*:*:*", "cpeNameId": "A13D5A45-1F78-4F9D-8932-09FB4963FE2B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.107:*:*:*:*:*:*:*", "cpeNameId": "94B537FB-3FC1-4A2A-90C5-A41C4E757EAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.108:*:*:*:*:*:*:*", "cpeNameId": "A36CC6BB-339C-4928-B79B-7047AD126CAE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.109:*:*:*:*:*:*:*", "cpeNameId": "787AABB6-F55D-41A7-99FA-AE59AD411920"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.110:*:*:*:*:*:*:*", "cpeNameId": "E8453C19-A25E-42BC-AC28-3967873C0502"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.111:*:*:*:*:*:*:*", "cpeNameId": "F25CCCEB-3631-4B9B-852D-A76ED56BA4DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.112:*:*:*:*:*:*:*", "cpeNameId": "5A726FC3-8B4B-4E63-9865-6A5C6BC9451D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.113:*:*:*:*:*:*:*", "cpeNameId": "CD45E388-608F-4BE6-8152-527548FE08DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.114:*:*:*:*:*:*:*", "cpeNameId": "A7BDF880-128D-4D74-8D98-E41C861040C5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.115:*:*:*:*:*:*:*", "cpeNameId": "6692FB97-9395-401A-B1CB-AD484F90B89A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.116:*:*:*:*:*:*:*", "cpeNameId": "9A64BA88-6D08-409E-BFE1-24CFA920C75A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.117:*:*:*:*:*:*:*", "cpeNameId": "2D582BFD-C229-4552-B828-115F83D73F89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.118:*:*:*:*:*:*:*", "cpeNameId": "CA086871-EB47-4699-8451-993791AA05DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.119:*:*:*:*:*:*:*", "cpeNameId": "483BEBC5-E6D4-4ED8-A5E5-DB2DD73986DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.120:*:*:*:*:*:*:*", "cpeNameId": "68EF2A7B-021A-4153-BDB1-A68499185EFB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.121:*:*:*:*:*:*:*", "cpeNameId": "C55B56E4-06A2-43C2-BE53-5681C0687D73"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.122:*:*:*:*:*:*:*", "cpeNameId": "CB7B49F3-DDD7-4A9E-BF7D-89BCA4437C52"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.123:*:*:*:*:*:*:*", "cpeNameId": "4A20AD3E-FA89-4524-8D02-B2728615111C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.124:*:*:*:*:*:*:*", "cpeNameId": "C30938C7-DF69-4F4C-ADF6-BF47C209872E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.125:*:*:*:*:*:*:*", "cpeNameId": "D091A040-31A4-4643-BD08-9D25F02BDDED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.126:*:*:*:*:*:*:*", "cpeNameId": "FF6CD639-C348-4BAA-8C59-8FE73D9966DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.127:*:*:*:*:*:*:*", "cpeNameId": "3F24CE79-3D3D-421A-AC44-E68C17FC5D92"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.128:*:*:*:*:*:*:*", "cpeNameId": "F9E550EF-FFA3-4194-9071-7922680C7E6E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.129:*:*:*:*:*:*:*", "cpeNameId": "987DB34E-E170-4E7E-B08A-CD32A73E9156"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.130:*:*:*:*:*:*:*", "cpeNameId": "A7E67D9A-9FA7-43ED-B536-312C5C01CD6E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.131:*:*:*:*:*:*:*", "cpeNameId": "D9C69A17-571F-45C1-9120-1BE31A33A948"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.132:*:*:*:*:*:*:*", "cpeNameId": "166EDBC5-3C18-4042-8C19-F339F25162FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.133:*:*:*:*:*:*:*", "cpeNameId": "CBA08C9F-0426-4B96-A6E8-7253C152FFBC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.134:*:*:*:*:*:*:*", "cpeNameId": "182AECF8-FAC1-4E1B-BE84-ABB34E11A3F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.135:*:*:*:*:*:*:*", "cpeNameId": "A7249039-E52A-4756-A93F-06A3284AEDEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.136:*:*:*:*:*:*:*", "cpeNameId": "84C67C6F-FA0B-41EE-9D20-11A0BC255F63"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.137:*:*:*:*:*:*:*", "cpeNameId": "00A8D67B-9DFD-4BBE-9A8D-976B22573BC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.138:*:*:*:*:*:*:*", "cpeNameId": "94A225AF-5670-4866-967D-29ECA4887457"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.139:*:*:*:*:*:*:*", "cpeNameId": "579F476A-FED8-4232-ADF1-3889FDC4C86C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.140:*:*:*:*:*:*:*", "cpeNameId": "84F54287-F019-47C9-9CB7-7B6B6CCBA9E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.141:*:*:*:*:*:*:*", "cpeNameId": "3E72C4BF-107C-4C73-AD2D-13564B590074"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.142:*:*:*:*:*:*:*", "cpeNameId": "FC309597-3B6C-4DB1-920B-97C1428824C2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.143:*:*:*:*:*:*:*", "cpeNameId": "0F20169C-AA6F-433A-AB4B-2FB83AFE4CBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.144:*:*:*:*:*:*:*", "cpeNameId": "02E301AD-B083-4D5E-81D5-7C1990FAA3B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.145:*:*:*:*:*:*:*", "cpeNameId": "BAA0E2C0-1BF2-4F95-BBDA-D294FFC56C90"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.146:*:*:*:*:*:*:*", "cpeNameId": "333D6187-DE99-4496-951B-79FC37281B50"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.147:*:*:*:*:*:*:*", "cpeNameId": "5B8EA31C-9846-414C-B164-133B7C72AFAC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.148:*:*:*:*:*:*:*", "cpeNameId": "48B13BAF-B20A-4DEA-9516-565B3030BD3F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.149:*:*:*:*:*:*:*", "cpeNameId": "2BDBBF02-8793-439B-B2B7-F1398DDC5165"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.150:*:*:*:*:*:*:*", "cpeNameId": "845A54DE-9847-4628-81AE-9202E104E5A7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.151:*:*:*:*:*:*:*", "cpeNameId": "429BF264-A007-4AFC-9AC8-17CA5BE8091F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.152:*:*:*:*:*:*:*", "cpeNameId": "A21895BD-17BD-4347-BB11-AC22832B5545"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.153:*:*:*:*:*:*:*", "cpeNameId": "C72F8FFE-0954-4360-ABC2-97FDC0DB5D45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.154:*:*:*:*:*:*:*", "cpeNameId": "76BE03E9-E28F-44A8-9B89-9700CF4E3689"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.155:*:*:*:*:*:*:*", "cpeNameId": "C28104D3-94AE-44FA-9395-B7B19859B677"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.156:*:*:*:*:*:*:*", "cpeNameId": "27FB0DEA-7659-4394-8E83-0EC289A5CAA4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.157:*:*:*:*:*:*:*", "cpeNameId": "D9820BF1-0B1A-432F-889F-F152AAA957DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.158:*:*:*:*:*:*:*", "cpeNameId": "C0BDDEFA-7B1D-4108-BCC9-FFA63A3DDC7E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.159:*:*:*:*:*:*:*", "cpeNameId": "8A23C014-F216-43C3-9D3C-5CEED86EE41D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.160:*:*:*:*:*:*:*", "cpeNameId": "1978465D-F79C-40EB-A6EF-50EFF77BB974"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.161:*:*:*:*:*:*:*", "cpeNameId": "29914586-1720-4AE1-A204-01432051782B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.162:*:*:*:*:*:*:*", "cpeNameId": "FBE6A9B7-94E5-456F-B336-59EE1C9C62E5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.163:*:*:*:*:*:*:*", "cpeNameId": "31DF5109-302D-4C99-BF27-7752453D8B5E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.164:*:*:*:*:*:*:*", "cpeNameId": "3262D873-56B3-449E-A70A-17DA2F4D9382"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.165:*:*:*:*:*:*:*", "cpeNameId": "21C9EF71-018C-41DE-ADCD-FF6A38C77E4C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.166:*:*:*:*:*:*:*", "cpeNameId": "46897616-FAB1-4E27-8F2B-7B59CF5B96D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.167:*:*:*:*:*:*:*", "cpeNameId": "2547AA22-645F-4613-A353-93431C5784F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.168:*:*:*:*:*:*:*", "cpeNameId": "FF6BB8B3-8746-4110-9FFC-C8FA51F8CD8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.169:*:*:*:*:*:*:*", "cpeNameId": "76B2AC55-7FE1-4EB6-B66F-AA2DA71D67CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.170:*:*:*:*:*:*:*", "cpeNameId": "E8A369DE-6CF8-43BF-ACC2-34CCEAAEADEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.171:*:*:*:*:*:*:*", "cpeNameId": "192DCF0D-9152-475F-828E-817AD9C86E8B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.172:*:*:*:*:*:*:*", "cpeNameId": "DF8383A9-7BF3-473B-9EE1-38C0FB296913"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.173:*:*:*:*:*:*:*", "cpeNameId": "7AB9EEF7-D575-4CB3-B57E-173AE0807897"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.174:*:*:*:*:*:*:*", "cpeNameId": "2658DE93-2BC0-4AC0-86D9-0487D4571A3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.175:*:*:*:*:*:*:*", "cpeNameId": "9C9415F0-7A65-436A-AAD8-31F99B9D7389"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.176:*:*:*:*:*:*:*", "cpeNameId": "1D0378DF-6D92-4307-904F-C66E45A7951E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.177:*:*:*:*:*:*:*", "cpeNameId": "EAE9A661-784D-4767-AF9B-7FBFA7D82738"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.178:*:*:*:*:*:*:*", "cpeNameId": "C17A6F7B-CD4A-49F4-A75B-B67338DDDDD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.179:*:*:*:*:*:*:*", "cpeNameId": "E79DFC9A-C359-4DD6-990B-2174E5B0024A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.180:*:*:*:*:*:*:*", "cpeNameId": "0A2AFA9A-832F-4C6C-BF9A-7C5A1C0E4FCA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.181:*:*:*:*:*:*:*", "cpeNameId": "4ED76815-B1FF-4FF7-B33D-4CC39C1A3948"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.182:*:*:*:*:*:*:*", "cpeNameId": "094B86B6-B8A4-408E-93F5-7514E0889F80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.183:*:*:*:*:*:*:*", "cpeNameId": "0ECF42BB-D201-4ED6-BA24-8B3A388564DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.184:*:*:*:*:*:*:*", "cpeNameId": "588AC0CC-AEA3-4230-8820-D46E13AFED1A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.185:*:*:*:*:*:*:*", "cpeNameId": "1B6E85FD-9863-43D4-830D-C46AC7CF8EA5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.186:*:*:*:*:*:*:*", "cpeNameId": "E1320383-8026-48C2-AA55-3D6DD4C91761"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.187:*:*:*:*:*:*:*", "cpeNameId": "78BC22D4-F955-4AC6-A00F-AD4832C1F2FA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.188:*:*:*:*:*:*:*", "cpeNameId": "E562975C-CD47-45F9-815A-F1549043871A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.189:*:*:*:*:*:*:*", "cpeNameId": "9F7D5828-8590-4C04-9BA2-03D8A9265783"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.190:*:*:*:*:*:*:*", "cpeNameId": "052F6967-B479-47A5-B705-66ADF5BAE5B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.191:*:*:*:*:*:*:*", "cpeNameId": "E6E1C494-101F-4F6C-B9F9-453EF9EC7D30"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.192:*:*:*:*:*:*:*", "cpeNameId": "A1A79F09-A517-41C9-81E2-0D1B960AC8E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.193:*:*:*:*:*:*:*", "cpeNameId": "329B75BA-C9CB-4193-A56B-4C175431194D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.194:*:*:*:*:*:*:*", "cpeNameId": "B3CC767E-10C4-4966-8921-50BB6E99E682"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.195:*:*:*:*:*:*:*", "cpeNameId": "BDAF83E0-E596-47CA-9FD5-E310643531AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.196:*:*:*:*:*:*:*", "cpeNameId": "B52AB3E0-7C8A-4E9B-9AB7-970D110AD689"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.197:*:*:*:*:*:*:*", "cpeNameId": "A98AABF5-2C66-4202-8CC8-7BD6A5BD206C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.198:*:*:*:*:*:*:*", "cpeNameId": "D2FB7CC8-3184-4B7B-8F15-206D478B957B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.199:*:*:*:*:*:*:*", "cpeNameId": "F17EC735-6954-48DE-9B79-129B113894DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.200:*:*:*:*:*:*:*", "cpeNameId": "215BF96E-9953-4137-9343-E664467C544B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.201:*:*:*:*:*:*:*", "cpeNameId": "4F5AA1AE-A206-4735-811F-D278CE94F425"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.202:*:*:*:*:*:*:*", "cpeNameId": "21709E5C-334E-4C9A-93FC-D33A6A234EBE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.203:*:*:*:*:*:*:*", "cpeNameId": "90B8792D-F589-4658-8105-D62452F51118"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.204:*:*:*:*:*:*:*", "cpeNameId": "783138D6-77F2-42BD-B712-64D5E3069478"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.205:*:*:*:*:*:*:*", "cpeNameId": "FDFF6DBF-A75C-45BA-A6EB-7EE625C06625"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.206:*:*:*:*:*:*:*", "cpeNameId": "3AFE0482-4EE2-4916-B1D9-6164C7CE9424"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.207:*:*:*:*:*:*:*", "cpeNameId": "B70FE32B-60B4-491B-BE0C-1709EFA5893C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.208:*:*:*:*:*:*:*", "cpeNameId": "0B61E6D6-2C0A-41BF-A847-2A0989F51690"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.209:*:*:*:*:*:*:*", "cpeNameId": "FAD83EB2-0BC4-4AD0-B7D0-84D486786E11"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.210:*:*:*:*:*:*:*", "cpeNameId": "4F085545-FA13-4D9D-ACC8-F268C0942C68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.211:*:*:*:*:*:*:*", "cpeNameId": "1110C146-0596-4E9A-9D9A-759EEE029BE7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.212:*:*:*:*:*:*:*", "cpeNameId": "C4725039-FE74-42A4-8F28-71890581F507"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.213:*:*:*:*:*:*:*", "cpeNameId": "01623D91-F403-4331-8911-FC3D9F207EEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.214:*:*:*:*:*:*:*", "cpeNameId": "6E428F60-24AE-403A-918B-A89C96B757C7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.215:*:*:*:*:*:*:*", "cpeNameId": "3800AEF1-ED61-41F4-9D70-EA3E0B77361D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.216:*:*:*:*:*:*:*", "cpeNameId": "0E9E733E-B81F-4112-AD2F-CE938439024B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.217:*:*:*:*:*:*:*", "cpeNameId": "48B7E2F6-5130-443C-8771-BE9DCDFBDD10"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.218:*:*:*:*:*:*:*", "cpeNameId": "3B485A54-4F57-4E7C-B620-A82938273FA7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.219:*:*:*:*:*:*:*", "cpeNameId": "C7F27EB7-A65A-45A2-A904-9F60507D342A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.220:*:*:*:*:*:*:*", "cpeNameId": "447A4E02-26AC-4CA2-B76D-B3508CF9B860"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.221:*:*:*:*:*:*:*", "cpeNameId": "436B2D40-F48C-4162-99D2-30D16807E3B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.222:*:*:*:*:*:*:*", "cpeNameId": "6BF3B63B-B671-44C8-8CBC-9FD21CA0E820"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.223:*:*:*:*:*:*:*", "cpeNameId": "121ACF12-28C3-4E2A-88C5-D5EF13920A90"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.224:*:*:*:*:*:*:*", "cpeNameId": "A67E472A-DC6E-4691-B5F1-225DE7946514"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.225:*:*:*:*:*:*:*", "cpeNameId": "CD10FD8D-0844-48A8-986D-33CA0DB5B3AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.226:*:*:*:*:*:*:*", "cpeNameId": "A11586F3-BA48-43B1-B808-2FD2280550F7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.227:*:*:*:*:*:*:*", "cpeNameId": "D3DD83A4-36EB-4F6B-86DB-524C91470807"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.229:*:*:*:*:*:*:*", "cpeNameId": "B816AFF0-A9B1-4F57-93E1-BB2D2A273A68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.230:*:*:*:*:*:*:*", "cpeNameId": "A940CCEF-1858-4FB9-BEC7-C2CD5A8DA5C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.244:*:*:*:*:*:*:*", "cpeNameId": "CA513596-6180-494F-A47C-4DC449B53BB7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:*:*:*:*:*:*:*", "cpeNameId": "63BC1E47-0228-41F4-989F-B4714260762B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:-:*:*:*:*:*:*", "cpeNameId": "BEEBF8B2-4493-470F-90B7-A9A57717C54C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:rc1:*:*:*:*:*:*", "cpeNameId": "AC145652-F483-4B19-B8C4-624F28E03010"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:rc2:*:*:*:*:*:*", "cpeNameId": "B9AE2C09-C300-4B2D-A5A7-E5D4CE11A0F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:rc3:*:*:*:*:*:*", "cpeNameId": "24855508-8DA6-4CA8-9B38-21B1C4505824"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:rc4:*:*:*:*:*:*", "cpeNameId": "B5E9A0D7-9681-4F6C-BBE8-30403B1C6F83"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:rc5:*:*:*:*:*:*", "cpeNameId": "95BCDE4B-2F7F-4F21-A2F1-A30E9C6370D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:rc6:*:*:*:*:*:*", "cpeNameId": "F455B799-C4F3-4B7A-8B65-0383984C3717"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:rc7:*:*:*:*:*:*", "cpeNameId": "1F290906-F5FA-45DF-922F-62ECC063EA76"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.1:*:*:*:*:*:*:*", "cpeNameId": "34D4AA87-9172-4704-BEA7-9DDEB516DB84"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.2:*:*:*:*:*:*:*", "cpeNameId": "8BF52BA5-E253-4CDD-A135-1531A86D543E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.3:*:*:*:*:*:*:*", "cpeNameId": "145EB557-D73C-47BB-87A6-B7029FA35A40"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.4:*:*:*:*:*:*:*", "cpeNameId": "7EEB122E-2E7E-4662-8AF2-B5F702EA3A6A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.5:*:*:*:*:*:*:*", "cpeNameId": "A3738040-9287-4A85-AE74-8E90D460C227"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.6:*:*:*:*:*:*:*", "cpeNameId": "C1C5E2C0-BA06-4A09-8063-F0CA9FC0ABFE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.7:*:*:*:*:*:*:*", "cpeNameId": "F2C4DB30-0C29-4A72-ACAD-AC339F102D29"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.8:*:*:*:*:*:*:*", "cpeNameId": "B8F6A213-C6B1-442B-BB9F-2B987BDEA023"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.9:*:*:*:*:*:*:*", "cpeNameId": "54EA37D0-6527-4F8B-A416-2ADF4F749CF8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.10:*:*:*:*:*:*:*", "cpeNameId": "620126E3-8499-4B1E-A182-2E3AF06B336B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.11:*:*:*:*:*:*:*", "cpeNameId": "193D233C-D3F2-4B20-AFFF-7B602948094F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.12:*:*:*:*:*:*:*", "cpeNameId": "90F5A23D-3E38-40C2-B5F8-8F4D6C1FA3E7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.13:*:*:*:*:*:*:*", "cpeNameId": "2B0BFF44-FCAF-4E26-BEB4-6F302ECCC398"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.14:*:*:*:*:*:*:*", "cpeNameId": "6F1AF9D1-837E-4681-A1B5-DBE553BB65DE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.15:*:*:*:*:*:*:*", "cpeNameId": "B9251847-EA27-4EBA-B9F3-1162156DBDFA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.16:*:*:*:*:*:*:*", "cpeNameId": "16A3579F-40D9-4FB0-B7D3-54FC47821FE8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.17:*:*:*:*:*:*:*", "cpeNameId": "BDFD9B25-4336-4D39-8C82-48867CB816ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.18:*:*:*:*:*:*:*", "cpeNameId": "82BF44C5-7264-4478-B8FC-06100D67440C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.19:*:*:*:*:*:*:*", "cpeNameId": "B4AE9BDA-08FC-43E5-B69A-12D179D1F0F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.20:*:*:*:*:*:*:*", "cpeNameId": "9FA3583C-D6CB-4E2D-8807-AD4BE72A8400"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.21:*:*:*:*:*:*:*", "cpeNameId": "4C39A0D8-85D6-4087-A5C7-E31B4763C30E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.22:*:*:*:*:*:*:*", "cpeNameId": "3734E58B-67DE-4CFE-8A0A-E198902F5EF3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12:-:*:*:*:*:*:*", "cpeNameId": "909AE298-650A-40FC-89B6-3C9B84F18D0D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12:rc1:*:*:*:*:*:*", "cpeNameId": "2DF254E6-DCA2-415F-A9CF-A8F8214C70C9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12:rc2:*:*:*:*:*:*", "cpeNameId": "28EA1789-0AA1-4DDF-8A3B-186FAE60250E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12:rc3:*:*:*:*:*:*", "cpeNameId": "18273D65-2C56-44F3-86BB-210E8183A30E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12:rc4:*:*:*:*:*:*", "cpeNameId": "1C698D86-842A-4A52-AC8A-0ACE001B6150"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12:rc5:*:*:*:*:*:*", "cpeNameId": "5DA86DC0-64A9-4E9C-A37C-A4EFB1764A84"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12:rc6:*:*:*:*:*:*", "cpeNameId": "DD2A90B7-FAAF-49E4-A5FE-F6E9ADF6A147"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12:rc7:*:*:*:*:*:*", "cpeNameId": "A990F6D8-E66C-4AD6-9606-71E2B8FB4CFE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.1:*:*:*:*:*:*:*", "cpeNameId": "7497D744-2E4C-45AD-9B58-D9ECD626175B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.2:*:*:*:*:*:*:*", "cpeNameId": "10641D0D-05A7-4B3D-82FB-FFE591B7DBD7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.3:*:*:*:*:*:*:*", "cpeNameId": "5AD0A9F1-5AD4-4ABB-A833-99BA7D351577"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.4:*:*:*:*:*:*:*", "cpeNameId": "4665239B-D45C-4558-9F54-695E98369E8C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.5:*:*:*:*:*:*:*", "cpeNameId": "8E690484-7C22-4011-9B03-9983E23095F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.6:*:*:*:*:*:*:*", "cpeNameId": "F9520114-68E1-4BB9-B088-7C1A27ACE515"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.7:*:*:*:*:*:*:*", "cpeNameId": "AD1AB54E-70EA-4B7E-B7D9-87F45E7F87A9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.8:*:*:*:*:*:*:*", "cpeNameId": "8C5ABC42-12D2-499A-B6CC-C9B1E15AEA71"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.9:*:*:*:*:*:*:*", "cpeNameId": "46196B73-964E-4ABC-B0E5-48B5F5CB7BFF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.10:*:*:*:*:*:*:*", "cpeNameId": "36A6AB9B-68B3-4234-A8E6-74EC108A160C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.11:*:*:*:*:*:*:*", "cpeNameId": "A12D7920-D1CA-44DC-A290-E26C4FE41EEF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.12:*:*:*:*:*:*:*", "cpeNameId": "9794C38E-32C0-4EB8-B4FE-D02D6E4ECFEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.13:*:*:*:*:*:*:*", "cpeNameId": "B5621156-BE25-4483-A3D0-4DD273245B57"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.14:*:*:*:*:*:*:*", "cpeNameId": "D1BB4FE7-AF71-4FEF-BD81-A88B9E860487"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.15:*:*:*:*:*:*:*", "cpeNameId": "9B349C0E-D91F-485E-A777-06055A4DF1D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.16:*:*:*:*:*:*:*", "cpeNameId": "0101B6BB-6E04-4238-A384-245C8C831FE0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.17:*:*:*:*:*:*:*", "cpeNameId": "B70E75C0-1784-4F2D-9890-72635AD1ABC8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.18:*:*:*:*:*:*:*", "cpeNameId": "FC1C2672-396B-452C-97B1-6C7F0583CB21"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.19:*:*:*:*:*:*:*", "cpeNameId": "6CE0FEDB-F644-4A9C-A88A-8F9D69B58BBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.25:*:*:*:*:*:*:*", "cpeNameId": "E9B47122-76AA-45F9-9BA9-9AA7D47E1819"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13:-:*:*:*:*:*:*", "cpeNameId": "760A4977-F4EC-4445-8EED-8F3540557E96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", "cpeNameId": "789E9076-49A9-4149-A146-FFAB80FD6312"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", "cpeNameId": "510FD2D9-571A-4924-B0B5-266204ABEF00"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", "cpeNameId": "B7FC9139-392C-42D9-B092-06ADE363B7C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", "cpeNameId": "78FDEB4A-AC37-4CEB-90F2-69700A1DFCB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*", "cpeNameId": "2B4C5B22-5D8E-46CA-A9A7-D488F2847060"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13:rc6:*:*:*:*:*:*", "cpeNameId": "55D4CFE3-C4CD-4A45-A04A-BFDA91D27503"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13:rc7:*:*:*:*:*:*", "cpeNameId": "DD429168-8AFF-457A-A8A7-8723FDC00949"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.0-52:*:*:*:*:*:*:*", "cpeNameId": "292646CC-C335-4347-87AE-6E1555659B40"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.1:*:*:*:*:*:*:*", "cpeNameId": "30F1E081-ED8A-457C-8465-D9C070DF0721"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.2:*:*:*:*:*:*:*", "cpeNameId": "17573538-60C1-4BBE-8321-EDE2F7F0E1A3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.3:*:*:*:*:*:*:*", "cpeNameId": "E0E67EF3-1AC9-4F29-B215-A82FF3493F6D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.4:*:*:*:*:*:*:*", "cpeNameId": "C6A71459-E60F-4B6A-B838-AE055D002725"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.5:*:*:*:*:*:*:*", "cpeNameId": "2F2A9933-4925-48E1-A572-276C4704E76F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.6:*:*:*:*:*:*:*", "cpeNameId": "9B5FC7E8-F482-43BD-B50D-7371AB3D4692"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.7:*:*:*:*:*:*:*", "cpeNameId": "94B23D33-6B16-475B-BF18-12A4FD5BE981"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.8:*:*:*:*:*:*:*", "cpeNameId": "71FC3F52-9D0F-4FA1-BEC8-7E662B3F0865"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.9:*:*:*:*:*:*:*", "cpeNameId": "5F17B3D4-BEAA-4606-B54B-419BE8532261"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.10:*:*:*:*:*:*:*", "cpeNameId": "73EC9A1A-02F6-4D0A-993F-5F2F9277F242"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.11:*:*:*:*:*:*:*", "cpeNameId": "45FFC97B-0FB5-4F9F-8660-FDCF0FBD5166"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.12:*:*:*:*:*:*:*", "cpeNameId": "2C6FC6E4-806F-4C8F-BC99-E279D18A47F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.13:*:*:*:*:*:*:*", "cpeNameId": "EBA292BE-DC50-49A1-8C5B-284C05E30E80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.14:*:*:*:*:*:*:*", "cpeNameId": "950E8486-A34F-4B8C-B6B9-213FB5D2B553"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.15:*:*:*:*:*:*:*", "cpeNameId": "DD0ACE31-23BC-46AE-8C24-DDE99C1677FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.16:*:*:*:*:*:*:*", "cpeNameId": "7D6ABA87-CFF7-4467-B1EB-26F1B2C8CD86"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.17:*:*:*:*:*:*:*", "cpeNameId": "B6F4951C-AB24-43F3-8361-34CD2C0DA81E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.18:*:*:*:*:*:*:*", "cpeNameId": "C7B2B5A1-F367-42EA-BB1B-F03C29AE7228"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.19:*:*:*:*:*:*:*", "cpeNameId": "39AC74B5-3F06-44E2-8F03-3C3F552C6111"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14:-:*:*:*:*:*:*", "cpeNameId": "290B9F79-3C87-4725-9517-AF89CC5F87D6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14:rc1:*:*:*:*:*:*", "cpeNameId": "A83E7C0B-A2D1-46BB-A787-DF9B68EA842A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14:rc2:*:*:*:*:*:*", "cpeNameId": "3FC14149-AA1E-48B5-8F75-5B5DD861A257"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14:rc3:*:*:*:*:*:*", "cpeNameId": "FA98B0B7-3C8F-4AC4-96E2-C1ED5869C608"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14:rc4:*:*:*:*:*:*", "cpeNameId": "21FB0B0F-DD53-4505-A841-D56D4C98ADDA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14:rc5:*:*:*:*:*:*", "cpeNameId": "4DDE3D5C-B126-49B9-8255-B97A9F55DC75"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14:rc6:*:*:*:*:*:*", "cpeNameId": "AC770C18-100E-4D5A-8E7C-548B363374D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.1:*:*:*:*:*:*:*", "cpeNameId": "6ED5E726-F7B4-446F-8B58-8756B5D09D3A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.2:*:*:*:*:*:*:*", "cpeNameId": "EEEEDE36-29F0-45B2-A5AD-AC615F9ECBFE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.3:*:*:*:*:*:*:*", "cpeNameId": "820DBC02-C9B5-4003-84F4-6C88EE2C3161"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.4:*:*:*:*:*:*:*", "cpeNameId": "75EEBB8F-B653-4BE3-8748-7973BB51D982"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.5:*:*:*:*:*:*:*", "cpeNameId": "EB2BAAA7-D118-4EE4-8974-B5E91B2DD088"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.6:*:*:*:*:*:*:*", "cpeNameId": "A90AEBB1-634D-4E4C-9EB4-5A378DA9921E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.7:*:*:*:*:*:*:*", "cpeNameId": "713408CD-13C2-4E22-A7CF-1CFA01082262"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.8:*:*:*:*:*:*:*", "cpeNameId": "AF7173EC-5AA6-4152-ADE2-77F860F5DCBD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.9:*:*:*:*:*:*:*", "cpeNameId": "5C3FF227-DDB0-4ACE-9170-4BE4CDA39239"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.10:*:*:*:*:*:*:*", "cpeNameId": "B9A635C8-CD0F-4897-A6E6-11F42F597CF7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.11:*:*:*:*:*:*:*", "cpeNameId": "D302868E-99BB-4C0C-9EC5-22E0F2F7B58A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.12:*:*:*:*:*:*:*", "cpeNameId": "227CCDD9-0DA9-4E19-A3A0-98182C78A04D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.13:*:*:*:*:*:*:*", "cpeNameId": "BA9F4788-9EAB-4974-B38D-F49FA29FCAB7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.14:*:*:*:*:*:*:*", "cpeNameId": "30A4EDD4-FFDC-46D1-9525-65CE02584D95"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.15:*:*:*:*:*:*:*", "cpeNameId": "253EE3A7-BB19-4AC4-B7F6-9B50D49FE43B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.16:*:*:*:*:*:*:*", "cpeNameId": "CFD0FB79-CC87-491D-8B44-C835289F1FF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.17:*:*:*:*:*:*:*", "cpeNameId": "6D7A8649-F82D-4F46-8B54-B4A42730DC62"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.18:*:*:*:*:*:*:*", "cpeNameId": "F5056E34-3AA2-4E1D-9445-D36A5E9AC2AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.19:*:*:*:*:*:*:*", "cpeNameId": "173C2A8A-1254-4EA0-8FE0-266FB47C42E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.20:*:*:*:*:*:*:*", "cpeNameId": "91634B25-518C-487C-90FC-C295D8AEF303"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.21:*:*:*:*:*:*:*", "cpeNameId": "1188704C-1DAC-4A1B-876D-B462547A9A1D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15:-:*:*:*:*:*:*", "cpeNameId": "599716EA-4916-4E30-8C24-4C6384D09138"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*", "cpeNameId": "CC920260-1BAF-4237-9263-2BCB29AE387F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*", "cpeNameId": "E052153B-5861-4C61-8207-1ED350609920"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:*", "cpeNameId": "6DBE44D0-670B-4B11-93BC-5CE160AE79A0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15:rc4:*:*:*:*:*:*", "cpeNameId": "D2702E38-FC04-4035-9742-46E5C2C32FF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15:rc5:*:*:*:*:*:*", "cpeNameId": "A638E326-4ACA-4CBB-8541-3860AEC16C9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15:rc6:*:*:*:*:*:*", "cpeNameId": "3E354D0D-99D1-4D2E-A42D-66946B7130B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15:rc7:*:*:*:*:*:*", "cpeNameId": "3FA3424A-B73B-4456-B871-280BBF7DE793"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.0:*:*:*:*:*:*:*", "cpeNameId": "3B152660-5C53-45F1-82AE-702237DAC922"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.0-58:*:*:*:*:*:*:*", "cpeNameId": "06ABD7CB-C7BF-4F85-ABD4-36F90A9114F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.1:*:*:*:*:*:*:*", "cpeNameId": "C92526FC-5702-4551-95C4-5D185E57703A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.2:*:*:*:*:*:*:*", "cpeNameId": "A70688C6-4AA2-4110-BC86-CA9E324DF3EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.3:*:*:*:*:*:*:*", "cpeNameId": "64CD2A28-6AE0-4894-8B00-F5232E3C34A9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.3:-:*:*:*:*:*:*", "cpeNameId": "FE18FBEA-C217-402C-8731-7C387B4B3D7F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.4:*:*:*:*:*:*:*", "cpeNameId": "969BD4C0-B372-451B-9376-0CA5FB3C286F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.5:*:*:*:*:*:*:*", "cpeNameId": "7309FA34-EDC1-41D1-BB4E-09F09900678F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.6:*:*:*:*:*:*:*", "cpeNameId": "DA042DB6-921A-4071-A171-7D0C2BBBC8F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.7:*:*:*:*:*:*:*", "cpeNameId": "0E69D848-C6AF-45F1-B581-3435108E1E1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.8:*:*:*:*:*:*:*", "cpeNameId": "73679DB9-DB66-4D04-9362-9F7FDE3ED7DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.9:*:*:*:*:*:*:*", "cpeNameId": "A914D016-CDDA-4F8C-8D11-AD68CA078395"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.10:*:*:*:*:*:*:*", "cpeNameId": "B8732B41-FD4D-4BB5-B500-664C2BA3129F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.11:*:*:*:*:*:*:*", "cpeNameId": "A58F2B5E-D805-40E6-B2EC-38AB78F48EBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.12:*:*:*:*:*:*:*", "cpeNameId": "C570EA74-0498-4116-8B63-2E08DB9EAF91"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.13:*:*:*:*:*:*:*", "cpeNameId": "D43ECFE8-45FA-41D1-94B9-F6A3601D99C4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.14:*:*:*:*:*:*:*", "cpeNameId": "9B285A1E-C507-4EDB-A79D-7F3A707A00D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.15:*:*:*:*:*:*:*", "cpeNameId": "479523C1-5DFC-4ADF-88A9-60D25E740ECD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.16:*:*:*:*:*:*:*", "cpeNameId": "283D07E0-7CF7-428B-B5E7-F9F389F42621"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.17:*:*:*:*:*:*:*", "cpeNameId": "28209832-3CD5-4EB8-BFF7-94C00921B21A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.18:*:*:*:*:*:*:*", "cpeNameId": "C402A420-3087-4169-B118-B9576726F29A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.19:*:*:*:*:*:*:*", "cpeNameId": "71FF4C04-4676-4339-904C-E431CA842C9A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.20:*:*:*:*:*:*:*", "cpeNameId": "D3AC6061-A8AD-4B32-9631-AAD5AE8AE846"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.21:*:*:*:*:*:*:*", "cpeNameId": "01512FC7-2E77-4185-84AD-233C3850F0C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.22:*:*:*:*:*:*:*", "cpeNameId": "13950585-5CDE-450C-8569-0F629C7EDB2E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.23:*:*:*:*:*:*:*", "cpeNameId": "84D3D456-7CBD-4BB2-940D-07D97BA08C58"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.24:*:*:*:*:*:*:*", "cpeNameId": "4B07A2D0-5A94-41AD-8478-EB93089837BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.25:*:*:*:*:*:*:*", "cpeNameId": "4B57878E-85D9-4630-81F9-971E521E1D04"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.26:*:*:*:*:*:*:*", "cpeNameId": "10C93845-0531-404A-B632-86FC15D22E78"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.27:*:*:*:*:*:*:*", "cpeNameId": "6B435B64-AB1B-4029-B6A5-01DD5C19206F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.28:*:*:*:*:*:*:*", "cpeNameId": "101F745E-07DD-436D-9573-77D88FEE7DA8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.29:*:*:*:*:*:*:*", "cpeNameId": "2126A535-152D-4C7D-BEEC-5E05EFF76DBF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.30:*:*:*:*:*:*:*", "cpeNameId": "3D5050EC-725E-41E0-A0BB-89C5CC71ACC5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.31:*:*:*:*:*:*:*", "cpeNameId": "CADD5BFF-62AF-44DA-8433-F0221493495C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.32:*:*:*:*:*:*:*", "cpeNameId": "D41546A8-EBED-4F57-BD4A-9E1B2A5C17CC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.33:*:*:*:*:*:*:*", "cpeNameId": "2AD16C2A-38AA-4931-922E-B883B7574C58"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.34:*:*:*:*:*:*:*", "cpeNameId": "99C916A9-866D-4905-9878-8DD27F5E980D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.35:*:*:*:*:*:*:*", "cpeNameId": "5F3D2240-53BA-4C7D-8199-FE7F31339D4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.36:*:*:*:*:*:*:*", "cpeNameId": "FF57011F-9545-414B-B253-52F38B78B77A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.37:*:*:*:*:*:*:*", "cpeNameId": "606225EC-ECF3-4F47-91A8-7F9D17842D62"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.38:*:*:*:*:*:*:*", "cpeNameId": "4DB0EF0E-5BF0-47C3-A2F9-B3522AFF7190"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.39:*:*:*:*:*:*:*", "cpeNameId": "A08CEA1B-91C1-4711-BD80-0F7ADDE94BA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.40:*:*:*:*:*:*:*", "cpeNameId": "89D88D81-DD0E-43FD-B671-78B808D88647"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.41:*:*:*:*:*:*:*", "cpeNameId": "DD7E6E45-BF7C-46DF-958C-735232ECCBED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.42:*:*:*:*:*:*:*", "cpeNameId": "B2520F43-B7D8-4373-8869-07DCFD59FF11"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.43:*:*:*:*:*:*:*", "cpeNameId": "F16FC01A-7763-44B0-B502-4FC46DA358AF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.44:*:*:*:*:*:*:*", "cpeNameId": "030D2A9C-692A-4DB1-9D63-44DBCC0C68F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.45:*:*:*:*:*:*:*", "cpeNameId": "94C51A53-591C-4ED3-BBD6-7549EE1F8068"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.46:*:*:*:*:*:*:*", "cpeNameId": "ACC8D217-A7B0-4C18-9B70-FA0E5262BFB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.47:*:*:*:*:*:*:*", "cpeNameId": "191C3ACC-27A6-438E-9334-742147EFFBFE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.48:*:*:*:*:*:*:*", "cpeNameId": "8B81D3ED-5819-4470-BE97-D8DEA91AFBB3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.49:*:*:*:*:*:*:*", "cpeNameId": "BAF8556B-BB65-4F53-8EB5-059A294DCD67"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.50:*:*:*:*:*:*:*", "cpeNameId": "D99EABCA-D9E3-44D7-AF96-2D5F1474CD15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.51:*:*:*:*:*:*:*", "cpeNameId": "89386483-66E5-4C04-B476-C08F5BD6D0D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.52:*:*:*:*:*:*:*", "cpeNameId": "076DEA19-48DB-476C-8CFA-06ACE89F67EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.53:*:*:*:*:*:*:*", "cpeNameId": "E3AAC0BA-7638-428F-9D89-08A94750E9EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.54:*:*:*:*:*:*:*", "cpeNameId": "56A56B25-D086-4413-8692-A5882F02760F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.55:*:*:*:*:*:*:*", "cpeNameId": "4BF52F71-274C-4E09-9D64-84AAC8D6F67E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.56:*:*:*:*:*:*:*", "cpeNameId": "2D041A4C-8395-4B72-B6B7-06ECBA8E8693"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.57:*:*:*:*:*:*:*", "cpeNameId": "6B5C0E6D-8C22-41CE-8CF7-5A85861A47D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.58:*:*:*:*:*:*:*", "cpeNameId": "FCE4E1B8-7046-4626-A6D1-53B7095B20A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.59:*:*:*:*:*:*:*", "cpeNameId": "729B700C-BDB9-4DFB-A795-98DFBE32EEC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.60:*:*:*:*:*:*:*", "cpeNameId": "1D98E598-4BF4-43D6-904C-9290DDF06272"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.61:*:*:*:*:*:*:*", "cpeNameId": "6CCCAF65-435F-482C-BA22-7DDC145109F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.62:*:*:*:*:*:*:*", "cpeNameId": "B90909CA-2810-4537-A85A-4CBA4A6AF37C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.63:*:*:*:*:*:*:*", "cpeNameId": "6F0C3B38-C13C-4A80-9EBD-65AC9FCC8F9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.64:*:*:*:*:*:*:*", "cpeNameId": "F91D8B0C-B2AC-43A8-8D6C-536E4C07BDA3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.65:*:*:*:*:*:*:*", "cpeNameId": "4C75DDA0-056C-4560-B8F6-FD3A28965C0F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.66:*:*:*:*:*:*:*", "cpeNameId": "479D10C6-D8AE-4C6C-95D8-D4935062ACDA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.67:*:*:*:*:*:*:*", "cpeNameId": "ADBEA5B5-A3FF-4667-A57F-EAA8FBC5F51A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.68:*:*:*:*:*:*:*", "cpeNameId": "E5298249-E4F2-40FD-9A02-0FFE62A97655"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.69:*:*:*:*:*:*:*", "cpeNameId": "AF74FFF5-EACB-41FA-9DDE-6E9F7C2D49E9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.70:*:*:*:*:*:*:*", "cpeNameId": "626D6B66-055F-40EF-87D0-BCA1ACB41632"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.71:*:*:*:*:*:*:*", "cpeNameId": "13BB2C1F-A7E8-4FEA-802A-FCB5DB17689E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.72:*:*:*:*:*:*:*", "cpeNameId": "687ACBBC-002B-4A57-B0C5-495C006BF83A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.73:*:*:*:*:*:*:*", "cpeNameId": "2FFC61CE-E920-4907-9237-ADCB03CF57F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.74:*:*:*:*:*:*:*", "cpeNameId": "21586670-7837-44DE-98F5-E8664ECB39F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.75:*:*:*:*:*:*:*", "cpeNameId": "257AECB1-0BFD-4F2F-9E1D-8B99451293E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.76:*:*:*:*:*:*:*", "cpeNameId": "4C6C2994-8803-478D-98AD-268D0B994FD2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.77:*:*:*:*:*:*:*", "cpeNameId": "67B26A96-5B92-41D5-A933-110235C90FC2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.78:*:*:*:*:*:*:*", "cpeNameId": "93765A6E-5FF1-428E-B6DD-08E9761E4BC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.79:*:*:*:*:*:*:*", "cpeNameId": "1E46E1F7-EC81-48DB-8D87-615670C42211"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.80:*:*:*:*:*:*:*", "cpeNameId": "403BE072-9172-420B-A0DF-A011387FC467"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.81:*:*:*:*:*:*:*", "cpeNameId": "76501F14-5447-4316-96C1-406CBB85ACEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.82:*:*:*:*:*:*:*", "cpeNameId": "EC139CB2-1B4C-41BA-B74E-6E21D4C75A65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.83:*:*:*:*:*:*:*", "cpeNameId": "B82C5952-6221-4637-A4F9-27F26C848140"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.84:*:*:*:*:*:*:*", "cpeNameId": "6D9BBF85-E068-4434-9F1D-FC5E2BCCCE15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.85:*:*:*:*:*:*:*", "cpeNameId": "4DFB6EEB-3B7C-4BBE-9C57-22212F5CF117"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.86:*:*:*:*:*:*:*", "cpeNameId": "54FA7373-2A0F-441F-B2DE-D0026C9E6E2A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.87:*:*:*:*:*:*:*", "cpeNameId": "D2002224-68A5-4CEB-84E8-C68A68A70477"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.88:*:*:*:*:*:*:*", "cpeNameId": "240ADDF1-F9B5-4E8A-BB28-8D25FD6EAFAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.89:*:*:*:*:*:*:*", "cpeNameId": "E8949735-535C-4365-9E77-3F5AFA127F45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.90:*:*:*:*:*:*:*", "cpeNameId": "27480E5A-75A6-4924-AE94-56C368919E20"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.91:*:*:*:*:*:*:*", "cpeNameId": "F1444DEC-505C-4B47-89E1-558CA1FE252D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.92:*:*:*:*:*:*:*", "cpeNameId": "366E992F-2DEB-4B73-8D13-0AAA6CDAB1AA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.93:*:*:*:*:*:*:*", "cpeNameId": "8B194E4D-C302-4781-A3EB-287B9338BB49"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.94:*:*:*:*:*:*:*", "cpeNameId": "8C4F3FDB-C7D3-4FAF-ADC9-F9C48692180C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.95:*:*:*:*:*:*:*", "cpeNameId": "78DB19FE-CDF2-4493-934F-F78BAC1E3525"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.96:*:*:*:*:*:*:*", "cpeNameId": "BD7068CF-1BF4-4836-A365-A1CAA95D8492"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.97:*:*:*:*:*:*:*", "cpeNameId": "8D4F726D-1B15-4756-B043-23B295E50326"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.98:*:*:*:*:*:*:*", "cpeNameId": "26CC4C2E-D776-4C60-9E36-FCAC66C0CA93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.99:*:*:*:*:*:*:*", "cpeNameId": "FB96FD42-EA7B-4EA4-BE27-FB6AE67A19D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.100:*:*:*:*:*:*:*", "cpeNameId": "8D34EF8C-BCA7-4EC8-9C69-559A59897E86"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.101:*:*:*:*:*:*:*", "cpeNameId": "6675EF7C-AACC-4247-A01C-896C9A44CFB9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.102:*:*:*:*:*:*:*", "cpeNameId": "2FEF936B-B116-4F46-8301-200550628240"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.103:*:*:*:*:*:*:*", "cpeNameId": "DE221176-159A-4357-8F12-AC71670703B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.104:*:*:*:*:*:*:*", "cpeNameId": "C1896DF2-E302-460B-9502-CF7063E5DF9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.105:*:*:*:*:*:*:*", "cpeNameId": "9E101463-342E-4486-823F-3BC4BD391306"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.106:*:*:*:*:*:*:*", "cpeNameId": "CA88855E-C837-4947-93E0-B9D7F9B827E7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.107:*:*:*:*:*:*:*", "cpeNameId": "B13F0C93-E3E4-4641-9EAB-3EA2990A1C89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.108:*:*:*:*:*:*:*", "cpeNameId": "130C0395-CE35-4126-A645-AADC5CD80532"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.109:*:*:*:*:*:*:*", "cpeNameId": "45D1D3CB-FD9D-42FB-A1D3-534BC36E80EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.110:*:*:*:*:*:*:*", "cpeNameId": "A931A0BD-98A1-47EB-9A75-0E8789CD2174"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.111:*:*:*:*:*:*:*", "cpeNameId": "CED0554E-DE06-438B-BD20-D55AB97E2137"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.112:*:*:*:*:*:*:*", "cpeNameId": "01469DE3-F508-4F50-B7EF-CFFAF6B0244A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.113:*:*:*:*:*:*:*", "cpeNameId": "EE8A8B31-F5BC-463C-8C3F-F99C8605D124"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.114:*:*:*:*:*:*:*", "cpeNameId": "7555AB4A-AA90-4F9E-AC9A-522F0EBB84B6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.115:*:*:*:*:*:*:*", "cpeNameId": "37780F52-A144-418A-8605-87E836109FA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.116:*:*:*:*:*:*:*", "cpeNameId": "67C9CBE9-0CF6-4DC1-96C9-8B8D0C572C76"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.117:*:*:*:*:*:*:*", "cpeNameId": "ADB012DE-27D7-4796-A07A-55897A9208B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.118:*:*:*:*:*:*:*", "cpeNameId": "6CAF3A99-3538-4B78-AB6F-1FD5BC1D3731"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.119:*:*:*:*:*:*:*", "cpeNameId": "F62E2EC5-1929-49E3-8920-4EFC89470EF3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.120:*:*:*:*:*:*:*", "cpeNameId": "1ACD20AE-5810-4832-9596-E0F2B77F6DED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.121:*:*:*:*:*:*:*", "cpeNameId": "0840D171-E172-4AEB-9A04-748165172F57"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.122:*:*:*:*:*:*:*", "cpeNameId": "108F7161-9C83-4AF5-81CE-7210DBE16A3B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.123:*:*:*:*:*:*:*", "cpeNameId": "AFC5B1D0-7550-4CA6-B9D8-7362589804BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.124:*:*:*:*:*:*:*", "cpeNameId": "607A4975-DD27-45FB-8492-B2D610C8CE49"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.125:*:*:*:*:*:*:*", "cpeNameId": "7CFAB9E2-3565-4DBE-A4A3-F420E0E6F1B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.126:*:*:*:*:*:*:*", "cpeNameId": "934C84D4-9205-4231-918D-52F8653AD03A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.127:*:*:*:*:*:*:*", "cpeNameId": "94F04153-424F-4287-9D87-86D843B8EC6B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.128:*:*:*:*:*:*:*", "cpeNameId": "3A0743EE-08EE-4033-974B-534685606B8D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.129:*:*:*:*:*:*:*", "cpeNameId": "1851B737-51D3-44EC-BAD0-C326CB4B258A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.130:*:*:*:*:*:*:*", "cpeNameId": "5E3B9172-8C12-4171-BE40-947651A6C1D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.131:*:*:*:*:*:*:*", "cpeNameId": "68CDD386-3C55-4849-BFDD-71A5DF5ECF00"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.132:*:*:*:*:*:*:*", "cpeNameId": "3F25FB70-CBCF-4363-947B-8D0749D054A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.133:*:*:*:*:*:*:*", "cpeNameId": "183855CE-2982-4596-954A-C8AD340BB217"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.134:*:*:*:*:*:*:*", "cpeNameId": "2C960D3A-EB30-4662-92DE-2F4DCA1B61DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.135:*:*:*:*:*:*:*", "cpeNameId": "795D4E07-5632-4B2F-889E-52121C56C87A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.136:*:*:*:*:*:*:*", "cpeNameId": "39F63867-B3B8-4B11-8568-793FE9BF0657"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.137:*:*:*:*:*:*:*", "cpeNameId": "86AFC96E-5CC1-4C7C-8D07-20BF5FD72F51"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.138:*:*:*:*:*:*:*", "cpeNameId": "6D98B672-ABF1-4E6A-85CA-C98156AD289F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.139:*:*:*:*:*:*:*", "cpeNameId": "60BDBDA5-D58A-4E1E-87FB-110840F829F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.140:*:*:*:*:*:*:*", "cpeNameId": "44DCAB0F-015F-4450-9454-1B281A41F7FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.141:*:*:*:*:*:*:*", "cpeNameId": "3C8C0EA5-6615-4404-9C0E-507EA505E607"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.142:*:*:*:*:*:*:*", "cpeNameId": "AACA090B-6D25-4504-8EEF-02C1DA914B55"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.143:*:*:*:*:*:*:*", "cpeNameId": "04411AB1-68B2-43CF-8AAF-023A00274276"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.144:*:*:*:*:*:*:*", "cpeNameId": "D1A15124-7544-4990-8884-8EC08CBDB231"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.145:*:*:*:*:*:*:*", "cpeNameId": "DBDB8123-C794-42AF-B554-13E794244440"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.146:*:*:*:*:*:*:*", "cpeNameId": "CD3243D1-4C4E-424A-BCFE-7FAF5782049D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.147:*:*:*:*:*:*:*", "cpeNameId": "D14C7C5E-C636-4B9B-941A-1B5D3FE4AF3B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.148:*:*:*:*:*:*:*", "cpeNameId": "43B668A9-8ADC-487B-8857-F8CC74D99990"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.149:*:*:*:*:*:*:*", "cpeNameId": "8C6DF61D-1354-424F-88D4-C76B0044C4BA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.150:*:*:*:*:*:*:*", "cpeNameId": "405263B7-A847-493D-BAC8-67CDC081E8A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.151:*:*:*:*:*:*:*", "cpeNameId": "AFB5460A-5F15-4E58-A1D9-438F22B08C61"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.152:*:*:*:*:*:*:*", "cpeNameId": "6FD5D09F-908B-4EA6-ADDA-D5D4867282C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.153:*:*:*:*:*:*:*", "cpeNameId": "35BC07C8-138B-48CB-94C8-F4F2DE1CEA73"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.154:*:*:*:*:*:*:*", "cpeNameId": "104BA652-53EA-4BE7-AEF6-1E69DF5BAB94"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.155:*:*:*:*:*:*:*", "cpeNameId": "82D13E0C-C092-4C55-8F8E-A8EC9F7C5B28"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.156:*:*:*:*:*:*:*", "cpeNameId": "0208D826-E36F-43ED-94E2-47B3786BDA8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.157:*:*:*:*:*:*:*", "cpeNameId": "29BE7FF8-0D66-4613-9FF9-1491805EF6E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.158:*:*:*:*:*:*:*", "cpeNameId": "F0BD86B6-9DA2-4CB5-925F-AED18EA69B7A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.159:*:*:*:*:*:*:*", "cpeNameId": "1967C928-055E-41A6-9452-11327EFD81F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.160:*:*:*:*:*:*:*", "cpeNameId": "39762989-4F30-40E8-9958-8100639F003F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.161:*:*:*:*:*:*:*", "cpeNameId": "93EFCF93-5625-453D-B8C8-D532F2F6B2EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.162:*:*:*:*:*:*:*", "cpeNameId": "AD93992B-560A-4880-AB8E-2B12E1ED9CE6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.163:*:*:*:*:*:*:*", "cpeNameId": "9F1AF162-C909-4161-9860-93F52BA93C11"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.164:*:*:*:*:*:*:*", "cpeNameId": "E82128C3-95AC-4517-8595-90030EB8B1B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.165:*:*:*:*:*:*:*", "cpeNameId": "DD75A3C4-3B2C-47C3-8249-25430F6326F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.166:*:*:*:*:*:*:*", "cpeNameId": "C4AE610D-F204-40F4-9F0E-A12F96513628"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.167:*:*:*:*:*:*:*", "cpeNameId": "AD2CD499-D496-457D-B206-76DD055935D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.168:*:*:*:*:*:*:*", "cpeNameId": "D17DDC10-C0C2-4595-99AA-7D081F156E28"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.170:*:*:*:*:*:*:*", "cpeNameId": "68B1E403-BB7E-46D6-93FB-39CCDEC9F903"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.171:*:*:*:*:*:*:*", "cpeNameId": "20D00418-523B-451C-A87C-A7494767A55C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.172:*:*:*:*:*:*:*", "cpeNameId": "BF5B290A-52DC-4153-9821-1E04DA80704B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16:-:*:*:*:*:*:*", "cpeNameId": "C83A7E51-CA73-46EC-8635-C725205B637D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*", "cpeNameId": "028A348E-72E2-4B13-9D61-56938AFFB6F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:*", "cpeNameId": "6495A470-21D2-43F0-B762-C6ECB6134C5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16:rc3:*:*:*:*:*:*", "cpeNameId": "6342FCDA-7AC5-4E1B-A8F7-C4A7CB62F606"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16:rc4:*:*:*:*:*:*", "cpeNameId": "3379676E-35B7-4474-8A99-EF053E0FD968"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16:rc5:*:*:*:*:*:*", "cpeNameId": "AE10DE94-CADF-4B77-B540-4197CCAB49EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16:rc6:*:*:*:*:*:*", "cpeNameId": "EFBAB573-844C-4A77-BC98-353AB1C86E1A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16:rc7:*:*:*:*:*:*", "cpeNameId": "71AEECF0-21D6-492A-999E-8D6687D719A7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.0:*:*:*:*:*:*:*", "cpeNameId": "081E7EC8-3E8E-48D4-8187-1B96F6BE062F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.0:rc1:*:*:*:*:*:*", "cpeNameId": "EB5911C8-9712-4439-99F2-5BCDED060240"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.1:*:*:*:*:*:*:*", "cpeNameId": "2730ED9E-094C-40E1-B3C5-75C02A9E1BBD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.2:*:*:*:*:*:*:*", "cpeNameId": "7A33187A-7AA3-4565-BD7A-EE2304904D3B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.3:*:*:*:*:*:*:*", "cpeNameId": "F0C5525B-4224-4481-9190-16DFA7982F9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.4:*:*:*:*:*:*:*", "cpeNameId": "891F8D0E-202D-4728-9D83-764496E40CB9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.5:*:*:*:*:*:*:*", "cpeNameId": "AFC47178-4013-4A67-BFBE-F2C1D8C43FAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.6:*:*:*:*:*:*:*", "cpeNameId": "A563BA20-7E45-4F95-97CC-B991BEE12EC2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.7:*:*:*:*:*:*:*", "cpeNameId": "62897C18-4BA0-46BF-A3C6-A2F57B2C400F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.8:*:*:*:*:*:*:*", "cpeNameId": "0D9ED6C5-B404-47B6-BDDA-21FB4E7392DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.9:*:*:*:*:*:*:*", "cpeNameId": "DBB9E77F-F972-4486-AE16-C40C76D64E87"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.10:*:*:*:*:*:*:*", "cpeNameId": "7D6A655C-B244-446F-8CDC-4D17D47253AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.11:*:*:*:*:*:*:*", "cpeNameId": "B5EB9714-867F-44F9-9AA3-BE8D500D4BC5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.12:*:*:*:*:*:*:*", "cpeNameId": "8BF0B6A9-F5F7-4EF6-A81F-9AA1DEBFBCE3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.13:*:*:*:*:*:*:*", "cpeNameId": "BE8039FF-A2FF-4592-BCF2-FDE1271C80D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.14:*:*:*:*:*:*:*", "cpeNameId": "70857AD4-FC92-4F1B-905E-19EC450C5B11"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.15:*:*:*:*:*:*:*", "cpeNameId": "AC26CE14-E5B3-4159-805B-6EC9D9B37D83"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.16:*:*:*:*:*:*:*", "cpeNameId": "544C971D-5F36-423D-AB36-E217BE202DB8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.17:*:*:*:*:*:*:*", "cpeNameId": "2A58FEF7-CB40-428A-806B-BE0B32BBB723"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.18:*:*:*:*:*:*:*", "cpeNameId": "7FBBF4E8-6F44-4592-8069-C21668D738E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.19:*:*:*:*:*:*:*", "cpeNameId": "CA37F5FB-5C02-45F3-B7B7-1F56F552B120"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.20:*:*:*:*:*:*:*", "cpeNameId": "83FC3AB5-576E-489E-A697-0865FE9D7439"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.62:*:*:*:*:*:*:*", "cpeNameId": "AC968C04-563B-44E7-A323-6CF404B73D4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:-:*:*:*:*:*:*", "cpeNameId": "805B659E-0A6A-4EDE-9E81-F83A30B3264A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*", "cpeNameId": "A87C09DD-69B1-4CA9-8AE6-3DBF4DF3F11D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*", "cpeNameId": "8F54EDC5-48AB-4577-8C36-660DC7D71454"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:rc3:*:*:*:*:*:*", "cpeNameId": "BA251D8D-4559-451C-9974-E9C6B8087A08"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:rc4:*:*:*:*:*:*", "cpeNameId": "75F94F87-13C3-44A6-80AF-C0C5C599E2A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:rc5:*:*:*:*:*:*", "cpeNameId": "CB671C15-924A-43CA-91DB-1D9FA9D0CC25"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:rc6:*:*:*:*:*:*", "cpeNameId": "A9B040E0-4FFC-4F00-ADB0-5AC01F8F04ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:rc7:*:*:*:*:*:*", "cpeNameId": "EC464421-E417-4360-86C8-511D0221DCF2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:rc8:*:*:*:*:*:*", "cpeNameId": "B3CC3FB2-843F-4B86-86B3-D72EEFBA33FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.1:*:*:*:*:*:*:*", "cpeNameId": "E3D26A37-A963-4501-AD97-1E252FA7A48E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.2:*:*:*:*:*:*:*", "cpeNameId": "7B9C1788-8178-4BDD-8547-0B3193B030A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.3:*:*:*:*:*:*:*", "cpeNameId": "C4DE0AAD-9698-4ADE-A59B-3A730D1B10C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.4:*:*:*:*:*:*:*", "cpeNameId": "EA1887EA-7FF5-4222-B72B-F17A05C0B035"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.5:*:*:*:*:*:*:*", "cpeNameId": "662B2A28-A112-4710-A201-3017CBD3FC8F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.6:*:*:*:*:*:*:*", "cpeNameId": "77EB0841-4431-4A1E-A99F-ACE36FC6FE50"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.7:*:*:*:*:*:*:*", "cpeNameId": "F2EA9343-31D9-42B5-B7DB-D7DDDE92F4F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.8:*:*:*:*:*:*:*", "cpeNameId": "31AD3C06-0526-4470-BC59-67D196013B43"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.9:*:*:*:*:*:*:*", "cpeNameId": "D3C822DE-EC22-4C9B-9AA7-C084613C6FF9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.10:*:*:*:*:*:*:*", "cpeNameId": "4CE524CA-B05D-4C9E-B81A-1937E7FFE6DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.11:*:*:*:*:*:*:*", "cpeNameId": "234E800C-A082-4960-BA0D-975F256DDD4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.12:*:*:*:*:*:*:*", "cpeNameId": "878DE0B7-411C-4C58-B753-C6D22E664553"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.13:*:*:*:*:*:*:*", "cpeNameId": "996D982B-11AA-4504-A9CD-8787C813BFBD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.14:*:*:*:*:*:*:*", "cpeNameId": "5E2AEB31-D1FD-4E9D-9CA9-0F9457674EA9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.15:*:*:*:*:*:*:*", "cpeNameId": "2C08D207-8B50-400F-9807-FB3072AD4E6A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:-:*:*:*:*:*:*", "cpeNameId": "0FD8602E-5D63-49B5-AB56-CB2948250E45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:rc1:*:*:*:*:*:*", "cpeNameId": "1DECE9B9-E9A2-4045-BD0B-C6510F69937D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:rc2:*:*:*:*:*:*", "cpeNameId": "EE2606B9-AA8F-4D28-8575-7AD825CAD250"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:rc3:*:*:*:*:*:*", "cpeNameId": "BC668967-571A-466D-8C69-9495260D3BBD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:rc4:*:*:*:*:*:*", "cpeNameId": "FD9CE501-B79F-4899-A816-149019C673E4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:rc5:*:*:*:*:*:*", "cpeNameId": "2E4EE9B2-FC64-4E7E-9757-5109B02E0AAF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:rc6:*:*:*:*:*:*", "cpeNameId": "D5A2141A-53D1-4E5B-B7C7-4FB179F6F219"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:rc7:*:*:*:*:*:*", "cpeNameId": "CF8E007E-9F74-4780-A09E-D101B3076FDF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:rc9:*:*:*:*:*:*", "cpeNameId": "E38067B2-E041-45F1-8A88-DE716AEDC5A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.1:*:*:*:*:*:*:*", "cpeNameId": "5EE504EE-64C4-4361-86B4-E5A7BD65776C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.2:*:*:*:*:*:*:*", "cpeNameId": "787215C4-0507-4760-BF1F-2A8491B66E4F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.3:*:*:*:*:*:*:*", "cpeNameId": "D2A628F1-1878-4C0B-87E6-B21A7CE382D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.4:*:*:*:*:*:*:*", "cpeNameId": "4890EDC3-B4E8-4CD2-AC95-A9DB9CB74FBF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.5:*:*:*:*:*:*:*", "cpeNameId": "BAA68B22-F0BC-45AD-A350-E8774FC53150"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.6:*:*:*:*:*:*:*", "cpeNameId": "C27B6005-D7EB-47DE-B01C-D5BD2B818D3A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.7:*:*:*:*:*:*:*", "cpeNameId": "89AE071D-DFF0-40A5-B7CE-BA33F9FCC5E7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.8:*:*:*:*:*:*:*", "cpeNameId": "F32F879F-B0ED-4F85-B1AD-A45D6DE80D86"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.9:*:*:*:*:*:*:*", "cpeNameId": "AE86A00C-455A-4075-9AC6-714B1F66D934"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.10:*:*:*:*:*:*:*", "cpeNameId": "704396EF-097A-4DFF-8DAE-4B19965C49AF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.11:*:*:*:*:*:*:*", "cpeNameId": "5CFE2D2B-62BD-448C-B0D4-5F7A9B8AB669"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.12:*:*:*:*:*:*:*", "cpeNameId": "F9A857D7-99FC-4761-B4DF-76E758BDE2BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.13:*:*:*:*:*:*:*", "cpeNameId": "A2A3B308-1BA2-4C79-88AF-861CE6482E28"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.14:*:*:*:*:*:*:*", "cpeNameId": "534CA992-2337-4EA8-B1F7-256574B35175"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.15:*:*:*:*:*:*:*", "cpeNameId": "2074E50B-BBEE-4902-B9F2-24E1B862076E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.16:*:*:*:*:*:*:*", "cpeNameId": "D2A2905E-45CE-4135-8D5D-0FF92766109E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.17:*:*:*:*:*:*:*", "cpeNameId": "4794F12E-3EDA-4619-BBB0-E275E1F06710"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.18:*:*:*:*:*:*:*", "cpeNameId": "17C90012-A0AA-459E-946A-B3C82983B22B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.19:*:*:*:*:*:*:*", "cpeNameId": "222B7748-23E3-4A4D-B9D5-4C5A6D5B2AEF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:-:*:*:*:*:*:*", "cpeNameId": "A7C04E0A-EF2B-426E-8AFE-CDFB04C2EE00"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*", "cpeNameId": "91317E86-8C24-4B48-BD6D-8EF732A881D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*", "cpeNameId": "4D6C0AAC-C284-42AB-8F4E-E54D5294D180"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*", "cpeNameId": "08BCB0AD-FBD2-4A2B-B8AE-9733E31BA02A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*", "cpeNameId": "5EC4698A-FD3A-4387-B636-810BCCBE2F15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*", "cpeNameId": "6FBD2340-901D-4CE1-BA59-55C77404D099"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*", "cpeNameId": "009D67E0-1C71-4212-BE27-834E15E8112B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*", "cpeNameId": "9294C90D-628E-44F8-B196-9ADEF3B72C89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:rc8:*:*:*:*:*:*", "cpeNameId": "1EF80A31-F9CD-4870-9F50-F71C1D3F4DC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.1:*:*:*:*:*:*:*", "cpeNameId": "3409D2C8-FB81-4CE9-9B26-677FAAD94F42"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.2:*:*:*:*:*:*:*", "cpeNameId": "0B80A369-7E22-4E25-8D33-298AD0B23074"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.3:*:*:*:*:*:*:*", "cpeNameId": "9E737761-792A-4225-9385-3EBF3CBBBA81"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.4:*:*:*:*:*:*:*", "cpeNameId": "5435810C-35B3-4401-9434-7EE8DE82604B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.5:*:*:*:*:*:*:*", "cpeNameId": "937FA107-2C1F-4AF8-955A-66F90A3DBB9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.6:*:*:*:*:*:*:*", "cpeNameId": "DD0D3175-C807-4197-BC7D-3737DEB5602D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.7:*:*:*:*:*:*:*", "cpeNameId": "A60E3F91-9293-4B3E-98E9-0D11D1942C1B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.8:*:*:*:*:*:*:*", "cpeNameId": "1A2B6F42-AF1B-473E-8033-83C73609D4E4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.9:*:*:*:*:*:*:*", "cpeNameId": "7664EA3B-7AD2-46EC-92EF-552091071A5F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.10:*:*:*:*:*:*:*", "cpeNameId": "93A56D61-5B65-4D74-ABEF-766372AF7AA0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.11:*:*:*:*:*:*:*", "cpeNameId": "C9534805-84C6-45B9-86BF-7D05E4136C96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.12:*:*:*:*:*:*:*", "cpeNameId": "DE9B1782-E79B-4EF2-8CDB-3D24CF153AC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.13:*:*:*:*:*:*:*", "cpeNameId": "BC90F145-D85D-4388-A4F8-2151884F1663"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.14:*:*:*:*:*:*:*", "cpeNameId": "C0BCABF8-19C2-4B49-9A49-EF7128C5B8B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.15:*:*:*:*:*:*:*", "cpeNameId": "88BDA49D-7A90-40EB-B71E-A570891B9EE6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.16:*:*:*:*:*:*:*", "cpeNameId": "9C3D06BA-AF02-4FFD-AE35-347B04643683"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.17:*:*:*:*:*:*:*", "cpeNameId": "124836C8-7921-4BFE-A64C-AE9F640C9130"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0:-:*:*:*:*:*:*", "cpeNameId": "3A2B23AB-CBA1-42BB-8FA6-C64C95B4FFC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:*", "cpeNameId": "28304135-D881-4B0E-B7C6-826D7CA6F1CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0:rc2:*:*:*:*:*:*", "cpeNameId": "80E35649-C2A2-423F-93D6-8DA4F6A8B4E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0:rc3:*:*:*:*:*:*", "cpeNameId": "D7F3713F-F696-4D43-80A5-98433FA9F02D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0:rc4:*:*:*:*:*:*", "cpeNameId": "C16C9B3F-BD8C-4404-B51D-91856734622D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0:rc5:*:*:*:*:*:*", "cpeNameId": "453F7A7A-15F4-4D21-B85B-6C1DE66FF9F4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0:rc6:*:*:*:*:*:*", "cpeNameId": "42BE5475-0D59-4599-AC53-94A247DA277C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0:rc7:*:*:*:*:*:*", "cpeNameId": "9F921345-A999-4E40-9F3F-4F009C78FBAE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.1:*:*:*:*:*:*:*", "cpeNameId": "DA897396-3BC0-4AC4-B42D-98475AAEFDB1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.2:*:*:*:*:*:*:*", "cpeNameId": "EAFB7D30-6006-44B3-9687-77CBE235323A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.3:*:*:*:*:*:*:*", "cpeNameId": "09573A93-AEDE-4BBA-88F3-6F5CC94F2EE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.4:*:*:*:*:*:*:*", "cpeNameId": "DA0AA4FE-4C59-448A-88DC-C8A8EAF513E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.5:*:*:*:*:*:*:*", "cpeNameId": "C8D96C96-4D7D-4FA4-9CEA-660BF39FC1D7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.6:*:*:*:*:*:*:*", "cpeNameId": "C978C4EF-7AF5-4AA8-BD1D-954E9D7476AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.7:*:*:*:*:*:*:*", "cpeNameId": "70248903-1B6E-43D3-963F-9CCA75253E2A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.8:*:*:*:*:*:*:*", "cpeNameId": "22375451-92E0-4690-B7C4-82B63F7F54AA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.9:*:*:*:*:*:*:*", "cpeNameId": "792202AB-6A0E-491B-87FC-3F98835781A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.10:*:*:*:*:*:*:*", "cpeNameId": "FF48867C-F23F-4340-96AC-8C40D01A93A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.11:*:*:*:*:*:*:*", "cpeNameId": "E8A33859-F785-4E67-83D6-3304A2AC8F1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.12:*:*:*:*:*:*:*", "cpeNameId": "BBCB0428-C568-4F4B-8069-BFC5DE18BA66"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.13:*:*:*:*:*:*:*", "cpeNameId": "785980A5-8FCC-4DEB-8C31-6B66B3F2ED06"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.14:*:*:*:*:*:*:*", "cpeNameId": "3D9CF1CA-591F-4D6B-835F-71E494855265"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.15:*:*:*:*:*:*:*", "cpeNameId": "3DB8BB3F-8384-49A3-9B5C-0C812B669916"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.16:*:*:*:*:*:*:*", "cpeNameId": "97B95EF5-6328-416C-A983-BAD4DB8178EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.17:*:*:*:*:*:*:*", "cpeNameId": "5D22785E-D725-46B7-83E8-9AA3F1B1EE61"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.18:*:*:*:*:*:*:*", "cpeNameId": "F5B47278-06DD-4334-BEAA-82D99836E0CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.19:*:*:*:*:*:*:*", "cpeNameId": "2D6FBBDE-1828-44E5-AE5B-0844E49DD7DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:-:*:*:*:*:*:*", "cpeNameId": "E1B09DBA-878F-4B52-AE09-74B0B8F5D68F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*", "cpeNameId": "30EC2354-B32A-44E9-9861-CEA7D545DFBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*", "cpeNameId": "BFAC13C0-7539-40DF-B674-4ECCA1868626"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*", "cpeNameId": "585AB024-3F59-4BDB-A302-D224DF5D8495"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*", "cpeNameId": "4A21513E-7139-44E5-88E8-9B991661CF3C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*", "cpeNameId": "8D834469-69DF-4937-AFF3-A0B90AB70455"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*", "cpeNameId": "25204659-6277-44F6-B75E-69B25412BE26"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*", "cpeNameId": "79676ADB-9CD8-4734-9FBF-13CA081A2193"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:rc8:*:*:*:*:*:*", "cpeNameId": "80492410-4FE5-4C8B-897C-243E42C03469"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.1:*:*:*:*:*:*:*", "cpeNameId": "3C595643-58A0-402D-8A1A-E2148719F38F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.2:*:*:*:*:*:*:*", "cpeNameId": "5F145B48-D5DB-4B52-ABDC-41BAACF04213"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.3:*:*:*:*:*:*:*", "cpeNameId": "59A7EC30-0E14-45EE-A5DA-9D98F4793E93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.4:*:*:*:*:*:*:*", "cpeNameId": "28AD2EF2-9A1F-4C90-A938-33E394A94615"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.5:*:*:*:*:*:*:*", "cpeNameId": "37B29EC5-AB56-4407-871C-6AF5177AE78F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.6:*:*:*:*:*:*:*", "cpeNameId": "76D2F6EA-F7DC-413B-85EC-C8B7916DCD0C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.7:*:*:*:*:*:*:*", "cpeNameId": "3E05D19C-FFAF-44BC-B9CB-D7054765D6D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.8:*:*:*:*:*:*:*", "cpeNameId": "9625E836-75C2-4337-BAA1-70F3958C06CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.9:*:*:*:*:*:*:*", "cpeNameId": "492A02F0-DBF7-40C0-9CD6-AFADC763E814"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.10:*:*:*:*:*:*:*", "cpeNameId": "9A0A4990-A036-4290-AD79-B7531545BA07"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.11:*:*:*:*:*:*:*", "cpeNameId": "5FDD9C37-5F34-43FE-98FA-3D3D7ED73B6F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.12:*:*:*:*:*:*:*", "cpeNameId": "54D136A5-6D3A-4CF8-8ECD-0A4B3345ED61"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.13:*:*:*:*:*:*:*", "cpeNameId": "A1D987CD-234D-48E5-BC87-D5BDAB19AD8D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.14:*:*:*:*:*:*:*", "cpeNameId": "51407BCD-81B8-4C16-9246-F7AC5E654783"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.15:*:*:*:*:*:*:*", "cpeNameId": "E0851513-6D8C-45D5-AA02-1A897F200C76"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.16:*:*:*:*:*:*:*", "cpeNameId": "FBCFC7A2-8E0C-400E-9903-F88E27BC6692"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.17:*:*:*:*:*:*:*", "cpeNameId": "D83234B0-70C7-49E3-B041-458A4388E5F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.18:*:*:*:*:*:*:*", "cpeNameId": "7BFD121A-9AAE-4FA4-B4BB-79BCFC945942"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.19:*:*:*:*:*:*:*", "cpeNameId": "5CEF4F40-C180-4D35-BFBE-CE813D0DB03A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.20:*:*:*:*:*:*:*", "cpeNameId": "8629FDD2-5ACC-47D6-A355-161F5C9E9DE2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.21:*:*:*:*:*:*:*", "cpeNameId": "5FAA107F-2A9C-4F4A-ADB6-BDE37B733B3A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.22:*:*:*:*:*:*:*", "cpeNameId": "8425DCE9-412B-439B-BCFA-0296FCF4AC3B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.23:*:*:*:*:*:*:*", "cpeNameId": "2CAA00B8-15FB-49C3-8D03-4EAC237C0C30"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.24:*:*:*:*:*:*:*", "cpeNameId": "55BE846B-6D72-4890-A345-41A221706A91"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.25:*:*:*:*:*:*:*", "cpeNameId": "6E8595D6-1B26-48C0-8BB5-7AA9956DA2EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.26:*:*:*:*:*:*:*", "cpeNameId": "579C1BAF-C0BD-4A23-8220-878509BD4041"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.27:*:*:*:*:*:*:*", "cpeNameId": "918EEE53-3E32-4088-A31F-7706A0658354"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.28:*:*:*:*:*:*:*", "cpeNameId": "E5894A09-16F4-4390-9756-7B55B730A5C7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.29:*:*:*:*:*:*:*", "cpeNameId": "4A87BD1D-E5CA-4D1E-BC1C-866333AC8B70"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.30:*:*:*:*:*:*:*", "cpeNameId": "EA84BB70-A3D7-488F-B591-6F660E5F72D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.31:*:*:*:*:*:*:*", "cpeNameId": "099FB693-8DF2-40B8-987C-638A2B85F830"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.32:*:*:*:*:*:*:*", "cpeNameId": "5A2E5E92-E0A5-4B86-979F-C06CBC9AF59E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.33:*:*:*:*:*:*:*", "cpeNameId": "4D00786A-3089-4F53-9833-D854D82A886A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.34:*:*:*:*:*:*:*", "cpeNameId": "394E558D-3CCA-4443-81A4-464D00F1796F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.35:*:*:*:*:*:*:*", "cpeNameId": "244B5E4B-3CCC-469E-BC89-424CC37562E5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.36:*:*:*:*:*:*:*", "cpeNameId": "A25A0D88-A1D0-44DD-9C59-0EC251F83B79"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.37:*:*:*:*:*:*:*", "cpeNameId": "FFD0F957-52D3-47DB-9B9B-9D40AB55A9E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.38:*:*:*:*:*:*:*", "cpeNameId": "A7384483-B54D-422E-BD1C-47B466DF7808"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.39:*:*:*:*:*:*:*", "cpeNameId": "BD0A672F-9FD5-470F-91C8-77E96F4B3741"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.40:*:*:*:*:*:*:*", "cpeNameId": "29E4B4C2-838C-48BD-B509-576D1E26C738"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.41:*:*:*:*:*:*:*", "cpeNameId": "C139FA8B-93DA-4053-B303-A3C1DC1382FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.42:*:*:*:*:*:*:*", "cpeNameId": "BF0F83BA-BD56-4364-B55F-EE486FFD9897"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.43:*:*:*:*:*:*:*", "cpeNameId": "37F54B64-6DB3-410B-9795-F9468CCD37D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.44:*:*:*:*:*:*:*", "cpeNameId": "A2813E22-3300-4145-9AF5-091D4FB91EDE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.45:*:*:*:*:*:*:*", "cpeNameId": "E862B1DC-542D-4E20-BEDE-89AC2B3B5D7F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.46:*:*:*:*:*:*:*", "cpeNameId": "940E4409-174B-45E7-B73A-69D72C14D42E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.47:*:*:*:*:*:*:*", "cpeNameId": "2E917523-B369-4B0C-B2FE-330ABAF30D9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.48:*:*:*:*:*:*:*", "cpeNameId": "7AE6B80A-97F9-46E1-91BF-10C5CFE9F291"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.49:*:*:*:*:*:*:*", "cpeNameId": "6C3E0D45-EDD1-48D6-B60C-99C23C609BB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.50:*:*:*:*:*:*:*", "cpeNameId": "3DB32BBC-2AFB-4C81-AB59-6F8C3BA243E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.51:*:*:*:*:*:*:*", "cpeNameId": "5AC8AA4E-C62F-4E70-9E99-6FDC429D2E4E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.52:*:*:*:*:*:*:*", "cpeNameId": "D833500B-5B7B-4D77-980F-A92A0E26CE6B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.53:*:*:*:*:*:*:*", "cpeNameId": "19E0C2D7-36FA-461C-B763-F0B8DBF346A7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.54:*:*:*:*:*:*:*", "cpeNameId": "CD384F60-5A3F-4B0C-A5A2-3ECEA68BB813"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.55:*:*:*:*:*:*:*", "cpeNameId": "768733C9-E2A4-4C01-8956-5FB868E592E3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.56:*:*:*:*:*:*:*", "cpeNameId": "0FC6F402-E917-4E7F-8D83-3D22EF171CAB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.57:*:*:*:*:*:*:*", "cpeNameId": "E8BCDBFF-F548-45B0-9AF9-3FB4B1E38539"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.58:*:*:*:*:*:*:*", "cpeNameId": "E8B92EC7-BB1E-4A65-A431-3125DA3DF1DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.59:*:*:*:*:*:*:*", "cpeNameId": "5C514FE3-ED8D-4DEA-874A-4B61A7578749"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.60:*:*:*:*:*:*:*", "cpeNameId": "215F5625-C874-4841-82C5-AE4A9E6ED912"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.61:*:*:*:*:*:*:*", "cpeNameId": "764780E0-FF24-42A3-A99B-CE11CB846C95"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.62:*:*:*:*:*:*:*", "cpeNameId": "5C2774B8-AF4C-4A7B-BBF4-9516ABF4B4E9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.63:*:*:*:*:*:*:*", "cpeNameId": "BC276565-052E-41EF-9F0F-7ECD9D9678BE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.64:*:*:*:*:*:*:*", "cpeNameId": "DB256AAF-90E8-463A-8C21-D57CC6368D0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.65:*:*:*:*:*:*:*", "cpeNameId": "C9A9E342-DEBC-44E6-82F3-3CCBCBD1F565"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.66:*:*:*:*:*:*:*", "cpeNameId": "68B83B2F-DA58-4442-A4E4-5EFBD7DA2E64"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.67:*:*:*:*:*:*:*", "cpeNameId": "FBD55969-6EB5-4ED7-AD05-1D03D728B999"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.68:*:*:*:*:*:*:*", "cpeNameId": "5A5B47CF-90B7-4BEF-B5AE-EE4FED51E095"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.69:*:*:*:*:*:*:*", "cpeNameId": "0ADD17CA-B3B5-4F53-B4F4-ED079642A461"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.70:*:*:*:*:*:*:*", "cpeNameId": "6F29E18D-63C6-4544-A0E7-92F17EB3ACFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.71:*:*:*:*:*:*:*", "cpeNameId": "A7455D5B-D8E2-4CBE-BF3D-D3CF1A6004FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.72:*:*:*:*:*:*:*", "cpeNameId": "91A1363B-FA51-4A72-AD5E-3784118C73E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.73:*:*:*:*:*:*:*", "cpeNameId": "7C1AD665-9759-452D-86AA-C903E4225BA7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.74:*:*:*:*:*:*:*", "cpeNameId": "7058C57F-5141-4FAC-932A-BDDF0F20C78A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.75:*:*:*:*:*:*:*", "cpeNameId": "2F7FAD3F-6381-42EE-B130-D942FAC1AED0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.76:*:*:*:*:*:*:*", "cpeNameId": "4F7988C5-FA25-4C7C-B0DC-5C084A8CA6DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.77:*:*:*:*:*:*:*", "cpeNameId": "9F7ABB2D-A627-40C5-BC86-9BC9BBBEDBB9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.78:*:*:*:*:*:*:*", "cpeNameId": "71DE43EB-3996-47C3-963A-B93C9E6C6142"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.79:*:*:*:*:*:*:*", "cpeNameId": "191F54D4-44BC-49D5-8FB9-5DFFD648B9F7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.80:*:*:*:*:*:*:*", "cpeNameId": "14B574EE-69F8-4E87-9017-91CBFDAEC743"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.81:*:*:*:*:*:*:*", "cpeNameId": "94E966D4-1DB0-4695-98DA-A28CB90D32EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.82:*:*:*:*:*:*:*", "cpeNameId": "8D92799A-0542-4509-923F-6006E116D1BE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.83:*:*:*:*:*:*:*", "cpeNameId": "C2EF5D53-F86A-4D8A-AB79-DD6491B257F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.84:*:*:*:*:*:*:*", "cpeNameId": "61BB8657-3718-4355-BAA8-92F84B14D1A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.85:*:*:*:*:*:*:*", "cpeNameId": "A599E08D-FD19-4E86-A335-C107B0C6CB0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.86:*:*:*:*:*:*:*", "cpeNameId": "324E1D15-3D11-4683-9B0A-D3BA95E6B7C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.87:*:*:*:*:*:*:*", "cpeNameId": "D320A094-647B-4DC5-83FB-BC79A60AAE61"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.88:*:*:*:*:*:*:*", "cpeNameId": "407DC4FD-0E42-48C0-8A16-07F5CB7F308F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.89:*:*:*:*:*:*:*", "cpeNameId": "2DCEF9A6-CB07-404E-ADCC-E2BD0F69354D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.90:*:*:*:*:*:*:*", "cpeNameId": "CD2E5E6E-F436-4447-BB45-4CA1EBCC1F0F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.91:*:*:*:*:*:*:*", "cpeNameId": "D5909F53-54F8-4E30-87B2-E5B74AEEF668"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.92:*:*:*:*:*:*:*", "cpeNameId": "825880D5-240B-4E5E-88D7-9FBE9377D725"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.93:*:*:*:*:*:*:*", "cpeNameId": "C34961F8-366C-44F9-884F-D95ED75D74E9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.94:*:*:*:*:*:*:*", "cpeNameId": "49338264-F467-4F72-851C-41E72F2E8849"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.95:*:*:*:*:*:*:*", "cpeNameId": "D583DD92-8DB8-4D08-8F84-FEACBF885E5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.96:*:*:*:*:*:*:*", "cpeNameId": "ABD92EA7-61F0-4324-AD60-18A4A9E0345B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.97:*:*:*:*:*:*:*", "cpeNameId": "9CA68F01-482D-4C81-9FAF-8FCB3F4EB631"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.98:*:*:*:*:*:*:*", "cpeNameId": "DB87B10B-0B00-43E6-9712-B7749C08C5B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.99:*:*:*:*:*:*:*", "cpeNameId": "FA3EF181-E416-4607-B59D-A6CEA2D95875"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.100:*:*:*:*:*:*:*", "cpeNameId": "92234FA1-8B41-45EB-BADB-32779B7E4E3C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.101:*:*:*:*:*:*:*", "cpeNameId": "2965F5F4-6322-4A74-BE47-C1E4FF4E4BB3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.102:*:*:*:*:*:*:*", "cpeNameId": "D936A06E-46B7-44F1-AEA1-6C899F68E2DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.103:*:*:*:*:*:*:*", "cpeNameId": "C3564FF2-0B2D-42BF-AA29-3AAF57DF9D0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.104:*:*:*:*:*:*:*", "cpeNameId": "CEF383F0-D9F1-4948-B102-C491944BECBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.105:*:*:*:*:*:*:*", "cpeNameId": "BC26835E-2E39-465E-B48C-E871C740CB06"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.106:*:*:*:*:*:*:*", "cpeNameId": "2142A9D9-E547-4FE9-BDA3-B7B27D3CEF4D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.107:*:*:*:*:*:*:*", "cpeNameId": "9F7EB5C3-3C76-4816-BB64-A0D47A8FF148"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.108:*:*:*:*:*:*:*", "cpeNameId": "A0B4BCED-0919-484E-B64A-2D6F944128BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.109:*:*:*:*:*:*:*", "cpeNameId": "14C4B1A8-4457-4620-A2F4-A7BAAB479E01"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.110:*:*:*:*:*:*:*", "cpeNameId": "08F57941-7A99-4F2F-982B-54B72CA90ECA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.111:*:*:*:*:*:*:*", "cpeNameId": "F75C660D-8C20-4B05-BAB3-2D3BEF6EBC9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.112:*:*:*:*:*:*:*", "cpeNameId": "82BF8B3E-D66C-40EF-B175-1E5A2466D997"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.113:*:*:*:*:*:*:*", "cpeNameId": "CF72EDAE-B29A-4A22-BF70-8FD89123C957"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.114:*:*:*:*:*:*:*", "cpeNameId": "86E6F51B-573A-4DB5-99FA-BB89A65DD613"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.115:*:*:*:*:*:*:*", "cpeNameId": "63567DC6-8639-44B7-BDBC-C600977ECD7C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.116:*:*:*:*:*:*:*", "cpeNameId": "7A6E8D0B-1EF6-4080-A3AD-45CD2B6C35AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.117:*:*:*:*:*:*:*", "cpeNameId": "AD8652AE-1F37-43B4-BC34-39F852FD3301"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.119:*:*:*:*:*:*:*", "cpeNameId": "3E564E16-38CA-428F-98CC-5F14B13A30CB"}]}} \ No newline at end of file diff --git a/cpematch/32/3286F488-B374-4E10-896A-D99D494BC5A6.json b/cpematch/32/3286F488-B374-4E10-896A-D99D494BC5A6.json new file mode 100644 index 00000000000..b1fc946b09c --- /dev/null +++ b/cpematch/32/3286F488-B374-4E10-896A-D99D494BC5A6.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "3286F488-B374-4E10-896A-D99D494BC5A6", "criteria": "cpe:2.3:o:qualcomm:auto_4g_modem_firmware:-:*:*:*:*:*:*:*", "lastModified": "2025-01-09T16:10:57.697", "cpeLastModified": "2025-01-09T16:10:57.697", "created": "2025-01-09T16:10:57.697", "status": "Active"}} \ No newline at end of file diff --git a/cpematch/4C/4CC2DFED-5A7B-4414-87E1-E40C35AEDD2C.json b/cpematch/4C/4CC2DFED-5A7B-4414-87E1-E40C35AEDD2C.json new file mode 100644 index 00000000000..13c918ffcf3 --- /dev/null +++ b/cpematch/4C/4CC2DFED-5A7B-4414-87E1-E40C35AEDD2C.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "4CC2DFED-5A7B-4414-87E1-E40C35AEDD2C", "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.7", "versionEndIncluding": "6.12.4", "lastModified": "2025-01-09T16:22:45.070", "cpeLastModified": "2025-01-09T16:22:45.070", "created": "2025-01-09T16:22:45.070", "status": "Active", "matches": [{"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7:-:*:*:*:*:*:*", "cpeNameId": "4F926A3F-EB69-4BA1-AA4D-89B4903AD53F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7:rc1:*:*:*:*:*:*", "cpeNameId": "E301E056-7928-4B81-A234-0C98F1236B85"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7:rc2:*:*:*:*:*:*", "cpeNameId": "43F3365E-C0C9-42BB-A915-34D7CBAB2DE0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7:rc3:*:*:*:*:*:*", "cpeNameId": "6DDBF4C8-7B8C-467B-9104-2A989321C78E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7:rc4:*:*:*:*:*:*", "cpeNameId": "B4BCF1CB-0208-4238-B258-5DE577FD9AD0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7:rc5:*:*:*:*:*:*", "cpeNameId": "E77625F8-8FB2-47ED-A9AD-F48005174C68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7:rc6:*:*:*:*:*:*", "cpeNameId": "6427DFBE-9CCC-4896-B0AE-F10BD5DBD126"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7:rc7:*:*:*:*:*:*", "cpeNameId": "1F6E6827-E8F8-41C3-992F-83481DEFA2B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7:rc8:*:*:*:*:*:*", "cpeNameId": "BF3EC0AD-6CD0-4473-A92A-9518DA968EF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7.1:*:*:*:*:*:*:*", "cpeNameId": "79D7ED41-5643-4D99-844C-9B043F32C448"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7.2:*:*:*:*:*:*:*", "cpeNameId": "C1ED5E3D-9AAE-49B9-AD5C-F67E5C2DED13"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7.3:*:*:*:*:*:*:*", "cpeNameId": "3F765E52-7235-45D2-9F5E-54A331DF8D5C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7.4:*:*:*:*:*:*:*", "cpeNameId": "1F5BBEFA-0A0E-41CF-ADCC-8F47EBCDB55C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7.5:*:*:*:*:*:*:*", "cpeNameId": "DBB2E8B7-C426-42F9-AA3C-49137FA9181F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7.6:*:*:*:*:*:*:*", "cpeNameId": "AE81517A-1398-4CBE-B09E-B7E4FE991601"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7.7:*:*:*:*:*:*:*", "cpeNameId": "9CC4542A-A669-4661-B058-053C2A9B7D13"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7.8:*:*:*:*:*:*:*", "cpeNameId": "E8303407-A959-458E-8957-F229F1DC34DE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7.9:*:*:*:*:*:*:*", "cpeNameId": "2378F7C0-BE31-4C41-B6F0-F5A488DD59DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7.10:*:*:*:*:*:*:*", "cpeNameId": "1C8BC43E-8B04-48EB-BDB9-B6F3AEDED204"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7.11:*:*:*:*:*:*:*", "cpeNameId": "0AD54002-D38C-49E2-9D46-7862AC5E7EA7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7.12:*:*:*:*:*:*:*", "cpeNameId": "5D166373-D54C-40CD-846C-A0DE746BABBC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8:-:*:*:*:*:*:*", "cpeNameId": "E606D576-BCBB-484B-8F66-5D5EC7155998"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", "cpeNameId": "13DF8AF0-B00A-49F7-AA57-0800C102A3D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", "cpeNameId": "8104072A-D502-4FAA-B807-F029C7B49CCC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", "cpeNameId": "6E7613C9-9ED8-4B71-83E6-5464BF413555"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*", "cpeNameId": "31A56C8B-CC28-40D1-9B52-92A6E0C2BEC0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*", "cpeNameId": "9276C1E8-4FB4-44B0-86BF-B3510326B189"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*", "cpeNameId": "CE634D04-E4EA-451A-B849-91406DF4B55B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8.1:*:*:*:*:*:*:*", "cpeNameId": "7FB18F84-7509-49E5-8B57-DDCD7A4FFD54"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8.2:*:*:*:*:*:*:*", "cpeNameId": "668323DC-447E-419D-8E2E-328DABEFC77C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8.3:*:*:*:*:*:*:*", "cpeNameId": "2492ED49-34F3-4332-BF22-89C19C630B9E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8.4:*:*:*:*:*:*:*", "cpeNameId": "726617ED-6BBB-436F-BBC3-DEA9B9916623"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8.5:*:*:*:*:*:*:*", "cpeNameId": "5B4F2389-8891-4F37-AAC4-309514EE2AFC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8.6:*:*:*:*:*:*:*", "cpeNameId": "998736C2-6532-4B98-AB83-1BFB34798139"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8.7:*:*:*:*:*:*:*", "cpeNameId": "3F42568E-4784-41CB-9FF5-67C82CFBBA1A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8.8:*:*:*:*:*:*:*", "cpeNameId": "EC7097AC-D466-446F-83E2-9A7A39C5F78A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8.9:*:*:*:*:*:*:*", "cpeNameId": "F656AB16-669F-464E-9767-730CDC3CD068"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8.10:*:*:*:*:*:*:*", "cpeNameId": "DA233A76-2843-42F9-BE64-E161DCBE7084"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8.11:*:*:*:*:*:*:*", "cpeNameId": "D6510469-001B-4E1F-81C4-79B94BE9B631"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8.12:*:*:*:*:*:*:*", "cpeNameId": "9F9FA208-A38C-4DDF-A6B1-DB3D6896163A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9:-:*:*:*:*:*:*", "cpeNameId": "DA68273F-A1B2-4072-8039-969DEC83F8B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*", "cpeNameId": "AD3F7724-6BA5-4196-BE25-BB908AD79224"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*", "cpeNameId": "EB425DB1-B18B-49FE-A1CD-D37A614EF196"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*", "cpeNameId": "5556F80D-9910-4BA1-BD39-A05DB521656C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*", "cpeNameId": "91148A86-2F56-4A4E-A618-4BFF86878C22"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:*", "cpeNameId": "4A6F1927-BF21-4430-B3E8-9A36CCC1BF7C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9:rc6:*:*:*:*:*:*", "cpeNameId": "A339A401-1D13-456C-8A03-21E0510811E3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9:rc7:*:*:*:*:*:*", "cpeNameId": "31965EBF-6545-45F2-9E6A-003EBFA0699B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9.1:*:*:*:*:*:*:*", "cpeNameId": "5409332C-40D6-44A9-82A7-28DB593D9017"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9.2:*:*:*:*:*:*:*", "cpeNameId": "895B3D2B-E49B-4522-A022-912A981787D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9.3:*:*:*:*:*:*:*", "cpeNameId": "2173448B-A956-45AD-86C8-740858CF88A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9.4:*:*:*:*:*:*:*", "cpeNameId": "FE7FFD19-DA74-4E11-BFD0-76F8418FF08B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9.5:*:*:*:*:*:*:*", "cpeNameId": "FB05F5D5-C3C5-47DB-82AC-AFD388940242"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9.6:*:*:*:*:*:*:*", "cpeNameId": "70A85201-A04C-469F-A3E0-40BC86FE0B8B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9.7:*:*:*:*:*:*:*", "cpeNameId": "ABA04A00-B7AF-4E92-A00F-27AF9DD38F88"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9.8:*:*:*:*:*:*:*", "cpeNameId": "DAA9BE88-6890-4061-8D58-6FFD85083184"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9.9:*:*:*:*:*:*:*", "cpeNameId": "6BF442C2-3D11-45DB-BDC2-9BF6162441D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9.10:*:*:*:*:*:*:*", "cpeNameId": "51127D6B-DBBA-40F8-98D1-A2BC3207393E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9.11:*:*:*:*:*:*:*", "cpeNameId": "7B3B966A-8BE8-45DB-B90F-1712FB11B7F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9.12:*:*:*:*:*:*:*", "cpeNameId": "B72A7495-1D73-4DD9-B3B9-B5ABF72C0EBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10:-:*:*:*:*:*:*", "cpeNameId": "33286ABD-F4EA-4F52-ABAF-90E4F9A40DC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*", "cpeNameId": "E3646D55-E6C9-45FB-B1A0-BC0B03CF9E9B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*", "cpeNameId": "9290D3F5-3EB5-4F3D-BBCC-757366758235"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*", "cpeNameId": "2DDCD76C-E056-41A7-A529-49E6DAF202D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*", "cpeNameId": "0BE3BCC9-5B0E-4A89-B662-E06F539878A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:*", "cpeNameId": "1C1806B7-1B9B-4D3A-B320-F8F93D12CA76"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10:rc6:*:*:*:*:*:*", "cpeNameId": "BD2DAAE2-0295-4DEF-890E-00E509610C5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10:rc7:*:*:*:*:*:*", "cpeNameId": "E4A1F3E6-6C2B-4E6C-9905-C28050CD03F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10.0:rc1:*:*:*:*:*:*", "cpeNameId": "4B006DC1-D30B-4EBE-B103-7F2C1F283DEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10.0:rc2:*:*:*:*:*:*", "cpeNameId": "C467A3E6-50F3-4D61-BC58-8554E9B2FEDA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10.0:rc3:*:*:*:*:*:*", "cpeNameId": "92F85456-7188-43FB-BCC1-3FC42DB1AD04"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10.1:*:*:*:*:*:*:*", "cpeNameId": "9DC1C968-7D70-4D77-9C80-E924C5BDBFD0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10.2:*:*:*:*:*:*:*", "cpeNameId": "6505BF6C-7B1F-4AD2-919F-95E8424C5655"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10.3:*:*:*:*:*:*:*", "cpeNameId": "52ECC529-5C55-4BF7-A72D-BD5233038B5C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10.4:*:*:*:*:*:*:*", "cpeNameId": "3AE1E52D-645D-49E2-B912-03E29DA32345"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10.5:*:*:*:*:*:*:*", "cpeNameId": "5B55EAC3-7C40-4D75-B398-16B166F3FD22"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10.6:*:*:*:*:*:*:*", "cpeNameId": "7E932982-7E26-415F-844D-315F2F5C948C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10.7:*:*:*:*:*:*:*", "cpeNameId": "A6988850-5FA9-49D5-8590-E3A4EE102859"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10.8:*:*:*:*:*:*:*", "cpeNameId": "B57DB349-33DC-4330-BDE6-892DE85147F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10.9:*:*:*:*:*:*:*", "cpeNameId": "47155132-EA0F-464F-B64D-7D8471B01C43"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10.10:*:*:*:*:*:*:*", "cpeNameId": "74E57DC5-D464-44BB-847F-8E3243AB319C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10.11:*:*:*:*:*:*:*", "cpeNameId": "F02AECA0-B93A-43BB-B039-92CE60BE643E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10.12:*:*:*:*:*:*:*", "cpeNameId": "D7EE8EC1-EDE8-49B2-AF80-3546F7C9F97E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10.13:*:*:*:*:*:*:*", "cpeNameId": "E2625B6C-03BB-4290-885D-EF36C2928C0D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10.14:*:*:*:*:*:*:*", "cpeNameId": "9368FB15-B2E5-4EDF-AB92-CE69EB5A9B25"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11:-:*:*:*:*:*:*", "cpeNameId": "D9796FCF-DF1C-4C11-9B21-DE3E5FCDE51C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", "cpeNameId": "11452F50-843F-4849-B0DF-FE5BFDBF5453"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", "cpeNameId": "D6BCD8FE-1131-4209-84D9-C060130E9FB3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*", "cpeNameId": "1F11FBEB-C56C-4CD0-92A1-9D515CD37197"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*", "cpeNameId": "D40D5AD3-6A6D-4192-94C9-5722335A5D0A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*", "cpeNameId": "1E20CDB6-B75C-4C9F-9FC5-8FB8D78A5341"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11:rc6:*:*:*:*:*:*", "cpeNameId": "BB4EA85D-981C-4FFA-A580-B102DCD07F73"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11:rc7:*:*:*:*:*:*", "cpeNameId": "CEA79089-82F2-42AB-87CB-85E788963687"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11:rc8:*:*:*:*:*:*", "cpeNameId": "FAE3B2C5-55FA-4E79-B6E5-9C2DCC93CE9C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11.1:*:*:*:*:*:*:*", "cpeNameId": "2EA27B24-8931-41F5-A44A-5F16AD703E95"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11.2:*:*:*:*:*:*:*", "cpeNameId": "94AD59E6-37CA-47AF-A40F-714406474754"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11.3:*:*:*:*:*:*:*", "cpeNameId": "8EF7CFFD-5176-47EC-B832-6D82331D3C68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11.4:*:*:*:*:*:*:*", "cpeNameId": "F3799B44-911D-446D-94A2-0E539D056143"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11.5:*:*:*:*:*:*:*", "cpeNameId": "7686FD31-8647-4F3A-9C99-9AD107D11924"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11.6:*:*:*:*:*:*:*", "cpeNameId": "F1DE77FC-8E60-4D63-B18E-B7BA79940CB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11.7:*:*:*:*:*:*:*", "cpeNameId": "9B065310-1D5F-44FA-A4C6-EC5749CF61B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11.8:*:*:*:*:*:*:*", "cpeNameId": "C3E26A1B-B3C5-4AE9-96EC-602DA39F49AA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11.10:*:*:*:*:*:*:*", "cpeNameId": "7E44ECC0-C3DF-41FB-A0DD-06945D8D465A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.12:-:*:*:*:*:*:*", "cpeNameId": "A6E24F28-F074-43F4-82D4-E576BF65E7E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", "cpeNameId": "FB19590B-8DC8-4AE8-9275-41B707178E02"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", "cpeNameId": "50D3D00F-E837-4BDE-8B6C-7CF51830A090"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*", "cpeNameId": "57179203-7A5D-490F-A8CF-4C4741F7497B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*", "cpeNameId": "EDE41C0D-4AB2-4CA6-B3C5-C095ED1CC4F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*", "cpeNameId": "A57E7724-0F01-442E-8E3B-40D312BEA8FF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*", "cpeNameId": "A13E0435-FB89-490C-AE2A-7CDDA505D96D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.12:rc7:*:*:*:*:*:*", "cpeNameId": "49B7D7EE-C6BD-441E-89B8-7B58C8D2720C"}]}} \ No newline at end of file diff --git a/cpematch/50/5069AD5C-1456-46D2-9193-2B10906D9B70.json b/cpematch/50/5069AD5C-1456-46D2-9193-2B10906D9B70.json new file mode 100644 index 00000000000..ab3e95c6878 --- /dev/null +++ b/cpematch/50/5069AD5C-1456-46D2-9193-2B10906D9B70.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "5069AD5C-1456-46D2-9193-2B10906D9B70", "criteria": "cpe:2.3:a:xwiki:xwiki:13.4.7:*:*:*:*:*:*:*", "lastModified": "2025-01-09T16:24:51.060", "cpeLastModified": "2025-01-09T16:24:51.060", "created": "2025-01-09T16:24:51.060", "status": "Active", "matches": [{"cpeName": "cpe:2.3:a:xwiki:xwiki:13.4.7:*:*:*:*:*:*:*", "cpeNameId": "C14A2289-1A0E-481D-8271-0E7590B9B666"}]}} \ No newline at end of file diff --git a/cpematch/77/77F7026A-AE0D-4962-A75D-57E86DDFBD0E.json b/cpematch/77/77F7026A-AE0D-4962-A75D-57E86DDFBD0E.json new file mode 100644 index 00000000000..757eced2dea --- /dev/null +++ b/cpematch/77/77F7026A-AE0D-4962-A75D-57E86DDFBD0E.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "77F7026A-AE0D-4962-A75D-57E86DDFBD0E", "criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*", "versionEndExcluding": "14.10.19", "lastModified": "2025-01-09T16:13:18.543", "cpeLastModified": "2025-01-09T16:13:18.543", "created": "2025-01-09T16:13:18.543", "status": "Active", "matches": [{"cpeName": "cpe:2.3:a:xwiki:xwiki:-:*:*:*:*:*:*:*", "cpeNameId": "9D032B66-41B7-4368-9A35-22BB3133D9D7"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:1.0:*:*:*:*:*:*:*", "cpeNameId": "06285393-A1EA-476E-AFCD-2BB721CCFE88"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:1.1:*:*:*:*:*:*:*", "cpeNameId": "71F7A6B7-824F-40B6-9893-A168B8DB1E45"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:1.1:milestone3:*:*:*:*:*:*", "cpeNameId": "7A877889-03E3-44D5-B9EE-E2AB5FBC5657"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:1.1:milestone4:*:*:*:*:*:*", "cpeNameId": "5337C3AE-4A21-4364-B03E-346AFD5A7057"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:1.3:*:*:*:*:*:*:*", "cpeNameId": "7C72104C-96CB-4056-927D-FAF30B78D864"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:1.3:rc1:*:*:*:*:*:*", "cpeNameId": "1B07072D-96D5-48FB-A1CC-BA9299BD0E19"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:1.5:-:*:*:*:*:*:*", "cpeNameId": "E94D2C31-1E32-4908-AB30-D905ED23EEC6"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:1.5:rc1:*:*:*:*:*:*", "cpeNameId": "517502BD-F34D-4FA4-900B-7F01D3CE5689"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:1.5:rc2:*:*:*:*:*:*", "cpeNameId": "6E90ECD0-7479-4996-ADF0-DF58EB54C025"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:1.5.1:*:*:*:*:*:*:*", "cpeNameId": "FA626856-407B-4FDF-9232-48C25BAADA3D"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:1.5.2:*:*:*:*:*:*:*", "cpeNameId": "01428218-470C-4A12-B349-FA2128D6D2EE"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:1.7:*:*:*:*:*:*:*", "cpeNameId": "55C8B5D6-B92A-40F4-B734-4F892E5D09D0"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:1.8:-:*:*:*:*:*:*", "cpeNameId": "F5BA08F1-D071-4C97-92E2-3E5EB059391C"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:1.8:rc1:*:*:*:*:*:*", "cpeNameId": "EC5B9486-E284-437F-AFFD-BBEC549FCB1E"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:1.8:rc2:*:*:*:*:*:*", "cpeNameId": "F243829C-9A16-4528-BE86-351277E8330D"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:1.9:milestone2:*:*:*:*:*:*", "cpeNameId": "F51702BC-149B-438B-94E5-E5861E0C1F98"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:2.0:milestone2:*:*:*:*:*:*", "cpeNameId": "2A369DB5-42F6-4140-B43B-EA52E6F50558"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:2.2:milestone1:*:*:*:*:*:*", "cpeNameId": "98EFA586-8D5B-477D-9ED0-EBECC46EE346"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:2.3:*:*:*:*:*:*:*", "cpeNameId": "3F3C5B80-74B8-4DFD-823D-738E7ACB1A50"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:2.3:milestone1:*:*:*:*:*:*", "cpeNameId": "D59FCAA6-0209-400C-9BC0-D44B496607CE"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:2.4:milestone2:*:*:*:*:*:*", "cpeNameId": "4781CFB9-C1E8-43CC-834D-05D1DE39400E"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:2.5:milestone2:*:*:*:*:*:*", "cpeNameId": "EB6D451B-B676-48A7-9CCE-4CD1694A98F8"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:3.0:-:*:*:*:*:*:*", "cpeNameId": "B2CD037F-BD86-4402-AF9B-701E6AB5B41E"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:3.0:milestone_2:*:*:*:*:*:*", "cpeNameId": "773D4F93-7FAF-4395-840E-1325E2FEC522"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:3.0:milestone_3:*:*:*:*:*:*", "cpeNameId": "4FD7ED9F-AD7A-4EC2-B459-08B3B6C660DF"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:3.0:milestone1:*:*:*:*:*:*", "cpeNameId": "BB432799-0954-43A1-B608-C75B0C8CBF7E"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:3.0:milestone2:*:*:*:*:*:*", "cpeNameId": "71D7959B-2DAC-458D-A892-59D8E21911C0"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:3.0:milestone3:*:*:*:*:*:*", "cpeNameId": "7C65356F-EBD2-4000-BBE4-D9613E2D0096"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:3.0:rc1:*:*:*:*:*:*", "cpeNameId": "299909C1-B44C-4339-96A2-88B59A6B0870"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:3.0.1:*:*:*:*:*:*:*", "cpeNameId": "88C6C2EE-E24C-4DF5-9EA4-E670992A5874"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:3.1:-:*:*:*:*:*:*", "cpeNameId": "668B9C49-D816-456F-81DD-7D3F6DD895DD"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:3.1:milestone1:*:*:*:*:*:*", "cpeNameId": "348CCAFC-7076-43D8-8644-CB7C5403EF20"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:3.1:milestone2:*:*:*:*:*:*", "cpeNameId": "5E84A16C-FFB5-4BCF-8EC4-FA437C5B1700"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:3.1:rc1:*:*:*:*:*:*", "cpeNameId": "098FF250-225A-4272-A699-485B6757CB7E"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:3.1.1:*:*:*:*:*:*:*", "cpeNameId": "CE35EB9B-B875-4FDC-AF41-2BC66507F55A"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:3.2:-:*:*:*:*:*:*", "cpeNameId": "3612D9D3-2737-4871-A181-E0052F2E8F9D"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:3.2:milestone1:*:*:*:*:*:*", "cpeNameId": "8C318F9F-F116-491E-884A-96551C8981F8"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:3.2:milestone2:*:*:*:*:*:*", "cpeNameId": "210E8018-DF37-43A8-B57F-C23B518484AD"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:3.2:milestone3:*:*:*:*:*:*", "cpeNameId": "95D10ECD-36C1-4472-92FB-29755F94235B"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:3.2:rc1:*:*:*:*:*:*", "cpeNameId": "7F3091E2-24D1-44FD-B2AA-69B75F9074A0"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:3.2.1:*:*:*:*:*:*:*", "cpeNameId": "842E40CA-F038-4A8A-BE19-9F829AEE8A79"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:3.3:-:*:*:*:*:*:*", "cpeNameId": "B082330D-EDFE-4A46-92E4-143A0EF801F1"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:3.3:milestone1:*:*:*:*:*:*", "cpeNameId": "FD388603-94E3-494E-967F-CDD35CE5A242"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:3.3:milestone2:*:*:*:*:*:*", "cpeNameId": "AD438AE6-E26F-45CE-9B7B-0892CD9AA09A"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:3.3:rc1:*:*:*:*:*:*", "cpeNameId": "E0A0F914-C6B7-4D25-B60F-EA67047531AD"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:3.3.1:*:*:*:*:*:*:*", "cpeNameId": "55FEDB6C-40DC-4DA2-8497-0E1793D714D4"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:3.4:-:*:*:*:*:*:*", "cpeNameId": "A5D12B94-272A-4F55-BE46-4825E62580E0"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:3.4:milestone1:*:*:*:*:*:*", "cpeNameId": "8A08A560-8090-41C5-B58D-F2055F5DB170"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:3.4:milestone-1:*:*:*:*:*:*", "cpeNameId": "9A44272D-E336-4DA2-8095-84E26BF76907"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:3.4:rc1:*:*:*:*:*:*", "cpeNameId": "546D3B10-8274-4101-90C7-325BCDB9078E"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:3.5:-:*:*:*:*:*:*", "cpeNameId": "D21E901B-2EB4-4937-9862-347205186762"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:3.5:milestone1:*:*:*:*:*:*", "cpeNameId": "D9B7836C-40A6-4EE4-A9A6-0E7B077E740C"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:3.5.1:*:*:*:*:*:*:*", "cpeNameId": "35CAD015-8409-4C9C-95F5-AE8C65264BF1"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:4.0:-:*:*:*:*:*:*", "cpeNameId": "76F013AA-7CAC-4A22-8916-45BED1C2AB34"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:4.0:milestone1:*:*:*:*:*:*", "cpeNameId": "E4265B6D-4A8C-49DA-8BB8-A8B0E901E8DA"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:4.0:milestone2:*:*:*:*:*:*", "cpeNameId": "976A6796-D9C8-48A2-AB46-3FC3457C4DD1"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:4.0:rc1:*:*:*:*:*:*", "cpeNameId": "2505EC0D-2C5A-45B1-A903-B389C819DF96"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:4.0.1:*:*:*:*:*:*:*", "cpeNameId": "06B7587F-D237-4B10-B160-23C941297BE8"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:4.1:-:*:*:*:*:*:*", "cpeNameId": "5A28EFCB-BDBD-4FA7-AAC1-EF80E46BE441"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:4.1:milestone1:*:*:*:*:*:*", "cpeNameId": "3487D1B1-CE61-4440-A432-252BCDD291B8"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:4.1:milestone2:*:*:*:*:*:*", "cpeNameId": "A66DC2D5-2BAE-4CE6-8F2F-F9738F1C0202"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:4.1:rc1:*:*:*:*:*:*", "cpeNameId": "1FBDEA62-A9E4-4ADE-A69F-9319FEF82884"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:4.1.1:*:*:*:*:*:*:*", "cpeNameId": "0693058C-4D50-4ED6-A1A8-B3261E93B063"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:4.1.2:*:*:*:*:*:*:*", "cpeNameId": "251A7FE2-3D29-46FF-9767-13B2A115D446"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:4.1.3:*:*:*:*:*:*:*", "cpeNameId": "63D3F7E4-EA74-4BD1-A34A-569E9B77ABBE"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:4.1.4:*:*:*:*:*:*:*", "cpeNameId": "E231B8CD-73A9-446C-B5B7-E999214DC0D1"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:4.2:-:*:*:*:*:*:*", "cpeNameId": "83104E1F-E54E-4544-9BDE-6805EC7995F2"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:4.2:milestone1:*:*:*:*:*:*", "cpeNameId": "82E343DE-CF6D-466E-A7D7-4CA6484AC905"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:4.2:milestone2:*:*:*:*:*:*", "cpeNameId": "A79C5D79-34FD-4473-9459-5F1E8E83D4E8"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:4.2:milestone3:*:*:*:*:*:*", "cpeNameId": "82BFA53A-EE66-4026-BB9B-27D54AE57EB9"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:4.2:rc1:*:*:*:*:*:*", "cpeNameId": "0B0AD211-2922-4F1D-BC37-43CC6D9EF605"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:4.3:-:*:*:*:*:*:*", "cpeNameId": "29FEFE2A-D969-4358-BE57-AFE3EA0A5FED"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:4.3:milestone1:*:*:*:*:*:*", "cpeNameId": "867FF1E4-19BA-4CD4-BB8C-BB42B9432C85"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:4.3:milestone2:*:*:*:*:*:*", "cpeNameId": "F9232A2F-3DBF-4101-851D-81CB4384E1B4"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:4.3:rc1:*:*:*:*:*:*", "cpeNameId": "FEE0A390-0354-4DE8-B11B-7983A6661C3C"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:4.3.1:*:*:*:*:*:*:*", "cpeNameId": "D183603C-AF39-4DDC-A4CB-5CF2151DF772"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:4.4:-:*:*:*:*:*:*", "cpeNameId": "A8665CDF-EE01-4BDD-9E68-61AD5B0AD11B"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:4.4:rc1:*:*:*:*:*:*", "cpeNameId": "5B5EF62D-4171-496C-BCC9-52AD6C8C4568"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:4.4.1:*:*:*:*:*:*:*", "cpeNameId": "CAF247A3-D842-436E-BCE7-880AADCD8F07"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:4.5:-:*:*:*:*:*:*", "cpeNameId": "275A1E3E-80B8-402C-8904-4FA851B276B3"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:4.5:milestone1:*:*:*:*:*:*", "cpeNameId": "D4BEC1D8-4D05-49F2-A07A-4C977A981326"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:4.5:rc1:*:*:*:*:*:*", "cpeNameId": "228CA38E-E78F-43F8-ABEF-852063FF6D60"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:4.5.1:*:*:*:*:*:*:*", "cpeNameId": "8547DFE4-57F5-4109-87D3-5920C0641E9D"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:4.5.2:*:*:*:*:*:*:*", "cpeNameId": "8B58B625-6F53-4CF8-A54F-AE0D4A917CCD"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:4.5.3:*:*:*:*:*:*:*", "cpeNameId": "89894F85-1318-4CE8-9CB0-B92638EC374A"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:4.5.4:*:*:*:*:*:*:*", "cpeNameId": "11E778D8-F6A1-468A-9342-72DF80A19F63"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:5.0:-:*:*:*:*:*:*", "cpeNameId": "81EA2AD7-F293-4158-BDF7-A8B86E766340"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:5.0:milestone1:*:*:*:*:*:*", "cpeNameId": "FE9037EC-7737-44FF-9B67-7EE01B916023"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:5.0:milestone2:*:*:*:*:*:*", "cpeNameId": "B6EE1F79-C08C-4E92-91B8-EE6CB5D7DA48"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:5.0:rc1:*:*:*:*:*:*", "cpeNameId": "AB01522B-AD64-4417-8E01-FDA3938AD7A6"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:5.0.1:*:*:*:*:*:*:*", "cpeNameId": "ECAE0F88-3454-4D21-AA34-3B2B7285E313"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:5.0.2:*:*:*:*:*:*:*", "cpeNameId": "A4C518D0-9B82-42F7-A1EF-1D6DE3670E66"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:5.0.3:*:*:*:*:*:*:*", "cpeNameId": "3F7AC416-C8E8-4193-8E09-112EFFB7ECFD"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:5.1:-:*:*:*:*:*:*", "cpeNameId": "A1FC5B3F-0443-4977-88AA-A08E14184A5A"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:5.1:milestone1:*:*:*:*:*:*", "cpeNameId": "A51F298B-7C36-42BB-8A77-D40A26474465"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:5.1:milestone2:*:*:*:*:*:*", "cpeNameId": "51AF9B3A-C3F7-4554-BFF0-80F97E7DA080"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:5.1:rc1:*:*:*:*:*:*", "cpeNameId": "6D96DF7B-5CFD-4216-A028-17397B3D2370"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:5.2:-:*:*:*:*:*:*", "cpeNameId": "CB2695B4-EEC4-4524-B8EE-C226A41D29F5"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:5.2:milestone1:*:*:*:*:*:*", "cpeNameId": "A70267F1-4CB6-49D1-BD61-CDD6BCFD2179"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:5.2:milestone2:*:*:*:*:*:*", "cpeNameId": "29A8EA53-32A6-459A-B8D3-9B6B03D1CAAC"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:5.2:rc1:*:*:*:*:*:*", "cpeNameId": "A8E74A20-9625-4186-8D60-F6E616DF38B6"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:5.2.1:*:*:*:*:*:*:*", "cpeNameId": "9788D29E-D50E-40AD-AF1D-CB7558F2B1A6"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:5.2.2:*:*:*:*:*:*:*", "cpeNameId": "B350BF99-2FF3-4E4A-BC1A-ABEAFAD3E7A1"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:5.2.3:*:*:*:*:*:*:*", "cpeNameId": "F6B3E00F-18F2-4FE6-A3EE-43305CBC8AF3"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:5.2.4:*:*:*:*:*:*:*", "cpeNameId": "39C62CAF-D3CF-4739-964C-EDFD5900C608"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:5.3:-:*:*:*:*:*:*", "cpeNameId": "392A23D2-71D2-4961-B479-EA03A9911D99"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:5.3:milestone1:*:*:*:*:*:*", "cpeNameId": "A8C644FF-0DF7-4845-8853-485E43D44156"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:5.3:milestone2:*:*:*:*:*:*", "cpeNameId": "AB4C4F90-14BE-4D77-BCEF-E0C7CED090AC"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:5.3:rc1:*:*:*:*:*:*", "cpeNameId": "9FDEB2E6-7BA1-451C-8194-1627B49389F8"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:5.4:-:*:*:*:*:*:*", "cpeNameId": "A294455C-4675-4063-936B-97AD2040DD6B"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:5.4:milestone1:*:*:*:*:*:*", "cpeNameId": "D5179C87-80CF-4ADD-9175-2F9D6551216E"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:5.4:rc1:*:*:*:*:*:*", "cpeNameId": "CD3125E1-906B-44EF-8C41-AB635DDF6032"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:5.4.1:*:*:*:*:*:*:*", "cpeNameId": "3936D753-586B-4E3E-AAD4-58BB592D4129"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:5.4.2:*:*:*:*:*:*:*", "cpeNameId": "1C3F41D4-D2CC-43D0-8CAB-F9BA226AA892"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:5.4.3:*:*:*:*:*:*:*", "cpeNameId": "249564BB-3BF8-4EA5-BE5F-774552FC891B"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:5.4.4:*:*:*:*:*:*:*", "cpeNameId": "F8B8A226-70B9-49FA-BF6B-527D0390F7D1"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:5.4.5:*:*:*:*:*:*:*", "cpeNameId": "389C37A3-DD20-4E20-8A16-B98B9DD3D00F"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:5.4.6:*:*:*:*:*:*:*", "cpeNameId": "3C8261D9-1527-4570-BC35-903675162CF0"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:5.4.7:*:*:*:*:*:*:*", "cpeNameId": "C8FE95B7-051E-4EBC-BF95-D1AC4A768E9C"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:6.0:-:*:*:*:*:*:*", "cpeNameId": "50C431F3-AA6A-4AAC-8E92-95E72FFAAA5F"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:6.0:milestone1:*:*:*:*:*:*", "cpeNameId": "1F87E137-0809-4815-85C9-AEA0D9F56894"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:6.0:milestone2:*:*:*:*:*:*", "cpeNameId": "F731E5AA-A5AD-455F-B7F2-70BBE7B909E0"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:6.0:rc1:*:*:*:*:*:*", "cpeNameId": "B1C1E477-8748-4AB9-94FA-3CFF031CDDA3"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:6.0.1:*:*:*:*:*:*:*", "cpeNameId": "9345EA42-B00D-4AE9-9AFD-771BA2DD04C9"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:6.1:-:*:*:*:*:*:*", "cpeNameId": "C6E19C1D-4865-4168-BD73-E9CEC61925BD"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:6.1:milestone1:*:*:*:*:*:*", "cpeNameId": "BD0FD654-EAA9-4226-8F01-5EF85A169A69"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:6.1:milestone2:*:*:*:*:*:*", "cpeNameId": "6F542C67-F7ED-473A-B860-9078750EB735"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:6.1:rc1:*:*:*:*:*:*", "cpeNameId": "A2431311-E000-4EA8-BAB0-E3A9F495310D"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:6.2:-:*:*:*:*:*:*", "cpeNameId": "ABFA4A5C-E2EA-4FB7-8F86-55E9EE771682"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:6.2:milestone1:*:*:*:*:*:*", "cpeNameId": "F9059561-752F-40A2-9DDD-3EE1D67C728A"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:6.2:milestone2:*:*:*:*:*:*", "cpeNameId": "23DB2DCA-9DC3-4BD3-B1CF-5CCE01AB0E87"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:6.2:rc1:*:*:*:*:*:*", "cpeNameId": "F1836237-414D-4582-8188-4ABD970E8A43"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:6.2.1:*:*:*:*:*:*:*", "cpeNameId": "614DF331-CC57-470E-9741-5BAB01AA297E"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:6.2.2:*:*:*:*:*:*:*", "cpeNameId": "753D8582-6E5C-45DE-B93C-F92AFB68BB09"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:6.2.3:*:*:*:*:*:*:*", "cpeNameId": "F445EFD7-C45B-4098-B4DE-DE79454B66A0"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:6.2.4:*:*:*:*:*:*:*", "cpeNameId": "622FCE58-D12E-41DF-9A1D-6E018C44793A"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:6.2.5:*:*:*:*:*:*:*", "cpeNameId": "2C72E386-1400-4700-98A8-17BC9B4E19D9"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:6.2.6:*:*:*:*:*:*:*", "cpeNameId": "FC646814-4115-444D-AB6E-6077054CA6A4"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:6.2.7:*:*:*:*:*:*:*", "cpeNameId": "0CBE7ED0-4F2D-4065-8E5B-863E793BB7DD"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:6.3:-:*:*:*:*:*:*", "cpeNameId": "39217DE5-55B1-4D5D-BE1F-4671DF55B1C0"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:6.3:milestone1:*:*:*:*:*:*", "cpeNameId": "13F8AC26-6FE3-4E7D-A2C4-6F5AA01B33A9"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:6.3:milestone2:*:*:*:*:*:*", "cpeNameId": "ED6A0010-A3D2-4BD5-8AD7-E04AA0E8F9A9"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:6.3:rc1:*:*:*:*:*:*", "cpeNameId": "F08EE2DE-93FE-440F-9C6E-3D03F25595DE"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:6.4:-:*:*:*:*:*:*", "cpeNameId": "623B94D6-3EDC-47A2-AA2F-9D1E0488AC68"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:6.4:milestone1:*:*:*:*:*:*", "cpeNameId": "FB010985-5D7A-4818-8A3B-D8CAFE491C95"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:6.4:milestone2:*:*:*:*:*:*", "cpeNameId": "05A94B93-7E6E-49DF-9C6C-F1DE8981C557"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:6.4:milestone3:*:*:*:*:*:*", "cpeNameId": "186A146C-44D6-4F7F-93A4-B124A9C55682"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:6.4:rc1:*:*:*:*:*:*", "cpeNameId": "4F883F9E-91F4-4C0E-B4AD-CF4467503FB8"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:6.4.1:*:*:*:*:*:*:*", "cpeNameId": "62A886E4-1FA9-4F6D-B318-42863F9EBCD0"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:6.4.2:*:*:*:*:*:*:*", "cpeNameId": "3B137FFC-DF8B-45AD-97F9-7E0C020C6054"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:6.4.3:*:*:*:*:*:*:*", "cpeNameId": "E9C1580C-FC89-4ECA-8592-DB21763A7835"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:6.4.4:*:*:*:*:*:*:*", "cpeNameId": "244C0BB4-F202-404B-9D8B-3BE6A9FBBE50"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:6.4.5:*:*:*:*:*:*:*", "cpeNameId": "2F61BF11-A6DC-4C9B-BFCD-BF937C79CEC7"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:6.4.6:*:*:*:*:*:*:*", "cpeNameId": "50479468-5380-4A3D-A416-4A63B4D80FBB"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:6.4.7:*:*:*:*:*:*:*", "cpeNameId": "A64386CB-D9BD-4B5C-8490-B32857CBD7BE"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:6.4.8:*:*:*:*:*:*:*", "cpeNameId": "7B9E24A5-1B79-479E-9FFF-048825F2C2C2"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.0:-:*:*:*:*:*:*", "cpeNameId": "1E62FC39-B6E2-4A33-ACDE-A18A7539CB27"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.0:milestone1:*:*:*:*:*:*", "cpeNameId": "23AB45E6-2BC3-47EB-BD4F-C155FBE4396B"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.0:milestone2:*:*:*:*:*:*", "cpeNameId": "8A49790A-8E75-448D-8034-432B0F440197"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.0:rc1:*:*:*:*:*:*", "cpeNameId": "C4B4A87A-FC69-412A-B145-FAF15DAAAA4F"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.0.1:*:*:*:*:*:*:*", "cpeNameId": "8E6665F6-CFCB-490B-8519-D6F5410DA0AF"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.1:-:*:*:*:*:*:*", "cpeNameId": "B8DEA6AD-9198-434A-9328-2D57EED213C0"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.1:milestone1:*:*:*:*:*:*", "cpeNameId": "9A548563-15F9-492B-B9B0-54138B15A34D"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.1:milestone2:*:*:*:*:*:*", "cpeNameId": "519F131A-FDEF-473C-841E-5760B1936C5B"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.1:rc1:*:*:*:*:*:*", "cpeNameId": "F50A1BE2-BA74-4411-850A-5E0DA7F13974"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.1.1:*:*:*:*:*:*:*", "cpeNameId": "6B887CAB-133F-486F-965F-93B23AB93688"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.1.2:*:*:*:*:*:*:*", "cpeNameId": "1FF32224-90FD-460E-9C11-FCD64B3ECE6C"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.1.3:*:*:*:*:*:*:*", "cpeNameId": "329380C9-0C26-4013-9C09-FCA5AED654E9"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.1.4:*:*:*:*:*:*:*", "cpeNameId": "8DF00086-8F5A-4AC2-A5BC-7E0C501B5FD7"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.2:*:*:*:*:*:*:*", "cpeNameId": "A366A6DD-AC70-473D-91F0-D6FCB05D02BB"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.2:-:*:*:*:*:*:*", "cpeNameId": "5E872CB1-228F-44B2-B9AB-CF5D34C8127F"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.2:milestone1:*:*:*:*:*:*", "cpeNameId": "28E9B788-669E-4814-8BD1-4884D134A38D"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.2:milestone2:*:*:*:*:*:*", "cpeNameId": "72AC8071-9CCC-4FE5-84F4-B93B4B0B9D0B"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.2:milestone3:*:*:*:*:*:*", "cpeNameId": "3913A8C5-C4F8-4541-9884-23ED4ECF3450"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.2:rc1:*:*:*:*:*:*", "cpeNameId": "3DD04CD7-BFAA-4378-931A-3B25F97AD553"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.3:-:*:*:*:*:*:*", "cpeNameId": "F54E5576-D1C3-4E1C-A0DE-451DA094DF18"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.3:milestone1:*:*:*:*:*:*", "cpeNameId": "9AB26561-7AA8-4368-9483-D2BD16BB8868"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.3:milestone2:*:*:*:*:*:*", "cpeNameId": "68F08746-0F8A-4985-841B-2B605D63E444"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.3:rc1:*:*:*:*:*:*", "cpeNameId": "08D4572D-5A3D-46B9-991E-F320EA443DC0"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.4:-:*:*:*:*:*:*", "cpeNameId": "01BEF97A-4CDF-489D-8FA4-F603F9C2E194"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.4:milestone1:*:*:*:*:*:*", "cpeNameId": "D11A70D6-6A1F-424D-A986-C903A03C9A41"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.4:milestone2:*:*:*:*:*:*", "cpeNameId": "61B7AA72-55D0-4D96-AAA2-6E8B87944EB4"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.4:rc1:*:*:*:*:*:*", "cpeNameId": "4A103771-BE63-424B-93FB-D5798C817FA4"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.4.1:*:*:*:*:*:*:*", "cpeNameId": "A715FC2A-9558-444D-A75C-518C65AA4016"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.4.2:*:*:*:*:*:*:*", "cpeNameId": "A9D5A5BE-F406-426B-84A8-A79B53B7C3B6"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.4.3:*:*:*:*:*:*:*", "cpeNameId": "A0B3AEA3-FB8F-40C4-9080-4EA00DE9B62E"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.4.4:*:*:*:*:*:*:*", "cpeNameId": "79DA1ED0-2E1E-49AA-8A45-94C496F4B3A6"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.4.5:*:*:*:*:*:*:*", "cpeNameId": "9704567C-4211-4BB1-A6E6-57F33106AED3"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:7.4.6:*:*:*:*:*:*:*", "cpeNameId": "A8A6538D-8AEC-4D08-BBC9-890431785B19"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.0:-:*:*:*:*:*:*", "cpeNameId": "BFB20586-DEFA-4EE6-97EE-D2CD8C9BA536"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.0:milestone1:*:*:*:*:*:*", "cpeNameId": "0A93C71E-FEE4-4D75-8A00-DA2D0B71B51A"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.0:milestone2:*:*:*:*:*:*", "cpeNameId": "34CDBF32-25A8-4E8D-BDE6-4F63BC7AF524"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.0:rc1:*:*:*:*:*:*", "cpeNameId": "08E6BC11-7B2D-4FFF-B962-7F55621DDF0C"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.1:-:*:*:*:*:*:*", "cpeNameId": "815E5325-4439-48C2-BBC3-1C237293CBDC"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.1:milestone1:*:*:*:*:*:*", "cpeNameId": "D83CC12B-F6B0-4267-BCF0-84BF75EE3F26"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.1:milestone2:*:*:*:*:*:*", "cpeNameId": "E4B0C520-6C2B-4FB0-9C22-F388F0EE947C"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.1:rc1:*:*:*:*:*:*", "cpeNameId": "81AAE56A-8A3E-4151-B4CC-D729DCA4DD64"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.2:-:*:*:*:*:*:*", "cpeNameId": "AB8BBA60-DDFB-4642-99EA-60C290A999B0"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.2:milestone1:*:*:*:*:*:*", "cpeNameId": "8CBEA74D-6895-4F81-BF00-F0A202F6CE69"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.2:milestone2:*:*:*:*:*:*", "cpeNameId": "1539DDC0-B935-4BD6-820A-0641FFB00A71"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.2:rc1:*:*:*:*:*:*", "cpeNameId": "E817E3EF-A19B-497B-AF80-295DE2773B7F"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.2.1:*:*:*:*:*:*:*", "cpeNameId": "B1CFC964-FA5D-4BF2-BAAF-043F04FD1115"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.2.2:*:*:*:*:*:*:*", "cpeNameId": "82FF491C-21D9-41E1-9FBC-532F1135AC81"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.3:*:*:*:*:*:*:*", "cpeNameId": "320EDC7E-CDB5-4DC0-B893-202F4EBABD1B"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.3:-:*:*:*:*:*:*", "cpeNameId": "7FECCED0-27D2-4385-B14E-1278DD8776A2"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.3:milestone1:*:*:*:*:*:*", "cpeNameId": "7A4020DA-9EC4-4DF6-A6EB-9D6D2305F780"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.3:milestone2:*:*:*:*:*:*", "cpeNameId": "AE23115C-78BE-4127-851E-14B4E5B348E7"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.3:rc1:*:*:*:*:*:*", "cpeNameId": "98B388FD-87A5-4A53-BC72-EB17CDB9680B"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.4:*:*:*:*:*:*:*", "cpeNameId": "ACF0C663-6379-440A-857E-16A07FDB90FD"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.4:-:*:*:*:*:*:*", "cpeNameId": "2D5D2F1A-7507-4568-83BA-D221A3AAC48E"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.4:rc1:*:*:*:*:*:*", "cpeNameId": "6A7EEE53-69F6-42BE-80AA-DE1F80263C5D"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.4.1:*:*:*:*:*:*:*", "cpeNameId": "B208C495-C8CF-4966-BB95-29D55006C641"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.4.2:*:*:*:*:*:*:*", "cpeNameId": "73224942-CB08-4453-82DC-267186DD0CD0"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.4.3:*:*:*:*:*:*:*", "cpeNameId": "6F715E27-018C-400F-A7B0-D105B8F0E88F"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.4.4:*:*:*:*:*:*:*", "cpeNameId": "B1D8197B-2997-44D5-8E69-A231E92D8AE5"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.4.5:*:*:*:*:*:*:*", "cpeNameId": "968F41A7-114C-42C3-BAAE-35305FF8CCEB"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:8.4.6:*:*:*:*:*:*:*", "cpeNameId": "4F9E6E9D-C4EC-468F-8FE9-07061510C974"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.0:*:*:*:*:*:*:*", "cpeNameId": "FD41C60F-710A-4238-93AD-EB280D041F1F"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.0:-:*:*:*:*:*:*", "cpeNameId": "4969ED73-939C-4F6F-A8E4-A5F3DF4F232C"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.0:rc1:*:*:*:*:*:*", "cpeNameId": "14C29E18-D92F-4A2D-BAD8-AE30B2E3EAB4"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.1:*:*:*:*:*:*:*", "cpeNameId": "F2BC4B5A-351B-4358-ABBB-3CB03A18AA7B"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.1:-:*:*:*:*:*:*", "cpeNameId": "293A03D3-1932-49A9-A9E4-7BEA12E73A5E"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.1:rc1:*:*:*:*:*:*", "cpeNameId": "7C04471F-33B6-470F-8325-60469891D42E"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.1.1:*:*:*:*:*:*:*", "cpeNameId": "0DA236A9-F469-4C5F-A366-D4FE28EF4CD9"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.1.2:*:*:*:*:*:*:*", "cpeNameId": "88DFF219-0CE8-4600-861F-F7FF8AE100D2"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.2:*:*:*:*:*:*:*", "cpeNameId": "1E8F5102-1E21-412F-A554-46FE38B6BED1"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.2:-:*:*:*:*:*:*", "cpeNameId": "B8458313-5231-4AEC-8CF6-4AC30C9991D9"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.2:rc1:*:*:*:*:*:*", "cpeNameId": "3CD900C4-8764-47D7-89BA-CB96A1FC1CCD"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.3:*:*:*:*:*:*:*", "cpeNameId": "E282B176-8DFE-4577-95FF-C53C1FDD98FA"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.3:-:*:*:*:*:*:*", "cpeNameId": "9FE77D7D-79CA-43C0-B8C7-9EF03C4930A2"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.3:rc1:*:*:*:*:*:*", "cpeNameId": "F420EE3E-F31E-4689-9C2F-307E1A0E88A9"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.3.1:*:*:*:*:*:*:*", "cpeNameId": "A9FA65E4-2665-4979-B235-57BB8F83D3A6"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.4:*:*:*:*:*:*:*", "cpeNameId": "C2423DBF-3740-4957-BE94-6291248E7CBB"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.4:-:*:*:*:*:*:*", "cpeNameId": "70A92F6E-B0E5-4C0F-92AD-E514D5CB709E"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.4:rc1:*:*:*:*:*:*", "cpeNameId": "1AF9DBEA-7198-4891-9411-CD471FF8549E"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.5:*:*:*:*:*:*:*", "cpeNameId": "45F60E3E-9D08-4B3A-8BE4-F0AF5F6E3E89"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.5:-:*:*:*:*:*:*", "cpeNameId": "EC1112B9-C681-40EA-BBCA-5B1DE42D83D5"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.5:rc1:*:*:*:*:*:*", "cpeNameId": "88D955FB-E683-4F91-89B2-6C0D4FF5A161"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.5.1:*:*:*:*:*:*:*", "cpeNameId": "FB87AE99-EBC4-419E-BB0E-A20B9AAFD49D"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.6:*:*:*:*:*:*:*", "cpeNameId": "430AF1A8-5AE9-4121-8363-A31958C7D113"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.6:-:*:*:*:*:*:*", "cpeNameId": "6E98F335-8A8B-41E9-B684-5DDCA272ADB3"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.6:rc1:*:*:*:*:*:*", "cpeNameId": "8306AE1D-B02E-4E7A-B088-B1535ECC4F73"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.7:*:*:*:*:*:*:*", "cpeNameId": "1FC4AF58-DDDF-4B44-AEB5-6A2D037515C6"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.7:-:*:*:*:*:*:*", "cpeNameId": "F07702A0-71E2-4A8C-9A61-603514BF1C2D"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.7:rc1:*:*:*:*:*:*", "cpeNameId": "F89FBB5F-1226-445B-B7FA-9F9E84D3691F"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.8:*:*:*:*:*:*:*", "cpeNameId": "4886BBB8-6F5F-4E6C-A3A0-739F35F00D60"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.8:-:*:*:*:*:*:*", "cpeNameId": "35F0F07F-4A10-401A-A4EF-16810E5BB07C"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.8:rc1:*:*:*:*:*:*", "cpeNameId": "92BC1891-B1E4-47DE-A961-C931279C4EC5"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.8.1:*:*:*:*:*:*:*", "cpeNameId": "95F33F86-A26E-4C58-927E-BF1B414397C8"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.9:*:*:*:*:*:*:*", "cpeNameId": "36A9D50D-D166-4B78-A150-4A815FB9E32A"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.9:-:*:*:*:*:*:*", "cpeNameId": "31031631-944C-432F-A9E7-B682E34AF010"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.9:rc2:*:*:*:*:*:*", "cpeNameId": "8F00E72C-C580-4461-96E6-825BAE54E340"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.10:*:*:*:*:*:*:*", "cpeNameId": "766B0A07-5A77-4AA1-BA1A-29F176D7E715"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.10:-:*:*:*:*:*:*", "cpeNameId": "3A23E36E-C6DE-4D1F-BB3F-4D7F9214B607"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.10:rc1:*:*:*:*:*:*", "cpeNameId": "33BAC252-FC9E-4C72-B774-FC78A2F1D176"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.10.1:*:*:*:*:*:*:*", "cpeNameId": "CB3D358C-729D-4E4F-B59C-211F8BD5F3DE"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.11:*:*:*:*:*:*:*", "cpeNameId": "DF1A52C9-91AC-4EB8-97D0-6ADC1CCAF4F7"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.11:-:*:*:*:*:*:*", "cpeNameId": "54C17EE9-4C0C-440D-B7F9-D24CAF23AD99"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.11:rc1:*:*:*:*:*:*", "cpeNameId": "EE123F68-36B1-45BC-A94E-CF229A425253"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.11.1:*:*:*:*:*:*:*", "cpeNameId": "DAB7F751-5105-4278-93AA-110060FF96AF"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.11.2:*:*:*:*:*:*:*", "cpeNameId": "677B3C7B-42BA-4A54-B60E-070CB9DAE0D3"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.11.3:*:*:*:*:*:*:*", "cpeNameId": "F31D51CA-749C-4D76-B232-9B01D69E2353"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.11.4:*:*:*:*:*:*:*", "cpeNameId": "D5664907-8D66-46C2-A97D-BA79C8792F8B"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.11.5:*:*:*:*:*:*:*", "cpeNameId": "7F567CB5-A8E3-4FBB-A531-C7985585CFCA"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.11.6:*:*:*:*:*:*:*", "cpeNameId": "F07E7631-28A0-4BA2-8DB5-B5B7493143B7"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.11.7:*:*:*:*:*:*:*", "cpeNameId": "84846FA2-71C5-42BF-854C-F7E1346289B0"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.11.8:*:*:*:*:*:*:*", "cpeNameId": "38281604-2487-4EA9-8DA7-3D288B13FA2B"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:9.11.9:*:*:*:*:*:*:*", "cpeNameId": "BC928E86-8FA0-409D-BF12-D0D8D414DBC5"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.0:*:*:*:*:*:*:*", "cpeNameId": "DCF293F6-BD5B-462F-B335-3DE035D7791E"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.1:*:*:*:*:*:*:*", "cpeNameId": "4C737026-F857-466C-B67F-1BD94D48A933"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.1:-:*:*:*:*:*:*", "cpeNameId": "D8800AA9-1072-4F55-B1EA-0FDBB13EF1A2"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.1:rc1:*:*:*:*:*:*", "cpeNameId": "439D79AE-8D93-452D-BD87-4E139B43A539"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.2:*:*:*:*:*:*:*", "cpeNameId": "7C043B12-C1E9-4182-B897-3632E2D2E4EC"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.3:*:*:*:*:*:*:*", "cpeNameId": "FE85C15C-8DF1-40D2-BF4C-7F354BB8C115"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.4:*:*:*:*:*:*:*", "cpeNameId": "B277492F-953D-4F02-A453-DCE64BC06DFC"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.4:-:*:*:*:*:*:*", "cpeNameId": "8CE13672-CD09-4380-B2D5-7D92D8CCF670"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.4:rc1:*:*:*:*:*:*", "cpeNameId": "24640DB7-15D4-4C00-8F65-62EF52B23E91"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.5:*:*:*:*:*:*:*", "cpeNameId": "5FE363A5-58A4-4480-932C-F8704BA0596F"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.5:-:*:*:*:*:*:*", "cpeNameId": "3A807660-792E-4FE2-BA35-1E29D33C3110"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.5:rc1:*:*:*:*:*:*", "cpeNameId": "83E24C08-680D-4B41-A49B-6BE73418BBC1"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.6:*:*:*:*:*:*:*", "cpeNameId": "A0C0D228-6AB9-43AC-9AE0-3265E437531C"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.6:-:*:*:*:*:*:*", "cpeNameId": "1B6D8A3C-3576-440B-AF64-94E225434A17"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.6:rc1:*:*:*:*:*:*", "cpeNameId": "1C862649-17C4-4DA3-8351-D055E4CEB1B8"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.6.1:*:*:*:*:*:*:*", "cpeNameId": "54EFA885-450A-44FB-A1D4-7540C38DF10A"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.7:*:*:*:*:*:*:*", "cpeNameId": "EBE1EF96-63E5-49EF-8DFB-730A455C7E29"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.7:-:*:*:*:*:*:*", "cpeNameId": "9622AA0F-5E47-4984-A732-78E7E7B931A9"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.7:rc1:*:*:*:*:*:*", "cpeNameId": "A5736D85-2F86-4E79-8011-FD25596280BF"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.7.1:*:*:*:*:*:*:*", "cpeNameId": "0D9DD8C8-3A46-4163-AA43-A7A21A0D2C19"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.8:-:*:*:*:*:*:*", "cpeNameId": "E36E5662-2625-43C6-B7F2-BBECE6B60AF0"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.8:rc1:*:*:*:*:*:*", "cpeNameId": "D2CE643C-B910-4EC5-B9DE-B6D83DBA81B7"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.8.1:*:*:*:*:*:*:*", "cpeNameId": "34F9C2BE-E763-4D6B-9F22-529EC9145F70"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.8.2:*:*:*:*:*:*:*", "cpeNameId": "1E7E695D-F080-46A7-B370-6EDA8F8037D1"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.8.3:*:*:*:*:*:*:*", "cpeNameId": "AA445C15-A7FF-4B84-B7A4-AD197F47B4DB"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.9:*:*:*:*:*:*:*", "cpeNameId": "33289941-300D-47D4-B97A-B20825F516E9"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.10:-:*:*:*:*:*:*", "cpeNameId": "4C302A3E-D96A-4AEA-8543-70AB63648E61"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.10:rc1:*:*:*:*:*:*", "cpeNameId": "D5EC857E-D3DB-4A92-85CD-CDCB1AF87E58"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.11:-:*:*:*:*:*:*", "cpeNameId": "9B2B18AC-368F-474D-85C2-F3C48A9DF65A"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.11:rc1:*:*:*:*:*:*", "cpeNameId": "5E5A0F4F-B34E-4809-8C5D-F1125AE819A3"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.11.1:*:*:*:*:*:*:*", "cpeNameId": "F91F9371-7A41-427F-A8F1-9F698320B6EF"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.11.2:*:*:*:*:*:*:*", "cpeNameId": "F6789C57-6A4F-4863-9A5D-01386BF404C9"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.11.3:*:*:*:*:*:*:*", "cpeNameId": "E0CCE02F-3C0F-4EF6-BCAA-C52285E996EB"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.11.4:*:*:*:*:*:*:*", "cpeNameId": "C11F9FDB-E920-4A4C-8998-342C49FE369F"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.11.5:*:*:*:*:*:*:*", "cpeNameId": "E24CC058-C80F-4CE6-B8D8-39F8E65E90B6"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.11.6:*:*:*:*:*:*:*", "cpeNameId": "82547A7F-7543-485A-8002-CBC9D29C5A87"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.11.7:*:*:*:*:*:*:*", "cpeNameId": "5C1B9970-9569-40D1-A2AA-A906970187E5"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.11.8:*:*:*:*:*:*:*", "cpeNameId": "10B11BE8-CFE5-4578-97BF-BBBF653B092A"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.11.9:*:*:*:*:*:*:*", "cpeNameId": "3668F7C7-16CE-4445-8446-F1F511DCE343"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.11.10:*:*:*:*:*:*:*", "cpeNameId": "A86C6673-7624-4229-8963-5FDD4E46149D"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:10.11.11:*:*:*:*:*:*:*", "cpeNameId": "A2E8764F-2F01-4670-A9BB-751E2C57B06E"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.0:*:*:*:*:*:*:*", "cpeNameId": "5C6E2F70-0A69-46E6-B4EA-64E8FB074A63"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.0.1:*:*:*:*:*:*:*", "cpeNameId": "B4EA9F69-61E9-4797-9B89-26179F230ADD"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.0.2:*:*:*:*:*:*:*", "cpeNameId": "778D7927-5D1A-42AA-BE25-B704AA4B97BE"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.0.3:*:*:*:*:*:*:*", "cpeNameId": "3D515A90-8796-4D01-8D4C-B139B4E3F48E"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.1:-:*:*:*:*:*:*", "cpeNameId": "B191E3EA-1D24-4CAC-96BC-ABB3DDC971F0"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.1:rc1:*:*:*:*:*:*", "cpeNameId": "1AC54C7D-3C1D-489D-B700-7DCFA5CD2CD7"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.2:-:*:*:*:*:*:*", "cpeNameId": "72980028-DFD2-44BF-B40A-838B18D492A1"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.2:rc1:*:*:*:*:*:*", "cpeNameId": "3F318D79-D10C-4426-A39A-2A9BC73F6F07"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.3:*:*:*:*:*:*:*", "cpeNameId": "C49A5941-2E29-489C-BB71-2A572E009D6A"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.3:-:*:*:*:*:*:*", "cpeNameId": "1F0BC9E9-F208-4F42-972E-6057B27C19E6"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.3:rc1:*:*:*:*:*:*", "cpeNameId": "D534E56E-648B-4AD6-B9D2-94607D12ACD9"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.3.1:*:*:*:*:*:*:*", "cpeNameId": "84434996-447F-4C7F-8AD9-55C194F73566"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.3.2:*:*:*:*:*:*:*", "cpeNameId": "ACC7EE57-2FCC-498D-B32F-C66A5717FADD"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.3.3:*:*:*:*:*:*:*", "cpeNameId": "8B55699F-8928-4579-990E-AA7241E529A6"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.3.4:*:*:*:*:*:*:*", "cpeNameId": "1AB4A4C8-B2D7-42E4-9C0F-EDEDE74D2458"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.3.5:*:*:*:*:*:*:*", "cpeNameId": "97E17B21-C88E-4610-B950-983B7246B455"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.3.6:*:*:*:*:*:*:*", "cpeNameId": "48A2054F-3C85-473F-BC4C-8FD46533EE09"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.3.7:*:*:*:*:*:*:*", "cpeNameId": "31C000F2-ADB1-4CDA-A609-66977E2D5627"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.4:-:*:*:*:*:*:*", "cpeNameId": "688E6B30-FB1C-4D48-A9A3-549CD3E01387"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.4:rc1:*:*:*:*:*:*", "cpeNameId": "D0D09B3F-D8E0-44F5-9BE2-4473051B2338"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.5:-:*:*:*:*:*:*", "cpeNameId": "AAFC532B-674E-475C-8A91-00A6DC83C1C7"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.5:rc1:*:*:*:*:*:*", "cpeNameId": "39BF7C30-21C7-468D-9DD1-CA14C749B12A"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.6:-:*:*:*:*:*:*", "cpeNameId": "A75200F3-C25B-4628-BB7A-222BAB17FB00"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.6:rc1:*:*:*:*:*:*", "cpeNameId": "7CED6F58-3B96-443D-9F2E-82879D76F428"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.6.1:*:*:*:*:*:*:*", "cpeNameId": "0F744922-FC92-4C37-BAEF-2A951EBCC680"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.7:-:*:*:*:*:*:*", "cpeNameId": "9D36783D-A49D-4A66-856F-068AEFC4DD32"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.7:rc1:*:*:*:*:*:*", "cpeNameId": "C0BFADB6-3A48-423E-9E99-967B165D0CEA"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.8:*:*:*:*:*:*:*", "cpeNameId": "507DF180-36DD-4544-BEE3-23E36F2DDD3D"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.8:-:*:*:*:*:*:*", "cpeNameId": "96E39521-1EAE-4D1D-B6FC-EAB6C1A12430"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.8:milestone1:*:*:*:*:*:*", "cpeNameId": "7B67D964-48C7-44BE-9BAF-17EF20BACDEE"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.8:rc1:*:*:*:*:*:*", "cpeNameId": "FCE9468F-2EEB-409E-8359-D906B619FCD6"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.8.1:*:*:*:*:*:*:*", "cpeNameId": "0DF573BE-DEFF-4CB6-96F4-CADE73893F35"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.9:*:*:*:*:*:*:*", "cpeNameId": "E510B285-CD0C-4EEC-97AE-F245EEC511D6"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.10:*:*:*:*:*:*:*", "cpeNameId": "8D5CD1D1-2F5C-4FE3-A92F-E70B59E37267"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.10.1:*:*:*:*:*:*:*", "cpeNameId": "A774D0CB-8332-4956-B735-053406D878D5"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.10.2:*:*:*:*:*:*:*", "cpeNameId": "2967EF03-4549-4671-9BB8-837376341204"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.10.3:*:*:*:*:*:*:*", "cpeNameId": "881AF951-3149-4728-84D8-0F96E69FAC79"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.10.4:*:*:*:*:*:*:*", "cpeNameId": "3421D6A2-AA2D-487A-B532-B134877D2101"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.10.5:*:*:*:*:*:*:*", "cpeNameId": "AF4E41BD-8EDA-44FD-B6BD-B4CC1F0CB235"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.10.6:*:*:*:*:*:*:*", "cpeNameId": "97F6BCC0-6101-4D71-9072-A76E57CFAB8A"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.10.7:*:*:*:*:*:*:*", "cpeNameId": "EEB33FEE-3C59-4CD2-BFA6-D7DB86421ECA"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.10.8:*:*:*:*:*:*:*", "cpeNameId": "39029A2E-C2B3-4A29-8DD2-A10659B58FBD"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.10.10:*:*:*:*:*:*:*", "cpeNameId": "FC6DCFD6-2AA7-4084-A813-B4B6282ADECB"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.10.11:*:*:*:*:*:*:*", "cpeNameId": "31C0315A-89FA-4727-992A-E086865F6DD8"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.10.12:*:*:*:*:*:*:*", "cpeNameId": "FF9B2F67-7834-48A0-9DA8-F714AA4F5419"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:11.10.13:*:*:*:*:*:*:*", "cpeNameId": "E0BDD868-26C3-41FA-B863-5A95AD7C4ABD"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.0:-:*:*:*:*:*:*", "cpeNameId": "2DB416B3-46EB-47C8-8A45-A17AFF5D53DC"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.0:rc1:*:*:*:*:*:*", "cpeNameId": "6908E728-2985-4601-805E-0A705CCD9E17"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.0.0:*:*:*:*:*:*:*", "cpeNameId": "C943013F-7747-4C3D-A340-0DACD107482D"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.1:-:*:*:*:*:*:*", "cpeNameId": "A59A31DC-91FE-4A9B-8500-39AF5528634D"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.1:rc1:*:*:*:*:*:*", "cpeNameId": "7C45DB23-7900-4386-9EFD-3B57F85CBBA3"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.2:*:*:*:*:*:*:*", "cpeNameId": "091DFBE1-1617-469C-B993-476120E10ADE"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.2.1:*:*:*:*:*:*:*", "cpeNameId": "99113DBE-9F92-479F-A2C1-8DF9B83AE98B"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.3:-:*:*:*:*:*:*", "cpeNameId": "AED49754-EDB3-4676-892D-45968A0EE2E9"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.3:rc1:*:*:*:*:*:*", "cpeNameId": "2D877340-50E1-4084-9AF3-20BF86B3A1F0"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.4:-:*:*:*:*:*:*", "cpeNameId": "A506A548-3F0D-4081-9DBA-00D7098DDC6D"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.4:rc1:*:*:*:*:*:*", "cpeNameId": "7BA7BE09-6593-4A56-BEDB-F330B1E5A31A"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.5:-:*:*:*:*:*:*", "cpeNameId": "F492EE89-51ED-42B7-9A84-82A486D793E1"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.5:rc1:*:*:*:*:*:*", "cpeNameId": "4531B5B9-E368-4C67-800E-029F33C075E7"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.5.1:*:*:*:*:*:*:*", "cpeNameId": "0E950185-A253-4949-9A06-5FE5399059B2"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.6:*:*:*:*:*:*:*", "cpeNameId": "B880CDCC-5362-41B6-93F3-2C2C69336668"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.6.1:*:*:*:*:*:*:*", "cpeNameId": "BB542D8C-E345-4657-B084-76C05595DA4F"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.6.2:*:*:*:*:*:*:*", "cpeNameId": "8A113ED1-2833-4EF9-92D6-37DB844AD846"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.6.3:*:*:*:*:*:*:*", "cpeNameId": "F1F899AE-162A-4E7B-99F5-A693446B181B"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.6.4:*:*:*:*:*:*:*", "cpeNameId": "DBC79D63-F806-4C15-8C5D-3CD1EDDC3B40"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.6.5:*:*:*:*:*:*:*", "cpeNameId": "25EDCC90-716B-4B7B-81E2-7A667A44EAD1"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.6.6:*:*:*:*:*:*:*", "cpeNameId": "7B5E7299-C57C-42ED-9447-EDF493AC71A3"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.6.7:*:*:*:*:*:*:*", "cpeNameId": "DB5125FA-D1D8-43A3-AA18-E9E02DD7F579"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.6.8:*:*:*:*:*:*:*", "cpeNameId": "A442E0FF-BD4D-4666-B684-7839BA8C2AA8"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.7:-:*:*:*:*:*:*", "cpeNameId": "9EF92353-FC63-4F2D-A563-F4818348D120"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.7:rc1:*:*:*:*:*:*", "cpeNameId": "7D29E593-47E6-4F83-8FAC-FBD5A42FE836"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.7.1:*:*:*:*:*:*:*", "cpeNameId": "23025C07-94A7-4586-97A3-37F301897A75"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.8:-:*:*:*:*:*:*", "cpeNameId": "F7890A6C-5C45-42FF-8566-F2B54B631AD7"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.8:rc1:*:*:*:*:*:*", "cpeNameId": "656F2875-EDAA-4A86-9E07-4110B8BC2E5E"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.9:-:*:*:*:*:*:*", "cpeNameId": "ED0BFD3F-638C-4126-AA8D-A5990AA600CE"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.9:rc1:*:*:*:*:*:*", "cpeNameId": "1F694770-2B89-44F2-BFD6-50843FA591D8"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.10:*:*:*:*:*:*:*", "cpeNameId": "1557F4EE-DE2F-4373-83DD-3D07E58D2123"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.10.1:*:*:*:*:*:*:*", "cpeNameId": "F73BF9B7-C70F-463E-9DF7-9B431018A1B7"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.10.2:*:*:*:*:*:*:*", "cpeNameId": "0B7F1102-6FA1-4082-AACF-E60FD8966374"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.10.3:*:*:*:*:*:*:*", "cpeNameId": "81D2690B-A376-4C7B-9BB7-6F2FDBF0514A"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.10.4:*:*:*:*:*:*:*", "cpeNameId": "DD01B4B4-A824-4741-9226-C8871560CC8E"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.10.5:*:*:*:*:*:*:*", "cpeNameId": "FFBB708D-8782-435D-B55C-EF8780F1A819"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.10.6:*:*:*:*:*:*:*", "cpeNameId": "801265DA-87A6-45B2-B4F7-18D6D44A52FD"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.10.7:*:*:*:*:*:*:*", "cpeNameId": "3B8579D2-B049-4BAF-AD9A-4FCD4ACDF3C2"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.10.8:*:*:*:*:*:*:*", "cpeNameId": "685EB785-B523-42B1-8F3D-2D5C73D2FB4D"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.10.9:*:*:*:*:*:*:*", "cpeNameId": "5F4587A8-1663-4BA3-86C0-4CD43DD0D7E7"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.10.10:*:*:*:*:*:*:*", "cpeNameId": "5CC180F7-0871-4265-AEB4-979390F0E191"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:12.10.11:*:*:*:*:*:*:*", "cpeNameId": "B7DFF136-5876-4EF4-AEFC-E72934745CBE"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.0:*:*:*:*:*:*:*", "cpeNameId": "031BBFCF-C3D9-4BBA-860D-6D09F7DE0CF1"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.1:-:*:*:*:*:*:*", "cpeNameId": "5609204E-0EEC-471C-948B-271FA00CEE51"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.1:rc1:*:*:*:*:*:*", "cpeNameId": "DABE0596-F4CC-4318-AE21-5A20B9A707F9"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.2:*:*:*:*:*:*:*", "cpeNameId": "E5F5E9F2-37C3-4E17-8070-9753DC368F2C"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.2:rc1:*:*:*:*:*:*", "cpeNameId": "61397454-ECB3-4ED4-B567-D70CAA319B3A"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.3:*:*:*:*:*:*:*", "cpeNameId": "B18265DA-C6F6-49B0-AF6D-D5ACB0333CE5"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.4:*:*:*:*:*:*:*", "cpeNameId": "ACAF8BE5-4000-4E19-ACDF-3FAF9490802C"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.4.1:*:*:*:*:*:*:*", "cpeNameId": "58C03EC0-003A-43FB-B861-0770A9ABC88A"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.4.2:*:*:*:*:*:*:*", "cpeNameId": "2129D1A3-F574-499B-86F0-E854DD28AECE"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.4.3:*:*:*:*:*:*:*", "cpeNameId": "4997FF7E-E602-4301-949F-A438EC554E71"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.4.4:*:*:*:*:*:*:*", "cpeNameId": "8CB62363-107F-49F3-BCF1-B019FB05D845"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.4.5:*:*:*:*:*:*:*", "cpeNameId": "B986DC4B-D59D-4CF8-B90D-A54488CFDDD9"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.4.6:*:*:*:*:*:*:*", "cpeNameId": "1BA53368-A8A1-4D89-99B4-8AA4881A569E"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.4.7:*:*:*:*:*:*:*", "cpeNameId": "C14A2289-1A0E-481D-8271-0E7590B9B666"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.5:*:*:*:*:*:*:*", "cpeNameId": "0D94FCD6-4A84-4E02-BDD6-82E4EC450517"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.6:*:*:*:*:*:*:*", "cpeNameId": "AAE5AD73-73D3-4A03-8EB1-C52071CA369C"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.7:*:*:*:*:*:*:*", "cpeNameId": "AAC1B214-80A3-455D-94A4-15091590989E"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.8:*:*:*:*:*:*:*", "cpeNameId": "360D025B-0F14-4891-9DFF-2C9845C6C40A"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.9:*:*:*:*:*:*:*", "cpeNameId": "5381019F-EF70-4F5C-B73E-9853090A465B"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.9:-:*:*:*:*:*:*", "cpeNameId": "6FC792DD-43C1-4348-A69B-16040EE0D014"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.9:rc1:*:*:*:*:*:*", "cpeNameId": "5806FD30-A4F2-474B-9721-B51FA67D325B"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.10:*:*:*:*:*:*:*", "cpeNameId": "60BC88E4-42EE-4501-AE47-026D11DA53ED"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.10:-:*:*:*:*:*:*", "cpeNameId": "7915D205-A813-4945-BA31-479D59805A10"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.10.1:*:*:*:*:*:*:*", "cpeNameId": "68344075-1679-4551-AA46-4E10976D007D"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.10.2:*:*:*:*:*:*:*", "cpeNameId": "3F99A2CF-1F21-4F30-AEC6-4757D57E3B23"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.10.3:*:*:*:*:*:*:*", "cpeNameId": "0A60D729-42DB-4EE4-8946-E90F2EBF1289"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.10.4:*:*:*:*:*:*:*", "cpeNameId": "047152F4-9E85-48BF-91A7-E525237302E5"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.10.5:*:*:*:*:*:*:*", "cpeNameId": "41DB3074-7B14-40EB-8545-074C7D4FAE17"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.10.6:*:*:*:*:*:*:*", "cpeNameId": "776DA325-AD58-42DA-9CEE-F0CF6E928FC9"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.10.8:*:*:*:*:*:*:*", "cpeNameId": "B161E05A-B5C4-4CCD-ABE1-FC3BFD8E1DAF"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.10.10:*:*:*:*:*:*:*", "cpeNameId": "8246E4A1-3683-4C2E-B088-07A4EE15773A"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.10.11:*:*:*:*:*:*:*", "cpeNameId": "6F84CAF1-41B2-4078-A68A-497D0AA99991"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.0:*:*:*:*:*:*:*", "cpeNameId": "7824EA81-53C1-4674-B114-0411C8206FC9"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.0:-:*:*:*:*:*:*", "cpeNameId": "B9C5C207-D4FB-414D-BA4F-6467BCBFAEA3"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.0:rc1:*:*:*:*:*:*", "cpeNameId": "2023855C-D781-4F9B-9D7B-6AB6A986C892"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.1:-:*:*:*:*:*:*", "cpeNameId": "D4EA6BF4-EDD0-49DF-819F-4F04C9DB69D3"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.1:rc1:*:*:*:*:*:*", "cpeNameId": "938A5549-2358-4C1E-BBB6-D3A50AE8CC9C"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.2:-:*:*:*:*:*:*", "cpeNameId": "8DD27F7C-BC13-4545-8633-E3200B6DE350"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.2:rc1:*:*:*:*:*:*", "cpeNameId": "1FBA61F1-ED50-4398-838D-EC9DC059D55C"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.2.1:*:*:*:*:*:*:*", "cpeNameId": "85A4FE01-3BE7-4F78-9AB3-124C36D7420C"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.3:-:*:*:*:*:*:*", "cpeNameId": "F97B0B70-7D2D-40BC-BE3E-2294BF2EAA2F"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.3:rc1:*:*:*:*:*:*", "cpeNameId": "63AC2F95-3C47-4B89-9E7B-49FC8BA51829"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.3.1:*:*:*:*:*:*:*", "cpeNameId": "DC84B566-5CD9-4766-8733-ECD1440602C8"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.4:*:*:*:*:*:*:*", "cpeNameId": "C8DD6789-4E8D-4725-8CFB-5E6AD8A927AD"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.4:rc1:*:*:*:*:*:*", "cpeNameId": "A1C287AA-0A0F-44A9-A199-ADE2E5B8391B"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.4.3:*:*:*:*:*:*:*", "cpeNameId": "11795995-6F15-47BB-89C7-67683A34929E"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.4.4:*:*:*:*:*:*:*", "cpeNameId": "885A1911-DB26-4E84-BF2B-1DA574200D89"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.4.5:*:*:*:*:*:*:*", "cpeNameId": "A8078299-277B-4D24-9B10-D998ABD725F6"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.4.6:*:*:*:*:*:*:*", "cpeNameId": "7A0E717A-B952-4032-9D87-2DBF950D8A7B"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.4.7:*:*:*:*:*:*:*", "cpeNameId": "F745D23C-7AF2-4832-8145-5E0A75E3B441"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.4.8:*:*:*:*:*:*:*", "cpeNameId": "5D73E7B5-143C-447C-9908-75212E828796"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.5:*:*:*:*:*:*:*", "cpeNameId": "2B739769-CDFA-42D1-9265-44A1D5783FCB"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.5.0:*:*:*:*:*:*:*", "cpeNameId": "84EA4DCE-8DBF-452F-82BC-8ADE6621E10D"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.6:*:*:*:*:*:*:*", "cpeNameId": "32582E82-7DD3-49CF-92C4-CAAE81B772D1"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.6:rc1:*:*:*:*:*:*", "cpeNameId": "FC61BED5-3A72-4227-9839-3F25C0453EC8"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.7:rc1:*:*:*:*:*:*", "cpeNameId": "497FC3C9-F49B-4BAD-B2B3-B7778C736BA9"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.9:-:*:*:*:*:*:*", "cpeNameId": "41C08E94-C771-4B15-8C2B-EB28421EE380"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.9:rc1:*:*:*:*:*:*", "cpeNameId": "889B6E18-FB37-456D-A289-17221683FC3E"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10:*:*:*:*:*:*:*", "cpeNameId": "D72A14EF-A21A-4075-BBE5-46A386715FE6"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10:rc1:*:*:*:*:*:*", "cpeNameId": "A071E854-3AFE-4FED-8C49-CEF3B9A54400"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.1:*:*:*:*:*:*:*", "cpeNameId": "E0075C9A-8BAD-4D9D-A339-A8D5184C8115"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.2:*:*:*:*:*:*:*", "cpeNameId": "6093CBD3-B3B7-4525-9D1D-56EF15A9AA15"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.3:*:*:*:*:*:*:*", "cpeNameId": "E4477D13-EBFF-4E21-9E35-E5C5219D31CC"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.4:*:*:*:*:*:*:*", "cpeNameId": "F1850A72-3461-4C1F-AC98-D923E6BD93E7"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.5:*:*:*:*:*:*:*", "cpeNameId": "6E4501C7-F455-443F-ADCF-8E6562B8659F"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.6:*:*:*:*:*:*:*", "cpeNameId": "593AAACA-1FFA-45D9-9FD0-8CC10F024689"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.7:*:*:*:*:*:*:*", "cpeNameId": "0042CF0D-EB49-405C-A844-02EC5EACC887"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.8:*:*:*:*:*:*:*", "cpeNameId": "E90B879F-5593-4EA6-B38C-2DCA73E61D54"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.9:*:*:*:*:*:*:*", "cpeNameId": "29AEA4F5-476C-4CDA-803C-C9020692B637"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.10:*:*:*:*:*:*:*", "cpeNameId": "5DAFA70B-FDC2-4ACF-AD39-793EE0C2A371"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.11:*:*:*:*:*:*:*", "cpeNameId": "0BF31F07-CDC0-4BD8-AF2F-01EDB06D519A"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.12:*:*:*:*:*:*:*", "cpeNameId": "C9A0176B-0A6F-4712-A300-AA801CBC88D3"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.13:*:*:*:*:*:*:*", "cpeNameId": "5656040E-3E90-4DED-904A-0A9B5DB45EAE"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.14:*:*:*:*:*:*:*", "cpeNameId": "6A401EB7-B169-44F4-A51F-99644CB2E338"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.15:*:*:*:*:*:*:*", "cpeNameId": "23918E08-4CCE-4B32-9545-579EE4569103"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.16:*:*:*:*:*:*:*", "cpeNameId": "4FD0CE1A-4168-4A7E-A64C-EC0136778D87"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.17:*:*:*:*:*:*:*", "cpeNameId": "4AAE8694-F060-4C88-A785-72A6F99CAE05"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.18:*:*:*:*:*:*:*", "cpeNameId": "1EC53B79-4B2F-4731-9A8D-CBAC103D7308"}]}} \ No newline at end of file diff --git a/cpematch/84/848A6CB8-2455-4B4C-9DE9-2C3B746B2CAD.json b/cpematch/84/848A6CB8-2455-4B4C-9DE9-2C3B746B2CAD.json new file mode 100644 index 00000000000..8846afc11f1 --- /dev/null +++ b/cpematch/84/848A6CB8-2455-4B4C-9DE9-2C3B746B2CAD.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "848A6CB8-2455-4B4C-9DE9-2C3B746B2CAD", "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartExcluding": "6.7", "versionEndExcluding": "6.12.4", "lastModified": "2025-01-09T16:17:59.330", "cpeLastModified": "2025-01-09T16:17:59.330", "created": "2025-01-09T16:17:59.330", "status": "Active", "matches": [{"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7.1:*:*:*:*:*:*:*", "cpeNameId": "79D7ED41-5643-4D99-844C-9B043F32C448"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7.2:*:*:*:*:*:*:*", "cpeNameId": "C1ED5E3D-9AAE-49B9-AD5C-F67E5C2DED13"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7.3:*:*:*:*:*:*:*", "cpeNameId": "3F765E52-7235-45D2-9F5E-54A331DF8D5C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7.4:*:*:*:*:*:*:*", "cpeNameId": "1F5BBEFA-0A0E-41CF-ADCC-8F47EBCDB55C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7.5:*:*:*:*:*:*:*", "cpeNameId": "DBB2E8B7-C426-42F9-AA3C-49137FA9181F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7.6:*:*:*:*:*:*:*", "cpeNameId": "AE81517A-1398-4CBE-B09E-B7E4FE991601"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7.7:*:*:*:*:*:*:*", "cpeNameId": "9CC4542A-A669-4661-B058-053C2A9B7D13"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7.8:*:*:*:*:*:*:*", "cpeNameId": "E8303407-A959-458E-8957-F229F1DC34DE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7.9:*:*:*:*:*:*:*", "cpeNameId": "2378F7C0-BE31-4C41-B6F0-F5A488DD59DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7.10:*:*:*:*:*:*:*", "cpeNameId": "1C8BC43E-8B04-48EB-BDB9-B6F3AEDED204"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7.11:*:*:*:*:*:*:*", "cpeNameId": "0AD54002-D38C-49E2-9D46-7862AC5E7EA7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7.12:*:*:*:*:*:*:*", "cpeNameId": "5D166373-D54C-40CD-846C-A0DE746BABBC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8:-:*:*:*:*:*:*", "cpeNameId": "E606D576-BCBB-484B-8F66-5D5EC7155998"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", "cpeNameId": "13DF8AF0-B00A-49F7-AA57-0800C102A3D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", "cpeNameId": "8104072A-D502-4FAA-B807-F029C7B49CCC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", "cpeNameId": "6E7613C9-9ED8-4B71-83E6-5464BF413555"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*", "cpeNameId": "31A56C8B-CC28-40D1-9B52-92A6E0C2BEC0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*", "cpeNameId": "9276C1E8-4FB4-44B0-86BF-B3510326B189"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*", "cpeNameId": "CE634D04-E4EA-451A-B849-91406DF4B55B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8.1:*:*:*:*:*:*:*", "cpeNameId": "7FB18F84-7509-49E5-8B57-DDCD7A4FFD54"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8.2:*:*:*:*:*:*:*", "cpeNameId": "668323DC-447E-419D-8E2E-328DABEFC77C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8.3:*:*:*:*:*:*:*", "cpeNameId": "2492ED49-34F3-4332-BF22-89C19C630B9E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8.4:*:*:*:*:*:*:*", "cpeNameId": "726617ED-6BBB-436F-BBC3-DEA9B9916623"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8.5:*:*:*:*:*:*:*", "cpeNameId": "5B4F2389-8891-4F37-AAC4-309514EE2AFC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8.6:*:*:*:*:*:*:*", "cpeNameId": "998736C2-6532-4B98-AB83-1BFB34798139"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8.7:*:*:*:*:*:*:*", "cpeNameId": "3F42568E-4784-41CB-9FF5-67C82CFBBA1A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8.8:*:*:*:*:*:*:*", "cpeNameId": "EC7097AC-D466-446F-83E2-9A7A39C5F78A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8.9:*:*:*:*:*:*:*", "cpeNameId": "F656AB16-669F-464E-9767-730CDC3CD068"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8.10:*:*:*:*:*:*:*", "cpeNameId": "DA233A76-2843-42F9-BE64-E161DCBE7084"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8.11:*:*:*:*:*:*:*", "cpeNameId": "D6510469-001B-4E1F-81C4-79B94BE9B631"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8.12:*:*:*:*:*:*:*", "cpeNameId": "9F9FA208-A38C-4DDF-A6B1-DB3D6896163A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9:-:*:*:*:*:*:*", "cpeNameId": "DA68273F-A1B2-4072-8039-969DEC83F8B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*", "cpeNameId": "AD3F7724-6BA5-4196-BE25-BB908AD79224"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*", "cpeNameId": "EB425DB1-B18B-49FE-A1CD-D37A614EF196"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*", "cpeNameId": "5556F80D-9910-4BA1-BD39-A05DB521656C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*", "cpeNameId": "91148A86-2F56-4A4E-A618-4BFF86878C22"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:*", "cpeNameId": "4A6F1927-BF21-4430-B3E8-9A36CCC1BF7C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9:rc6:*:*:*:*:*:*", "cpeNameId": "A339A401-1D13-456C-8A03-21E0510811E3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9:rc7:*:*:*:*:*:*", "cpeNameId": "31965EBF-6545-45F2-9E6A-003EBFA0699B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9.1:*:*:*:*:*:*:*", "cpeNameId": "5409332C-40D6-44A9-82A7-28DB593D9017"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9.2:*:*:*:*:*:*:*", "cpeNameId": "895B3D2B-E49B-4522-A022-912A981787D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9.3:*:*:*:*:*:*:*", "cpeNameId": "2173448B-A956-45AD-86C8-740858CF88A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9.4:*:*:*:*:*:*:*", "cpeNameId": "FE7FFD19-DA74-4E11-BFD0-76F8418FF08B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9.5:*:*:*:*:*:*:*", "cpeNameId": "FB05F5D5-C3C5-47DB-82AC-AFD388940242"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9.6:*:*:*:*:*:*:*", "cpeNameId": "70A85201-A04C-469F-A3E0-40BC86FE0B8B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9.7:*:*:*:*:*:*:*", "cpeNameId": "ABA04A00-B7AF-4E92-A00F-27AF9DD38F88"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9.8:*:*:*:*:*:*:*", "cpeNameId": "DAA9BE88-6890-4061-8D58-6FFD85083184"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9.9:*:*:*:*:*:*:*", "cpeNameId": "6BF442C2-3D11-45DB-BDC2-9BF6162441D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9.10:*:*:*:*:*:*:*", "cpeNameId": "51127D6B-DBBA-40F8-98D1-A2BC3207393E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9.11:*:*:*:*:*:*:*", "cpeNameId": "7B3B966A-8BE8-45DB-B90F-1712FB11B7F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9.12:*:*:*:*:*:*:*", "cpeNameId": "B72A7495-1D73-4DD9-B3B9-B5ABF72C0EBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10:-:*:*:*:*:*:*", "cpeNameId": "33286ABD-F4EA-4F52-ABAF-90E4F9A40DC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*", "cpeNameId": "E3646D55-E6C9-45FB-B1A0-BC0B03CF9E9B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*", "cpeNameId": "9290D3F5-3EB5-4F3D-BBCC-757366758235"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*", "cpeNameId": "2DDCD76C-E056-41A7-A529-49E6DAF202D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*", "cpeNameId": "0BE3BCC9-5B0E-4A89-B662-E06F539878A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:*", "cpeNameId": "1C1806B7-1B9B-4D3A-B320-F8F93D12CA76"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10:rc6:*:*:*:*:*:*", "cpeNameId": "BD2DAAE2-0295-4DEF-890E-00E509610C5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10:rc7:*:*:*:*:*:*", "cpeNameId": "E4A1F3E6-6C2B-4E6C-9905-C28050CD03F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10.0:rc1:*:*:*:*:*:*", "cpeNameId": "4B006DC1-D30B-4EBE-B103-7F2C1F283DEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10.0:rc2:*:*:*:*:*:*", "cpeNameId": "C467A3E6-50F3-4D61-BC58-8554E9B2FEDA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10.0:rc3:*:*:*:*:*:*", "cpeNameId": "92F85456-7188-43FB-BCC1-3FC42DB1AD04"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10.1:*:*:*:*:*:*:*", "cpeNameId": "9DC1C968-7D70-4D77-9C80-E924C5BDBFD0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10.2:*:*:*:*:*:*:*", "cpeNameId": "6505BF6C-7B1F-4AD2-919F-95E8424C5655"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10.3:*:*:*:*:*:*:*", "cpeNameId": "52ECC529-5C55-4BF7-A72D-BD5233038B5C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10.4:*:*:*:*:*:*:*", "cpeNameId": "3AE1E52D-645D-49E2-B912-03E29DA32345"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10.5:*:*:*:*:*:*:*", "cpeNameId": "5B55EAC3-7C40-4D75-B398-16B166F3FD22"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10.6:*:*:*:*:*:*:*", "cpeNameId": "7E932982-7E26-415F-844D-315F2F5C948C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10.7:*:*:*:*:*:*:*", "cpeNameId": "A6988850-5FA9-49D5-8590-E3A4EE102859"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10.8:*:*:*:*:*:*:*", "cpeNameId": "B57DB349-33DC-4330-BDE6-892DE85147F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10.9:*:*:*:*:*:*:*", "cpeNameId": "47155132-EA0F-464F-B64D-7D8471B01C43"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10.10:*:*:*:*:*:*:*", "cpeNameId": "74E57DC5-D464-44BB-847F-8E3243AB319C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10.11:*:*:*:*:*:*:*", "cpeNameId": "F02AECA0-B93A-43BB-B039-92CE60BE643E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10.12:*:*:*:*:*:*:*", "cpeNameId": "D7EE8EC1-EDE8-49B2-AF80-3546F7C9F97E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10.13:*:*:*:*:*:*:*", "cpeNameId": "E2625B6C-03BB-4290-885D-EF36C2928C0D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10.14:*:*:*:*:*:*:*", "cpeNameId": "9368FB15-B2E5-4EDF-AB92-CE69EB5A9B25"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11:-:*:*:*:*:*:*", "cpeNameId": "D9796FCF-DF1C-4C11-9B21-DE3E5FCDE51C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", "cpeNameId": "11452F50-843F-4849-B0DF-FE5BFDBF5453"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", "cpeNameId": "D6BCD8FE-1131-4209-84D9-C060130E9FB3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*", "cpeNameId": "1F11FBEB-C56C-4CD0-92A1-9D515CD37197"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*", "cpeNameId": "D40D5AD3-6A6D-4192-94C9-5722335A5D0A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*", "cpeNameId": "1E20CDB6-B75C-4C9F-9FC5-8FB8D78A5341"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11:rc6:*:*:*:*:*:*", "cpeNameId": "BB4EA85D-981C-4FFA-A580-B102DCD07F73"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11:rc7:*:*:*:*:*:*", "cpeNameId": "CEA79089-82F2-42AB-87CB-85E788963687"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11:rc8:*:*:*:*:*:*", "cpeNameId": "FAE3B2C5-55FA-4E79-B6E5-9C2DCC93CE9C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11.1:*:*:*:*:*:*:*", "cpeNameId": "2EA27B24-8931-41F5-A44A-5F16AD703E95"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11.2:*:*:*:*:*:*:*", "cpeNameId": "94AD59E6-37CA-47AF-A40F-714406474754"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11.3:*:*:*:*:*:*:*", "cpeNameId": "8EF7CFFD-5176-47EC-B832-6D82331D3C68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11.4:*:*:*:*:*:*:*", "cpeNameId": "F3799B44-911D-446D-94A2-0E539D056143"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11.5:*:*:*:*:*:*:*", "cpeNameId": "7686FD31-8647-4F3A-9C99-9AD107D11924"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11.6:*:*:*:*:*:*:*", "cpeNameId": "F1DE77FC-8E60-4D63-B18E-B7BA79940CB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11.7:*:*:*:*:*:*:*", "cpeNameId": "9B065310-1D5F-44FA-A4C6-EC5749CF61B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11.8:*:*:*:*:*:*:*", "cpeNameId": "C3E26A1B-B3C5-4AE9-96EC-602DA39F49AA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11.10:*:*:*:*:*:*:*", "cpeNameId": "7E44ECC0-C3DF-41FB-A0DD-06945D8D465A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.12:-:*:*:*:*:*:*", "cpeNameId": "A6E24F28-F074-43F4-82D4-E576BF65E7E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", "cpeNameId": "FB19590B-8DC8-4AE8-9275-41B707178E02"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", "cpeNameId": "50D3D00F-E837-4BDE-8B6C-7CF51830A090"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*", "cpeNameId": "57179203-7A5D-490F-A8CF-4C4741F7497B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*", "cpeNameId": "EDE41C0D-4AB2-4CA6-B3C5-C095ED1CC4F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*", "cpeNameId": "A57E7724-0F01-442E-8E3B-40D312BEA8FF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*", "cpeNameId": "A13E0435-FB89-490C-AE2A-7CDDA505D96D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.12:rc7:*:*:*:*:*:*", "cpeNameId": "49B7D7EE-C6BD-441E-89B8-7B58C8D2720C"}]}} \ No newline at end of file diff --git a/cpematch/8F/8FDF516A-A433-4547-8ED4-BE0902B2166F.json b/cpematch/8F/8FDF516A-A433-4547-8ED4-BE0902B2166F.json new file mode 100644 index 00000000000..0d66f33687f --- /dev/null +++ b/cpematch/8F/8FDF516A-A433-4547-8ED4-BE0902B2166F.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "8FDF516A-A433-4547-8ED4-BE0902B2166F", "criteria": "cpe:2.3:h:qualcomm:auto_5g_modem-rf:-:*:*:*:*:*:*:*", "lastModified": "2025-01-09T16:10:57.697", "cpeLastModified": "2025-01-09T16:10:57.697", "created": "2025-01-09T16:10:57.697", "status": "Active"}} \ No newline at end of file diff --git a/cpematch/95/95D33EF5-7C1B-4CC4-AA45-A372E660A8FF.json b/cpematch/95/95D33EF5-7C1B-4CC4-AA45-A372E660A8FF.json new file mode 100644 index 00000000000..441ac362e6b --- /dev/null +++ b/cpematch/95/95D33EF5-7C1B-4CC4-AA45-A372E660A8FF.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "95D33EF5-7C1B-4CC4-AA45-A372E660A8FF", "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.4.257", "versionEndExcluding": "5.4.287", "lastModified": "2025-01-09T16:11:48.037", "cpeLastModified": "2025-01-09T16:11:48.037", "created": "2025-01-09T16:11:48.037", "status": "Active", "matches": [{"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.257:*:*:*:*:*:*:*", "cpeNameId": "28E9A455-1593-4AF5-9451-B313D622E813"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.258:*:*:*:*:*:*:*", "cpeNameId": "B5718D89-967C-42C8-AA82-C97D345B3B10"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.259:*:*:*:*:*:*:*", "cpeNameId": "87BB858F-8D92-452F-B51C-12ACE0798353"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.260:*:*:*:*:*:*:*", "cpeNameId": "AE07B665-D693-4561-A9B4-9932CD77333B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.261:*:*:*:*:*:*:*", "cpeNameId": "EF86313B-7F46-43B8-8338-AE692B75A0A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.262:*:*:*:*:*:*:*", "cpeNameId": "E1B563A5-0659-4D95-89A0-8FCC2A436214"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.263:*:*:*:*:*:*:*", "cpeNameId": "8D53F67C-F067-4BF8-AE22-78A1176571BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.264:*:*:*:*:*:*:*", "cpeNameId": "7111A17A-1784-4740-B976-38B722A838CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.265:*:*:*:*:*:*:*", "cpeNameId": "2D41AA24-795C-4C26-8A5A-D07B59EBD394"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.266:*:*:*:*:*:*:*", "cpeNameId": "A97784BF-DCF7-40A8-87DA-0CB401BEC707"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.267:*:*:*:*:*:*:*", "cpeNameId": "073D9BD8-4FBC-4DF6-8017-37FB83733D26"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.268:*:*:*:*:*:*:*", "cpeNameId": "91DAF395-305E-4836-A12C-1E2377F31FA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.269:*:*:*:*:*:*:*", "cpeNameId": "5FCE10E6-EC75-4696-82C2-8958D55E379A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.270:*:*:*:*:*:*:*", "cpeNameId": "431FAE79-4814-471C-ADD1-50E98CA62255"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.271:*:*:*:*:*:*:*", "cpeNameId": "90DCF88A-E713-42F3-9D1E-2CCCAA5074ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.272:*:*:*:*:*:*:*", "cpeNameId": "6B454F24-35C3-4974-86AC-E42EC930E187"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.273:*:*:*:*:*:*:*", "cpeNameId": "02AE5EE4-8747-4828-AC90-7DC0689482DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.274:*:*:*:*:*:*:*", "cpeNameId": "F006D7E9-C3E7-43D0-BFF9-1905CC924F0E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.275:*:*:*:*:*:*:*", "cpeNameId": "81C1BF7F-E953-42D0-965C-B5F736085500"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.276:*:*:*:*:*:*:*", "cpeNameId": "CFCF98F3-408F-4FB9-B097-3CE467D5C047"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.277:*:*:*:*:*:*:*", "cpeNameId": "8B64B495-66D8-4EE8-9391-2078D025F252"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.278:*:*:*:*:*:*:*", "cpeNameId": "25928F5C-D970-404D-B6CB-E3DFCD7EC853"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.279:*:*:*:*:*:*:*", "cpeNameId": "478BD5C9-EF9A-4FBB-9BCF-DF23EA8F3492"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.280:*:*:*:*:*:*:*", "cpeNameId": "9513977F-A95A-4F0F-AADE-B21201231052"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.281:*:*:*:*:*:*:*", "cpeNameId": "14DBE587-6D62-4B91-BC57-0C84D152E7EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.282:*:*:*:*:*:*:*", "cpeNameId": "6057E10C-DE66-4645-A2B5-44203C31F784"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.283:*:*:*:*:*:*:*", "cpeNameId": "951347D3-550A-41E6-B000-E2D716A96A20"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.284:*:*:*:*:*:*:*", "cpeNameId": "5979A8F6-3B9D-4C0C-8C75-9FA49E82A345"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.285:*:*:*:*:*:*:*", "cpeNameId": "F1278C94-D023-48BF-A6D6-36D0DF76CFF3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.286:*:*:*:*:*:*:*", "cpeNameId": "7E65B46E-A161-4126-9E85-B9F5B4C0005D"}]}} \ No newline at end of file diff --git a/cpematch/9C/9C6F0AFE-D450-48DE-9734-B53F57378968.json b/cpematch/9C/9C6F0AFE-D450-48DE-9734-B53F57378968.json new file mode 100644 index 00000000000..1578cb3d842 --- /dev/null +++ b/cpematch/9C/9C6F0AFE-D450-48DE-9734-B53F57378968.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "9C6F0AFE-D450-48DE-9734-B53F57378968", "criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*", "versionStartIncluding": "13.2", "versionEndExcluding": "14.10.21", "lastModified": "2025-01-09T16:41:58.223", "cpeLastModified": "2025-01-09T16:41:58.223", "created": "2025-01-09T16:41:58.223", "status": "Active", "matches": [{"cpeName": "cpe:2.3:a:xwiki:xwiki:13.2:*:*:*:*:*:*:*", "cpeNameId": "E5F5E9F2-37C3-4E17-8070-9753DC368F2C"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.2:rc1:*:*:*:*:*:*", "cpeNameId": "61397454-ECB3-4ED4-B567-D70CAA319B3A"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.3:*:*:*:*:*:*:*", "cpeNameId": "B18265DA-C6F6-49B0-AF6D-D5ACB0333CE5"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.4:*:*:*:*:*:*:*", "cpeNameId": "ACAF8BE5-4000-4E19-ACDF-3FAF9490802C"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.4.1:*:*:*:*:*:*:*", "cpeNameId": "58C03EC0-003A-43FB-B861-0770A9ABC88A"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.4.2:*:*:*:*:*:*:*", "cpeNameId": "2129D1A3-F574-499B-86F0-E854DD28AECE"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.4.3:*:*:*:*:*:*:*", "cpeNameId": "4997FF7E-E602-4301-949F-A438EC554E71"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.4.4:*:*:*:*:*:*:*", "cpeNameId": "8CB62363-107F-49F3-BCF1-B019FB05D845"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.4.5:*:*:*:*:*:*:*", "cpeNameId": "B986DC4B-D59D-4CF8-B90D-A54488CFDDD9"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.4.6:*:*:*:*:*:*:*", "cpeNameId": "1BA53368-A8A1-4D89-99B4-8AA4881A569E"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.4.7:*:*:*:*:*:*:*", "cpeNameId": "C14A2289-1A0E-481D-8271-0E7590B9B666"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.5:*:*:*:*:*:*:*", "cpeNameId": "0D94FCD6-4A84-4E02-BDD6-82E4EC450517"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.6:*:*:*:*:*:*:*", "cpeNameId": "AAE5AD73-73D3-4A03-8EB1-C52071CA369C"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.7:*:*:*:*:*:*:*", "cpeNameId": "AAC1B214-80A3-455D-94A4-15091590989E"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.8:*:*:*:*:*:*:*", "cpeNameId": "360D025B-0F14-4891-9DFF-2C9845C6C40A"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.9:*:*:*:*:*:*:*", "cpeNameId": "5381019F-EF70-4F5C-B73E-9853090A465B"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.9:-:*:*:*:*:*:*", "cpeNameId": "6FC792DD-43C1-4348-A69B-16040EE0D014"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.9:rc1:*:*:*:*:*:*", "cpeNameId": "5806FD30-A4F2-474B-9721-B51FA67D325B"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.10:*:*:*:*:*:*:*", "cpeNameId": "60BC88E4-42EE-4501-AE47-026D11DA53ED"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.10:-:*:*:*:*:*:*", "cpeNameId": "7915D205-A813-4945-BA31-479D59805A10"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.10.1:*:*:*:*:*:*:*", "cpeNameId": "68344075-1679-4551-AA46-4E10976D007D"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.10.2:*:*:*:*:*:*:*", "cpeNameId": "3F99A2CF-1F21-4F30-AEC6-4757D57E3B23"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.10.3:*:*:*:*:*:*:*", "cpeNameId": "0A60D729-42DB-4EE4-8946-E90F2EBF1289"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.10.4:*:*:*:*:*:*:*", "cpeNameId": "047152F4-9E85-48BF-91A7-E525237302E5"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.10.5:*:*:*:*:*:*:*", "cpeNameId": "41DB3074-7B14-40EB-8545-074C7D4FAE17"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.10.6:*:*:*:*:*:*:*", "cpeNameId": "776DA325-AD58-42DA-9CEE-F0CF6E928FC9"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.10.8:*:*:*:*:*:*:*", "cpeNameId": "B161E05A-B5C4-4CCD-ABE1-FC3BFD8E1DAF"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.10.10:*:*:*:*:*:*:*", "cpeNameId": "8246E4A1-3683-4C2E-B088-07A4EE15773A"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.10.11:*:*:*:*:*:*:*", "cpeNameId": "6F84CAF1-41B2-4078-A68A-497D0AA99991"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.0:*:*:*:*:*:*:*", "cpeNameId": "7824EA81-53C1-4674-B114-0411C8206FC9"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.0:-:*:*:*:*:*:*", "cpeNameId": "B9C5C207-D4FB-414D-BA4F-6467BCBFAEA3"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.0:rc1:*:*:*:*:*:*", "cpeNameId": "2023855C-D781-4F9B-9D7B-6AB6A986C892"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.1:-:*:*:*:*:*:*", "cpeNameId": "D4EA6BF4-EDD0-49DF-819F-4F04C9DB69D3"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.1:rc1:*:*:*:*:*:*", "cpeNameId": "938A5549-2358-4C1E-BBB6-D3A50AE8CC9C"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.2:-:*:*:*:*:*:*", "cpeNameId": "8DD27F7C-BC13-4545-8633-E3200B6DE350"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.2:rc1:*:*:*:*:*:*", "cpeNameId": "1FBA61F1-ED50-4398-838D-EC9DC059D55C"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.2.1:*:*:*:*:*:*:*", "cpeNameId": "85A4FE01-3BE7-4F78-9AB3-124C36D7420C"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.3:-:*:*:*:*:*:*", "cpeNameId": "F97B0B70-7D2D-40BC-BE3E-2294BF2EAA2F"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.3:rc1:*:*:*:*:*:*", "cpeNameId": "63AC2F95-3C47-4B89-9E7B-49FC8BA51829"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.3.1:*:*:*:*:*:*:*", "cpeNameId": "DC84B566-5CD9-4766-8733-ECD1440602C8"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.4:*:*:*:*:*:*:*", "cpeNameId": "C8DD6789-4E8D-4725-8CFB-5E6AD8A927AD"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.4:rc1:*:*:*:*:*:*", "cpeNameId": "A1C287AA-0A0F-44A9-A199-ADE2E5B8391B"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.4.3:*:*:*:*:*:*:*", "cpeNameId": "11795995-6F15-47BB-89C7-67683A34929E"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.4.4:*:*:*:*:*:*:*", "cpeNameId": "885A1911-DB26-4E84-BF2B-1DA574200D89"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.4.5:*:*:*:*:*:*:*", "cpeNameId": "A8078299-277B-4D24-9B10-D998ABD725F6"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.4.6:*:*:*:*:*:*:*", "cpeNameId": "7A0E717A-B952-4032-9D87-2DBF950D8A7B"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.4.7:*:*:*:*:*:*:*", "cpeNameId": "F745D23C-7AF2-4832-8145-5E0A75E3B441"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.4.8:*:*:*:*:*:*:*", "cpeNameId": "5D73E7B5-143C-447C-9908-75212E828796"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.5:*:*:*:*:*:*:*", "cpeNameId": "2B739769-CDFA-42D1-9265-44A1D5783FCB"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.5.0:*:*:*:*:*:*:*", "cpeNameId": "84EA4DCE-8DBF-452F-82BC-8ADE6621E10D"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.6:*:*:*:*:*:*:*", "cpeNameId": "32582E82-7DD3-49CF-92C4-CAAE81B772D1"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.6:rc1:*:*:*:*:*:*", "cpeNameId": "FC61BED5-3A72-4227-9839-3F25C0453EC8"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.7:rc1:*:*:*:*:*:*", "cpeNameId": "497FC3C9-F49B-4BAD-B2B3-B7778C736BA9"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.9:-:*:*:*:*:*:*", "cpeNameId": "41C08E94-C771-4B15-8C2B-EB28421EE380"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.9:rc1:*:*:*:*:*:*", "cpeNameId": "889B6E18-FB37-456D-A289-17221683FC3E"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10:*:*:*:*:*:*:*", "cpeNameId": "D72A14EF-A21A-4075-BBE5-46A386715FE6"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10:rc1:*:*:*:*:*:*", "cpeNameId": "A071E854-3AFE-4FED-8C49-CEF3B9A54400"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.1:*:*:*:*:*:*:*", "cpeNameId": "E0075C9A-8BAD-4D9D-A339-A8D5184C8115"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.2:*:*:*:*:*:*:*", "cpeNameId": "6093CBD3-B3B7-4525-9D1D-56EF15A9AA15"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.3:*:*:*:*:*:*:*", "cpeNameId": "E4477D13-EBFF-4E21-9E35-E5C5219D31CC"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.4:*:*:*:*:*:*:*", "cpeNameId": "F1850A72-3461-4C1F-AC98-D923E6BD93E7"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.5:*:*:*:*:*:*:*", "cpeNameId": "6E4501C7-F455-443F-ADCF-8E6562B8659F"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.6:*:*:*:*:*:*:*", "cpeNameId": "593AAACA-1FFA-45D9-9FD0-8CC10F024689"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.7:*:*:*:*:*:*:*", "cpeNameId": "0042CF0D-EB49-405C-A844-02EC5EACC887"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.8:*:*:*:*:*:*:*", "cpeNameId": "E90B879F-5593-4EA6-B38C-2DCA73E61D54"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.9:*:*:*:*:*:*:*", "cpeNameId": "29AEA4F5-476C-4CDA-803C-C9020692B637"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.10:*:*:*:*:*:*:*", "cpeNameId": "5DAFA70B-FDC2-4ACF-AD39-793EE0C2A371"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.11:*:*:*:*:*:*:*", "cpeNameId": "0BF31F07-CDC0-4BD8-AF2F-01EDB06D519A"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.12:*:*:*:*:*:*:*", "cpeNameId": "C9A0176B-0A6F-4712-A300-AA801CBC88D3"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.13:*:*:*:*:*:*:*", "cpeNameId": "5656040E-3E90-4DED-904A-0A9B5DB45EAE"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.14:*:*:*:*:*:*:*", "cpeNameId": "6A401EB7-B169-44F4-A51F-99644CB2E338"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.15:*:*:*:*:*:*:*", "cpeNameId": "23918E08-4CCE-4B32-9545-579EE4569103"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.16:*:*:*:*:*:*:*", "cpeNameId": "4FD0CE1A-4168-4A7E-A64C-EC0136778D87"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.17:*:*:*:*:*:*:*", "cpeNameId": "4AAE8694-F060-4C88-A785-72A6F99CAE05"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.18:*:*:*:*:*:*:*", "cpeNameId": "1EC53B79-4B2F-4731-9A8D-CBAC103D7308"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.19:*:*:*:*:*:*:*", "cpeNameId": "0C6F5CD5-ACF9-4EB2-8496-114A2392EE11"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.20:*:*:*:*:*:*:*", "cpeNameId": "0A42CBCA-E61E-4A78-AAF2-13958340F92B"}]}} \ No newline at end of file diff --git a/cpematch/A3/A31A5270-DDE5-45C2-8B33-2941C4B71EBD.json b/cpematch/A3/A31A5270-DDE5-45C2-8B33-2941C4B71EBD.json new file mode 100644 index 00000000000..7a2466311cd --- /dev/null +++ b/cpematch/A3/A31A5270-DDE5-45C2-8B33-2941C4B71EBD.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "A31A5270-DDE5-45C2-8B33-2941C4B71EBD", "criteria": "cpe:2.3:a:themeum:tutor_lms:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "2.6.1", "lastModified": "2025-01-09T16:43:02.437", "cpeLastModified": "2025-01-09T16:43:02.437", "created": "2025-01-09T16:43:02.437", "status": "Active", "matches": [{"cpeName": "cpe:2.3:a:themeum:tutor_lms:-:*:*:*:*:wordpress:*:*", "cpeNameId": "66106D56-2E9A-4098-BB78-2323E704374A"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.0.0:-:*:*:*:wordpress:*:*", "cpeNameId": "2A4520AB-AD86-4B15-A38E-4233190575F5"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.0.0:alpha:*:*:*:wordpress:*:*", "cpeNameId": "3D5E2B43-DCDF-40F6-8686-95D77FE4CC24"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.0.1:*:*:*:*:wordpress:*:*", "cpeNameId": "DF8CC9A0-C426-4F5B-940F-390040A336BF"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.0.2:*:*:*:*:wordpress:*:*", "cpeNameId": "8FB58BD7-FCD7-4F42-A55B-0728CEB96D9D"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.0.3:*:*:*:*:wordpress:*:*", "cpeNameId": "F41959C8-39ED-4C31-8B79-72DCE08CC1E9"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.0.4:*:*:*:*:wordpress:*:*", "cpeNameId": "124468BF-5337-4775-9FE7-259084B57AEB"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.0.5:*:*:*:*:wordpress:*:*", "cpeNameId": "313B4025-6A32-44EF-9695-42E74A348A3C"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.0.6:*:*:*:*:wordpress:*:*", "cpeNameId": "C1C9F2F1-79BE-4CEC-A6A0-45C0BF950234"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.0.7:*:*:*:*:wordpress:*:*", "cpeNameId": "C9D0E76D-6428-47E8-9C0B-187D730E1CA7"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.0.8:*:*:*:*:wordpress:*:*", "cpeNameId": "AAE47948-BB2D-4CC3-B10B-F871C1813E76"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.0.9:*:*:*:*:wordpress:*:*", "cpeNameId": "39E1752C-CD27-4FBE-8E21-4F16F589F344"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.1.0:*:*:*:*:wordpress:*:*", "cpeNameId": "EFAC5EC7-E7D9-4F75-83B1-32C3A67B1FE1"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.1.1:*:*:*:*:wordpress:*:*", "cpeNameId": "F8117047-365D-4562-AA73-071AED631837"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.2.0:*:*:*:*:wordpress:*:*", "cpeNameId": "6EEA8FA2-5F61-433A-983C-AFE575CEFCDA"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.2.1:*:*:*:*:wordpress:*:*", "cpeNameId": "4D84DD6B-7616-4A9A-A117-93EDADD9C2AF"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.2.11:*:*:*:*:wordpress:*:*", "cpeNameId": "39B85ECF-E1B5-4AD6-A57E-33E6EA6A2712"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.2.12:*:*:*:*:wordpress:*:*", "cpeNameId": "40476BA3-4407-4126-AA4F-E9211A34E88D"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.2.13:*:*:*:*:wordpress:*:*", "cpeNameId": "E9100DAF-2352-47CE-B90E-4FB6E8EE173E"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.2.20:*:*:*:*:wordpress:*:*", "cpeNameId": "D8097E51-FD75-4D8E-9CC2-B480407FD964"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.3.0:*:*:*:*:wordpress:*:*", "cpeNameId": "EB685DF7-D2D8-4481-A045-A6BB540E46CC"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.3.1:*:*:*:*:wordpress:*:*", "cpeNameId": "CF71E45C-2056-463C-898B-CE7BF97C3911"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.3.2:*:*:*:*:wordpress:*:*", "cpeNameId": "3C9B2988-299C-4C88-B2DE-0AC994E786E1"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.3.3:*:*:*:*:wordpress:*:*", "cpeNameId": "2CFB0177-5A46-4A23-8017-F8174E5B2488"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.3.4:*:*:*:*:wordpress:*:*", "cpeNameId": "5E72A60B-AC34-4203-8D77-6D23C69AD697"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.3.5:*:*:*:*:wordpress:*:*", "cpeNameId": "9F0DFFC3-1F33-4F43-BC54-4996FA65D431"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.3.6:*:*:*:*:wordpress:*:*", "cpeNameId": "B656CCD3-89C3-4F51-AB3E-F085CFBF705E"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.3.7:*:*:*:*:wordpress:*:*", "cpeNameId": "6ED19FDB-A410-44CD-8FB3-0893A4B9DE16"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.3.8:*:*:*:*:wordpress:*:*", "cpeNameId": "3BACAF25-6023-4BD8-8311-B46481BA21D4"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.3.9:*:*:*:*:wordpress:*:*", "cpeNameId": "106D27FE-CD6B-496A-AB0E-4A4A8FF8CB94"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.4.0:*:*:*:*:wordpress:*:*", "cpeNameId": "0A715E96-6CBC-444A-A0F3-E599474D47A5"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.4.1:*:*:*:*:wordpress:*:*", "cpeNameId": "C16211F3-5594-4B9E-84CC-877D51010C58"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.4.2:*:*:*:*:wordpress:*:*", "cpeNameId": "B4C67C07-3F25-46C9-8675-A14A181E6EB5"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.4.3:*:*:*:*:wordpress:*:*", "cpeNameId": "9AC95724-022C-4B10-BD21-52CB0BDF7547"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.4.4:*:*:*:*:wordpress:*:*", "cpeNameId": "F0C845C7-BB43-4034-9286-BD8433EAF8AE"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.4.5:*:*:*:*:wordpress:*:*", "cpeNameId": "620E1C39-BCDB-4593-931D-062FB75D7F43"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.4.6:*:*:*:*:wordpress:*:*", "cpeNameId": "E1371A46-190B-4484-8F44-FB031C982398"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.4.7:*:*:*:*:wordpress:*:*", "cpeNameId": "71239D7D-06F8-4893-9881-1962FC4FB0E2"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.4.8:*:*:*:*:wordpress:*:*", "cpeNameId": "C0B06F14-EC48-47F7-920F-891B99178A84"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.4.9:*:*:*:*:wordpress:*:*", "cpeNameId": "19C898B9-93AE-42E5-9B48-C84A9312FA56"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.5.0:*:*:*:*:wordpress:*:*", "cpeNameId": "01D12092-AC09-428B-8C60-6CF99A11F047"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.5.1:*:*:*:*:wordpress:*:*", "cpeNameId": "27F1D8A3-D383-486D-935C-4F7BE64D6E97"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.5.2:*:*:*:*:wordpress:*:*", "cpeNameId": "5532154D-25B7-475F-8F87-0CA8478ED1DB"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.5.3:*:*:*:*:wordpress:*:*", "cpeNameId": "9B1C3B7E-537E-4FC9-A775-EF87628AD83A"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.5.4:*:*:*:*:wordpress:*:*", "cpeNameId": "689844AC-493F-4F71-8E6B-4640D5D03ADE"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.5.5:*:*:*:*:wordpress:*:*", "cpeNameId": "98ED1B25-02BB-4D37-B3CF-8364F95988AC"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.5.6:*:*:*:*:wordpress:*:*", "cpeNameId": "F5F311F9-3A25-4759-9564-F175ADDD0F8E"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.5.7:*:*:*:*:wordpress:*:*", "cpeNameId": "646FD159-A87F-44C2-A1DE-4B886192E206"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.5.8:*:*:*:*:wordpress:*:*", "cpeNameId": "4977153F-A0EB-45F0-A1D8-8E2EAFB1D409"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.5.9:*:*:*:*:wordpress:*:*", "cpeNameId": "5B0A0583-F14A-4ACF-9FCF-F2E5B83E6FC1"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.6.0:*:*:*:*:wordpress:*:*", "cpeNameId": "DC646BE6-9427-41D9-A399-9AAF25975B6B"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.6.1:*:*:*:*:wordpress:*:*", "cpeNameId": "797A11B5-82D9-452C-A92E-1B0A4749097C"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.6.2:*:*:*:*:wordpress:*:*", "cpeNameId": "B7166C01-5058-406E-B426-1E28AE73E7A7"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.6.3:*:*:*:*:wordpress:*:*", "cpeNameId": "717A46CC-720F-437E-92F2-C6A511C9D47E"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.6.4:*:*:*:*:wordpress:*:*", "cpeNameId": "254D6D9E-A9D5-4125-A134-DB3179C6CBA7"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.6.5:*:*:*:*:wordpress:*:*", "cpeNameId": "80A6D412-970A-4F49-B212-672FE00C2BF4"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.6.6:*:*:*:*:wordpress:*:*", "cpeNameId": "43F8E4A3-2157-45B2-9951-8FD14E9E5697"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.6.7:*:*:*:*:wordpress:*:*", "cpeNameId": "4EA1D055-A65B-4718-AC6C-EF16826E5C0F"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.6.8:*:*:*:*:wordpress:*:*", "cpeNameId": "355E49F7-615C-474E-9943-02E731EDEFC7"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.6.9:*:*:*:*:wordpress:*:*", "cpeNameId": "D4F4F665-D948-405C-981C-FDD52D61F0E0"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.7.0:*:*:*:*:wordpress:*:*", "cpeNameId": "3628F5A9-0332-417D-B628-D8AA1C63CDCF"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.7.1:*:*:*:*:wordpress:*:*", "cpeNameId": "D3ECC6FE-2F46-49F6-91A2-C4888F49140C"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.7.2:*:*:*:*:wordpress:*:*", "cpeNameId": "4E3FC02A-B028-4451-87F6-51C8259ED7A2"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.7.3:*:*:*:*:wordpress:*:*", "cpeNameId": "11505733-BA9A-4E16-B0BC-A0A94AE93EC8"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.7.4:*:*:*:*:wordpress:*:*", "cpeNameId": "FA9CC4A7-31E0-4C5C-93DB-A355B8933FB4"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.7.5:*:*:*:*:wordpress:*:*", "cpeNameId": "53C521C5-D03E-4CFA-8F0B-D6A392ABDD41"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.7.6:*:*:*:*:wordpress:*:*", "cpeNameId": "96BACAE3-2F87-4865-BC2D-D257C22F73D3"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.7.7:*:*:*:*:wordpress:*:*", "cpeNameId": "39818733-1E11-441E-B7F0-FEF583ED638D"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.7.8:*:*:*:*:wordpress:*:*", "cpeNameId": "313DF337-41C6-416C-9E33-BFC1017B3B5C"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.7.9:*:*:*:*:wordpress:*:*", "cpeNameId": "426B1E32-FB6D-4A82-B32D-FE046227561B"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.8.0:*:*:*:*:wordpress:*:*", "cpeNameId": "C71D7BF3-1477-4AB5-BCF6-281F1C37579F"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.8.1:*:*:*:*:wordpress:*:*", "cpeNameId": "6F7E9493-993C-4A9C-A310-2C26D877C324"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.8.2:*:*:*:*:wordpress:*:*", "cpeNameId": "FB5D1642-BE24-41D5-A9E5-D95D7AB3A72C"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.8.3:*:*:*:*:wordpress:*:*", "cpeNameId": "0149DB16-6B4F-43B0-8F13-2EE8457608F5"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.8.4:*:*:*:*:wordpress:*:*", "cpeNameId": "750DF1D9-3F2F-46A3-A7F6-9FD5BED98147"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.8.5:*:*:*:*:wordpress:*:*", "cpeNameId": "A124FC4D-7240-4DAF-A8EE-909DFA0F75C5"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.8.6:*:*:*:*:wordpress:*:*", "cpeNameId": "E6A5D164-491C-4A8B-9FA0-36580E1149A9"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.8.7:*:*:*:*:wordpress:*:*", "cpeNameId": "14409048-FED3-4D9D-8900-449DD64F43A7"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.8.8:*:*:*:*:wordpress:*:*", "cpeNameId": "EC748A08-9A0F-41A7-A3C0-AAC8F541FFE9"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.8.9:*:*:*:*:wordpress:*:*", "cpeNameId": "DEC7785D-78C8-415B-8BCA-9D49C7217D3C"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.8.10:*:*:*:*:wordpress:*:*", "cpeNameId": "332503DD-5419-409E-9E41-2BEB247C2170"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.0:*:*:*:*:wordpress:*:*", "cpeNameId": "22C482D9-1290-4786-8DD7-8448753D1516"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.1:*:*:*:*:wordpress:*:*", "cpeNameId": "204E384E-EDA0-413E-A36F-7A9A6463E338"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.2:*:*:*:*:wordpress:*:*", "cpeNameId": "EEB25D88-0021-442A-90C7-4117FDE4103B"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.3:*:*:*:*:wordpress:*:*", "cpeNameId": "D1A59E89-91D2-488C-9F5F-8ACECA1388D9"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.4:*:*:*:*:wordpress:*:*", "cpeNameId": "65D23508-ACAE-4271-9483-2A8C3DED0E01"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.5:*:*:*:*:wordpress:*:*", "cpeNameId": "F5133B3E-028F-4896-A4B3-F474F6425C1D"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.6:*:*:*:*:wordpress:*:*", "cpeNameId": "CA8D09A0-6528-4956-A048-CEA3755787A0"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.7:*:*:*:*:wordpress:*:*", "cpeNameId": "FAED1883-A03B-41C4-888E-1090AFD08289"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.8:*:*:*:*:wordpress:*:*", "cpeNameId": "7DECE0C7-084A-47FF-8D22-ABD4649ECE77"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.9:*:*:*:*:wordpress:*:*", "cpeNameId": "A66E75A3-FBE6-4C55-9F9D-395A206DF48B"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.10:*:*:*:*:wordpress:*:*", "cpeNameId": "F2E004CF-D616-444E-80EF-2467F812E0B7"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.11:*:*:*:*:wordpress:*:*", "cpeNameId": "A1F64816-2280-41DA-A49B-575623943494"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.12:*:*:*:*:wordpress:*:*", "cpeNameId": "1DFF5671-0525-4C5D-936F-B436E59B46BD"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.13:*:*:*:*:wordpress:*:*", "cpeNameId": "481C6CFA-CBE4-47C0-B40B-B13B01045976"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.14:*:*:*:*:wordpress:*:*", "cpeNameId": "FEBC3C38-4EA0-490C-9F29-C9B068031DC0"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.15:*:*:*:*:wordpress:*:*", "cpeNameId": "F4FA5322-E757-4896-A8E2-90C196929114"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.16:*:*:*:*:wordpress:*:*", "cpeNameId": "2617AB77-9B94-4053-9283-B17DE789DFEA"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.0.0:*:*:*:*:wordpress:*:*", "cpeNameId": "222466FD-EED9-4F20-916E-DB3BBACFFC58"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.0.1:*:*:*:*:wordpress:*:*", "cpeNameId": "07434B19-2D1F-4C10-92CF-DA80E7CC105A"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.0.2:*:*:*:*:wordpress:*:*", "cpeNameId": "AD23B45A-DAE2-4E90-81B5-0EF98D0C2FEB"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.0.3:*:*:*:*:wordpress:*:*", "cpeNameId": "4DA2B442-4F2C-4870-A20E-E59882CB6963"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.0.4:*:*:*:*:wordpress:*:*", "cpeNameId": "4AB986C5-8373-4229-9C61-6357BC906614"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.0.5:*:*:*:*:wordpress:*:*", "cpeNameId": "BE1C7B70-01D4-4775-8B4E-4A31F63659DE"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.0.6:*:*:*:*:wordpress:*:*", "cpeNameId": "573FEB3F-C2F0-452E-9C2A-939C3C12AE66"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.0.7:*:*:*:*:wordpress:*:*", "cpeNameId": "5113E2D5-73B8-4633-95E2-0976FEE63ED0"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.0.8:*:*:*:*:wordpress:*:*", "cpeNameId": "C2426453-D370-4582-A55E-A8FBB40E3DCB"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.0.9:*:*:*:*:wordpress:*:*", "cpeNameId": "3F042A25-170D-4983-BDC4-6218AB5136AD"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.0.10:*:*:*:*:wordpress:*:*", "cpeNameId": "B893EEB8-B6E4-4D6A-A8C2-3018E03DD614"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.1.0:*:*:*:*:wordpress:*:*", "cpeNameId": "EBEAF2CE-A0D4-4B86-B6A6-5A236AEEDC35"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.1.1:*:*:*:*:wordpress:*:*", "cpeNameId": "7E493E02-C72F-4D84-90A3-900240E17E9F"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.1.2:*:*:*:*:wordpress:*:*", "cpeNameId": "63CA9691-17DA-484C-8E0A-91879FC64F51"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.1.3:*:*:*:*:wordpress:*:*", "cpeNameId": "759CA983-0CDF-48F6-9935-8A7337EC1C22"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.1.4:*:*:*:*:wordpress:*:*", "cpeNameId": "A7FA4467-CD30-44E7-BAC5-FCB9F5FD1FD6"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.1.5:*:*:*:*:wordpress:*:*", "cpeNameId": "4CA1EA76-3897-430E-B32E-D3E1D5FEA3C9"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.1.6:*:*:*:*:wordpress:*:*", "cpeNameId": "6F0505DC-B5F4-4D8E-A6E3-2B9687A6CFA3"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.1.7:*:*:*:*:wordpress:*:*", "cpeNameId": "1C199316-E27F-4374-B3C9-A74A4CF203E8"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.1.8:*:*:*:*:wordpress:*:*", "cpeNameId": "981EC46A-20A3-4186-AF1D-43FE118403D1"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.1.9:*:*:*:*:wordpress:*:*", "cpeNameId": "E83A592F-6768-4597-AA99-EFE3B9E42FEC"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.1.10:*:*:*:*:wordpress:*:*", "cpeNameId": "5F6048F9-DD31-48FE-A0A1-6B10FB6D0B0E"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.2.0:*:*:*:*:wordpress:*:*", "cpeNameId": "74EB8DF6-D9B8-4AE6-AF6F-46CC291985DB"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.2.1:*:*:*:*:wordpress:*:*", "cpeNameId": "9A4D4BE2-F691-4C10-9A8D-C20B4D598C9F"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.2.2:*:*:*:*:wordpress:*:*", "cpeNameId": "8B71AAF1-2CF3-493E-BE57-2B76BCA46166"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.2.3:*:*:*:*:wordpress:*:*", "cpeNameId": "CA42D59F-98F7-429A-93FC-EB9EFAEAA784"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.2.4:*:*:*:*:wordpress:*:*", "cpeNameId": "DA885B8E-4AAE-43BA-826B-205035901A93"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.3.0:*:*:*:*:wordpress:*:*", "cpeNameId": "74C9373D-0449-4B4C-BDBA-BEF6AE3E5C41"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.4.0:*:*:*:*:wordpress:*:*", "cpeNameId": "BFA9D04A-78D8-4139-A0D8-8C782BFF6A53"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.5.0:*:*:*:*:wordpress:*:*", "cpeNameId": "98CCC884-FC38-4399-8454-B6F8BF969A1A"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.6.0:*:*:*:*:wordpress:*:*", "cpeNameId": "BC6E4DD3-F467-49E8-96CA-285E189BC28B"}]}} \ No newline at end of file diff --git a/cpematch/A6/A615DCE6-67AC-4717-A274-E2001B0074BC.json b/cpematch/A6/A615DCE6-67AC-4717-A274-E2001B0074BC.json new file mode 100644 index 00000000000..6581192eacb --- /dev/null +++ b/cpematch/A6/A615DCE6-67AC-4717-A274-E2001B0074BC.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "A615DCE6-67AC-4717-A274-E2001B0074BC", "criteria": "cpe:2.3:a:themeum:tutor_lms:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "2.6.2", "lastModified": "2025-01-09T16:46:29.917", "cpeLastModified": "2025-01-09T16:46:29.917", "created": "2025-01-09T16:46:29.917", "status": "Active", "matches": [{"cpeName": "cpe:2.3:a:themeum:tutor_lms:-:*:*:*:*:wordpress:*:*", "cpeNameId": "66106D56-2E9A-4098-BB78-2323E704374A"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.0.0:-:*:*:*:wordpress:*:*", "cpeNameId": "2A4520AB-AD86-4B15-A38E-4233190575F5"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.0.0:alpha:*:*:*:wordpress:*:*", "cpeNameId": "3D5E2B43-DCDF-40F6-8686-95D77FE4CC24"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.0.1:*:*:*:*:wordpress:*:*", "cpeNameId": "DF8CC9A0-C426-4F5B-940F-390040A336BF"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.0.2:*:*:*:*:wordpress:*:*", "cpeNameId": "8FB58BD7-FCD7-4F42-A55B-0728CEB96D9D"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.0.3:*:*:*:*:wordpress:*:*", "cpeNameId": "F41959C8-39ED-4C31-8B79-72DCE08CC1E9"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.0.4:*:*:*:*:wordpress:*:*", "cpeNameId": "124468BF-5337-4775-9FE7-259084B57AEB"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.0.5:*:*:*:*:wordpress:*:*", "cpeNameId": "313B4025-6A32-44EF-9695-42E74A348A3C"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.0.6:*:*:*:*:wordpress:*:*", "cpeNameId": "C1C9F2F1-79BE-4CEC-A6A0-45C0BF950234"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.0.7:*:*:*:*:wordpress:*:*", "cpeNameId": "C9D0E76D-6428-47E8-9C0B-187D730E1CA7"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.0.8:*:*:*:*:wordpress:*:*", "cpeNameId": "AAE47948-BB2D-4CC3-B10B-F871C1813E76"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.0.9:*:*:*:*:wordpress:*:*", "cpeNameId": "39E1752C-CD27-4FBE-8E21-4F16F589F344"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.1.0:*:*:*:*:wordpress:*:*", "cpeNameId": "EFAC5EC7-E7D9-4F75-83B1-32C3A67B1FE1"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.1.1:*:*:*:*:wordpress:*:*", "cpeNameId": "F8117047-365D-4562-AA73-071AED631837"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.2.0:*:*:*:*:wordpress:*:*", "cpeNameId": "6EEA8FA2-5F61-433A-983C-AFE575CEFCDA"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.2.1:*:*:*:*:wordpress:*:*", "cpeNameId": "4D84DD6B-7616-4A9A-A117-93EDADD9C2AF"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.2.11:*:*:*:*:wordpress:*:*", "cpeNameId": "39B85ECF-E1B5-4AD6-A57E-33E6EA6A2712"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.2.12:*:*:*:*:wordpress:*:*", "cpeNameId": "40476BA3-4407-4126-AA4F-E9211A34E88D"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.2.13:*:*:*:*:wordpress:*:*", "cpeNameId": "E9100DAF-2352-47CE-B90E-4FB6E8EE173E"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.2.20:*:*:*:*:wordpress:*:*", "cpeNameId": "D8097E51-FD75-4D8E-9CC2-B480407FD964"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.3.0:*:*:*:*:wordpress:*:*", "cpeNameId": "EB685DF7-D2D8-4481-A045-A6BB540E46CC"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.3.1:*:*:*:*:wordpress:*:*", "cpeNameId": "CF71E45C-2056-463C-898B-CE7BF97C3911"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.3.2:*:*:*:*:wordpress:*:*", "cpeNameId": "3C9B2988-299C-4C88-B2DE-0AC994E786E1"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.3.3:*:*:*:*:wordpress:*:*", "cpeNameId": "2CFB0177-5A46-4A23-8017-F8174E5B2488"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.3.4:*:*:*:*:wordpress:*:*", "cpeNameId": "5E72A60B-AC34-4203-8D77-6D23C69AD697"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.3.5:*:*:*:*:wordpress:*:*", "cpeNameId": "9F0DFFC3-1F33-4F43-BC54-4996FA65D431"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.3.6:*:*:*:*:wordpress:*:*", "cpeNameId": "B656CCD3-89C3-4F51-AB3E-F085CFBF705E"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.3.7:*:*:*:*:wordpress:*:*", "cpeNameId": "6ED19FDB-A410-44CD-8FB3-0893A4B9DE16"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.3.8:*:*:*:*:wordpress:*:*", "cpeNameId": "3BACAF25-6023-4BD8-8311-B46481BA21D4"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.3.9:*:*:*:*:wordpress:*:*", "cpeNameId": "106D27FE-CD6B-496A-AB0E-4A4A8FF8CB94"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.4.0:*:*:*:*:wordpress:*:*", "cpeNameId": "0A715E96-6CBC-444A-A0F3-E599474D47A5"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.4.1:*:*:*:*:wordpress:*:*", "cpeNameId": "C16211F3-5594-4B9E-84CC-877D51010C58"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.4.2:*:*:*:*:wordpress:*:*", "cpeNameId": "B4C67C07-3F25-46C9-8675-A14A181E6EB5"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.4.3:*:*:*:*:wordpress:*:*", "cpeNameId": "9AC95724-022C-4B10-BD21-52CB0BDF7547"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.4.4:*:*:*:*:wordpress:*:*", "cpeNameId": "F0C845C7-BB43-4034-9286-BD8433EAF8AE"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.4.5:*:*:*:*:wordpress:*:*", "cpeNameId": "620E1C39-BCDB-4593-931D-062FB75D7F43"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.4.6:*:*:*:*:wordpress:*:*", "cpeNameId": "E1371A46-190B-4484-8F44-FB031C982398"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.4.7:*:*:*:*:wordpress:*:*", "cpeNameId": "71239D7D-06F8-4893-9881-1962FC4FB0E2"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.4.8:*:*:*:*:wordpress:*:*", "cpeNameId": "C0B06F14-EC48-47F7-920F-891B99178A84"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.4.9:*:*:*:*:wordpress:*:*", "cpeNameId": "19C898B9-93AE-42E5-9B48-C84A9312FA56"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.5.0:*:*:*:*:wordpress:*:*", "cpeNameId": "01D12092-AC09-428B-8C60-6CF99A11F047"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.5.1:*:*:*:*:wordpress:*:*", "cpeNameId": "27F1D8A3-D383-486D-935C-4F7BE64D6E97"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.5.2:*:*:*:*:wordpress:*:*", "cpeNameId": "5532154D-25B7-475F-8F87-0CA8478ED1DB"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.5.3:*:*:*:*:wordpress:*:*", "cpeNameId": "9B1C3B7E-537E-4FC9-A775-EF87628AD83A"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.5.4:*:*:*:*:wordpress:*:*", "cpeNameId": "689844AC-493F-4F71-8E6B-4640D5D03ADE"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.5.5:*:*:*:*:wordpress:*:*", "cpeNameId": "98ED1B25-02BB-4D37-B3CF-8364F95988AC"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.5.6:*:*:*:*:wordpress:*:*", "cpeNameId": "F5F311F9-3A25-4759-9564-F175ADDD0F8E"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.5.7:*:*:*:*:wordpress:*:*", "cpeNameId": "646FD159-A87F-44C2-A1DE-4B886192E206"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.5.8:*:*:*:*:wordpress:*:*", "cpeNameId": "4977153F-A0EB-45F0-A1D8-8E2EAFB1D409"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.5.9:*:*:*:*:wordpress:*:*", "cpeNameId": "5B0A0583-F14A-4ACF-9FCF-F2E5B83E6FC1"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.6.0:*:*:*:*:wordpress:*:*", "cpeNameId": "DC646BE6-9427-41D9-A399-9AAF25975B6B"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.6.1:*:*:*:*:wordpress:*:*", "cpeNameId": "797A11B5-82D9-452C-A92E-1B0A4749097C"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.6.2:*:*:*:*:wordpress:*:*", "cpeNameId": "B7166C01-5058-406E-B426-1E28AE73E7A7"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.6.3:*:*:*:*:wordpress:*:*", "cpeNameId": "717A46CC-720F-437E-92F2-C6A511C9D47E"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.6.4:*:*:*:*:wordpress:*:*", "cpeNameId": "254D6D9E-A9D5-4125-A134-DB3179C6CBA7"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.6.5:*:*:*:*:wordpress:*:*", "cpeNameId": "80A6D412-970A-4F49-B212-672FE00C2BF4"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.6.6:*:*:*:*:wordpress:*:*", "cpeNameId": "43F8E4A3-2157-45B2-9951-8FD14E9E5697"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.6.7:*:*:*:*:wordpress:*:*", "cpeNameId": "4EA1D055-A65B-4718-AC6C-EF16826E5C0F"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.6.8:*:*:*:*:wordpress:*:*", "cpeNameId": "355E49F7-615C-474E-9943-02E731EDEFC7"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.6.9:*:*:*:*:wordpress:*:*", "cpeNameId": "D4F4F665-D948-405C-981C-FDD52D61F0E0"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.7.0:*:*:*:*:wordpress:*:*", "cpeNameId": "3628F5A9-0332-417D-B628-D8AA1C63CDCF"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.7.1:*:*:*:*:wordpress:*:*", "cpeNameId": "D3ECC6FE-2F46-49F6-91A2-C4888F49140C"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.7.2:*:*:*:*:wordpress:*:*", "cpeNameId": "4E3FC02A-B028-4451-87F6-51C8259ED7A2"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.7.3:*:*:*:*:wordpress:*:*", "cpeNameId": "11505733-BA9A-4E16-B0BC-A0A94AE93EC8"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.7.4:*:*:*:*:wordpress:*:*", "cpeNameId": "FA9CC4A7-31E0-4C5C-93DB-A355B8933FB4"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.7.5:*:*:*:*:wordpress:*:*", "cpeNameId": "53C521C5-D03E-4CFA-8F0B-D6A392ABDD41"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.7.6:*:*:*:*:wordpress:*:*", "cpeNameId": "96BACAE3-2F87-4865-BC2D-D257C22F73D3"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.7.7:*:*:*:*:wordpress:*:*", "cpeNameId": "39818733-1E11-441E-B7F0-FEF583ED638D"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.7.8:*:*:*:*:wordpress:*:*", "cpeNameId": "313DF337-41C6-416C-9E33-BFC1017B3B5C"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.7.9:*:*:*:*:wordpress:*:*", "cpeNameId": "426B1E32-FB6D-4A82-B32D-FE046227561B"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.8.0:*:*:*:*:wordpress:*:*", "cpeNameId": "C71D7BF3-1477-4AB5-BCF6-281F1C37579F"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.8.1:*:*:*:*:wordpress:*:*", "cpeNameId": "6F7E9493-993C-4A9C-A310-2C26D877C324"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.8.2:*:*:*:*:wordpress:*:*", "cpeNameId": "FB5D1642-BE24-41D5-A9E5-D95D7AB3A72C"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.8.3:*:*:*:*:wordpress:*:*", "cpeNameId": "0149DB16-6B4F-43B0-8F13-2EE8457608F5"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.8.4:*:*:*:*:wordpress:*:*", "cpeNameId": "750DF1D9-3F2F-46A3-A7F6-9FD5BED98147"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.8.5:*:*:*:*:wordpress:*:*", "cpeNameId": "A124FC4D-7240-4DAF-A8EE-909DFA0F75C5"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.8.6:*:*:*:*:wordpress:*:*", "cpeNameId": "E6A5D164-491C-4A8B-9FA0-36580E1149A9"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.8.7:*:*:*:*:wordpress:*:*", "cpeNameId": "14409048-FED3-4D9D-8900-449DD64F43A7"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.8.8:*:*:*:*:wordpress:*:*", "cpeNameId": "EC748A08-9A0F-41A7-A3C0-AAC8F541FFE9"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.8.9:*:*:*:*:wordpress:*:*", "cpeNameId": "DEC7785D-78C8-415B-8BCA-9D49C7217D3C"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.8.10:*:*:*:*:wordpress:*:*", "cpeNameId": "332503DD-5419-409E-9E41-2BEB247C2170"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.0:*:*:*:*:wordpress:*:*", "cpeNameId": "22C482D9-1290-4786-8DD7-8448753D1516"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.1:*:*:*:*:wordpress:*:*", "cpeNameId": "204E384E-EDA0-413E-A36F-7A9A6463E338"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.2:*:*:*:*:wordpress:*:*", "cpeNameId": "EEB25D88-0021-442A-90C7-4117FDE4103B"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.3:*:*:*:*:wordpress:*:*", "cpeNameId": "D1A59E89-91D2-488C-9F5F-8ACECA1388D9"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.4:*:*:*:*:wordpress:*:*", "cpeNameId": "65D23508-ACAE-4271-9483-2A8C3DED0E01"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.5:*:*:*:*:wordpress:*:*", "cpeNameId": "F5133B3E-028F-4896-A4B3-F474F6425C1D"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.6:*:*:*:*:wordpress:*:*", "cpeNameId": "CA8D09A0-6528-4956-A048-CEA3755787A0"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.7:*:*:*:*:wordpress:*:*", "cpeNameId": "FAED1883-A03B-41C4-888E-1090AFD08289"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.8:*:*:*:*:wordpress:*:*", "cpeNameId": "7DECE0C7-084A-47FF-8D22-ABD4649ECE77"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.9:*:*:*:*:wordpress:*:*", "cpeNameId": "A66E75A3-FBE6-4C55-9F9D-395A206DF48B"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.10:*:*:*:*:wordpress:*:*", "cpeNameId": "F2E004CF-D616-444E-80EF-2467F812E0B7"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.11:*:*:*:*:wordpress:*:*", "cpeNameId": "A1F64816-2280-41DA-A49B-575623943494"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.12:*:*:*:*:wordpress:*:*", "cpeNameId": "1DFF5671-0525-4C5D-936F-B436E59B46BD"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.13:*:*:*:*:wordpress:*:*", "cpeNameId": "481C6CFA-CBE4-47C0-B40B-B13B01045976"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.14:*:*:*:*:wordpress:*:*", "cpeNameId": "FEBC3C38-4EA0-490C-9F29-C9B068031DC0"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.15:*:*:*:*:wordpress:*:*", "cpeNameId": "F4FA5322-E757-4896-A8E2-90C196929114"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.16:*:*:*:*:wordpress:*:*", "cpeNameId": "2617AB77-9B94-4053-9283-B17DE789DFEA"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.0.0:*:*:*:*:wordpress:*:*", "cpeNameId": "222466FD-EED9-4F20-916E-DB3BBACFFC58"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.0.1:*:*:*:*:wordpress:*:*", "cpeNameId": "07434B19-2D1F-4C10-92CF-DA80E7CC105A"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.0.2:*:*:*:*:wordpress:*:*", "cpeNameId": "AD23B45A-DAE2-4E90-81B5-0EF98D0C2FEB"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.0.3:*:*:*:*:wordpress:*:*", "cpeNameId": "4DA2B442-4F2C-4870-A20E-E59882CB6963"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.0.4:*:*:*:*:wordpress:*:*", "cpeNameId": "4AB986C5-8373-4229-9C61-6357BC906614"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.0.5:*:*:*:*:wordpress:*:*", "cpeNameId": "BE1C7B70-01D4-4775-8B4E-4A31F63659DE"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.0.6:*:*:*:*:wordpress:*:*", "cpeNameId": "573FEB3F-C2F0-452E-9C2A-939C3C12AE66"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.0.7:*:*:*:*:wordpress:*:*", "cpeNameId": "5113E2D5-73B8-4633-95E2-0976FEE63ED0"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.0.8:*:*:*:*:wordpress:*:*", "cpeNameId": "C2426453-D370-4582-A55E-A8FBB40E3DCB"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.0.9:*:*:*:*:wordpress:*:*", "cpeNameId": "3F042A25-170D-4983-BDC4-6218AB5136AD"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.0.10:*:*:*:*:wordpress:*:*", "cpeNameId": "B893EEB8-B6E4-4D6A-A8C2-3018E03DD614"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.1.0:*:*:*:*:wordpress:*:*", "cpeNameId": "EBEAF2CE-A0D4-4B86-B6A6-5A236AEEDC35"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.1.1:*:*:*:*:wordpress:*:*", "cpeNameId": "7E493E02-C72F-4D84-90A3-900240E17E9F"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.1.2:*:*:*:*:wordpress:*:*", "cpeNameId": "63CA9691-17DA-484C-8E0A-91879FC64F51"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.1.3:*:*:*:*:wordpress:*:*", "cpeNameId": "759CA983-0CDF-48F6-9935-8A7337EC1C22"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.1.4:*:*:*:*:wordpress:*:*", "cpeNameId": "A7FA4467-CD30-44E7-BAC5-FCB9F5FD1FD6"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.1.5:*:*:*:*:wordpress:*:*", "cpeNameId": "4CA1EA76-3897-430E-B32E-D3E1D5FEA3C9"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.1.6:*:*:*:*:wordpress:*:*", "cpeNameId": "6F0505DC-B5F4-4D8E-A6E3-2B9687A6CFA3"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.1.7:*:*:*:*:wordpress:*:*", "cpeNameId": "1C199316-E27F-4374-B3C9-A74A4CF203E8"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.1.8:*:*:*:*:wordpress:*:*", "cpeNameId": "981EC46A-20A3-4186-AF1D-43FE118403D1"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.1.9:*:*:*:*:wordpress:*:*", "cpeNameId": "E83A592F-6768-4597-AA99-EFE3B9E42FEC"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.1.10:*:*:*:*:wordpress:*:*", "cpeNameId": "5F6048F9-DD31-48FE-A0A1-6B10FB6D0B0E"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.2.0:*:*:*:*:wordpress:*:*", "cpeNameId": "74EB8DF6-D9B8-4AE6-AF6F-46CC291985DB"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.2.1:*:*:*:*:wordpress:*:*", "cpeNameId": "9A4D4BE2-F691-4C10-9A8D-C20B4D598C9F"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.2.2:*:*:*:*:wordpress:*:*", "cpeNameId": "8B71AAF1-2CF3-493E-BE57-2B76BCA46166"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.2.3:*:*:*:*:wordpress:*:*", "cpeNameId": "CA42D59F-98F7-429A-93FC-EB9EFAEAA784"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.2.4:*:*:*:*:wordpress:*:*", "cpeNameId": "DA885B8E-4AAE-43BA-826B-205035901A93"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.3.0:*:*:*:*:wordpress:*:*", "cpeNameId": "74C9373D-0449-4B4C-BDBA-BEF6AE3E5C41"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.4.0:*:*:*:*:wordpress:*:*", "cpeNameId": "BFA9D04A-78D8-4139-A0D8-8C782BFF6A53"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.5.0:*:*:*:*:wordpress:*:*", "cpeNameId": "98CCC884-FC38-4399-8454-B6F8BF969A1A"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.6.0:*:*:*:*:wordpress:*:*", "cpeNameId": "BC6E4DD3-F467-49E8-96CA-285E189BC28B"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.6.1:*:*:*:*:wordpress:*:*", "cpeNameId": "D9E306CE-9D7E-4D98-838A-4668F702B0D4"}]}} \ No newline at end of file diff --git a/cpematch/AE/AE5BF211-C0AC-4C88-BEA3-A6AC61FDB878.json b/cpematch/AE/AE5BF211-C0AC-4C88-BEA3-A6AC61FDB878.json index 6bb4dda8a1d..210fa737d65 100644 --- a/cpematch/AE/AE5BF211-C0AC-4C88-BEA3-A6AC61FDB878.json +++ b/cpematch/AE/AE5BF211-C0AC-4C88-BEA3-A6AC61FDB878.json @@ -1 +1 @@ -{"matchString": {"matchCriteriaId": "AE5BF211-C0AC-4C88-BEA3-A6AC61FDB878", "criteria": "cpe:2.3:a:wpmet:elementskit_elementor_addons:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "3.0.4", "lastModified": "2025-01-07T21:36:56.740", "cpeLastModified": "2025-01-07T21:36:56.740", "created": "2025-01-07T21:36:56.740", "status": "Active", "matches": [{"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:-:*:*:*:*:wordpress:*:*", "cpeNameId": "CCDEC17D-5272-4330-8BA0-69FC27D8319D"}]}} \ No newline at end of file +{"matchString": {"matchCriteriaId": "AE5BF211-C0AC-4C88-BEA3-A6AC61FDB878", "criteria": "cpe:2.3:a:wpmet:elementskit_elementor_addons:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "3.0.4", "lastModified": "2025-01-09T17:44:38.630", "cpeLastModified": "2025-01-09T17:44:38.630", "created": "2025-01-07T21:36:56.740", "status": "Active", "matches": [{"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:-:*:*:*:*:wordpress:*:*", "cpeNameId": "CCDEC17D-5272-4330-8BA0-69FC27D8319D"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:1.3.4:*:*:*:*:wordpress:*:*", "cpeNameId": "CC94DFD0-7846-469D-B08C-4EE6DA1EE818"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:1.3.8:*:*:*:*:wordpress:*:*", "cpeNameId": "B4C8E208-C662-479D-9C94-C6950E771790"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:1.3.9:*:*:*:*:wordpress:*:*", "cpeNameId": "0F2B95FC-90D7-4435-81CF-4D2E915F1B64"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:1.4.0:*:*:*:*:wordpress:*:*", "cpeNameId": "3F521B5E-D61A-47B9-ABFB-254D4820BA8D"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:1.4.1:*:*:*:*:wordpress:*:*", "cpeNameId": "B980AD58-921B-4FC4-BA37-322129AB0DAC"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:1.4.2:*:*:*:*:wordpress:*:*", "cpeNameId": "78CC48E9-E044-45C4-B728-0FACEAF66341"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:1.4.3:*:*:*:*:wordpress:*:*", "cpeNameId": "18885BFF-33DD-42EF-B735-1EAC435B411B"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:1.4.4:*:*:*:*:wordpress:*:*", "cpeNameId": "8CD1E1DB-65CE-4658-A034-8D2C64D59682"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:1.4.5:*:*:*:*:wordpress:*:*", "cpeNameId": "15CB2E0F-EB89-4126-A31B-1CE140CA80B6"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:1.4.7:*:*:*:*:wordpress:*:*", "cpeNameId": "0318BAC5-E96E-444A-B209-62A3D194A75B"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:1.4.8:*:*:*:*:wordpress:*:*", "cpeNameId": "1D6B9D36-23D4-4710-BAE8-703BE28F379D"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:1.4.9:*:*:*:*:wordpress:*:*", "cpeNameId": "A61F11FF-9869-4842-9E00-47266997DAAD"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:1.5.0:*:*:*:*:wordpress:*:*", "cpeNameId": "A65B6E55-BE92-4392-8B64-A19CA1BE6A2F"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:1.5.1:*:*:*:*:wordpress:*:*", "cpeNameId": "C2D32C46-090A-4A8F-B353-1444C840F40A"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:1.5.2:*:*:*:*:wordpress:*:*", "cpeNameId": "2966EB53-19E5-4CD8-A783-EACC546C032F"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:1.5.3:*:*:*:*:wordpress:*:*", "cpeNameId": "4B15B89E-B41E-4AD5-8939-76AA40ABBC8E"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:1.5.4:*:*:*:*:wordpress:*:*", "cpeNameId": "E138E010-0C47-48BE-BED4-7462409C1826"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:1.5.5:*:*:*:*:wordpress:*:*", "cpeNameId": "F1984F2B-E7DF-4972-86BD-8F5038F77931"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:1.5.6:*:*:*:*:wordpress:*:*", "cpeNameId": "F47EBEB9-D065-4110-A19D-2F4EAC2AE49D"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:1.5.7:*:*:*:*:wordpress:*:*", "cpeNameId": "5F2D5EB0-92A7-4432-97B5-0847CEA9D863"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:1.5.8:*:*:*:*:wordpress:*:*", "cpeNameId": "CC3C3C2C-E0D5-441F-96EC-0951CC0CE3A7"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:1.5.9:*:*:*:*:wordpress:*:*", "cpeNameId": "675FB260-F040-4C23-9BE8-E3AC2F7A4156"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:1.5.10:*:*:*:*:wordpress:*:*", "cpeNameId": "15FBBCC1-AA2B-45FD-A1BE-57360EFA4CA9"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:1.5.11:*:*:*:*:wordpress:*:*", "cpeNameId": "DD3C3F6E-672E-4B9E-9C15-B724A062B571"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:1.5.12:*:*:*:*:wordpress:*:*", "cpeNameId": "10E39DF6-1468-4B78-AC39-C948F580B1A2"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.0.0:*:*:*:*:wordpress:*:*", "cpeNameId": "416E7A39-A5CB-49E3-A178-AA831738F20F"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.0.1:*:*:*:*:wordpress:*:*", "cpeNameId": "C86EBDD3-3920-42A8-9CEF-C49E0BD94333"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.0.2:*:*:*:*:wordpress:*:*", "cpeNameId": "167C8EB6-CBA5-44F7-8C59-06662A6CFDB7"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.0.3:*:*:*:*:wordpress:*:*", "cpeNameId": "5358F408-DA2A-4EE9-857D-C645B48FE7B8"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.0.4:*:*:*:*:wordpress:*:*", "cpeNameId": "B0A3B1FB-5AD0-4D9E-8E08-E93B010D9360"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.0.5:*:*:*:*:wordpress:*:*", "cpeNameId": "91540B4C-CB95-4DEC-B5B5-E8AC1342E03F"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.0.6:*:*:*:*:wordpress:*:*", "cpeNameId": "8B79C810-91AC-471C-B3C4-BF14B5A5E08A"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.0.7:*:*:*:*:wordpress:*:*", "cpeNameId": "85BE819D-8658-44AC-8854-451BC10DA2EA"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.0.8:*:*:*:*:wordpress:*:*", "cpeNameId": "3B174E6C-8FEC-43FE-886E-263F63D644FE"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.0.9:*:*:*:*:wordpress:*:*", "cpeNameId": "E6421FD1-E8D4-4BF5-AB38-414529F18040"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.0.9.1:*:*:*:*:wordpress:*:*", "cpeNameId": "4A659525-CFC1-4D97-8AD9-26F842CAC135"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.0.9.2:*:*:*:*:wordpress:*:*", "cpeNameId": "7132E72B-3CA9-40B8-8BB3-01BEB9D8F754"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.0.9.3:*:*:*:*:wordpress:*:*", "cpeNameId": "FD0C9C93-A857-4C2D-847A-278185BFD4E6"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.0.10:*:*:*:*:wordpress:*:*", "cpeNameId": "DF7837B3-62AD-4EF0-BE34-D57878ED683D"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.0.11:*:*:*:*:wordpress:*:*", "cpeNameId": "108A7A79-D572-4C0F-98C3-6DE8161C2DAA"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.0.12:*:*:*:*:wordpress:*:*", "cpeNameId": "B99D60AD-0A98-4A84-AB06-382A30194B75"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.0.13:*:*:*:*:wordpress:*:*", "cpeNameId": "03EE17E0-A0ED-40B1-BA1E-5CD0D2D1B6F4"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.1.0:*:*:*:*:wordpress:*:*", "cpeNameId": "A2B0C3B6-A45C-4286-AF4A-0822B4558C0F"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.1.1:*:*:*:*:wordpress:*:*", "cpeNameId": "7E8020B2-3544-4DA7-AB56-E7C65CBD469F"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.1.2:*:*:*:*:wordpress:*:*", "cpeNameId": "379415C5-4A19-45BE-825B-DE02ECFF52D4"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.1.3:*:*:*:*:wordpress:*:*", "cpeNameId": "D202FA0F-0579-43C9-B105-FB4B77852C6D"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.1.4:*:*:*:*:wordpress:*:*", "cpeNameId": "9724795A-202E-433B-BCFC-752E8F42391E"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.1.5:*:*:*:*:wordpress:*:*", "cpeNameId": "4AB5439A-142F-401B-94CA-6F5544D11132"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.1.6:*:*:*:*:wordpress:*:*", "cpeNameId": "4CD8F4CF-1B3B-413D-A9FC-C07FB5C9B96C"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.1.7:*:*:*:*:wordpress:*:*", "cpeNameId": "189A6326-6ABE-4C26-A798-024695E31CBE"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.2.0:*:*:*:*:wordpress:*:*", "cpeNameId": "2964B18A-D1CC-4873-9C15-2D6675FA91AC"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.2.1:*:*:*:*:wordpress:*:*", "cpeNameId": "E3546C72-CC78-4F91-AEF4-60EA37985901"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.2.2:*:*:*:*:wordpress:*:*", "cpeNameId": "25494BF7-A651-4F1E-9845-371E6B3D4047"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.2.3:*:*:*:*:wordpress:*:*", "cpeNameId": "AD2099E0-6D30-42CD-B046-BE3E65D045DF"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.2.4:*:*:*:*:wordpress:*:*", "cpeNameId": "34288E57-E0A1-4F39-ABE6-FF6640BABDB5"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.3.0:*:*:*:*:wordpress:*:*", "cpeNameId": "9560E386-D279-40A5-A2C1-B10EEDDB9846"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.3.1:*:*:*:*:wordpress:*:*", "cpeNameId": "A6B073AC-7A3B-496A-81E8-C64DD1EBB6C1"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.3.1.1:*:*:*:*:wordpress:*:*", "cpeNameId": "7E6355D6-0501-4A5C-880F-248F670672CB"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.3.2:*:*:*:*:wordpress:*:*", "cpeNameId": "EF004CAF-7716-4ADA-99A1-69D88B94CA46"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.3.3:*:*:*:*:wordpress:*:*", "cpeNameId": "4005EF5C-C24F-4153-A826-E281A9CC3F98"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.3.4:*:*:*:*:wordpress:*:*", "cpeNameId": "ADCB2C6F-2E62-4A4E-8A2B-7604096563F3"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.3.5:*:*:*:*:wordpress:*:*", "cpeNameId": "8A22A671-1634-49A8-A3A5-1F697F0E8135"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.3.6:*:*:*:*:wordpress:*:*", "cpeNameId": "7B754E89-1426-4E48-85B9-8BFDE9F1189F"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.3.7:*:*:*:*:wordpress:*:*", "cpeNameId": "E3CE81F4-7D2A-43F6-8B4C-93B73DBD385F"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.4.0:*:*:*:*:wordpress:*:*", "cpeNameId": "24FF35EC-65A2-4115-BB7D-A3C97ED620C3"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.5.0:*:*:*:*:wordpress:*:*", "cpeNameId": "E567DF57-AB79-4A98-BF8C-32D3BFA36914"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.5.1:*:*:*:*:wordpress:*:*", "cpeNameId": "C7DD6953-8D69-44C4-AC8F-7A1A4A9F9E52"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.5.2:*:*:*:*:wordpress:*:*", "cpeNameId": "1964A2C2-7063-453A-B277-796248E1DFA1"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.5.3:*:*:*:*:wordpress:*:*", "cpeNameId": "DAC4D4E1-C276-4B2D-96B7-B87B1C8FE849"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.5.4:*:*:*:*:wordpress:*:*", "cpeNameId": "05B42F14-400A-41AD-8D9E-E48FA6E64FFD"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.5.5:*:*:*:*:wordpress:*:*", "cpeNameId": "DDE1DD91-DD49-4920-AE14-7EDEFD3C90A5"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.5.6:*:*:*:*:wordpress:*:*", "cpeNameId": "2CB4B5F5-8823-4F6C-9F3F-00D410DF6F2F"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.5.7:*:*:*:*:wordpress:*:*", "cpeNameId": "530F9CE3-A98C-4FC0-A4F5-C63D2ED6B5C2"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.5.8:*:*:*:*:wordpress:*:*", "cpeNameId": "C53C6315-9DA4-493F-8A8D-634CFCA12E1C"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.5.9:*:*:*:*:wordpress:*:*", "cpeNameId": "2CA52A2D-6504-4DCD-8185-691C508E2F68"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.5.10:*:*:*:*:wordpress:*:*", "cpeNameId": "18948B48-744D-4228-A51F-35E5FFCD7321"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.6.0:*:*:*:*:wordpress:*:*", "cpeNameId": "998EF0AD-226B-4FAD-A07D-4025932DA513"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.6.1:*:*:*:*:wordpress:*:*", "cpeNameId": "7DA6AB6A-301B-46B2-820E-B73EB794CB19"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.6.2:*:*:*:*:wordpress:*:*", "cpeNameId": "98F2943D-6AD1-41EF-BC4D-974B8B74F946"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.6.3:*:*:*:*:wordpress:*:*", "cpeNameId": "1DDB662B-A5C3-4B84-90BD-CFEE3A0D558D"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.7.0:*:*:*:*:wordpress:*:*", "cpeNameId": "80059FF8-75B8-4FFF-BF0D-98D45CA2DF1B"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.7.2:*:*:*:*:wordpress:*:*", "cpeNameId": "DDBBFEAB-1537-4771-8CC3-738ADA3D098C"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.7.3:*:*:*:*:wordpress:*:*", "cpeNameId": "FEF74B33-66AF-4B13-BD97-7111F7B490F6"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.7.4:*:*:*:*:wordpress:*:*", "cpeNameId": "2716FD90-5718-400F-B9EE-21C050662FA7"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.7.5:*:*:*:*:wordpress:*:*", "cpeNameId": "E0F46E0A-7CA4-45CD-876A-428E501F11BD"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.8.0:*:*:*:*:wordpress:*:*", "cpeNameId": "1B8A0A76-435D-4AFB-9CBE-D4E478BBB52D"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.8.1:*:*:*:*:wordpress:*:*", "cpeNameId": "BAA99239-A1D4-49E9-AA68-0D0E67EDBEEF"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.8.5:*:*:*:*:wordpress:*:*", "cpeNameId": "A3171B9C-89A1-46B5-B020-AB2CFC07A5A9"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.8.6:*:*:*:*:wordpress:*:*", "cpeNameId": "8A9793CA-A6AA-4A31-880E-375B421DE321"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.8.7:*:*:*:*:wordpress:*:*", "cpeNameId": "F3A29540-6163-46E0-B18B-12E9B63D50DE"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.8.8:*:*:*:*:wordpress:*:*", "cpeNameId": "48F8A896-0C7F-4972-A100-4F556498C563"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.9.0:*:*:*:*:wordpress:*:*", "cpeNameId": "DB030BBF-5351-405B-BF7D-3CD5306095EA"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.9.2:*:*:*:*:wordpress:*:*", "cpeNameId": "650E99D4-2DCA-4178-B2DD-CEB4CFC1EC28"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:3.0.0:*:*:*:*:wordpress:*:*", "cpeNameId": "A2681FDE-D694-4A28-B9C7-67A943DD1330"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:3.0.1:*:*:*:*:wordpress:*:*", "cpeNameId": "30A002BA-21FF-4628-88DF-06D3B814FF7D"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:3.0.2:*:*:*:*:wordpress:*:*", "cpeNameId": "2644B805-BF93-4BC4-916C-DF739AEDB4A3"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:3.0.3:*:*:*:*:wordpress:*:*", "cpeNameId": "7B90F082-323B-43EF-8861-6838AE06C2C0"}]}} \ No newline at end of file diff --git a/cpematch/AF/AF749C2D-ED47-4223-980B-E1FD7A3B1C46.json b/cpematch/AF/AF749C2D-ED47-4223-980B-E1FD7A3B1C46.json index 24432abc80f..fe280b0fd28 100644 --- a/cpematch/AF/AF749C2D-ED47-4223-980B-E1FD7A3B1C46.json +++ b/cpematch/AF/AF749C2D-ED47-4223-980B-E1FD7A3B1C46.json @@ -1 +1 @@ -{"matchString": {"matchCriteriaId": "AF749C2D-ED47-4223-980B-E1FD7A3B1C46", "criteria": "cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.0.0", "versionEndExcluding": "3.10.12", "lastModified": "2024-09-09T17:40:02.650", "cpeLastModified": "2024-09-13T20:00:56.703", "created": "2024-09-09T17:40:02.650", "status": "Active", "matches": [{"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.0.0:*:*:*:*:*:*:*", "cpeNameId": "60A80490-5F92-4E84-B6C7-20B7A28A4E39"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.0.1:*:*:*:*:*:*:*", "cpeNameId": "BB84B8E1-CAD4-441C-A371-4E32ED356577"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.0.2:*:*:*:*:*:*:*", "cpeNameId": "6C542D59-24A6-43EF-AAE3-81AD2933C4F1"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.0.3:*:*:*:*:*:*:*", "cpeNameId": "1A4882E5-761A-47B3-B78B-AB55520EDCDC"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.0.4:*:*:*:*:*:*:*", "cpeNameId": "8C0519B7-D874-464B-B774-4F1D17939631"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.1.0:*:*:*:*:*:*:*", "cpeNameId": "8D69C571-5FC9-4E5A-8A0D-BE6AD557371B"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.1.1:*:*:*:*:*:*:*", "cpeNameId": "8DA169CD-D6E5-4C43-BCA3-CFC4F1ED6252"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.1.2:*:*:*:*:*:*:*", "cpeNameId": "1AB9A9DB-D89E-4186-BC13-0F1C865B3402"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.2.0:*:*:*:*:*:*:*", "cpeNameId": "1B2E0F48-1A29-474F-AC92-DE6BC0C7B8B5"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.2.1:*:*:*:*:*:*:*", "cpeNameId": "8E22435B-0FCD-41C9-B6DA-8304D177C607"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.2.2:*:*:*:*:*:*:*", "cpeNameId": "9ABE6BC9-0F1F-4157-ACDB-1E39F5A578CC"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.3.0:*:*:*:*:*:*:*", "cpeNameId": "1E424989-A4F1-4FF3-9D73-B2ACC860D060"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.3.1:*:*:*:*:*:*:*", "cpeNameId": "04AE1835-5229-43AF-AD31-B2A63E3EF71D"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.4.0:*:*:*:*:*:*:*", "cpeNameId": "8C186DDF-D684-42D7-ABBB-920DF38592AF"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.4.1:*:*:*:*:*:*:*", "cpeNameId": "7C358628-D291-4ACB-92E0-BEC695D193F4"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.4.2:*:*:*:*:*:*:*", "cpeNameId": "5F12B5B2-942B-4940-9B06-4EA5E15C503B"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.4.3:*:*:*:*:*:*:*", "cpeNameId": "667E1231-54DB-4082-B5F4-4491D70E99C2"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.5.0:*:*:*:*:*:*:*", "cpeNameId": "D5F3780B-E1BF-4B0E-AC43-B7A41E2B77CF"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.5.1:*:*:*:*:*:*:*", "cpeNameId": "10E7529A-6133-4B77-8484-49B4B3C3603A"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.5.2:*:*:*:*:*:*:*", "cpeNameId": "AE5C5B6B-A968-438C-98A4-935AFA8F403F"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.5.3:*:*:*:*:*:*:*", "cpeNameId": "96E69160-B1A0-47F2-A0E2-824DEE713CAF"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.5.4:*:*:*:*:*:*:*", "cpeNameId": "509F2A90-4136-43CA-A56E-637322E792AB"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.5.5:*:*:*:*:*:*:*", "cpeNameId": "F396949E-D426-447B-966F-C00DCD22E8A9"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.5.6:*:*:*:*:*:*:*", "cpeNameId": "535686AF-5D79-4C59-AB00-2288A9C94817"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.5.7:*:*:*:*:*:*:*", "cpeNameId": "2CC2866A-E306-44A2-9DEC-53D321F84BA5"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.6.0:*:*:*:*:*:*:*", "cpeNameId": "A01BDCBD-287B-4479-B2D3-407D50A94655"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.6.1:*:*:*:*:*:*:*", "cpeNameId": "12B1FF7B-EB2E-4E79-813B-B4A808C51AAA"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.6.2:*:*:*:*:*:*:*", "cpeNameId": "1E53DBA8-5607-48D5-B820-0DA6E8BFC3C9"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.6.3:*:*:*:*:*:*:*", "cpeNameId": "E13ACBF2-56EA-41B1-9ABA-2B56F5E7E439"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.6.4:*:*:*:*:*:*:*", "cpeNameId": "1556E107-9C23-4F9C-A367-965A962820B2"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.6.5:*:*:*:*:*:*:*", "cpeNameId": "0E8591C3-4CD7-4DA9-89B0-6AD5AC31FEFE"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.6.6:*:*:*:*:*:*:*", "cpeNameId": "4A0E2AFA-1908-4A39-A28D-54F62986E552"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.7.1:*:*:*:*:*:*:*", "cpeNameId": "EEBF8CC9-7A10-4770-AC39-7E8B34A5BC36"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.7.2:*:*:*:*:*:*:*", "cpeNameId": "86E284BA-BA19-4E25-B1D4-BAE8E3C279E9"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.8.0:*:*:*:*:*:*:*", "cpeNameId": "81A8F662-FD05-446D-BE2F-C350D718EDAB"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.10.0:*:*:*:*:*:*:*", "cpeNameId": "518A9E4F-D287-46CA-AB73-B0AAB5BD6DB6"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.10.1:*:*:*:*:*:*:*", "cpeNameId": "3AFCE5E1-41A9-4C07-AEC3-E3FDCC468859"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.10.2:*:*:*:*:*:*:*", "cpeNameId": "7CC4D062-1377-492D-8461-256DE96F6CC7"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.10.3:*:*:*:*:*:*:*", "cpeNameId": "D27BC250-8598-44CE-93C5-189D6E7E4601"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.10.4:*:*:*:*:*:*:*", "cpeNameId": "D498E636-872B-41F7-866A-F37D15754E0A"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.10.5:*:*:*:*:*:*:*", "cpeNameId": "B2811BA4-700D-4775-B335-ABAF8BCA719A"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.10.6:*:*:*:*:*:*:*", "cpeNameId": "E62786EC-7697-495E-B41B-74E3B7DAC72D"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.10.7:*:*:*:*:*:*:*", "cpeNameId": "8B6D30EE-7AF6-403A-AFF8-12420AF083C4"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.10.8:*:*:*:*:*:*:*", "cpeNameId": "3FBEED11-F406-420D-B298-4F420926C568"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.10.9:*:*:*:*:*:*:*", "cpeNameId": "6B5818DD-1559-4894-B1A9-F1E5AD2F2499"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.10.10:*:*:*:*:*:*:*", "cpeNameId": "2D1B015A-2C6E-4B2F-B4A5-34585A5362DD"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.10.11:*:*:*:*:*:*:*", "cpeNameId": "CA1FDDF6-A2F0-4DA9-B0F1-03A501739CFE"}]}} \ No newline at end of file +{"matchString": {"matchCriteriaId": "AF749C2D-ED47-4223-980B-E1FD7A3B1C46", "criteria": "cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.0.0", "versionEndExcluding": "3.10.12", "lastModified": "2025-01-09T17:22:40.577", "cpeLastModified": "2024-09-13T20:00:56.703", "created": "2024-09-09T17:40:02.650", "status": "Active", "matches": [{"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.0.0:*:*:*:*:*:*:*", "cpeNameId": "60A80490-5F92-4E84-B6C7-20B7A28A4E39"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.0.1:*:*:*:*:*:*:*", "cpeNameId": "BB84B8E1-CAD4-441C-A371-4E32ED356577"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.0.2:*:*:*:*:*:*:*", "cpeNameId": "6C542D59-24A6-43EF-AAE3-81AD2933C4F1"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.0.3:*:*:*:*:*:*:*", "cpeNameId": "1A4882E5-761A-47B3-B78B-AB55520EDCDC"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.0.4:*:*:*:*:*:*:*", "cpeNameId": "8C0519B7-D874-464B-B774-4F1D17939631"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.1.0:*:*:*:*:*:*:*", "cpeNameId": "8D69C571-5FC9-4E5A-8A0D-BE6AD557371B"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.1.1:*:*:*:*:*:*:*", "cpeNameId": "8DA169CD-D6E5-4C43-BCA3-CFC4F1ED6252"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.1.2:*:*:*:*:*:*:*", "cpeNameId": "1AB9A9DB-D89E-4186-BC13-0F1C865B3402"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.2.0:*:*:*:*:*:*:*", "cpeNameId": "1B2E0F48-1A29-474F-AC92-DE6BC0C7B8B5"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.2.1:*:*:*:*:*:*:*", "cpeNameId": "8E22435B-0FCD-41C9-B6DA-8304D177C607"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.2.2:*:*:*:*:*:*:*", "cpeNameId": "9ABE6BC9-0F1F-4157-ACDB-1E39F5A578CC"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.3.0:*:*:*:*:*:*:*", "cpeNameId": "1E424989-A4F1-4FF3-9D73-B2ACC860D060"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.3.1:*:*:*:*:*:*:*", "cpeNameId": "04AE1835-5229-43AF-AD31-B2A63E3EF71D"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.4.0:*:*:*:*:*:*:*", "cpeNameId": "8C186DDF-D684-42D7-ABBB-920DF38592AF"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.4.1:*:*:*:*:*:*:*", "cpeNameId": "7C358628-D291-4ACB-92E0-BEC695D193F4"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.4.2:*:*:*:*:*:*:*", "cpeNameId": "5F12B5B2-942B-4940-9B06-4EA5E15C503B"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.4.3:*:*:*:*:*:*:*", "cpeNameId": "667E1231-54DB-4082-B5F4-4491D70E99C2"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.5.0:*:*:*:*:*:*:*", "cpeNameId": "D5F3780B-E1BF-4B0E-AC43-B7A41E2B77CF"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.5.1:*:*:*:*:*:*:*", "cpeNameId": "10E7529A-6133-4B77-8484-49B4B3C3603A"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.5.2:*:*:*:*:*:*:*", "cpeNameId": "AE5C5B6B-A968-438C-98A4-935AFA8F403F"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.5.3:*:*:*:*:*:*:*", "cpeNameId": "96E69160-B1A0-47F2-A0E2-824DEE713CAF"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.5.4:*:*:*:*:*:*:*", "cpeNameId": "509F2A90-4136-43CA-A56E-637322E792AB"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.5.5:*:*:*:*:*:*:*", "cpeNameId": "F396949E-D426-447B-966F-C00DCD22E8A9"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.5.6:*:*:*:*:*:*:*", "cpeNameId": "535686AF-5D79-4C59-AB00-2288A9C94817"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.5.7:*:*:*:*:*:*:*", "cpeNameId": "2CC2866A-E306-44A2-9DEC-53D321F84BA5"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.6.0:*:*:*:*:*:*:*", "cpeNameId": "A01BDCBD-287B-4479-B2D3-407D50A94655"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.6.1:*:*:*:*:*:*:*", "cpeNameId": "12B1FF7B-EB2E-4E79-813B-B4A808C51AAA"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.6.2:*:*:*:*:*:*:*", "cpeNameId": "1E53DBA8-5607-48D5-B820-0DA6E8BFC3C9"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.6.3:*:*:*:*:*:*:*", "cpeNameId": "E13ACBF2-56EA-41B1-9ABA-2B56F5E7E439"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.6.4:*:*:*:*:*:*:*", "cpeNameId": "1556E107-9C23-4F9C-A367-965A962820B2"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.6.5:*:*:*:*:*:*:*", "cpeNameId": "0E8591C3-4CD7-4DA9-89B0-6AD5AC31FEFE"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.6.6:*:*:*:*:*:*:*", "cpeNameId": "4A0E2AFA-1908-4A39-A28D-54F62986E552"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.7.1:*:*:*:*:*:*:*", "cpeNameId": "EEBF8CC9-7A10-4770-AC39-7E8B34A5BC36"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.7.2:*:*:*:*:*:*:*", "cpeNameId": "86E284BA-BA19-4E25-B1D4-BAE8E3C279E9"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.8.0:*:*:*:*:*:*:*", "cpeNameId": "81A8F662-FD05-446D-BE2F-C350D718EDAB"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.10.0:*:*:*:*:*:*:*", "cpeNameId": "518A9E4F-D287-46CA-AB73-B0AAB5BD6DB6"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.10.1:*:*:*:*:*:*:*", "cpeNameId": "3AFCE5E1-41A9-4C07-AEC3-E3FDCC468859"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.10.2:*:*:*:*:*:*:*", "cpeNameId": "7CC4D062-1377-492D-8461-256DE96F6CC7"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.10.3:*:*:*:*:*:*:*", "cpeNameId": "D27BC250-8598-44CE-93C5-189D6E7E4601"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.10.4:*:*:*:*:*:*:*", "cpeNameId": "D498E636-872B-41F7-866A-F37D15754E0A"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.10.5:*:*:*:*:*:*:*", "cpeNameId": "B2811BA4-700D-4775-B335-ABAF8BCA719A"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.10.6:*:*:*:*:*:*:*", "cpeNameId": "E62786EC-7697-495E-B41B-74E3B7DAC72D"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.10.7:*:*:*:*:*:*:*", "cpeNameId": "8B6D30EE-7AF6-403A-AFF8-12420AF083C4"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.10.8:*:*:*:*:*:*:*", "cpeNameId": "3FBEED11-F406-420D-B298-4F420926C568"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.10.9:*:*:*:*:*:*:*", "cpeNameId": "6B5818DD-1559-4894-B1A9-F1E5AD2F2499"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.10.10:*:*:*:*:*:*:*", "cpeNameId": "2D1B015A-2C6E-4B2F-B4A5-34585A5362DD"}, {"cpeName": "cpe:2.3:a:fit2cloud:jumpserver:3.10.11:*:*:*:*:*:*:*", "cpeNameId": "CA1FDDF6-A2F0-4DA9-B0F1-03A501739CFE"}]}} \ No newline at end of file diff --git a/cpematch/AF/AFF5FA32-4A6D-4E94-8C05-57F73D319626.json b/cpematch/AF/AFF5FA32-4A6D-4E94-8C05-57F73D319626.json new file mode 100644 index 00000000000..8c6c12d3ba8 --- /dev/null +++ b/cpematch/AF/AFF5FA32-4A6D-4E94-8C05-57F73D319626.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "AFF5FA32-4A6D-4E94-8C05-57F73D319626", "criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.9.0", "versionEndExcluding": "2.9.13", "lastModified": "2025-01-09T16:58:26.927", "cpeLastModified": "2025-01-09T16:58:26.927", "created": "2025-01-09T16:58:26.927", "status": "Active", "matches": [{"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.9.0:-:*:*:*:*:*:*", "cpeNameId": "49F17761-9FAE-48C6-A4F9-718835D9AEF4"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.9.0:rc1:*:*:*:*:*:*", "cpeNameId": "CA0C9589-A729-422E-BFA3-0EF20392605E"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.9.0:rc2:*:*:*:*:*:*", "cpeNameId": "88E339D1-BB25-47A4-8178-484F54A9984B"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.9.0:rc3:*:*:*:*:*:*", "cpeNameId": "EB431D3C-076B-4725-9B6B-0F160AE6B078"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.9.0:rc4:*:*:*:*:*:*", "cpeNameId": "4246CECF-09C1-4A60-BACF-86F6EC3184B7"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.9.1:*:*:*:*:*:*:*", "cpeNameId": "F4E74C08-F0A8-4B88-B337-09A925838D10"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.9.2:*:*:*:*:*:*:*", "cpeNameId": "32D706FF-7ECA-475B-ABDC-3CC7950DDB2A"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.9.3:*:*:*:*:*:*:*", "cpeNameId": "8BCC560A-36AE-436E-964C-EEFB3BC87DB3"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.9.4:*:*:*:*:*:*:*", "cpeNameId": "84E3ACA1-DCF4-4478-BE98-35C3F36968DD"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.9.5:*:*:*:*:*:*:*", "cpeNameId": "D91262C5-07EF-442A-996F-CD7E3BBF5A7D"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.9.6:*:*:*:*:*:*:*", "cpeNameId": "B4E17091-A5BC-4B92-A8BC-806C831D09F6"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.9.7:*:*:*:*:*:*:*", "cpeNameId": "1AA585C7-68DC-457F-A1FA-DF6A28F845E5"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.9.8:*:*:*:*:*:*:*", "cpeNameId": "C4B5403D-C072-4A64-B389-92D0631FB01C"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.9.9:*:*:*:*:*:*:*", "cpeNameId": "6B9BBD28-E019-493C-9197-D32A0C1DE826"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.9.10:*:*:*:*:*:*:*", "cpeNameId": "F8E9241E-078F-41E1-933F-37B59CDD89AD"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.9.11:*:*:*:*:*:*:*", "cpeNameId": "842B9886-A920-4EE7-B163-BF4EC0DE1E14"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.9.12:*:*:*:*:*:*:*", "cpeNameId": "CA351E38-33B7-4FCA-B8FB-8BF3195F63F4"}]}} \ No newline at end of file diff --git a/cpematch/B1/B1CD131A-4CDE-4465-BA81-77A93AFF784B.json b/cpematch/B1/B1CD131A-4CDE-4465-BA81-77A93AFF784B.json new file mode 100644 index 00000000000..3c546fd7cc0 --- /dev/null +++ b/cpematch/B1/B1CD131A-4CDE-4465-BA81-77A93AFF784B.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "B1CD131A-4CDE-4465-BA81-77A93AFF784B", "criteria": "cpe:2.3:a:xwiki:xwiki:16.0.0:rc1:*:*:*:*:*:*", "lastModified": "2025-01-09T16:24:51.060", "cpeLastModified": "2025-01-09T16:24:51.060", "created": "2025-01-09T16:24:51.060", "status": "Active", "matches": [{"cpeName": "cpe:2.3:a:xwiki:xwiki:16.0.0:rc1:*:*:*:*:*:*", "cpeNameId": "6B554677-E5AC-4004-BD86-A34F782C6459"}]}} \ No newline at end of file diff --git a/cpematch/BA/BA8076E5-F10D-46A7-92F4-84D35F8B71AD.json b/cpematch/BA/BA8076E5-F10D-46A7-92F4-84D35F8B71AD.json new file mode 100644 index 00000000000..4b1c4f06517 --- /dev/null +++ b/cpematch/BA/BA8076E5-F10D-46A7-92F4-84D35F8B71AD.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "BA8076E5-F10D-46A7-92F4-84D35F8B71AD", "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartExcluding": "5.16", "versionEndExcluding": "6.1.120", "lastModified": "2025-01-09T16:17:59.330", "cpeLastModified": "2025-01-09T16:17:59.330", "created": "2025-01-09T16:17:59.330", "status": "Active", "matches": [{"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.0:*:*:*:*:*:*:*", "cpeNameId": "081E7EC8-3E8E-48D4-8187-1B96F6BE062F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.0:rc1:*:*:*:*:*:*", "cpeNameId": "EB5911C8-9712-4439-99F2-5BCDED060240"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.1:*:*:*:*:*:*:*", "cpeNameId": "2730ED9E-094C-40E1-B3C5-75C02A9E1BBD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.2:*:*:*:*:*:*:*", "cpeNameId": "7A33187A-7AA3-4565-BD7A-EE2304904D3B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.3:*:*:*:*:*:*:*", "cpeNameId": "F0C5525B-4224-4481-9190-16DFA7982F9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.4:*:*:*:*:*:*:*", "cpeNameId": "891F8D0E-202D-4728-9D83-764496E40CB9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.5:*:*:*:*:*:*:*", "cpeNameId": "AFC47178-4013-4A67-BFBE-F2C1D8C43FAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.6:*:*:*:*:*:*:*", "cpeNameId": "A563BA20-7E45-4F95-97CC-B991BEE12EC2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.7:*:*:*:*:*:*:*", "cpeNameId": "62897C18-4BA0-46BF-A3C6-A2F57B2C400F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.8:*:*:*:*:*:*:*", "cpeNameId": "0D9ED6C5-B404-47B6-BDDA-21FB4E7392DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.9:*:*:*:*:*:*:*", "cpeNameId": "DBB9E77F-F972-4486-AE16-C40C76D64E87"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.10:*:*:*:*:*:*:*", "cpeNameId": "7D6A655C-B244-446F-8CDC-4D17D47253AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.11:*:*:*:*:*:*:*", "cpeNameId": "B5EB9714-867F-44F9-9AA3-BE8D500D4BC5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.12:*:*:*:*:*:*:*", "cpeNameId": "8BF0B6A9-F5F7-4EF6-A81F-9AA1DEBFBCE3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.13:*:*:*:*:*:*:*", "cpeNameId": "BE8039FF-A2FF-4592-BCF2-FDE1271C80D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.14:*:*:*:*:*:*:*", "cpeNameId": "70857AD4-FC92-4F1B-905E-19EC450C5B11"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.15:*:*:*:*:*:*:*", "cpeNameId": "AC26CE14-E5B3-4159-805B-6EC9D9B37D83"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.16:*:*:*:*:*:*:*", "cpeNameId": "544C971D-5F36-423D-AB36-E217BE202DB8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.17:*:*:*:*:*:*:*", "cpeNameId": "2A58FEF7-CB40-428A-806B-BE0B32BBB723"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.18:*:*:*:*:*:*:*", "cpeNameId": "7FBBF4E8-6F44-4592-8069-C21668D738E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.19:*:*:*:*:*:*:*", "cpeNameId": "CA37F5FB-5C02-45F3-B7B7-1F56F552B120"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.20:*:*:*:*:*:*:*", "cpeNameId": "83FC3AB5-576E-489E-A697-0865FE9D7439"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.62:*:*:*:*:*:*:*", "cpeNameId": "AC968C04-563B-44E7-A323-6CF404B73D4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:-:*:*:*:*:*:*", "cpeNameId": "805B659E-0A6A-4EDE-9E81-F83A30B3264A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*", "cpeNameId": "A87C09DD-69B1-4CA9-8AE6-3DBF4DF3F11D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*", "cpeNameId": "8F54EDC5-48AB-4577-8C36-660DC7D71454"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:rc3:*:*:*:*:*:*", "cpeNameId": "BA251D8D-4559-451C-9974-E9C6B8087A08"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:rc4:*:*:*:*:*:*", "cpeNameId": "75F94F87-13C3-44A6-80AF-C0C5C599E2A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:rc5:*:*:*:*:*:*", "cpeNameId": "CB671C15-924A-43CA-91DB-1D9FA9D0CC25"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:rc6:*:*:*:*:*:*", "cpeNameId": "A9B040E0-4FFC-4F00-ADB0-5AC01F8F04ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:rc7:*:*:*:*:*:*", "cpeNameId": "EC464421-E417-4360-86C8-511D0221DCF2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:rc8:*:*:*:*:*:*", "cpeNameId": "B3CC3FB2-843F-4B86-86B3-D72EEFBA33FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.1:*:*:*:*:*:*:*", "cpeNameId": "E3D26A37-A963-4501-AD97-1E252FA7A48E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.2:*:*:*:*:*:*:*", "cpeNameId": "7B9C1788-8178-4BDD-8547-0B3193B030A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.3:*:*:*:*:*:*:*", "cpeNameId": "C4DE0AAD-9698-4ADE-A59B-3A730D1B10C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.4:*:*:*:*:*:*:*", "cpeNameId": "EA1887EA-7FF5-4222-B72B-F17A05C0B035"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.5:*:*:*:*:*:*:*", "cpeNameId": "662B2A28-A112-4710-A201-3017CBD3FC8F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.6:*:*:*:*:*:*:*", "cpeNameId": "77EB0841-4431-4A1E-A99F-ACE36FC6FE50"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.7:*:*:*:*:*:*:*", "cpeNameId": "F2EA9343-31D9-42B5-B7DB-D7DDDE92F4F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.8:*:*:*:*:*:*:*", "cpeNameId": "31AD3C06-0526-4470-BC59-67D196013B43"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.9:*:*:*:*:*:*:*", "cpeNameId": "D3C822DE-EC22-4C9B-9AA7-C084613C6FF9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.10:*:*:*:*:*:*:*", "cpeNameId": "4CE524CA-B05D-4C9E-B81A-1937E7FFE6DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.11:*:*:*:*:*:*:*", "cpeNameId": "234E800C-A082-4960-BA0D-975F256DDD4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.12:*:*:*:*:*:*:*", "cpeNameId": "878DE0B7-411C-4C58-B753-C6D22E664553"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.13:*:*:*:*:*:*:*", "cpeNameId": "996D982B-11AA-4504-A9CD-8787C813BFBD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.14:*:*:*:*:*:*:*", "cpeNameId": "5E2AEB31-D1FD-4E9D-9CA9-0F9457674EA9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.15:*:*:*:*:*:*:*", "cpeNameId": "2C08D207-8B50-400F-9807-FB3072AD4E6A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:-:*:*:*:*:*:*", "cpeNameId": "0FD8602E-5D63-49B5-AB56-CB2948250E45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:rc1:*:*:*:*:*:*", "cpeNameId": "1DECE9B9-E9A2-4045-BD0B-C6510F69937D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:rc2:*:*:*:*:*:*", "cpeNameId": "EE2606B9-AA8F-4D28-8575-7AD825CAD250"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:rc3:*:*:*:*:*:*", "cpeNameId": "BC668967-571A-466D-8C69-9495260D3BBD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:rc4:*:*:*:*:*:*", "cpeNameId": "FD9CE501-B79F-4899-A816-149019C673E4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:rc5:*:*:*:*:*:*", "cpeNameId": "2E4EE9B2-FC64-4E7E-9757-5109B02E0AAF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:rc6:*:*:*:*:*:*", "cpeNameId": "D5A2141A-53D1-4E5B-B7C7-4FB179F6F219"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:rc7:*:*:*:*:*:*", "cpeNameId": "CF8E007E-9F74-4780-A09E-D101B3076FDF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:rc9:*:*:*:*:*:*", "cpeNameId": "E38067B2-E041-45F1-8A88-DE716AEDC5A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.1:*:*:*:*:*:*:*", "cpeNameId": "5EE504EE-64C4-4361-86B4-E5A7BD65776C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.2:*:*:*:*:*:*:*", "cpeNameId": "787215C4-0507-4760-BF1F-2A8491B66E4F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.3:*:*:*:*:*:*:*", "cpeNameId": "D2A628F1-1878-4C0B-87E6-B21A7CE382D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.4:*:*:*:*:*:*:*", "cpeNameId": "4890EDC3-B4E8-4CD2-AC95-A9DB9CB74FBF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.5:*:*:*:*:*:*:*", "cpeNameId": "BAA68B22-F0BC-45AD-A350-E8774FC53150"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.6:*:*:*:*:*:*:*", "cpeNameId": "C27B6005-D7EB-47DE-B01C-D5BD2B818D3A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.7:*:*:*:*:*:*:*", "cpeNameId": "89AE071D-DFF0-40A5-B7CE-BA33F9FCC5E7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.8:*:*:*:*:*:*:*", "cpeNameId": "F32F879F-B0ED-4F85-B1AD-A45D6DE80D86"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.9:*:*:*:*:*:*:*", "cpeNameId": "AE86A00C-455A-4075-9AC6-714B1F66D934"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.10:*:*:*:*:*:*:*", "cpeNameId": "704396EF-097A-4DFF-8DAE-4B19965C49AF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.11:*:*:*:*:*:*:*", "cpeNameId": "5CFE2D2B-62BD-448C-B0D4-5F7A9B8AB669"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.12:*:*:*:*:*:*:*", "cpeNameId": "F9A857D7-99FC-4761-B4DF-76E758BDE2BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.13:*:*:*:*:*:*:*", "cpeNameId": "A2A3B308-1BA2-4C79-88AF-861CE6482E28"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.14:*:*:*:*:*:*:*", "cpeNameId": "534CA992-2337-4EA8-B1F7-256574B35175"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.15:*:*:*:*:*:*:*", "cpeNameId": "2074E50B-BBEE-4902-B9F2-24E1B862076E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.16:*:*:*:*:*:*:*", "cpeNameId": "D2A2905E-45CE-4135-8D5D-0FF92766109E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.17:*:*:*:*:*:*:*", "cpeNameId": "4794F12E-3EDA-4619-BBB0-E275E1F06710"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.18:*:*:*:*:*:*:*", "cpeNameId": "17C90012-A0AA-459E-946A-B3C82983B22B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.19:*:*:*:*:*:*:*", "cpeNameId": "222B7748-23E3-4A4D-B9D5-4C5A6D5B2AEF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:-:*:*:*:*:*:*", "cpeNameId": "A7C04E0A-EF2B-426E-8AFE-CDFB04C2EE00"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*", "cpeNameId": "91317E86-8C24-4B48-BD6D-8EF732A881D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*", "cpeNameId": "4D6C0AAC-C284-42AB-8F4E-E54D5294D180"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*", "cpeNameId": "08BCB0AD-FBD2-4A2B-B8AE-9733E31BA02A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*", "cpeNameId": "5EC4698A-FD3A-4387-B636-810BCCBE2F15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*", "cpeNameId": "6FBD2340-901D-4CE1-BA59-55C77404D099"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*", "cpeNameId": "009D67E0-1C71-4212-BE27-834E15E8112B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*", "cpeNameId": "9294C90D-628E-44F8-B196-9ADEF3B72C89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:rc8:*:*:*:*:*:*", "cpeNameId": "1EF80A31-F9CD-4870-9F50-F71C1D3F4DC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.1:*:*:*:*:*:*:*", "cpeNameId": "3409D2C8-FB81-4CE9-9B26-677FAAD94F42"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.2:*:*:*:*:*:*:*", "cpeNameId": "0B80A369-7E22-4E25-8D33-298AD0B23074"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.3:*:*:*:*:*:*:*", "cpeNameId": "9E737761-792A-4225-9385-3EBF3CBBBA81"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.4:*:*:*:*:*:*:*", "cpeNameId": "5435810C-35B3-4401-9434-7EE8DE82604B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.5:*:*:*:*:*:*:*", "cpeNameId": "937FA107-2C1F-4AF8-955A-66F90A3DBB9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.6:*:*:*:*:*:*:*", "cpeNameId": "DD0D3175-C807-4197-BC7D-3737DEB5602D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.7:*:*:*:*:*:*:*", "cpeNameId": "A60E3F91-9293-4B3E-98E9-0D11D1942C1B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.8:*:*:*:*:*:*:*", "cpeNameId": "1A2B6F42-AF1B-473E-8033-83C73609D4E4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.9:*:*:*:*:*:*:*", "cpeNameId": "7664EA3B-7AD2-46EC-92EF-552091071A5F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.10:*:*:*:*:*:*:*", "cpeNameId": "93A56D61-5B65-4D74-ABEF-766372AF7AA0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.11:*:*:*:*:*:*:*", "cpeNameId": "C9534805-84C6-45B9-86BF-7D05E4136C96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.12:*:*:*:*:*:*:*", "cpeNameId": "DE9B1782-E79B-4EF2-8CDB-3D24CF153AC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.13:*:*:*:*:*:*:*", "cpeNameId": "BC90F145-D85D-4388-A4F8-2151884F1663"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.14:*:*:*:*:*:*:*", "cpeNameId": "C0BCABF8-19C2-4B49-9A49-EF7128C5B8B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.15:*:*:*:*:*:*:*", "cpeNameId": "88BDA49D-7A90-40EB-B71E-A570891B9EE6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.16:*:*:*:*:*:*:*", "cpeNameId": "9C3D06BA-AF02-4FFD-AE35-347B04643683"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.17:*:*:*:*:*:*:*", "cpeNameId": "124836C8-7921-4BFE-A64C-AE9F640C9130"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0:-:*:*:*:*:*:*", "cpeNameId": "3A2B23AB-CBA1-42BB-8FA6-C64C95B4FFC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:*", "cpeNameId": "28304135-D881-4B0E-B7C6-826D7CA6F1CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0:rc2:*:*:*:*:*:*", "cpeNameId": "80E35649-C2A2-423F-93D6-8DA4F6A8B4E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0:rc3:*:*:*:*:*:*", "cpeNameId": "D7F3713F-F696-4D43-80A5-98433FA9F02D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0:rc4:*:*:*:*:*:*", "cpeNameId": "C16C9B3F-BD8C-4404-B51D-91856734622D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0:rc5:*:*:*:*:*:*", "cpeNameId": "453F7A7A-15F4-4D21-B85B-6C1DE66FF9F4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0:rc6:*:*:*:*:*:*", "cpeNameId": "42BE5475-0D59-4599-AC53-94A247DA277C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0:rc7:*:*:*:*:*:*", "cpeNameId": "9F921345-A999-4E40-9F3F-4F009C78FBAE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.1:*:*:*:*:*:*:*", "cpeNameId": "DA897396-3BC0-4AC4-B42D-98475AAEFDB1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.2:*:*:*:*:*:*:*", "cpeNameId": "EAFB7D30-6006-44B3-9687-77CBE235323A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.3:*:*:*:*:*:*:*", "cpeNameId": "09573A93-AEDE-4BBA-88F3-6F5CC94F2EE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.4:*:*:*:*:*:*:*", "cpeNameId": "DA0AA4FE-4C59-448A-88DC-C8A8EAF513E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.5:*:*:*:*:*:*:*", "cpeNameId": "C8D96C96-4D7D-4FA4-9CEA-660BF39FC1D7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.6:*:*:*:*:*:*:*", "cpeNameId": "C978C4EF-7AF5-4AA8-BD1D-954E9D7476AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.7:*:*:*:*:*:*:*", "cpeNameId": "70248903-1B6E-43D3-963F-9CCA75253E2A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.8:*:*:*:*:*:*:*", "cpeNameId": "22375451-92E0-4690-B7C4-82B63F7F54AA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.9:*:*:*:*:*:*:*", "cpeNameId": "792202AB-6A0E-491B-87FC-3F98835781A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.10:*:*:*:*:*:*:*", "cpeNameId": "FF48867C-F23F-4340-96AC-8C40D01A93A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.11:*:*:*:*:*:*:*", "cpeNameId": "E8A33859-F785-4E67-83D6-3304A2AC8F1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.12:*:*:*:*:*:*:*", "cpeNameId": "BBCB0428-C568-4F4B-8069-BFC5DE18BA66"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.13:*:*:*:*:*:*:*", "cpeNameId": "785980A5-8FCC-4DEB-8C31-6B66B3F2ED06"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.14:*:*:*:*:*:*:*", "cpeNameId": "3D9CF1CA-591F-4D6B-835F-71E494855265"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.15:*:*:*:*:*:*:*", "cpeNameId": "3DB8BB3F-8384-49A3-9B5C-0C812B669916"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.16:*:*:*:*:*:*:*", "cpeNameId": "97B95EF5-6328-416C-A983-BAD4DB8178EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.17:*:*:*:*:*:*:*", "cpeNameId": "5D22785E-D725-46B7-83E8-9AA3F1B1EE61"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.18:*:*:*:*:*:*:*", "cpeNameId": "F5B47278-06DD-4334-BEAA-82D99836E0CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.19:*:*:*:*:*:*:*", "cpeNameId": "2D6FBBDE-1828-44E5-AE5B-0844E49DD7DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:-:*:*:*:*:*:*", "cpeNameId": "E1B09DBA-878F-4B52-AE09-74B0B8F5D68F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*", "cpeNameId": "30EC2354-B32A-44E9-9861-CEA7D545DFBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*", "cpeNameId": "BFAC13C0-7539-40DF-B674-4ECCA1868626"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*", "cpeNameId": "585AB024-3F59-4BDB-A302-D224DF5D8495"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*", "cpeNameId": "4A21513E-7139-44E5-88E8-9B991661CF3C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*", "cpeNameId": "8D834469-69DF-4937-AFF3-A0B90AB70455"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*", "cpeNameId": "25204659-6277-44F6-B75E-69B25412BE26"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*", "cpeNameId": "79676ADB-9CD8-4734-9FBF-13CA081A2193"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:rc8:*:*:*:*:*:*", "cpeNameId": "80492410-4FE5-4C8B-897C-243E42C03469"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.1:*:*:*:*:*:*:*", "cpeNameId": "3C595643-58A0-402D-8A1A-E2148719F38F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.2:*:*:*:*:*:*:*", "cpeNameId": "5F145B48-D5DB-4B52-ABDC-41BAACF04213"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.3:*:*:*:*:*:*:*", "cpeNameId": "59A7EC30-0E14-45EE-A5DA-9D98F4793E93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.4:*:*:*:*:*:*:*", "cpeNameId": "28AD2EF2-9A1F-4C90-A938-33E394A94615"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.5:*:*:*:*:*:*:*", "cpeNameId": "37B29EC5-AB56-4407-871C-6AF5177AE78F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.6:*:*:*:*:*:*:*", "cpeNameId": "76D2F6EA-F7DC-413B-85EC-C8B7916DCD0C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.7:*:*:*:*:*:*:*", "cpeNameId": "3E05D19C-FFAF-44BC-B9CB-D7054765D6D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.8:*:*:*:*:*:*:*", "cpeNameId": "9625E836-75C2-4337-BAA1-70F3958C06CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.9:*:*:*:*:*:*:*", "cpeNameId": "492A02F0-DBF7-40C0-9CD6-AFADC763E814"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.10:*:*:*:*:*:*:*", "cpeNameId": "9A0A4990-A036-4290-AD79-B7531545BA07"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.11:*:*:*:*:*:*:*", "cpeNameId": "5FDD9C37-5F34-43FE-98FA-3D3D7ED73B6F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.12:*:*:*:*:*:*:*", "cpeNameId": "54D136A5-6D3A-4CF8-8ECD-0A4B3345ED61"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.13:*:*:*:*:*:*:*", "cpeNameId": "A1D987CD-234D-48E5-BC87-D5BDAB19AD8D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.14:*:*:*:*:*:*:*", "cpeNameId": "51407BCD-81B8-4C16-9246-F7AC5E654783"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.15:*:*:*:*:*:*:*", "cpeNameId": "E0851513-6D8C-45D5-AA02-1A897F200C76"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.16:*:*:*:*:*:*:*", "cpeNameId": "FBCFC7A2-8E0C-400E-9903-F88E27BC6692"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.17:*:*:*:*:*:*:*", "cpeNameId": "D83234B0-70C7-49E3-B041-458A4388E5F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.18:*:*:*:*:*:*:*", "cpeNameId": "7BFD121A-9AAE-4FA4-B4BB-79BCFC945942"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.19:*:*:*:*:*:*:*", "cpeNameId": "5CEF4F40-C180-4D35-BFBE-CE813D0DB03A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.20:*:*:*:*:*:*:*", "cpeNameId": "8629FDD2-5ACC-47D6-A355-161F5C9E9DE2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.21:*:*:*:*:*:*:*", "cpeNameId": "5FAA107F-2A9C-4F4A-ADB6-BDE37B733B3A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.22:*:*:*:*:*:*:*", "cpeNameId": "8425DCE9-412B-439B-BCFA-0296FCF4AC3B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.23:*:*:*:*:*:*:*", "cpeNameId": "2CAA00B8-15FB-49C3-8D03-4EAC237C0C30"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.24:*:*:*:*:*:*:*", "cpeNameId": "55BE846B-6D72-4890-A345-41A221706A91"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.25:*:*:*:*:*:*:*", "cpeNameId": "6E8595D6-1B26-48C0-8BB5-7AA9956DA2EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.26:*:*:*:*:*:*:*", "cpeNameId": "579C1BAF-C0BD-4A23-8220-878509BD4041"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.27:*:*:*:*:*:*:*", "cpeNameId": "918EEE53-3E32-4088-A31F-7706A0658354"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.28:*:*:*:*:*:*:*", "cpeNameId": "E5894A09-16F4-4390-9756-7B55B730A5C7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.29:*:*:*:*:*:*:*", "cpeNameId": "4A87BD1D-E5CA-4D1E-BC1C-866333AC8B70"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.30:*:*:*:*:*:*:*", "cpeNameId": "EA84BB70-A3D7-488F-B591-6F660E5F72D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.31:*:*:*:*:*:*:*", "cpeNameId": "099FB693-8DF2-40B8-987C-638A2B85F830"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.32:*:*:*:*:*:*:*", "cpeNameId": "5A2E5E92-E0A5-4B86-979F-C06CBC9AF59E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.33:*:*:*:*:*:*:*", "cpeNameId": "4D00786A-3089-4F53-9833-D854D82A886A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.34:*:*:*:*:*:*:*", "cpeNameId": "394E558D-3CCA-4443-81A4-464D00F1796F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.35:*:*:*:*:*:*:*", "cpeNameId": "244B5E4B-3CCC-469E-BC89-424CC37562E5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.36:*:*:*:*:*:*:*", "cpeNameId": "A25A0D88-A1D0-44DD-9C59-0EC251F83B79"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.37:*:*:*:*:*:*:*", "cpeNameId": "FFD0F957-52D3-47DB-9B9B-9D40AB55A9E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.38:*:*:*:*:*:*:*", "cpeNameId": "A7384483-B54D-422E-BD1C-47B466DF7808"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.39:*:*:*:*:*:*:*", "cpeNameId": "BD0A672F-9FD5-470F-91C8-77E96F4B3741"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.40:*:*:*:*:*:*:*", "cpeNameId": "29E4B4C2-838C-48BD-B509-576D1E26C738"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.41:*:*:*:*:*:*:*", "cpeNameId": "C139FA8B-93DA-4053-B303-A3C1DC1382FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.42:*:*:*:*:*:*:*", "cpeNameId": "BF0F83BA-BD56-4364-B55F-EE486FFD9897"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.43:*:*:*:*:*:*:*", "cpeNameId": "37F54B64-6DB3-410B-9795-F9468CCD37D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.44:*:*:*:*:*:*:*", "cpeNameId": "A2813E22-3300-4145-9AF5-091D4FB91EDE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.45:*:*:*:*:*:*:*", "cpeNameId": "E862B1DC-542D-4E20-BEDE-89AC2B3B5D7F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.46:*:*:*:*:*:*:*", "cpeNameId": "940E4409-174B-45E7-B73A-69D72C14D42E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.47:*:*:*:*:*:*:*", "cpeNameId": "2E917523-B369-4B0C-B2FE-330ABAF30D9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.48:*:*:*:*:*:*:*", "cpeNameId": "7AE6B80A-97F9-46E1-91BF-10C5CFE9F291"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.49:*:*:*:*:*:*:*", "cpeNameId": "6C3E0D45-EDD1-48D6-B60C-99C23C609BB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.50:*:*:*:*:*:*:*", "cpeNameId": "3DB32BBC-2AFB-4C81-AB59-6F8C3BA243E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.51:*:*:*:*:*:*:*", "cpeNameId": "5AC8AA4E-C62F-4E70-9E99-6FDC429D2E4E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.52:*:*:*:*:*:*:*", "cpeNameId": "D833500B-5B7B-4D77-980F-A92A0E26CE6B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.53:*:*:*:*:*:*:*", "cpeNameId": "19E0C2D7-36FA-461C-B763-F0B8DBF346A7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.54:*:*:*:*:*:*:*", "cpeNameId": "CD384F60-5A3F-4B0C-A5A2-3ECEA68BB813"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.55:*:*:*:*:*:*:*", "cpeNameId": "768733C9-E2A4-4C01-8956-5FB868E592E3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.56:*:*:*:*:*:*:*", "cpeNameId": "0FC6F402-E917-4E7F-8D83-3D22EF171CAB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.57:*:*:*:*:*:*:*", "cpeNameId": "E8BCDBFF-F548-45B0-9AF9-3FB4B1E38539"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.58:*:*:*:*:*:*:*", "cpeNameId": "E8B92EC7-BB1E-4A65-A431-3125DA3DF1DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.59:*:*:*:*:*:*:*", "cpeNameId": "5C514FE3-ED8D-4DEA-874A-4B61A7578749"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.60:*:*:*:*:*:*:*", "cpeNameId": "215F5625-C874-4841-82C5-AE4A9E6ED912"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.61:*:*:*:*:*:*:*", "cpeNameId": "764780E0-FF24-42A3-A99B-CE11CB846C95"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.62:*:*:*:*:*:*:*", "cpeNameId": "5C2774B8-AF4C-4A7B-BBF4-9516ABF4B4E9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.63:*:*:*:*:*:*:*", "cpeNameId": "BC276565-052E-41EF-9F0F-7ECD9D9678BE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.64:*:*:*:*:*:*:*", "cpeNameId": "DB256AAF-90E8-463A-8C21-D57CC6368D0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.65:*:*:*:*:*:*:*", "cpeNameId": "C9A9E342-DEBC-44E6-82F3-3CCBCBD1F565"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.66:*:*:*:*:*:*:*", "cpeNameId": "68B83B2F-DA58-4442-A4E4-5EFBD7DA2E64"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.67:*:*:*:*:*:*:*", "cpeNameId": "FBD55969-6EB5-4ED7-AD05-1D03D728B999"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.68:*:*:*:*:*:*:*", "cpeNameId": "5A5B47CF-90B7-4BEF-B5AE-EE4FED51E095"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.69:*:*:*:*:*:*:*", "cpeNameId": "0ADD17CA-B3B5-4F53-B4F4-ED079642A461"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.70:*:*:*:*:*:*:*", "cpeNameId": "6F29E18D-63C6-4544-A0E7-92F17EB3ACFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.71:*:*:*:*:*:*:*", "cpeNameId": "A7455D5B-D8E2-4CBE-BF3D-D3CF1A6004FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.72:*:*:*:*:*:*:*", "cpeNameId": "91A1363B-FA51-4A72-AD5E-3784118C73E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.73:*:*:*:*:*:*:*", "cpeNameId": "7C1AD665-9759-452D-86AA-C903E4225BA7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.74:*:*:*:*:*:*:*", "cpeNameId": "7058C57F-5141-4FAC-932A-BDDF0F20C78A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.75:*:*:*:*:*:*:*", "cpeNameId": "2F7FAD3F-6381-42EE-B130-D942FAC1AED0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.76:*:*:*:*:*:*:*", "cpeNameId": "4F7988C5-FA25-4C7C-B0DC-5C084A8CA6DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.77:*:*:*:*:*:*:*", "cpeNameId": "9F7ABB2D-A627-40C5-BC86-9BC9BBBEDBB9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.78:*:*:*:*:*:*:*", "cpeNameId": "71DE43EB-3996-47C3-963A-B93C9E6C6142"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.79:*:*:*:*:*:*:*", "cpeNameId": "191F54D4-44BC-49D5-8FB9-5DFFD648B9F7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.80:*:*:*:*:*:*:*", "cpeNameId": "14B574EE-69F8-4E87-9017-91CBFDAEC743"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.81:*:*:*:*:*:*:*", "cpeNameId": "94E966D4-1DB0-4695-98DA-A28CB90D32EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.82:*:*:*:*:*:*:*", "cpeNameId": "8D92799A-0542-4509-923F-6006E116D1BE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.83:*:*:*:*:*:*:*", "cpeNameId": "C2EF5D53-F86A-4D8A-AB79-DD6491B257F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.84:*:*:*:*:*:*:*", "cpeNameId": "61BB8657-3718-4355-BAA8-92F84B14D1A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.85:*:*:*:*:*:*:*", "cpeNameId": "A599E08D-FD19-4E86-A335-C107B0C6CB0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.86:*:*:*:*:*:*:*", "cpeNameId": "324E1D15-3D11-4683-9B0A-D3BA95E6B7C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.87:*:*:*:*:*:*:*", "cpeNameId": "D320A094-647B-4DC5-83FB-BC79A60AAE61"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.88:*:*:*:*:*:*:*", "cpeNameId": "407DC4FD-0E42-48C0-8A16-07F5CB7F308F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.89:*:*:*:*:*:*:*", "cpeNameId": "2DCEF9A6-CB07-404E-ADCC-E2BD0F69354D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.90:*:*:*:*:*:*:*", "cpeNameId": "CD2E5E6E-F436-4447-BB45-4CA1EBCC1F0F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.91:*:*:*:*:*:*:*", "cpeNameId": "D5909F53-54F8-4E30-87B2-E5B74AEEF668"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.92:*:*:*:*:*:*:*", "cpeNameId": "825880D5-240B-4E5E-88D7-9FBE9377D725"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.93:*:*:*:*:*:*:*", "cpeNameId": "C34961F8-366C-44F9-884F-D95ED75D74E9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.94:*:*:*:*:*:*:*", "cpeNameId": "49338264-F467-4F72-851C-41E72F2E8849"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.95:*:*:*:*:*:*:*", "cpeNameId": "D583DD92-8DB8-4D08-8F84-FEACBF885E5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.96:*:*:*:*:*:*:*", "cpeNameId": "ABD92EA7-61F0-4324-AD60-18A4A9E0345B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.97:*:*:*:*:*:*:*", "cpeNameId": "9CA68F01-482D-4C81-9FAF-8FCB3F4EB631"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.98:*:*:*:*:*:*:*", "cpeNameId": "DB87B10B-0B00-43E6-9712-B7749C08C5B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.99:*:*:*:*:*:*:*", "cpeNameId": "FA3EF181-E416-4607-B59D-A6CEA2D95875"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.100:*:*:*:*:*:*:*", "cpeNameId": "92234FA1-8B41-45EB-BADB-32779B7E4E3C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.101:*:*:*:*:*:*:*", "cpeNameId": "2965F5F4-6322-4A74-BE47-C1E4FF4E4BB3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.102:*:*:*:*:*:*:*", "cpeNameId": "D936A06E-46B7-44F1-AEA1-6C899F68E2DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.103:*:*:*:*:*:*:*", "cpeNameId": "C3564FF2-0B2D-42BF-AA29-3AAF57DF9D0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.104:*:*:*:*:*:*:*", "cpeNameId": "CEF383F0-D9F1-4948-B102-C491944BECBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.105:*:*:*:*:*:*:*", "cpeNameId": "BC26835E-2E39-465E-B48C-E871C740CB06"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.106:*:*:*:*:*:*:*", "cpeNameId": "2142A9D9-E547-4FE9-BDA3-B7B27D3CEF4D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.107:*:*:*:*:*:*:*", "cpeNameId": "9F7EB5C3-3C76-4816-BB64-A0D47A8FF148"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.108:*:*:*:*:*:*:*", "cpeNameId": "A0B4BCED-0919-484E-B64A-2D6F944128BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.109:*:*:*:*:*:*:*", "cpeNameId": "14C4B1A8-4457-4620-A2F4-A7BAAB479E01"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.110:*:*:*:*:*:*:*", "cpeNameId": "08F57941-7A99-4F2F-982B-54B72CA90ECA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.111:*:*:*:*:*:*:*", "cpeNameId": "F75C660D-8C20-4B05-BAB3-2D3BEF6EBC9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.112:*:*:*:*:*:*:*", "cpeNameId": "82BF8B3E-D66C-40EF-B175-1E5A2466D997"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.113:*:*:*:*:*:*:*", "cpeNameId": "CF72EDAE-B29A-4A22-BF70-8FD89123C957"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.114:*:*:*:*:*:*:*", "cpeNameId": "86E6F51B-573A-4DB5-99FA-BB89A65DD613"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.115:*:*:*:*:*:*:*", "cpeNameId": "63567DC6-8639-44B7-BDBC-C600977ECD7C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.116:*:*:*:*:*:*:*", "cpeNameId": "7A6E8D0B-1EF6-4080-A3AD-45CD2B6C35AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.117:*:*:*:*:*:*:*", "cpeNameId": "AD8652AE-1F37-43B4-BC34-39F852FD3301"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.119:*:*:*:*:*:*:*", "cpeNameId": "3E564E16-38CA-428F-98CC-5F14B13A30CB"}]}} \ No newline at end of file diff --git a/cpematch/BC/BC68E1ED-A70A-4238-8AB6-089C61EE46F7.json b/cpematch/BC/BC68E1ED-A70A-4238-8AB6-089C61EE46F7.json new file mode 100644 index 00000000000..fe94671a7d9 --- /dev/null +++ b/cpematch/BC/BC68E1ED-A70A-4238-8AB6-089C61EE46F7.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "BC68E1ED-A70A-4238-8AB6-089C61EE46F7", "criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.1.0", "versionEndExcluding": "2.8.17", "lastModified": "2025-01-09T16:58:26.927", "cpeLastModified": "2025-01-09T16:58:26.927", "created": "2025-01-09T16:58:26.927", "status": "Active", "matches": [{"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.1.0:-:*:*:*:*:*:*", "cpeNameId": "CC86C76D-E3C0-4757-A596-6D208BD36C35"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.1.0:rc1:*:*:*:*:*:*", "cpeNameId": "F35BD789-9B5B-4A5B-AA8E-5CEB8CABB960"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.1.0:rc2:*:*:*:*:*:*", "cpeNameId": "3248F169-4D83-4623-939F-3CB672A624CF"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.1.0:rc3:*:*:*:*:*:*", "cpeNameId": "31F7E273-2989-4624-8D0A-BE427A866D01"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.1.1:*:*:*:*:*:*:*", "cpeNameId": "92C39D94-E991-48EF-AB5C-1E629BFC276B"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.1.2:-:*:*:*:*:*:*", "cpeNameId": "DA576877-38E8-4E18-BF13-64A682B69518"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.1.2:hotfix1:*:*:*:*:*:*", "cpeNameId": "BF48DB77-B51E-4412-AB16-916CB372B87D"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.1.3:*:*:*:*:*:*:*", "cpeNameId": "360373E9-D376-4ED8-98BD-B90F5A40A02C"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.1.4:*:*:*:*:*:*:*", "cpeNameId": "1EE8EFD5-679B-4B0D-9C87-CD92B25F2D4D"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.1.5:*:*:*:*:*:*:*", "cpeNameId": "FCB8DAC6-6AE0-4F77-B091-F966DCABFDF8"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.1.6:*:*:*:*:*:*:*", "cpeNameId": "F78A034A-33E5-4E34-9267-35CD0D3C4BA2"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.1.7:*:*:*:*:*:*:*", "cpeNameId": "4F443A41-9D0F-4295-ADF0-146DC1CA498E"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.1.8:*:*:*:*:*:*:*", "cpeNameId": "AFED2699-AB00-428A-96EF-269A24A9F92C"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.1.9:*:*:*:*:*:*:*", "cpeNameId": "E4C60DAE-40BD-407E-B65C-7C3D72A80064"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.1.10:*:*:*:*:*:*:*", "cpeNameId": "B2D21863-039B-4467-8650-E0EB1814BB62"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.1.11:*:*:*:*:*:*:*", "cpeNameId": "BA70776A-C958-4154-90F3-005E95C531B4"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.1.12:*:*:*:*:*:*:*", "cpeNameId": "1FC06F4E-3EB8-4DA3-BCA8-E060D99AC666"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.1.13:*:*:*:*:*:*:*", "cpeNameId": "A7729986-6002-4E6D-AB47-4128054FBC7E"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.1.14:*:*:*:*:*:*:*", "cpeNameId": "C2CDE075-FF50-4610-964E-3F2E749D998F"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.1.15:*:*:*:*:*:*:*", "cpeNameId": "F3EF6839-3526-42E5-9F13-670195913CF5"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.1.16:*:*:*:*:*:*:*", "cpeNameId": "9ED8F9BA-7334-4FAD-A200-E7256E35AD50"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.2.0:-:*:*:*:*:*:*", "cpeNameId": "67D4BFAD-6243-4905-847B-A2EAE8AC7D45"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.2.0:rc1:*:*:*:*:*:*", "cpeNameId": "D19DC38D-91A7-480D-ABD2-2D41241C5928"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.2.1:*:*:*:*:*:*:*", "cpeNameId": "057D81F9-BA2C-4D96-BC62-4644074A4E5A"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.2.2:*:*:*:*:*:*:*", "cpeNameId": "60E063C6-4E71-4FE4-85EE-7EFDA5143D5D"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.2.3:*:*:*:*:*:*:*", "cpeNameId": "CF14C7E2-5F4E-4818-BF92-7B09DF0AE15F"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.2.4:*:*:*:*:*:*:*", "cpeNameId": "71ED763D-3717-4FE9-BBF5-BFDD4B5D6BC4"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.2.5:*:*:*:*:*:*:*", "cpeNameId": "C41E24BB-565E-4004-B859-2C441A56E546"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.2.6:*:*:*:*:*:*:*", "cpeNameId": "878E4CE7-6243-425F-9E8C-68FAF26AD94E"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.2.7:*:*:*:*:*:*:*", "cpeNameId": "E06D8A7F-63A4-48DD-8161-B04FF0F9FB7B"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.2.8:*:*:*:*:*:*:*", "cpeNameId": "E079C973-385E-469D-8351-1834677121DD"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.2.8-1:*:*:*:*:*:*:*", "cpeNameId": "EFCB34D7-72B6-4535-A17B-3ADD1EAF98AB"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.2.9:*:*:*:*:*:*:*", "cpeNameId": "01D54132-64E3-49B0-9E88-F4A1E99EC2CE"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.2.10:*:*:*:*:*:*:*", "cpeNameId": "12D08431-EF4D-4CFD-8339-1DE4ADA11BFE"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.2.11:*:*:*:*:*:*:*", "cpeNameId": "08799D1B-6E1A-49FC-A2D2-A8C9BCD9C78D"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.2.12:*:*:*:*:*:*:*", "cpeNameId": "81974CDB-4AD5-4F4A-A737-34DB2F678A14"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.2.13:*:*:*:*:*:*:*", "cpeNameId": "AAFA3765-5A17-4505-A612-7B8823705584"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.2.14:*:*:*:*:*:*:*", "cpeNameId": "28294F5F-AD33-4AC0-BCC4-5CD23DBC12B0"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.2.15:*:*:*:*:*:*:*", "cpeNameId": "0F9EF5AD-D015-447A-9319-3951B21E1A82"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.2.16:*:*:*:*:*:*:*", "cpeNameId": "D25A257D-E353-4705-85CD-9B08570D22D9"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.3.0:-:*:*:*:*:*:*", "cpeNameId": "90C14477-1F44-4E3A-8BE1-16C03F5760C7"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.3.0:rc1:*:*:*:*:*:*", "cpeNameId": "F0A4E481-41D5-41CC-A660-8C6F0517337C"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.3.0:rc2:*:*:*:*:*:*", "cpeNameId": "57C4AD4F-0F14-42C3-BF9A-6546419FC5F2"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.3.0:rc4:*:*:*:*:*:*", "cpeNameId": "60053410-0B14-4FB0-9B5D-013B693F428A"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.3.0:rc5:*:*:*:*:*:*", "cpeNameId": "2198BCF6-9A7C-48F2-AD93-C377E0A28C2E"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.3.1:*:*:*:*:*:*:*", "cpeNameId": "7092AFAF-9A42-47D7-A03B-82B01AAC0F6C"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.3.2:*:*:*:*:*:*:*", "cpeNameId": "4645539F-15A7-4D4D-9D3F-D25A0D00BCAD"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.3.3:*:*:*:*:*:*:*", "cpeNameId": "E4A51F63-F9AB-4AD0-A4AC-0C9E12A193A9"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.3.4:*:*:*:*:*:*:*", "cpeNameId": "1D8B102F-358F-43EF-A50A-B95A336C9B24"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.3.5:*:*:*:*:*:*:*", "cpeNameId": "0CB9664A-DBBA-4A95-B2E8-0EB79FFABD91"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.3.6:*:*:*:*:*:*:*", "cpeNameId": "41CF83FC-7D57-4D57-ADF1-3EAEDF6FD7F0"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.3.7:*:*:*:*:*:*:*", "cpeNameId": "4B4604A5-76D7-4A55-B638-9435110EED6F"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.3.8:*:*:*:*:*:*:*", "cpeNameId": "4881825E-84BF-4F51-9440-511F5157C8F6"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.3.9:*:*:*:*:*:*:*", "cpeNameId": "182C74C8-8949-45E2-983A-64AC3C4D12FB"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.3.10:*:*:*:*:*:*:*", "cpeNameId": "C4F3720B-DC25-4C9C-A504-5B930530FDBD"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.3.11:*:*:*:*:*:*:*", "cpeNameId": "6D4D703C-5C86-40D1-8B0C-A9816C9E74BC"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.3.12:*:*:*:*:*:*:*", "cpeNameId": "A75EAC21-05B3-452B-923C-41D0D32EFFE4"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.3.13:*:*:*:*:*:*:*", "cpeNameId": "B535183A-22FB-44AB-80B3-22A7D4132983"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.3.14:*:*:*:*:*:*:*", "cpeNameId": "85384DBA-BD1F-41E3-B714-90A0221C370C"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.3.15:*:*:*:*:*:*:*", "cpeNameId": "CF826E3F-3580-4174-BE84-B14E749F8D89"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.3.16:*:*:*:*:*:*:*", "cpeNameId": "397BD6B9-C737-414B-8803-5040861548B7"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.3.17:*:*:*:*:*:*:*", "cpeNameId": "77589F6F-3F05-4EB0-B34D-C9F39A49792E"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.4.0:-:*:*:*:*:*:*", "cpeNameId": "5499AE92-56AF-427B-AE01-3723F1B1F30C"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.4.0:rc1:*:*:*:*:*:*", "cpeNameId": "FB2CC6B0-913B-4596-BB6F-A20FDC437EB0"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.4.0:rc2:*:*:*:*:*:*", "cpeNameId": "0073994B-2148-4519-8850-A85FCFE0B133"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.4.0:rc3:*:*:*:*:*:*", "cpeNameId": "A3D501AF-7F5A-4027-8F7E-F8EB9C2C7798"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.4.0:rc4:*:*:*:*:*:*", "cpeNameId": "D1D17FA9-4387-4300-BB8C-6BEDA6126F56"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.4.0:rc5:*:*:*:*:*:*", "cpeNameId": "AA48B08D-3491-4A99-9292-A1CDF97D728C"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.4.1:*:*:*:*:*:*:*", "cpeNameId": "7BBA957C-950C-4678-8F66-0B97D79DEEE1"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.4.2:*:*:*:*:*:*:*", "cpeNameId": "5C69861F-857A-4362-A50F-A0BF3F95340C"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.4.3:*:*:*:*:*:*:*", "cpeNameId": "F711615E-504C-4325-94D0-FA280ECE8D08"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.4.4:*:*:*:*:*:*:*", "cpeNameId": "B9C1CD70-089A-46FE-86AB-EA57F491FDC4"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.4.5:*:*:*:*:*:*:*", "cpeNameId": "7A6CCD90-970A-4F34-95D1-CC0B53FF132C"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.4.6:*:*:*:*:*:*:*", "cpeNameId": "A53172BE-D7A2-4A53-A279-3BF481C2375F"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.4.7:*:*:*:*:*:*:*", "cpeNameId": "016CB749-9B05-4421-AA39-A7C8AFAF3EDF"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.4.8:*:*:*:*:*:*:*", "cpeNameId": "FA6211D5-8261-432B-A0D8-0FC73E3D7D7B"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.4.9:*:*:*:*:*:*:*", "cpeNameId": "0FEFAA24-D024-4EF4-8142-77B062791E46"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.4.10:*:*:*:*:*:*:*", "cpeNameId": "EBF6F03D-3196-4401-A765-13E649B8756C"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.4.11:*:*:*:*:*:*:*", "cpeNameId": "B9C8D187-7380-4D8B-9AC7-6C06C2689414"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.4.12:*:*:*:*:*:*:*", "cpeNameId": "20917EB5-FEC4-4732-A955-E0C7A540040E"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.4.13:*:*:*:*:*:*:*", "cpeNameId": "A8CAC6A5-8B3D-4498-B0AC-0C58E4FFE776"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.4.14:*:*:*:*:*:*:*", "cpeNameId": "F1235C07-DB7A-4469-A3C6-B7B596994965"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.4.15:*:*:*:*:*:*:*", "cpeNameId": "5EA78826-6919-4CEB-8C6A-8EE48115B5F8"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.4.16:*:*:*:*:*:*:*", "cpeNameId": "6DDA8C72-E3C3-4C4A-86C7-B9D4000235FB"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.4.17:*:*:*:*:*:*:*", "cpeNameId": "D430D4C5-76C0-487E-A7B5-93CB6FA83974"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.4.18:*:*:*:*:*:*:*", "cpeNameId": "BA6E34DD-ADB5-4D82-A52F-8641181EE4C3"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.4.19:*:*:*:*:*:*:*", "cpeNameId": "84652C48-AD7A-4245-9A6F-56FAD755CE08"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.4.20:*:*:*:*:*:*:*", "cpeNameId": "49CFE822-59F3-4C0F-9366-978B2A2190AC"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.4.21:*:*:*:*:*:*:*", "cpeNameId": "A7464CBC-A603-4B80-94F0-AE08A3234BEC"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.4.22:*:*:*:*:*:*:*", "cpeNameId": "0C64F333-E94C-49B7-85DB-5E3365C1782A"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.4.23:*:*:*:*:*:*:*", "cpeNameId": "90F80EDC-9E0C-42C4-A2F9-2B3182C733D0"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.4.24:*:*:*:*:*:*:*", "cpeNameId": "35A2F3E1-18C4-4845-AAB2-BAAC966630AD"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.4.25:*:*:*:*:*:*:*", "cpeNameId": "D1F1467B-23A6-4AE9-8D9C-84440FB19CBB"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.4.26:*:*:*:*:*:*:*", "cpeNameId": "62383BFC-0CD9-4FA1-B7F2-0969D3CAB3E5"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.4.27:*:*:*:*:*:*:*", "cpeNameId": "95B23095-F73E-46C9-B4C4-6641CCE0D631"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.4.28:*:*:*:*:*:*:*", "cpeNameId": "4846B25C-22C0-471F-AC42-CBFF2F889E5E"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.5.0:-:*:*:*:*:*:*", "cpeNameId": "45689397-AF4F-44A5-BC95-4ECAD26B3904"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.5.0:rc1:*:*:*:*:*:*", "cpeNameId": "CAC05D08-81FA-46B7-BAA8-95EF1CAF4AD5"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.5.0:rc2:*:*:*:*:*:*", "cpeNameId": "59D7E1F5-A4BF-44AD-A5AB-0BFABC1B0FCB"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.5.0:rc3:*:*:*:*:*:*", "cpeNameId": "0740B09D-4C02-4EF7-91A2-AC34DB8A418C"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.5.1:*:*:*:*:*:*:*", "cpeNameId": "BD5652FD-1682-4467-BBC4-71EA201E28D4"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.5.2:*:*:*:*:*:*:*", "cpeNameId": "829F2AE9-9005-45F7-8C34-F293DC13FE77"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.5.3:*:*:*:*:*:*:*", "cpeNameId": "9DAA3754-7C5A-4449-9E3D-F1DD99808EC1"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.5.4:*:*:*:*:*:*:*", "cpeNameId": "A0F1A75B-3BA3-4417-9B68-330612E248CF"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.5.5:*:*:*:*:*:*:*", "cpeNameId": "DA63955A-5C9D-4EAE-874A-2B62D3311C3D"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.5.6:*:*:*:*:*:*:*", "cpeNameId": "DF2A9F8C-11A0-4201-BC60-A9CB7B136240"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.5.7:*:*:*:*:*:*:*", "cpeNameId": "DEF05CDF-EF23-4F64-AC19-E2708B00565F"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.5.8:*:*:*:*:*:*:*", "cpeNameId": "BDA733E6-2BC0-4CF5-A391-CD2475730498"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.5.9:*:*:*:*:*:*:*", "cpeNameId": "8FCC8AF3-3D33-498F-845C-9E8BF5136F82"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.5.10:*:*:*:*:*:*:*", "cpeNameId": "A748EC9B-DE84-496F-AC2D-E382B7A88CBF"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.5.11:*:*:*:*:*:*:*", "cpeNameId": "57051916-B62C-4D1C-8D63-12CA4FCA5221"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.5.12:*:*:*:*:*:*:*", "cpeNameId": "AA69D41F-C13F-4F7F-B78D-F9E6CF02A9BE"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.5.13:*:*:*:*:*:*:*", "cpeNameId": "E61835D2-F0B7-451A-A370-F56737A05172"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.5.14:*:*:*:*:*:*:*", "cpeNameId": "49F6E681-5FB0-4B8B-A301-44809FF4823E"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.5.15:*:*:*:*:*:*:*", "cpeNameId": "2AC9190F-954F-41FD-8DEC-B931D95D2891"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.5.16:*:*:*:*:*:*:*", "cpeNameId": "2453BFFF-7456-4DE5-A6AF-A4A0E445C65D"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.5.17:*:*:*:*:*:*:*", "cpeNameId": "1DD08B97-43BD-4BC8-8B29-001FDAB82FEC"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.5.18:*:*:*:*:*:*:*", "cpeNameId": "D9A470D5-EDC5-4E02-99F0-8C6E8A4EA372"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.5.19:*:*:*:*:*:*:*", "cpeNameId": "8EF6786E-1AC7-408F-BF6B-B78EBDE2A6F5"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.5.20:*:*:*:*:*:*:*", "cpeNameId": "735C252C-76E9-4B44-B7B7-B69143258693"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.5.21:*:*:*:*:*:*:*", "cpeNameId": "366A16C2-2FBD-4461-BD76-96AFFC456D39"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.5.22:*:*:*:*:*:*:*", "cpeNameId": "EE6DF70B-2352-4CC8-BEBA-33602B1D9D27"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.6.0:-:*:*:*:*:*:*", "cpeNameId": "5156556E-826C-46C9-9BAA-5B42626D42F4"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.6.0:rc1:*:*:*:*:*:*", "cpeNameId": "A96CB9DB-09DB-4849-B47C-7411CCF25A17"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.6.0:rc2:*:*:*:*:*:*", "cpeNameId": "4C031AD2-3BB5-46AD-8DC6-0642BAB55430"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.6.0:rc3:*:*:*:*:*:*", "cpeNameId": "BC91FE4B-B9D2-4A64-B7A9-7E17042239A4"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.6.0:rc4:*:*:*:*:*:*", "cpeNameId": "A5A5A8FD-192E-4DFA-85B7-29CD32949C23"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.6.0:rc5:*:*:*:*:*:*", "cpeNameId": "F57A42A0-A3C0-4C54-A589-FEC110790126"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.6.0:rc6:*:*:*:*:*:*", "cpeNameId": "540AAB02-1FCE-4132-9FE2-68903F4873A9"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.6.0:rc7:*:*:*:*:*:*", "cpeNameId": "F93EF567-6420-4237-81C3-DB239C5E3ECE"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.6.1:*:*:*:*:*:*:*", "cpeNameId": "B319DBD3-030E-43CA-85E5-FDED634E16B7"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.6.2:*:*:*:*:*:*:*", "cpeNameId": "774EF29C-4579-484E-8235-1B091A7CDCE4"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.6.3:*:*:*:*:*:*:*", "cpeNameId": "274720DC-9C58-4C60-86F2-EECC77BE6B53"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.6.4:*:*:*:*:*:*:*", "cpeNameId": "44595944-F76B-400E-8F2C-27D45CADA433"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.6.5:*:*:*:*:*:*:*", "cpeNameId": "4E47451C-B393-487F-88AE-21A0C7AD460E"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.6.6:*:*:*:*:*:*:*", "cpeNameId": "C0D5E1B3-7A96-4E9C-90EE-3977272CA5E8"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.6.7:*:*:*:*:*:*:*", "cpeNameId": "F814CC76-DDE6-47D4-A00A-4E7BBFF5C36E"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.6.8:*:*:*:*:*:*:*", "cpeNameId": "6B425D4B-ED6B-48DD-82CB-A9580DABFF6E"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.6.9:*:*:*:*:*:*:*", "cpeNameId": "3E8D88CF-A275-4D3E-89AE-B293BC061491"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.6.10:*:*:*:*:*:*:*", "cpeNameId": "102620B5-1998-4F08-A50F-3D719F8C1925"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.6.11:*:*:*:*:*:*:*", "cpeNameId": "2FF82892-9876-4143-891F-A87048E41FB2"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.6.12:*:*:*:*:*:*:*", "cpeNameId": "8262E4BE-54F5-417C-8B5F-A7FED40F9832"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.6.13:*:*:*:*:*:*:*", "cpeNameId": "9C43EA2C-7697-458B-BBE5-D69468D5D760"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.6.14:*:*:*:*:*:*:*", "cpeNameId": "3B775495-27C3-4902-8F46-0D9CFBCBD955"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.6.15:*:*:*:*:*:*:*", "cpeNameId": "984FEE28-F14D-4B84-AEA3-10A504E46BF4"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.7.0:-:*:*:*:*:*:*", "cpeNameId": "B94602F1-408F-4C2B-9537-FAECA3B4280A"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.7.0:rc1:*:*:*:*:*:*", "cpeNameId": "503A622A-B2D0-4876-AFDD-F58C9080394C"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.7.0:rc2:*:*:*:*:*:*", "cpeNameId": "668A12EF-9FE7-4473-8771-26705C1D0521"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.7.1:*:*:*:*:*:*:*", "cpeNameId": "3BC6075A-C349-446B-B9FA-E37EECFADFF3"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.7.2:*:*:*:*:*:*:*", "cpeNameId": "3C7C9AAD-6C04-428E-A965-87D1D6CC6AA6"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.7.3:*:*:*:*:*:*:*", "cpeNameId": "FD7A4555-088D-43FB-B0C5-A87EB929018F"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.7.4:*:*:*:*:*:*:*", "cpeNameId": "D886C26B-E935-440F-BB3F-AD15CDC6AF8B"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.7.5:*:*:*:*:*:*:*", "cpeNameId": "70F871EC-6E4B-4F54-AA2B-CA191CFB6237"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.7.6:*:*:*:*:*:*:*", "cpeNameId": "BCC4628D-D7A9-49DB-B877-E1A80A020E09"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.7.7:*:*:*:*:*:*:*", "cpeNameId": "2D87554C-7188-4F54-A18B-FFABD836E055"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.7.8:*:*:*:*:*:*:*", "cpeNameId": "A89E0FFC-7BA0-47F5-8BF7-AED8C421A34E"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.7.9:*:*:*:*:*:*:*", "cpeNameId": "3F62ABDF-C295-4A65-A5C1-69DFF8898FEE"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.7.10:*:*:*:*:*:*:*", "cpeNameId": "3B051F53-78DA-441C-86F2-F6D65B3B8339"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.7.11:*:*:*:*:*:*:*", "cpeNameId": "F0D4E152-E527-476B-8386-2DD499AD4954"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.7.12:*:*:*:*:*:*:*", "cpeNameId": "87519553-11EE-4E8A-8715-8F7DAB7212A6"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.7.13:*:*:*:*:*:*:*", "cpeNameId": "D34E00B7-ABF8-473C-8381-BED9885A2CDB"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.7.14:*:*:*:*:*:*:*", "cpeNameId": "BF59D703-2A45-49BF-8506-D11D37073E51"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.7.15:*:*:*:*:*:*:*", "cpeNameId": "8BC63F4C-BC90-4A33-BAB6-2E40A7944BD8"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.7.16:*:*:*:*:*:*:*", "cpeNameId": "0E5EFA6E-B444-4BB6-9AF1-11E712D9E43D"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.7.17:*:*:*:*:*:*:*", "cpeNameId": "F353C1B0-6950-4F8D-9932-1E179FADA125"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.7.18:*:*:*:*:*:*:*", "cpeNameId": "E4DF3D9F-2B19-4EF6-B429-CD682AFD8086"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.8.0:-:*:*:*:*:*:*", "cpeNameId": "E32BD0B9-EBD1-4438-8622-BA3A893C1C0C"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.8.0:rc1:*:*:*:*:*:*", "cpeNameId": "C9924607-40DC-4466-A842-4F4787A8FD28"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.8.0:rc2:*:*:*:*:*:*", "cpeNameId": "430137D1-4754-4945-8FC0-EF4280E8D05D"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.8.0:rc3:*:*:*:*:*:*", "cpeNameId": "6F5012A7-F5DD-40C8-A814-56C6622DC0AC"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.8.0:rc4:*:*:*:*:*:*", "cpeNameId": "0F26A9D7-B1BA-4A61-BDDA-B0757C172FDB"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.8.0:rc5:*:*:*:*:*:*", "cpeNameId": "73236D83-CD70-440F-A5CF-AF79CCFAC87A"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.8.0:rc6:*:*:*:*:*:*", "cpeNameId": "8DAD0753-8587-4D28-867D-1F70752C55DF"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.8.0:rc7:*:*:*:*:*:*", "cpeNameId": "4DBBABE8-EFF9-4BEE-AB14-0CD3E319D13A"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.8.1:*:*:*:*:*:*:*", "cpeNameId": "415E013E-9938-4D8B-85CA-A6CB80C583CE"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.8.2:*:*:*:*:*:*:*", "cpeNameId": "2F56DA76-EF72-4FD5-946B-96515607DD5D"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.8.3:*:*:*:*:*:*:*", "cpeNameId": "8A3916A1-F25D-453D-BC89-F7FB0E5EEBA8"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.8.4:*:*:*:*:*:*:*", "cpeNameId": "3CF19C73-F27C-42A9-9B15-35655F6BACD1"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.8.5:*:*:*:*:*:*:*", "cpeNameId": "7DA493D0-9C35-4818-BC63-8272E633ED31"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.8.6:*:*:*:*:*:*:*", "cpeNameId": "2BEAFEE9-6F19-491D-95A1-431DF20F114F"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.8.7:*:*:*:*:*:*:*", "cpeNameId": "0B4B6C3B-3459-491A-854C-3F8F9D0FCB0D"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.8.8:*:*:*:*:*:*:*", "cpeNameId": "C0A511A2-135E-41F7-9B8C-A0681506D3F9"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.8.9:*:*:*:*:*:*:*", "cpeNameId": "BAE10B43-9815-42EA-AB2A-43822BA77CF4"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.8.10:*:*:*:*:*:*:*", "cpeNameId": "69DBD485-17F4-495C-9411-8314D749751F"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.8.11:*:*:*:*:*:*:*", "cpeNameId": "13A60202-EA4A-4DC0-8097-743426057628"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.8.12:*:*:*:*:*:*:*", "cpeNameId": "B7EECCCF-37E5-4916-B715-6BEC3A042D14"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.8.13:*:*:*:*:*:*:*", "cpeNameId": "4E2CBD22-0C36-4D5A-B348-75D4503DDE95"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.8.14:*:*:*:*:*:*:*", "cpeNameId": "9FC3B1B5-F1DE-465B-AF7F-047DA3798443"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.8.15:*:*:*:*:*:*:*", "cpeNameId": "E2C74586-4D89-4C16-9762-8D64824EAD12"}, {"cpeName": "cpe:2.3:a:argoproj:argo_cd:2.8.16:*:*:*:*:*:*:*", "cpeNameId": "23DEFFB7-9032-4E2D-BD7F-44FBB9778C2F"}]}} \ No newline at end of file diff --git a/cpematch/BD/BD342BE3-BDB3-4031-9F0B-DE4F90246387.json b/cpematch/BD/BD342BE3-BDB3-4031-9F0B-DE4F90246387.json new file mode 100644 index 00000000000..cd31f3eb166 --- /dev/null +++ b/cpematch/BD/BD342BE3-BDB3-4031-9F0B-DE4F90246387.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "BD342BE3-BDB3-4031-9F0B-DE4F90246387", "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "4.9.333", "lastModified": "2025-01-09T17:37:23.203", "cpeLastModified": "2025-01-09T17:37:23.203", "created": "2025-01-09T17:37:23.203", "status": "Active", "matches": [{"cpeName": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpeNameId": "0BA1AF04-98FA-4EBA-893B-700905C43151"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:arm32:*", "cpeNameId": "0EE3D2E5-A1B7-4DD3-9B6A-9CD7014FF769"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:x64:*", "cpeNameId": "DCBFE1ED-9B0D-4F9C-ABCF-0AFDFA24DFAF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:1.2.0:*:*:*:*:*:*:*", "cpeNameId": "B32F7327-3C28-46AF-A760-A97F8342EDDF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:1.3.0:*:*:*:*:*:*:*", "cpeNameId": "075A041A-12FA-4654-B47B-734E22DDA6EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0:*:*:*:*:*:*:*", "cpeNameId": "7D0752A5-4B86-4687-A0AD-426F0B482760"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.0:*:*:*:*:*:*:*", "cpeNameId": "1E8D4989-C88F-470C-995B-76266C3DCB41"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.1:*:*:*:*:*:*:*", "cpeNameId": "A47C7AE5-F9C5-4B97-9080-FA269969C7ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.2:*:*:*:*:*:*:*", "cpeNameId": "2D148A09-B342-44C5-83F2-82ACDB0D9D36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.3:*:*:*:*:*:*:*", "cpeNameId": "0DCEFF75-A4E4-465E-9129-449700F6D612"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.4:*:*:*:*:*:*:*", "cpeNameId": "DFB11C62-D1C9-46A9-BD73-EE49541EF221"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.5:*:*:*:*:*:*:*", "cpeNameId": "0718E25A-12B8-43A1-B194-51090D8C7BE2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.6:*:*:*:*:*:*:*", "cpeNameId": "BFE10CC5-D80F-45F0-BCBD-03D91A0BB813"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.7:*:*:*:*:*:*:*", "cpeNameId": "E97F701B-7C26-45E9-94BD-A4935B97C08C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.8:*:*:*:*:*:*:*", "cpeNameId": "4EBB4222-0272-4F04-BEDE-59BDD594D4BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.9:*:*:*:*:*:*:*", "cpeNameId": "C9BA0645-3011-4C47-B702-6F92D27D45F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.9.9:*:*:*:*:*:*:*", "cpeNameId": "88AAD11E-2E95-408D-8533-6469ECADAAE5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.10:*:*:*:*:*:*:*", "cpeNameId": "386F4D94-B4C9-4090-A7FC-2CB0D36C0144"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.11:*:*:*:*:*:*:*", "cpeNameId": "5623879D-00B9-4265-8DD3-13F81E0645EE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.12:*:*:*:*:*:*:*", "cpeNameId": "D0F0D9F5-86DD-4CEF-A3AF-FCF632039512"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.13:*:*:*:*:*:*:*", "cpeNameId": "65C670DA-5AA8-43C6-BCF8-17427620F5D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.14:*:*:*:*:*:*:*", "cpeNameId": "01E2C7E8-40E1-42AA-87FA-2C2FD1F3965D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.15:*:*:*:*:*:*:*", "cpeNameId": "EE508826-01D3-45CA-B3B3-F324DCF63DA8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.16:*:*:*:*:*:*:*", "cpeNameId": "16624148-BCB7-4F74-BCF2-061816DACD5A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.17:*:*:*:*:*:*:*", "cpeNameId": "0FB8086D-0000-4D37-B251-CB9B35391732"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.18:*:*:*:*:*:*:*", "cpeNameId": "48CC244C-257B-42CA-858B-07EDDAEF684A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.19:*:*:*:*:*:*:*", "cpeNameId": "CA1E8EFC-F60A-4D20-8D45-52DC2E0DF7D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.20:*:*:*:*:*:*:*", "cpeNameId": "1F8C9F53-0087-4BAF-BA7E-4661E53EAD5F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.21:*:*:*:*:*:*:*", "cpeNameId": "47FE9605-6EB9-4CAA-9B0D-DDA1DB8DFB54"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.22:*:*:*:*:*:*:*", "cpeNameId": "6020DCE2-C641-46A5-98AF-1497EA3169D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.23:*:*:*:*:*:*:*", "cpeNameId": "AD8F7AC5-D687-40A4-8627-648EC213B739"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.24:*:*:*:*:*:*:*", "cpeNameId": "EF695863-F81E-4F32-9DB6-DA1100C6B483"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.25:*:*:*:*:*:*:*", "cpeNameId": "142CB40B-5526-4203-8134-703A36E7F632"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.26:*:*:*:*:*:*:*", "cpeNameId": "CBA0B441-1138-46E1-AE5C-87E32BD0436E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.27:*:*:*:*:*:*:*", "cpeNameId": "89EE4C84-747B-4183-80DF-B935F6F83FC8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.28:*:*:*:*:*:*:*", "cpeNameId": "63EA86AA-8541-4DF1-9BCA-87DE5878E150"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.29:*:*:*:*:*:*:*", "cpeNameId": "E37BA6E6-2743-4421-A874-87A3EC73BA45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.30:*:*:*:*:*:*:*", "cpeNameId": "A034B8CD-0E4F-4C45-B7E0-2592B85F4A99"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.31:*:*:*:*:*:*:*", "cpeNameId": "923D8336-E526-47E0-97D2-23DAF7546EB2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.32:*:*:*:*:*:*:*", "cpeNameId": "7BAA1656-DF02-497B-AAD1-DC406F6AE937"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.33:*:*:*:*:*:*:*", "cpeNameId": "7786B307-402C-4D73-84DE-8421F1C47FB1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.34:*:*:*:*:*:*:*", "cpeNameId": "8BA9CCF6-B8C9-47C3-8D62-81D0A796E896"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.35:*:*:*:*:*:*:*", "cpeNameId": "E891A639-0028-4188-A7C8-78AA49134BEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.36:*:*:*:*:*:*:*", "cpeNameId": "3CF54451-724A-4E7D-90B8-A430DB7EEBA9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.37:*:*:*:*:*:*:*", "cpeNameId": "7C3B4A2E-CBF4-463E-B1B2-8AE9F1583967"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.38:*:*:*:*:*:*:*", "cpeNameId": "151D2CE6-5AA2-47F6-BE4E-027FC0445AAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.39:*:*:*:*:*:*:*", "cpeNameId": "50855B79-B40B-4B9D-873C-EDF74D761634"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1:*:*:*:*:*:*:*", "cpeNameId": "DA5BA2A3-8137-49FD-8AD0-263174449A5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.0:*:*:*:*:*:*:*", "cpeNameId": "F4869021-EB2D-4597-9633-0C22F003063E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.1:*:*:*:*:*:*:*", "cpeNameId": "7A9C6B6F-5BCE-4DE6-9AEF-2A12A0EC39A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.2:*:*:*:*:*:*:*", "cpeNameId": "D8F24AA6-A4D0-4A76-9445-12AD00760FA5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.3:*:*:*:*:*:*:*", "cpeNameId": "C03BD68F-8DA6-4F4A-B5C2-6E4DBE062FF3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.4:*:*:*:*:*:*:*", "cpeNameId": "8183004F-62BF-430A-9DEC-E0807CD6185C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.5:*:*:*:*:*:*:*", "cpeNameId": "7D3547D6-4D24-46F3-8E6A-67C9E420ECD4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.6:*:*:*:*:*:*:*", "cpeNameId": "F4A8FD3D-F3C4-4FA1-8B0E-CC20E46A2D62"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.7:*:*:*:*:*:*:*", "cpeNameId": "862EC88F-9853-4A33-B17E-D8094CD31B56"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.8:*:*:*:*:*:*:*", "cpeNameId": "CD07C89A-9F4A-49E6-AB27-5F34B2D552AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.9:*:*:*:*:*:*:*", "cpeNameId": "DB9504AB-15ED-4062-9E60-FBBFCF1888D6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.10:*:*:*:*:*:*:*", "cpeNameId": "134D3BA3-2035-4F17-9566-D97B862CD9AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.11:*:*:*:*:*:*:*", "cpeNameId": "735F0903-F295-4B97-9947-557D3BE093F7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.12:*:*:*:*:*:*:*", "cpeNameId": "53201AAD-91C7-40CE-8E9B-ACE0D106E2A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.13:*:*:*:*:*:*:*", "cpeNameId": "9FA60CC4-E232-44BC-9B73-4D5DE031E9F7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.14:*:*:*:*:*:*:*", "cpeNameId": "7E824070-C18C-4908-B8BB-A00D0E5050CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.15:*:*:*:*:*:*:*", "cpeNameId": "96296B03-44CD-49B2-9683-6C2540C7D540"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.16:*:*:*:*:*:*:*", "cpeNameId": "0A45BEEA-FDD5-4214-A5E8-42A1B1E7362B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.17:*:*:*:*:*:*:*", "cpeNameId": "4FD3A061-B2CB-4794-8DFE-682617523474"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.18:*:*:*:*:*:*:*", "cpeNameId": "1D57DEB5-39D9-468B-AE0C-5B24B7E92811"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.19:*:*:*:*:*:*:*", "cpeNameId": "F57186BA-A3B2-4D96-AD1F-89014F339AEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.20:*:*:*:*:*:*:*", "cpeNameId": "E6493953-8B33-420B-AD52-DDD054D520A5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.21:*:*:*:*:*:*:*", "cpeNameId": "232A415E-5E6C-4D6E-B615-A7F985E05A98"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.22:*:*:*:*:*:*:*", "cpeNameId": "29689FC9-6BEC-4049-B0CF-850E0A3BFB23"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.23:*:*:*:*:*:*:*", "cpeNameId": "5D5E4A1A-C7A8-4C65-BDBA-F72806D163D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.24:*:*:*:*:*:*:*", "cpeNameId": "AD1B1508-8CB3-45DB-A85F-14BE2503FDBD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.25:*:*:*:*:*:*:*", "cpeNameId": "6678E6E5-46CB-4C1A-8092-1F5469AA6A41"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.26:*:*:*:*:*:*:*", "cpeNameId": "341B7403-FBD8-459E-950E-669683E3EA8F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.27:*:*:*:*:*:*:*", "cpeNameId": "D4DD4F90-598B-403D-B05F-10D212E88A76"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.28:*:*:*:*:*:*:*", "cpeNameId": "27FBBB4E-2CB5-41C2-8EBC-A7F4FB0220A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.29:*:*:*:*:*:*:*", "cpeNameId": "DB69395F-E5B5-4002-AA42-994905575ACD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.30:*:*:*:*:*:*:*", "cpeNameId": "695D96ED-7797-4E45-A038-854075B03949"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.31:*:*:*:*:*:*:*", "cpeNameId": "019345EE-5FE7-46DB-87AC-41ACAB0688B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.32:*:*:*:*:*:*:*", "cpeNameId": "42126205-9153-4DED-8736-2199AAFAFB9E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.33:*:*:*:*:*:*:*", "cpeNameId": "603095C9-4BAA-44E6-B7E2-BCE82FE73CE6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.34:*:*:*:*:*:*:*", "cpeNameId": "A802DB87-82C2-48A9-BE8D-4E1956F07F66"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.35:*:*:*:*:*:*:*", "cpeNameId": "9E00571C-02D6-4854-A3F1-9A93FD690491"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.36:*:*:*:*:*:*:*", "cpeNameId": "529CEF81-EDBE-45DA-BB39-10125CF3F345"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.37:*:*:*:*:*:*:*", "cpeNameId": "E4FEB542-8C07-45BE-9841-D222842BDC83"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.38:*:*:*:*:*:*:*", "cpeNameId": "6E54EE56-DB63-4F7F-9D3C-1197B3471A5B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.39:*:*:*:*:*:*:*", "cpeNameId": "75A07C05-F3F1-4548-9B92-1344A6DB2D63"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.40:*:*:*:*:*:*:*", "cpeNameId": "B1259C2A-174E-4D45-87DF-4C798DED7DD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.41:*:*:*:*:*:*:*", "cpeNameId": "6852A88D-858D-4F40-86B2-4CE1EE7B9572"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.42:*:*:*:*:*:*:*", "cpeNameId": "111D7D94-27E6-4C86-9B03-419FD7C240D6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.43:*:*:*:*:*:*:*", "cpeNameId": "C7D57BFE-E5D6-4BCA-A929-7A70A778B1D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.44:*:*:*:*:*:*:*", "cpeNameId": "5150F55B-F56A-4018-A7BB-A60048867056"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.45:*:*:*:*:*:*:*", "cpeNameId": "399A360D-E5A4-45D2-B0A0-596BDCBCE16F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.46:*:*:*:*:*:*:*", "cpeNameId": "29DED077-3E24-427C-9BCC-C7BCEF40AB4E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.47:*:*:*:*:*:*:*", "cpeNameId": "C4016B9C-A035-4EED-AA66-350AF4693458"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.48:*:*:*:*:*:*:*", "cpeNameId": "C9FBA8CF-B28D-43A7-9036-4ED6BAA7CC86"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.49:*:*:*:*:*:*:*", "cpeNameId": "CEA7A38C-3A20-4BC6-B421-FA39F0EBAB4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.50:*:*:*:*:*:*:*", "cpeNameId": "D3DDAA5D-9152-4A8E-8FAC-5DA6354EA8A9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.51:*:*:*:*:*:*:*", "cpeNameId": "5B1E05AB-39E9-41A9-BA25-A34017EBA743"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.52:*:*:*:*:*:*:*", "cpeNameId": "D38DA3F3-550D-430C-BED5-3BBA5E00AFB7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.53:*:*:*:*:*:*:*", "cpeNameId": "05DA0214-69E9-4D72-8EB2-A0E28B86A78B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.54:*:*:*:*:*:*:*", "cpeNameId": "BABF7F9E-D0A3-4B3F-BDD3-E047A0F62E78"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.55:*:*:*:*:*:*:*", "cpeNameId": "247F8E95-0A01-4C72-8385-85AC4C15DB9B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.56:*:*:*:*:*:*:*", "cpeNameId": "F59B9524-E1E3-44BD-BFF9-D4A8C06012E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.57:*:*:*:*:*:*:*", "cpeNameId": "971E8A0E-9329-4890-8381-B13996E42DA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.58:*:*:*:*:*:*:*", "cpeNameId": "5F03FBA6-2A33-46FB-ABA4-6EDE3B8CFF87"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.59:*:*:*:*:*:*:*", "cpeNameId": "073E8421-7D98-4CFF-BE86-EDA7A8698CD6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.60:*:*:*:*:*:*:*", "cpeNameId": "7385718A-3A95-4171-9CE7-F9D557110531"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.61:*:*:*:*:*:*:*", "cpeNameId": "68B08025-FBF2-43CB-A2D9-02A72228F125"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.62:*:*:*:*:*:*:*", "cpeNameId": "F1456C09-5C07-47E0-813F-17A430A637FF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.63:*:*:*:*:*:*:*", "cpeNameId": "A6682D39-9C6F-4D16-AE02-FFB7369A0D8C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.64:*:*:*:*:*:*:*", "cpeNameId": "3606F7A9-BF14-48B3-A244-A82BD796D27E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.65:*:*:*:*:*:*:*", "cpeNameId": "31D14F91-BBD8-4628-BC9D-9F6466312BA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.66:*:*:*:*:*:*:*", "cpeNameId": "0EC222A2-0409-4A3F-A023-6DE9616F2A50"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.67:*:*:*:*:*:*:*", "cpeNameId": "89F90F00-BD05-468C-AD0E-BC6A3C42329A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.68:*:*:*:*:*:*:*", "cpeNameId": "5B82AB56-AAA7-4BE7-9982-F2D5DF9F58D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.69:*:*:*:*:*:*:*", "cpeNameId": "55F6B784-B627-409F-A397-09EC85FDDE00"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.70:*:*:*:*:*:*:*", "cpeNameId": "6281CE1A-E38E-4600-85C7-ED8E7D3BF5F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.71:*:*:*:*:*:*:*", "cpeNameId": "20BB7AD1-2148-4356-AB63-CFF168ABB077"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.72:*:*:*:*:*:*:*", "cpeNameId": "AA673595-977E-42E1-9EB2-BCBC8C935D77"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.73:*:*:*:*:*:*:*", "cpeNameId": "C85C53AC-6DF8-46AF-8577-4C52BB4466DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.74:*:*:*:*:*:*:*", "cpeNameId": "C4195A7B-F187-4DFA-869E-6EFC37C15979"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.75:*:*:*:*:*:*:*", "cpeNameId": "F931B916-FC8D-4345-89D7-1131D1A262DE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.76:*:*:*:*:*:*:*", "cpeNameId": "1F18EFD5-05A9-4B23-8C14-5501156AC1F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.77:*:*:*:*:*:*:*", "cpeNameId": "CDA62841-541F-4C7C-A486-D04F1C1036EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.78:*:*:*:*:*:*:*", "cpeNameId": "29D0977D-CF1D-4BF5-8FA9-6C73AD1F065F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.79:*:*:*:*:*:*:*", "cpeNameId": "2C15BF5B-E3E5-4683-81F9-0A1B9A23B7DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.80:*:*:*:*:*:*:*", "cpeNameId": "57858A4E-E3F3-4B5C-B197-6E12B22C7962"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.81:*:*:*:*:*:*:*", "cpeNameId": "DDA3D523-E956-4887-ADEA-DC6A9FB31248"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.82:*:*:*:*:*:*:*", "cpeNameId": "F1282F02-E86D-4226-99B2-B39F1F06684B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.83:*:*:*:*:*:*:*", "cpeNameId": "796F54A2-D588-4117-AC25-79AF1E778377"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.84:*:*:*:*:*:*:*", "cpeNameId": "3123855C-D9BD-4495-A342-612FC3D40FC6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.85:*:*:*:*:*:*:*", "cpeNameId": "0AF6159E-76B9-498B-959A-9404DFE45033"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.86:*:*:*:*:*:*:*", "cpeNameId": "2F109F9F-6E2C-414E-A92D-051A4360F802"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.87:*:*:*:*:*:*:*", "cpeNameId": "9842D0D0-08F2-48D7-AA46-25002987FE0A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.88:*:*:*:*:*:*:*", "cpeNameId": "81FD3C05-3610-4722-A832-A94FE519518F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.89:*:*:*:*:*:*:*", "cpeNameId": "ACC41BAA-65A1-49AF-BC01-5BAC01A17368"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.90:*:*:*:*:*:*:*", "cpeNameId": "07CDD783-885D-4F85-8D89-158D04238D1C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.91:*:*:*:*:*:*:*", "cpeNameId": "8BB9BC65-751D-417E-A021-E7125437DA07"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.92:*:*:*:*:*:*:*", "cpeNameId": "25FDD825-2CE3-44CA-9322-1DD59C97472D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.93:*:*:*:*:*:*:*", "cpeNameId": "191D96F1-1BBD-4683-961F-9DE3A444D1B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.94:*:*:*:*:*:*:*", "cpeNameId": "49788D3F-160D-4352-8AF3-CCEFAD0E801B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.95:*:*:*:*:*:*:*", "cpeNameId": "622D9109-543C-485F-82B3-72A927C6EF13"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.96:*:*:*:*:*:*:*", "cpeNameId": "AC75305F-8552-4AC4-BBC7-5377540FCC6B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.97:*:*:*:*:*:*:*", "cpeNameId": "1C1555FB-46AE-4633-BD9A-78D862394025"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.98:*:*:*:*:*:*:*", "cpeNameId": "1BE7BFD3-E533-488A-82EF-B475141CCE6E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.99:*:*:*:*:*:*:*", "cpeNameId": "4DCC45FA-F87A-4968-AC04-C22FDDE14C16"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.100:*:*:*:*:*:*:*", "cpeNameId": "5B3AD9EF-3264-4C4D-8D25-AA9702653EE7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.101:*:*:*:*:*:*:*", "cpeNameId": "C7B88D9C-248D-461D-BBC5-A888443796B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.102:*:*:*:*:*:*:*", "cpeNameId": "9B419D35-AE67-477C-9D99-6748C2CA2D55"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.103:*:*:*:*:*:*:*", "cpeNameId": "1092A3CB-9C91-4AA9-AD08-59F3D26B68E3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.104:*:*:*:*:*:*:*", "cpeNameId": "8F6493E7-5E52-41F5-867A-C29BC50D1DD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.105:*:*:*:*:*:*:*", "cpeNameId": "E4E770C8-F311-4911-9027-D19481033916"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.106:*:*:*:*:*:*:*", "cpeNameId": "6252E44C-26D7-4015-B536-6ABBD43C83A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.107:*:*:*:*:*:*:*", "cpeNameId": "1BE0B8EA-CF54-4654-85A0-7B655A2DD67B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.108:*:*:*:*:*:*:*", "cpeNameId": "E4B80D52-8159-4A2E-9A7B-DA84A491264A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.109:*:*:*:*:*:*:*", "cpeNameId": "FA7EF58F-1CEA-414A-87F1-9B8E34F63E5C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.110:*:*:*:*:*:*:*", "cpeNameId": "ABB8CF0B-6E74-4F03-A426-042018C7C059"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.111:*:*:*:*:*:*:*", "cpeNameId": "9CBBF318-07D0-493D-A096-D26D507E523E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.112:*:*:*:*:*:*:*", "cpeNameId": "337FBDDB-5C05-45FB-BBBE-91D9AD0B73A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.113:*:*:*:*:*:*:*", "cpeNameId": "63A885E7-F288-41FB-89AB-FB24626824D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.114:*:*:*:*:*:*:*", "cpeNameId": "D49C62C8-8938-49BA-90F4-2C249B76DBBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.115:*:*:*:*:*:*:*", "cpeNameId": "2BA49A88-8F42-41CE-A628-EE02FC14F2E4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.116:*:*:*:*:*:*:*", "cpeNameId": "E3731923-4E3B-42A5-AE80-1EB299C90799"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.117:*:*:*:*:*:*:*", "cpeNameId": "FA801127-FCED-400B-A29E-C566F8B8F133"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.118:*:*:*:*:*:*:*", "cpeNameId": "BB55C4E2-CDF9-4821-8768-E0C587DE6DB2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.119:*:*:*:*:*:*:*", "cpeNameId": "653693DC-33AA-4229-9F9D-AE8DA97FFD72"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.120:*:*:*:*:*:*:*", "cpeNameId": "85DE6D16-0F84-48BF-BC75-9AEA2912BF05"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.121:*:*:*:*:*:*:*", "cpeNameId": "74954A8F-F42E-4566-B639-BC19108CE4B1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.122:*:*:*:*:*:*:*", "cpeNameId": "243DD1C7-3931-4BAE-B999-F201EF56BC0F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.123:*:*:*:*:*:*:*", "cpeNameId": "4DF34A4E-B62F-453A-B02D-48D0252DAD58"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.124:*:*:*:*:*:*:*", "cpeNameId": "9EE0EEB7-F547-473E-99FE-7A1ED3D06EF9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.125:*:*:*:*:*:*:*", "cpeNameId": "B820226E-293D-4400-AD4D-8FB3737E4AB1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.126:*:*:*:*:*:*:*", "cpeNameId": "F7854FF5-3889-4B05-8E67-3568BC48F6C2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.127:*:*:*:*:*:*:*", "cpeNameId": "5FEBF123-1596-4506-9AFC-729E3A8F5799"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.128:*:*:*:*:*:*:*", "cpeNameId": "4D17EF68-1C23-4775-AF3B-14D71E3A9B6B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.129:*:*:*:*:*:*:*", "cpeNameId": "27A443F4-355C-4696-8CE8-BF3F928FE282"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.130:*:*:*:*:*:*:*", "cpeNameId": "B0C390CA-BCEE-469B-9D23-6D44F3215AB9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.131:*:*:*:*:*:*:*", "cpeNameId": "B9376F0F-A3EB-45C4-A7DE-AD7F994FCAAB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.132:*:*:*:*:*:*:*", "cpeNameId": "22734EB4-A800-4393-BD9A-CAAE04E6B881"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.0:*:*:*:*:*:*:*", "cpeNameId": "13C4FC8B-F6B4-41F0-AC1C-937BC7EF18FA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.1:*:*:*:*:*:*:*", "cpeNameId": "40224E2D-7B43-48F2-B456-1B9BDF49B4D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.2:*:*:*:*:*:*:*", "cpeNameId": "B9027F20-ED15-4420-897C-2D77E2C2F8C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.3:*:*:*:*:*:*:*", "cpeNameId": "C80D1CD8-2BD6-4ECE-9B13-8F9CBF9C1CAE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.4:*:*:*:*:*:*:*", "cpeNameId": "50DB0290-A30A-4A23-A2C8-2A3FC722D153"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.4:-:*:*:*:*:*:*", "cpeNameId": "FF5F86F4-1E28-40F3-8E82-9C24907FAD3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.4:rc1:*:*:*:*:*:*", "cpeNameId": "14BE90D6-F00B-4F6C-A463-0F4DF51E6FBC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.5:*:*:*:*:*:*:*", "cpeNameId": "78885165-7DD5-4B28-A31A-FBEA3A5E10F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.6:*:*:*:*:*:*:*", "cpeNameId": "794634E8-0FF9-474B-BCDD-8FFA362537C2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.7:*:*:*:*:*:*:*", "cpeNameId": "FB84E920-9D4B-4B69-A907-CCAB65E78C05"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.8:*:*:*:*:*:*:*", "cpeNameId": "E3475366-F920-4E92-AEE9-40563183862B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.9:*:*:*:*:*:*:*", "cpeNameId": "BD6D83FB-D4B3-46C5-B037-78FFCC0CA090"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.10:*:*:*:*:*:*:*", "cpeNameId": "97AE4ED6-6C0F-4336-8A7B-36D7C8D58D78"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.11:*:*:*:*:*:*:*", "cpeNameId": "D709F8FA-D918-4712-95FF-B05FB4A32332"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.12:*:*:*:*:*:*:*", "cpeNameId": "051313B3-1587-451C-A644-C146F138FC76"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.13:*:*:*:*:*:*:*", "cpeNameId": "DD3795AB-5EAB-4200-96B9-4F80E854A16A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.13:-:*:*:*:*:*:*", "cpeNameId": "F4A65157-42C4-467A-AB6C-A92E272A28D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.13:pre15:*:*:*:*:*:*", "cpeNameId": "FAEBF03B-A612-4BE7-B0A7-B299384A78D6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.14:*:*:*:*:*:*:*", "cpeNameId": "F21D5BED-4B96-4749-9EED-EF14924C8B29"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.15:*:*:*:*:*:*:*", "cpeNameId": "D153944E-EFEC-45D3-80BF-859BC60BA635"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.15:-:*:*:*:*:*:*", "cpeNameId": "0B810E74-C3EF-4409-8068-B082386F06E4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.15:pre16:*:*:*:*:*:*", "cpeNameId": "6D0DF215-5C5E-4900-B921-3DEDB4C9263B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.16:*:*:*:*:*:*:*", "cpeNameId": "5D45F05D-E4CF-451F-AFF6-34FABA76C823"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.16:-:*:*:*:*:*:*", "cpeNameId": "2E448DEB-CE6B-474B-9F22-B9CEC1171E3E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.16:pre5:*:*:*:*:*:*", "cpeNameId": "59F23C3B-FEC8-4BAF-8029-1897B81272BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.16:pre6:*:*:*:*:*:*", "cpeNameId": "9211173D-6077-40CA-81FC-59F8D77C9890"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.17:*:*:*:*:*:*:*", "cpeNameId": "EC3FA70E-FD2A-4F16-A043-FC1AF08688B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.17:-:*:*:*:*:*:*", "cpeNameId": "89BD8996-FF8A-4ED4-A368-59A1A2E028FF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.17:pre14:*:*:*:*:*:*", "cpeNameId": "6242F3E2-4DFC-430E-882C-EFA051552CC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.18:*:*:*:*:*:*:*", "cpeNameId": "E7DA0099-EB96-4F50-8358-176D96B1F07D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.19:*:*:*:*:*:*:*", "cpeNameId": "2E4FFFBF-D5C1-4148-8D27-EDEEA7606E0F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.20:*:*:*:*:*:*:*", "cpeNameId": "0C5D3CE2-FFFA-491C-893C-8AD45D417C4F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.21:*:*:*:*:*:*:*", "cpeNameId": "C2F3ABFD-B35B-43C4-9A79-CC6494184B3B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.21:-:*:*:*:*:*:*", "cpeNameId": "275338FC-E82A-42A6-97AC-84E3B1354379"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.21:pre1:*:*:*:*:*:*", "cpeNameId": "9CB97665-1ABE-4DEB-B593-8F417D953693"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.21:pre2:*:*:*:*:*:*", "cpeNameId": "E17A8DCB-84EA-44AA-AB7A-1D2FE2ACFB57"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.21:pre3:*:*:*:*:*:*", "cpeNameId": "21884192-3FF0-4481-BE72-F6829668AAA4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.21:pre4:*:*:*:*:*:*", "cpeNameId": "058F7E60-02ED-488B-B459-D448999ADF94"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.21:rc1:*:*:*:*:*:*", "cpeNameId": "DD080096-4061-4AE3-8524-939C9843DA84"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.21:rc2:*:*:*:*:*:*", "cpeNameId": "2CFF9695-43FD-412E-8F6D-4505ABF081EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.21:rc3:*:*:*:*:*:*", "cpeNameId": "35CB955B-12D3-4B33-A212-45FD327D72C4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.21:rc4:*:*:*:*:*:*", "cpeNameId": "43DEE698-A725-41D5-8346-2C2E65FC6049"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.22:*:*:*:*:*:*:*", "cpeNameId": "6856B62F-5614-4AFD-BEAF-5FCEBF4C0D49"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.22:-:*:*:*:*:*:*", "cpeNameId": "C7CE2508-6250-495D-900C-0DA780E0BEAC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.22:rc1:*:*:*:*:*:*", "cpeNameId": "40EC7F3E-946B-4554-A7D4-222CE4672195"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.22:rc2:*:*:*:*:*:*", "cpeNameId": "29DCD7D9-D89E-4043-BBA3-4D61FBE12070"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.22:rc3:*:*:*:*:*:*", "cpeNameId": "B39A5411-C54A-4227-8457-74BECBAC5C18"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.23:*:*:*:*:*:*:*", "cpeNameId": "33BB0B9F-FF76-4B5C-A8FF-9935CA325FA4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.23:-:*:*:*:*:*:*", "cpeNameId": "31A3B878-E962-4031-BB6F-73958422545C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.23:rc1:*:*:*:*:*:*", "cpeNameId": "6D21A143-BADB-4601-9E00-34FCF81ACDBF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.23:rc2:*:*:*:*:*:*", "cpeNameId": "C6A5E759-0277-4733-ABF1-5612C7934BC6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.24:*:*:*:*:*:*:*", "cpeNameId": "2E8A4817-1AD7-4282-AADB-6C8C93B4E296"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.24:-:*:*:*:*:*:*", "cpeNameId": "B54F162F-BF50-4B5A-A91C-C4E43DD74AA4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.24:rc2:*:*:*:*:*:*", "cpeNameId": "9484FF19-FA04-4B10-8D99-5CBDF3A54E4D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.24:rc3:*:*:*:*:*:*", "cpeNameId": "772D3B39-3AAF-40C7-9787-8FF438BBAF5B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.24:rc4:*:*:*:*:*:*", "cpeNameId": "9F32508C-F21F-48AF-B33C-43A4DF42D7F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.24:rc5:*:*:*:*:*:*", "cpeNameId": "83DE2963-50A3-43B0-A0D7-85B2E7C8AA35"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.25:*:*:*:*:*:*:*", "cpeNameId": "8025A452-5260-476B-B0C8-991B42143C58"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.26:*:*:*:*:*:*:*", "cpeNameId": "6C2F0EF8-2392-45FF-8111-DADD78C904FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.27:-:*:*:*:*:*:*", "cpeNameId": "F69A41E0-C0AF-4962-8A77-4BFCE08A782E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.27:pre1:*:*:*:*:*:*", "cpeNameId": "89F0DB43-CA84-430A-95CC-49CAA09A6B2B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.27:pre2:*:*:*:*:*:*", "cpeNameId": "F0C58AFE-37C2-40EE-974E-21444F448F97"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.27:rc1:*:*:*:*:*:*", "cpeNameId": "6E6A4EAD-756C-4ABE-A253-CF39FD80CADA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.27:rc2:*:*:*:*:*:*", "cpeNameId": "878BBACB-F697-4935-AE53-DA015DEC8980"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.0:*:*:*:*:*:*:*", "cpeNameId": "6885DFBA-2302-4B86-B781-70298C5578CC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.1:*:*:*:*:*:*:*", "cpeNameId": "D5DD8818-9E53-400C-90BB-01099CB5C0BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.2:*:*:*:*:*:*:*", "cpeNameId": "9127467F-1841-43A9-ADD3-AF5A5F62A7D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.3:*:*:*:*:*:*:*", "cpeNameId": "9358DA4D-6117-4594-928C-3F1E853B232C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.4:*:*:*:*:*:*:*", "cpeNameId": "E57F3367-DB6B-4240-B5FA-AB7C4CFA49CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.5:*:*:*:*:*:*:*", "cpeNameId": "C6D254B9-7189-4947-A7BB-27AA4426CDB3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.6:*:*:*:*:*:*:*", "cpeNameId": "4B8BA1F4-C144-4605-8D9F-5733EF6DFDFC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.7:*:*:*:*:*:*:*", "cpeNameId": "2C2F8004-1C51-4F78-9807-3E4CC7F67AC2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.8:*:*:*:*:*:*:*", "cpeNameId": "3FC6518A-86A4-47F5-852A-167597E9D027"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.9:*:*:*:*:*:*:*", "cpeNameId": "14285535-B19A-4499-81E5-09235F64B40C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.10:*:*:*:*:*:*:*", "cpeNameId": "1829C195-B08C-4EC3-AE12-BB4645EFB49B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.11:*:*:*:*:*:*:*", "cpeNameId": "225ED22A-CF9E-45A8-B2FB-5EDFF5D1DA03"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.12:*:*:*:*:*:*:*", "cpeNameId": "8CFE2386-BF62-4778-825F-0F621492CBE4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.13:*:*:*:*:*:*:*", "cpeNameId": "1EA48224-9060-45AB-B697-8FC8A7629AEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.14:*:*:*:*:*:*:*", "cpeNameId": "B3920E7C-3DAC-406E-B5A7-2B4298C0E084"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.15:*:*:*:*:*:*:*", "cpeNameId": "63F1A1C7-6FF2-4189-896F-47D9C2FF7A65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.16:*:*:*:*:*:*:*", "cpeNameId": "80B26697-B044-45D6-AB99-08FE810646C9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.17:*:*:*:*:*:*:*", "cpeNameId": "47E8D67E-D9B5-45BB-9549-9AC6B43A0D8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.18:*:*:*:*:*:*:*", "cpeNameId": "32ADDC21-EDCD-428E-8015-D2E479E88AAF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.19:*:*:*:*:*:*:*", "cpeNameId": "79731EB0-0B01-4A1E-B451-1095138F101A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.20:*:*:*:*:*:*:*", "cpeNameId": "818CF9A0-EE53-4550-AC60-7E3EE0B8E678"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.21:*:*:*:*:*:*:*", "cpeNameId": "5C09F2E6-2A40-4DC2-8FF9-56DDE0BC4A1A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.22:*:*:*:*:*:*:*", "cpeNameId": "233C2A76-D5EC-4824-B10F-1D7655C2D578"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.23:*:*:*:*:*:*:*", "cpeNameId": "266E3C2D-D70B-4F6B-BE6B-909397E932A7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.24:*:*:*:*:*:*:*", "cpeNameId": "B3B84DE9-2D07-4D6F-976A-6B60FC10D2D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.25:*:*:*:*:*:*:*", "cpeNameId": "B3B43958-4B32-450D-A3A9-F93F219339F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.26:*:*:*:*:*:*:*", "cpeNameId": "8BFBAF02-EC4D-44C8-A752-50AACBA300A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.27:*:*:*:*:*:*:*", "cpeNameId": "0CFDA004-5E21-4FED-9DA0-8501AA176910"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.28:*:*:*:*:*:*:*", "cpeNameId": "B401D087-9FCD-4F53-A37E-5579A9FC27D7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.29:*:*:*:*:*:*:*", "cpeNameId": "52318DAD-5351-4823-A06F-984C28AE7B7C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.30:*:*:*:*:*:*:*", "cpeNameId": "E5405848-ACAD-4719-9E6C-6DFFCC559ADA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.31:*:*:*:*:*:*:*", "cpeNameId": "91A40219-12C1-4A39-918C-35769BB148DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.32:*:*:*:*:*:*:*", "cpeNameId": "2EDAB694-7FDD-4DA6-83F8-8C2B370D2389"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.33:*:*:*:*:*:*:*", "cpeNameId": "76F07DEA-92A3-4DDE-963C-11AC3B8DD0FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.34:*:*:*:*:*:*:*", "cpeNameId": "93584B0B-448C-4555-BA08-931D1CB18F12"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.35:*:*:*:*:*:*:*", "cpeNameId": "F821F5BB-25C4-4A4C-8C52-46238CCC4390"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.36:*:*:*:*:*:*:*", "cpeNameId": "7502F79C-1AE1-4782-81B9-36D71087CEB1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.37:*:*:*:*:*:*:*", "cpeNameId": "323C16CA-8499-438D-B838-ED4F7BA3AB5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.38:*:*:*:*:*:*:*", "cpeNameId": "79B12734-7C91-4D23-9172-DDF7004C4C5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.39:*:*:*:*:*:*:*", "cpeNameId": "83261266-EF03-423E-8786-ECA0D15575D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.40:*:*:*:*:*:*:*", "cpeNameId": "E7C31995-8FCB-43BF-B78C-6B5CD6D117A7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.41:*:*:*:*:*:*:*", "cpeNameId": "27C1D4F1-AA28-447B-8CE2-500F8CB64510"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.42:*:*:*:*:*:*:*", "cpeNameId": "CE72B4C4-C7B3-4008-92E6-34D670AA52F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.43:*:*:*:*:*:*:*", "cpeNameId": "BE45EF91-4154-4453-8148-159BEDCCED39"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.44:*:*:*:*:*:*:*", "cpeNameId": "1678C3C2-414B-497D-8144-75A45682A36C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.45:*:*:*:*:*:*:*", "cpeNameId": "B6DA579B-A5A0-40C7-8AA1-4440F4C61648"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.46:*:*:*:*:*:*:*", "cpeNameId": "676CA150-B5C0-4A55-8850-54A8D11FF583"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.47:*:*:*:*:*:*:*", "cpeNameId": "F0C3DFFB-F7F7-4465-A2C6-3122AE043C5C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.48:*:*:*:*:*:*:*", "cpeNameId": "17AC55BE-248B-4DB3-AB48-510E3C3CA5FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.49:*:*:*:*:*:*:*", "cpeNameId": "4F7665BF-DD6C-4BA9-AF78-22E1B273F8A0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.50:*:*:*:*:*:*:*", "cpeNameId": "C23F55C8-126E-4C56-B8FE-FC7FAE12C242"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.51:*:*:*:*:*:*:*", "cpeNameId": "9CCC5433-4B7D-42D5-B5CC-435A412AC581"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.99:*:*:*:*:*:*:*", "cpeNameId": "8BC66B77-A2F1-4297-9227-7B4E0816AB74"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.99:-:*:*:*:*:*:*", "cpeNameId": "152EE140-EB5C-4E61-BA75-B0474EBF3A58"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.99:pre1:*:*:*:*:*:*", "cpeNameId": "F69B39B4-0DD3-4DC8-A077-B2D67EC4D416"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.99:pre2:*:*:*:*:*:*", "cpeNameId": "C3E83FEB-BB0A-4C82-8DE2-A02F20F3320A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.99:pre3:*:*:*:*:*:*", "cpeNameId": "2353E47B-F4D6-4924-9EF7-4EF56FAAA72B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.99:pre4:*:*:*:*:*:*", "cpeNameId": "9EF97749-AC1B-4563-88DE-1E98B54280DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.99:pre5:*:*:*:*:*:*", "cpeNameId": "F77FEBD2-660A-43AE-A3C2-FDD03BF1019C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.99:pre6:*:*:*:*:*:*", "cpeNameId": "4E285E79-9C0E-46FE-9183-998F1143A604"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.99:pre7:*:*:*:*:*:*", "cpeNameId": "8AFE6D23-637C-44C2-BBC5-A537B0F800F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.99:pre8:*:*:*:*:*:*", "cpeNameId": "32647711-DE5E-4593-8810-82594D35C354"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.99:pre9:*:*:*:*:*:*", "cpeNameId": "ADB0A585-EB61-47F3-8A47-DB3D5225D9D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*", "cpeNameId": "FB317221-B926-4694-996D-C320D54E923E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.0:-:*:*:*:*:*:*", "cpeNameId": "3C7652E2-F955-4E7A-85F7-8158BEA2CD12"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*", "cpeNameId": "88AF315A-51ED-4ECA-BC81-CF3559C5C9B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*", "cpeNameId": "96EE8CF9-9892-4F3A-9DCB-41960117A8F7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*", "cpeNameId": "8D04D7E3-D059-4A4E-8CD0-B76FFC7D5978"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*", "cpeNameId": "B4951F0C-7B41-4405-9E58-945B5E680C8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*", "cpeNameId": "456AF411-A61A-4BB7-98D0-E9891D2DA01D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*", "cpeNameId": "996FC593-0E5E-4C17-A8A4-3C0BEC73D909"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*", "cpeNameId": "F70103F6-D472-4920-854D-F59DA88CE2CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*", "cpeNameId": "EA386B3A-D846-416D-82E2-DFA03B14E5A6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*", "cpeNameId": "7078E669-81FB-4C6B-853E-958C3FD1EFF9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*", "cpeNameId": "1C040CFE-8C6E-4491-88BF-F39BA1D314A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*", "cpeNameId": "40D26360-8A9B-4004-B821-61644EBBAE46"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*", "cpeNameId": "1C35EF4D-20E6-4D0B-B063-2E4848E398E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*", "cpeNameId": "7E7C9989-A526-4E30-B79F-58E42063F1C5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*", "cpeNameId": "2ED7406F-31F5-4EBF-AA7E-B6A257635CD3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*", "cpeNameId": "82E1BFE2-2D96-44CA-B044-6E194DAB8830"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.3:-:*:*:*:*:*:*", "cpeNameId": "B3BD888E-4C47-4AF3-9B64-03A571B9E0DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.3:pre3:*:*:*:*:*:*", "cpeNameId": "CBF260F5-ED2F-4A9B-B02F-18D3926D3F9A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*", "cpeNameId": "C57060CB-0575-417A-ABC8-CCAEDAA71EE3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*", "cpeNameId": "A6BBEF03-1360-41B0-98A1-7B9952777B2B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*", "cpeNameId": "40545821-7236-4AB9-BD16-633EC3F85471"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*", "cpeNameId": "A954622D-3B3C-4D9D-A2B0-4DA7AB78596E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*", "cpeNameId": "48BC2B29-8ADD-4D41-860D-11F75168E27F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*", "cpeNameId": "A259E0E8-0757-4478-ABB7-3DEF981D4167"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*", "cpeNameId": "D8D60D91-78C0-4543-93D2-EF50ECC26C06"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*", "cpeNameId": "7F34EBED-EBDB-4B10-A9EC-B4C0A56BFD57"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.11:-:*:*:*:*:*:*", "cpeNameId": "B656327E-C463-4FB1-8DBE-0860BAD611A0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.11:pre3:*:*:*:*:*:*", "cpeNameId": "C9953E5D-82CA-46CE-B0D1-3CE85D4F1147"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*", "cpeNameId": "E9E42A6D-67CA-4104-94F9-7F9612D764D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*", "cpeNameId": "D355D8A7-3332-4F7C-8537-45447BBAB886"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*", "cpeNameId": "5605786D-125D-49D6-9673-5A8AC4A0DA0E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*", "cpeNameId": "1D48BA0E-DEDE-4CD0-A531-2EAFA0676A84"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*", "cpeNameId": "DA7EAA8F-051D-493E-A4D7-5D97E9C5E7AA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*", "cpeNameId": "CCC542D5-AACD-49D8-8122-D3E80094CC9C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*", "cpeNameId": "3D6A8C53-91FB-4E3E-A5ED-ECDD050BDB2C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.18:-:*:*:*:*:*:*", "cpeNameId": "F4DFF799-273D-475E-B75C-B6706B6E0EB7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*", "cpeNameId": "10F2A87E-192B-48C1-BA18-97A9C1C1292A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*", "cpeNameId": "55C8238F-8089-4298-870B-35F6600CB235"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*", "cpeNameId": "E35AAFAC-CB47-4D14-9E2E-3902943D7123"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*", "cpeNameId": "D6ADF52D-1247-499F-994F-78DB03A9AA14"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*", "cpeNameId": "FED1E8E1-D567-4D93-999A-325CF2806B56"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*", "cpeNameId": "AD1072E7-F17C-4F3F-95A3-CF087E36D4A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*", "cpeNameId": "1E9F91DC-9717-4A92-9744-A6135B5D3339"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*", "cpeNameId": "9024BBA6-B1F4-4D09-BD83-3481FD82194D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre9:*:*:*:*:*:*", "cpeNameId": "ACB44D2D-FF10-4C61-B708-612E67499ED5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*", "cpeNameId": "2A1BD83D-C6BE-4A7C-B1E6-94808B6E7E8D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.19:-:*:*:*:*:*:*", "cpeNameId": "A10C76A6-812A-4A53-A0F9-EDF8B585E81B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*", "cpeNameId": "58F6776B-59D3-4BE8-9360-D17F0B137A16"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*", "cpeNameId": "457C36BD-BDAA-4E5A-B8DA-4B44A81F43DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*", "cpeNameId": "6E56681C-1104-417D-AA8D-171FB78B1E25"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*", "cpeNameId": "837DEBCB-2979-4F3D-BBF0-025A50DA5078"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*", "cpeNameId": "27B17801-33BF-405A-8EB9-AB8926C5810D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*", "cpeNameId": "521BCA41-D09C-4740-9535-EE017D4E3E09"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*", "cpeNameId": "115856F4-505E-42A4-A941-7D35E8F03ECD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*", "cpeNameId": "C35301BB-E1C3-4BB1-BD60-54CEF634BF24"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.21:-:*:*:*:*:*:*", "cpeNameId": "470DF9FB-EAB5-4BDD-B981-614496D91818"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*", "cpeNameId": "FD176F1D-3356-467E-8C10-3431814EEC3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*", "cpeNameId": "8C22F5D4-9780-4C5E-A373-356082667D3A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*", "cpeNameId": "F52984A0-AB95-46F2-9E56-54E347651BE5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*", "cpeNameId": "8123BB85-CE77-4911-B1E5-C5C30CA08C3E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.22:-:*:*:*:*:*:*", "cpeNameId": "0007A6A4-C5F9-4A83-AC34-F28AD735F4B2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.22:pre10:*:*:*:*:*:*", "cpeNameId": "F9A55986-F3A1-46D2-9D48-53676EA8F1FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*", "cpeNameId": "E6303281-22FC-4F0F-88DC-82DD59189367"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.23:-:*:*:*:*:*:*", "cpeNameId": "C7F39251-4CBF-42A8-9081-976568CC4C3F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*", "cpeNameId": "BF1CC304-1331-49F6-9293-4FC7C627FB15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*", "cpeNameId": "EA7ED7D4-ECF0-4633-9323-1F894F7981C2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*", "cpeNameId": "6CEC9267-FB0A-4F0A-B641-30CE574247AA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*", "cpeNameId": "E9E66A77-265D-4E40-BCB7-47AAD1205426"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*", "cpeNameId": "CA376C60-4AA6-4343-BEB6-7AC90A243040"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.27:-:*:*:*:*:*:*", "cpeNameId": "410F50F7-6B6A-4CF8-BF2F-41DE465E27D6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*", "cpeNameId": "A196A84B-8091-4BC1-8495-1E360DBEE485"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre2:*:*:*:*:*:*", "cpeNameId": "88D20409-760F-4F7C-B313-035B1F464D1B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre3:*:*:*:*:*:*", "cpeNameId": "ABB8A004-E824-4154-B2BD-3E33AC87BC02"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre4:*:*:*:*:*:*", "cpeNameId": "9A0ACD69-C4D9-4D63-A903-901D44B9046C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre5:*:*:*:*:*:*", "cpeNameId": "E102791E-51B0-46C4-84AC-6CDC80F2830C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*", "cpeNameId": "F0D012A2-1151-40D0-B4D3-741DEF693761"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.29:*:*:*:*:*:*:*", "cpeNameId": "B0303B63-EE51-47CF-8A45-1B2C9C12650B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.29:-:*:*:*:*:*:*", "cpeNameId": "5DE6082C-7706-480F-8010-68047ECB0223"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.29:rc1:*:*:*:*:*:*", "cpeNameId": "C6932552-CDF1-47A0-A056-8DE8D6D8F355"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.29:rc2:*:*:*:*:*:*", "cpeNameId": "FFB53A6C-F42A-4928-9959-00D9528BD357"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.30:*:*:*:*:*:*:*", "cpeNameId": "A2F14953-9888-4711-829C-C3181A90F657"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.30:-:*:*:*:*:*:*", "cpeNameId": "0E9275B5-7676-4221-805B-E85345477A0C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.30:rc2:*:*:*:*:*:*", "cpeNameId": "14B31F1E-3790-4495-8815-4A7C50EB16B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.30:rc3:*:*:*:*:*:*", "cpeNameId": "D5B96E2D-856B-4DB0-BD77-4A3E6D3CB76A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.31:*:*:*:*:*:*:*", "cpeNameId": "92D1D95B-D840-46D5-A7CB-F4F89088E7B1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.31:-:*:*:*:*:*:*", "cpeNameId": "1FD116AC-FE4C-42BC-AD37-82A3757E97E5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.31:pre1:*:*:*:*:*:*", "cpeNameId": "C46FC2E2-18E8-40F8-999E-1581850E3DB9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.32:*:*:*:*:*:*:*", "cpeNameId": "2631F388-B2FE-452B-875A-12EF66EE1C1D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.32:-:*:*:*:*:*:*", "cpeNameId": "CD7300DE-A299-40F2-9838-F574B6ACA3FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.32:pre1:*:*:*:*:*:*", "cpeNameId": "B2B3057D-BED0-4B7E-9A0A-915F8A36704B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.32:pre2:*:*:*:*:*:*", "cpeNameId": "031C80FE-1D10-4415-A764-EEBA523BA433"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.33:*:*:*:*:*:*:*", "cpeNameId": "F17755F8-8B46-4913-9981-DD4FAD214047"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.33:-:*:*:*:*:*:*", "cpeNameId": "C5C89978-DB1A-497C-AC8E-0C77B05916DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.33:pre1:*:*:*:*:*:*", "cpeNameId": "71A87B72-D245-4DE2-B665-F7F40DEAB332"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.33.1:*:*:*:*:*:*:*", "cpeNameId": "9BC4BBFC-436E-42A4-B1E2-BFAE970E14E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.33.2:*:*:*:*:*:*:*", "cpeNameId": "1BC181B3-50F6-419D-A0D4-AF6A50699FD6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.33.3:*:*:*:*:*:*:*", "cpeNameId": "5399C4B2-D188-4846-9458-A81AC2532D3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.33.4:*:*:*:*:*:*:*", "cpeNameId": "8AC7FAE5-0D23-46F0-80EF-2E2135F06AC9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.33.5:*:*:*:*:*:*:*", "cpeNameId": "1B939C49-7AC7-4AA8-B8B1-07543255917E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.34:*:*:*:*:*:*:*", "cpeNameId": "21E608F2-2753-4313-9266-B784970D3217"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.34:-:*:*:*:*:*:*", "cpeNameId": "1ACAD21E-C198-4EF5-8879-8D5D0D8CBD7C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.34:rc3:*:*:*:*:*:*", "cpeNameId": "8FB33F0A-1A60-45F4-9E7F-BB29DF2BCCF0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.34.1:*:*:*:*:*:*:*", "cpeNameId": "816CD484-B57C-4CF2-A20C-8B6DE30E425E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.34.2:*:*:*:*:*:*:*", "cpeNameId": "208BA8AF-508C-445E-9A88-779D72EC5150"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.35:*:*:*:*:*:*:*", "cpeNameId": "5C182757-B817-4822-8C89-DBDCBD041302"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.35.2:*:*:*:*:*:*:*", "cpeNameId": "2F7CD3A7-2FDD-4638-95A6-1BE501F754B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.36:*:*:*:*:*:*:*", "cpeNameId": "E802846E-533A-4735-9809-337F43415B35"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.36.1:*:*:*:*:*:*:*", "cpeNameId": "91AC05F1-4DC8-4334-9D57-265B3E234225"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.36.2:*:*:*:*:*:*:*", "cpeNameId": "7D099047-FCF4-4F24-A718-AAC659CBD949"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.36.3:*:*:*:*:*:*:*", "cpeNameId": "CC82E364-BA22-46CF-B591-AEAFC5388062"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.36.4:*:*:*:*:*:*:*", "cpeNameId": "886B7EC6-5529-4330-B5AF-53D21F1E75D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.36.5:*:*:*:*:*:*:*", "cpeNameId": "A22E7DB2-C698-4E4F-8642-690BD180C02B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.36.6:*:*:*:*:*:*:*", "cpeNameId": "1070BFCA-9E6C-4D0D-8D4A-0C1C5E186553"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.37:*:*:*:*:*:*:*", "cpeNameId": "D19BE961-C7BE-43E1-A240-EB0F118E98AA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.37.5:*:*:*:*:*:*:*", "cpeNameId": "858FDD69-C0DC-4A94-A0C8-B8CDEA948C59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.37.6:*:*:*:*:*:*:*", "cpeNameId": "997B7828-A817-4EAB-87D2-6ECD3AC80740"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.0:*:*:*:*:*:*:*", "cpeNameId": "BA4E2099-C85B-4927-AF7F-869F4D8CC388"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.1:*:*:*:*:*:*:*", "cpeNameId": "0AC0FCC8-A0D2-4D6A-80EB-3FE9A098AF37"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.2:*:*:*:*:*:*:*", "cpeNameId": "6823F058-708A-40FB-9A6D-D7E21E4FACED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.3:*:*:*:*:*:*:*", "cpeNameId": "F27D74C4-0419-4F04-85D5-2648EC8FA70D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.4:*:*:*:*:*:*:*", "cpeNameId": "DF8B4E31-F2A3-4F4B-9FFB-E1B0FF57614E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.5:*:*:*:*:*:*:*", "cpeNameId": "28591C13-ECC2-4651-8905-D599BD000BFC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.6:*:*:*:*:*:*:*", "cpeNameId": "18919A0C-BA5B-42B4-9E29-07580B9AB477"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.7:*:*:*:*:*:*:*", "cpeNameId": "FB9F8721-8B66-43F6-8458-F0B472011CB3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.8:*:*:*:*:*:*:*", "cpeNameId": "1339DBBF-8293-4981-8A48-512488F08740"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.9:*:*:*:*:*:*:*", "cpeNameId": "2AD365E3-529A-4BD2-B1DD-0E37CC9A88F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.10:*:*:*:*:*:*:*", "cpeNameId": "09A526F3-9141-46EF-9333-F564B9F6F8E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.11:*:*:*:*:*:*:*", "cpeNameId": "A88DEE0A-8864-4E20-8082-E842565B2A0E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.12:*:*:*:*:*:*:*", "cpeNameId": "62862EE1-CA27-4D0F-B925-1765E164C212"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.13:*:*:*:*:*:*:*", "cpeNameId": "0301E10D-887D-43F2-826A-FC9758993FB2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.14:*:*:*:*:*:*:*", "cpeNameId": "30551DAC-492E-4F48-89F6-63BF5548759C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.15:*:*:*:*:*:*:*", "cpeNameId": "9CBE6C70-F3AF-40B0-8F5D-69DA1E2DC07A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.16:*:*:*:*:*:*:*", "cpeNameId": "A82F0DF7-0B65-4361-8973-1ED627D787BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.17:*:*:*:*:*:*:*", "cpeNameId": "566E2D17-7CCA-4C4C-9930-C07052555F2E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.18:*:*:*:*:*:*:*", "cpeNameId": "9B682EC8-AA07-4303-918B-04838D054669"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.19:*:*:*:*:*:*:*", "cpeNameId": "5CCCA282-FE0F-4011-BF32-94592DF1B766"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.20:*:*:*:*:*:*:*", "cpeNameId": "5807BC8F-8278-4B14-B151-FB5BFD180D8F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.21:*:*:*:*:*:*:*", "cpeNameId": "12163A05-AEEE-4923-82F7-6497F0742CCE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.22:*:*:*:*:*:*:*", "cpeNameId": "6068E3CD-E21C-49E1-BE48-3A53905020EE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.23:*:*:*:*:*:*:*", "cpeNameId": "262686EE-D7BF-403D-AD11-07627715A480"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.24:*:*:*:*:*:*:*", "cpeNameId": "7196629D-CD2C-4A02-873A-7F6C2D1F93DE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.25:*:*:*:*:*:*:*", "cpeNameId": "48D122AB-988C-48C9-97C3-5238089EAE07"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.26:*:*:*:*:*:*:*", "cpeNameId": "0778A27E-2311-4DB0-AF4B-30A87525DB94"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.27:*:*:*:*:*:*:*", "cpeNameId": "1EFD1831-68B8-4D79-865D-DB63DF8A670C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.28:*:*:*:*:*:*:*", "cpeNameId": "4FC02F5B-5642-43B2-AAD4-C6213265C5EC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.29:*:*:*:*:*:*:*", "cpeNameId": "C7137075-70A6-4683-8EA8-95B2C334AB4B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.30:*:*:*:*:*:*:*", "cpeNameId": "60A8680E-BD1A-4B5D-B25D-F2204CD6FBD0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.31:*:*:*:*:*:*:*", "cpeNameId": "B6A2E648-1E74-473D-B366-257891AFB97C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.32:*:*:*:*:*:*:*", "cpeNameId": "DF160156-422B-46CF-96B8-1D6F35A903CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.33:*:*:*:*:*:*:*", "cpeNameId": "BC79535A-46D0-4D1F-884C-EC7C1A2E280D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.34:*:*:*:*:*:*:*", "cpeNameId": "2C437763-12C6-4A61-9D1D-11BC27D1E263"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.35:*:*:*:*:*:*:*", "cpeNameId": "273F3E40-2768-40BF-8F01-E39F7301FCBE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.36:*:*:*:*:*:*:*", "cpeNameId": "AC847908-F547-46CE-B4C9-A70CF3717EE2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.37:*:*:*:*:*:*:*", "cpeNameId": "B9B74A29-331F-4775-A4EF-1B7D0FBA5950"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.38:*:*:*:*:*:*:*", "cpeNameId": "A783DB98-8A4E-48BE-91F0-EA59E342FA8B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.39:*:*:*:*:*:*:*", "cpeNameId": "136CBFC5-0872-46E9-B220-C8CF1D83A971"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.40:*:*:*:*:*:*:*", "cpeNameId": "D2A9BC70-7256-453B-AAB9-DC43F1B7BAB2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.41:*:*:*:*:*:*:*", "cpeNameId": "C114C19E-EF1E-4D72-9406-084EB05F0F51"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.42:*:*:*:*:*:*:*", "cpeNameId": "55CED012-D8C6-4AEC-A096-645E648DACEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.43:*:*:*:*:*:*:*", "cpeNameId": "A2CA2A15-4549-4848-B74C-BA2C29EC75A7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.44:*:*:*:*:*:*:*", "cpeNameId": "9F6032FA-EAF9-450A-AC5D-536A700AEC2F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.45:*:*:*:*:*:*:*", "cpeNameId": "07A60662-C49A-46E0-86D8-A4ADD3C3D17A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.46:*:*:*:*:*:*:*", "cpeNameId": "9175BF1D-F50B-4C09-900C-FEAE877890F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.47:*:*:*:*:*:*:*", "cpeNameId": "BFAC0BC3-D9CC-4CA3-BE42-5E3FFD333666"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.48:*:*:*:*:*:*:*", "cpeNameId": "5DB8C2C4-D6B4-41AB-97C4-E78733C9BDC5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.49:*:*:*:*:*:*:*", "cpeNameId": "BDB65DE5-5372-4FF4-8BB3-D9E59254E514"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.50:*:*:*:*:*:*:*", "cpeNameId": "F1E8669B-EC7C-4FBC-9757-3570C5248EB2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.51:*:*:*:*:*:*:*", "cpeNameId": "85F3CC65-9ED1-4CD5-8325-7772CFA649A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.52:*:*:*:*:*:*:*", "cpeNameId": "B9EB3872-D9E5-42CA-88B4-9CE498692242"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.53:*:*:*:*:*:*:*", "cpeNameId": "F6242A61-FD1E-40EC-AAC5-0B4F7B321076"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.54:*:*:*:*:*:*:*", "cpeNameId": "23DD1C10-88D6-4D0E-95B9-134E1389E283"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.55:*:*:*:*:*:*:*", "cpeNameId": "4F661345-3C05-4FBF-B99D-FDF13BBFB6E7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.56:*:*:*:*:*:*:*", "cpeNameId": "F8EFC398-0C3F-4755-A662-233C0889DE16"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.57:*:*:*:*:*:*:*", "cpeNameId": "4395B935-E03C-4803-A318-52D2E88D4075"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.58:*:*:*:*:*:*:*", "cpeNameId": "101D8A98-9E7A-4549-BA57-0664E19876A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.59:*:*:*:*:*:*:*", "cpeNameId": "ADD23EFD-A2AE-4BB5-B3DB-C4F8412AC4E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.60:*:*:*:*:*:*:*", "cpeNameId": "E97EFCA1-BCA7-4086-B358-63DB27335269"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.61:*:*:*:*:*:*:*", "cpeNameId": "67F32AC2-728F-4D14-9C4E-A72153FD8929"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.62:*:*:*:*:*:*:*", "cpeNameId": "EA2C3762-51BE-4704-B7F4-75CB116DC006"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.63:*:*:*:*:*:*:*", "cpeNameId": "DD335EE4-DB9E-4241-B1F8-EBB27B07BE49"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.64:*:*:*:*:*:*:*", "cpeNameId": "061CB600-4BF2-4B21-882F-FE34305F3A5E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.65:*:*:*:*:*:*:*", "cpeNameId": "45FA5113-81F1-4771-9CE3-9D6A21B78203"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.66:*:*:*:*:*:*:*", "cpeNameId": "B5883846-AFFD-4195-B628-C27A6E3EFAE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.67:*:*:*:*:*:*:*", "cpeNameId": "3565FC04-8DC4-4EFC-BC5E-0A6E47778B66"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.68:*:*:*:*:*:*:*", "cpeNameId": "52D574D5-A16B-463D-AFBE-A1476982B157"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.69:*:*:*:*:*:*:*", "cpeNameId": "3114E01B-1020-40CA-A91B-A091E53A6AA0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.75:*:*:*:*:*:*:*", "cpeNameId": "D953ACAB-158B-4068-BD38-76091959E5FF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6:*:*:*:*:*:*:*", "cpeNameId": "5AAC5E77-EEA3-4821-9EBA-7A921B03389A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*", "cpeNameId": "A89B1895-59A2-4496-842E-860E3352102C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.0:-:*:*:*:*:*:*", "cpeNameId": "C1208401-DB46-42CD-95D6-D10E6275D760"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*", "cpeNameId": "99E228E2-1E71-4B97-AA81-7507BA657C16"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*", "cpeNameId": "2B933EF1-1310-4381-81F0-CCE547BA0CB3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*", "cpeNameId": "9D6EB42E-A597-45CD-8BF6-578ACFEE20A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*", "cpeNameId": "54A53111-D513-4CC2-BE56-5634E0FD7EBC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*", "cpeNameId": "A0D092AE-1507-4775-94DF-FB68869E2BA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*", "cpeNameId": "7F55A3CB-B4C9-41BF-9053-6E5C331076BE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*", "cpeNameId": "F6CF8C73-3118-41DD-A695-3BD6D7D9A3F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*", "cpeNameId": "83E6E096-ED3A-44F2-AF15-93ACE5A79FC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*", "cpeNameId": "2A054947-7DA1-4FE5-9572-9A2EB1A20617"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*", "cpeNameId": "98433FA6-9682-43B2-9E3E-35A6849BA2DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*", "cpeNameId": "69A52C25-5CB9-4C41-B6A2-856F46CE1F87"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*", "cpeNameId": "B2DFB42B-1D6B-4500-B7FE-2EEBA7B08F0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.1:-:*:*:*:*:*:*", "cpeNameId": "35B6D3BB-E290-4E84-8785-71E53B05E502"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*", "cpeNameId": "674626C2-4F05-4824-904D-EB281442138B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*", "cpeNameId": "9FC5142D-3741-4732-9045-3682B9574685"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.1:rc3:*:*:*:*:*:*", "cpeNameId": "DAB49446-7990-4CF5-BA6A-B89173A593A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*", "cpeNameId": "DF3171C4-00E8-4B0F-97EB-2F3EC3394A87"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.2:-:*:*:*:*:*:*", "cpeNameId": "1B4C49FC-8606-45D7-94D1-19C5626D69C7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.2:rc1:*:*:*:*:*:*", "cpeNameId": "FA46E5D1-9EAD-44AC-9690-C3EBC05C6EB1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.2:rc2:*:*:*:*:*:*", "cpeNameId": "69C80F8F-650D-47B3-ADF1-2C286A3B530B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.2:rc3:*:*:*:*:*:*", "cpeNameId": "BBA4769C-07C5-4A1C-9A92-50041E1E2B80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*", "cpeNameId": "C5AE4EB6-4CD1-416B-BDD4-70428924A7AD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.3:-:*:*:*:*:*:*", "cpeNameId": "C5F86C20-90F5-4112-B951-9980AF64D1B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.3:rc1:*:*:*:*:*:*", "cpeNameId": "6EC8517C-25D6-40E3-97DD-487A41CBEB8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.3:rc2:*:*:*:*:*:*", "cpeNameId": "659C6C98-CEAE-47FC-9B9E-2BD6C4CD83E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.3:rc3:*:*:*:*:*:*", "cpeNameId": "8E9073F2-E5D8-4339-BD58-8FAF15C00EF7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.3:rc4:*:*:*:*:*:*", "cpeNameId": "DCB5E432-E2CB-4349-BE6C-5B772CEB23A5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*", "cpeNameId": "436732C9-CEB7-459C-82CA-0DA300F5309B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.4:-:*:*:*:*:*:*", "cpeNameId": "029F79FE-EC00-4E10-8F68-201F23DDA90F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.4:rc1:*:*:*:*:*:*", "cpeNameId": "59153938-208A-42C0-A9F2-5763B8387EC1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.4:rc2:*:*:*:*:*:*", "cpeNameId": "A91FBC5E-D0DF-4817-8515-6C7B2C429447"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.4:rc3:*:*:*:*:*:*", "cpeNameId": "F5A83A6F-7E60-4C69-8D32-EF74823C5AE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*", "cpeNameId": "5ACC730F-7A40-408A-B35C-486F6E5D9484"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.5:-:*:*:*:*:*:*", "cpeNameId": "481F64FE-DB75-48F6-BD68-9590DFA79630"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.5:rc1:*:*:*:*:*:*", "cpeNameId": "3151F9B9-F5F2-459E-BA86-2FFBC705821E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.5:rc2:*:*:*:*:*:*", "cpeNameId": "17E91D87-DE58-4ABE-8856-5820D2F375B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.5:rc3:*:*:*:*:*:*", "cpeNameId": "3B7E0656-7A57-4400-87FF-F3623AA09CAC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*", "cpeNameId": "28CB8353-6739-4BFA-841D-BA39BA900FE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.6:-:*:*:*:*:*:*", "cpeNameId": "8B471054-1F09-4CB6-929B-041C53E7B67A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*", "cpeNameId": "99653018-EFA6-43F7-9241-ACB328324AB6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.6:rc2:*:*:*:*:*:*", "cpeNameId": "579FB92D-3ECF-4411-B8B9-E84AB3DFB8D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.6:rc3:*:*:*:*:*:*", "cpeNameId": "ED0B1928-3472-4EEA-A5AA-9799CDB7D790"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*", "cpeNameId": "2C131898-E446-49D6-8823-34BD06B9444D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.7:-:*:*:*:*:*:*", "cpeNameId": "FA35726E-503D-4326-B400-8342B3F34C56"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*", "cpeNameId": "5DC69ED4-4C0B-46F2-AAA7-9FD05945ACF3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.7:rc2:*:*:*:*:*:*", "cpeNameId": "16F6AB59-7CC2-4CAA-9560-74FA72101EE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.7:rc3:*:*:*:*:*:*", "cpeNameId": "A5864419-1EBC-489B-BC0F-961D051F4DE2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*", "cpeNameId": "AD3F7197-3AC9-444A-B871-43472B7496E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*", "cpeNameId": "367D2EC1-9FE4-4D99-96C5-BBC752F5A303"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*", "cpeNameId": "64C591D9-B5FC-431C-81BB-5B28D1D744B2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*", "cpeNameId": "101E1502-F38A-4B76-8A31-08E122F52653"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc4:*:*:*:*:*:*", "cpeNameId": "91D55BBA-0525-4D47-9765-744972086AFA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*", "cpeNameId": "F8BEC7E1-57BD-426F-AEC2-DC654C17D8CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:*:*:*:*:*:*", "cpeNameId": "2DA3A643-7A26-461D-94A7-00BC882A9DC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*", "cpeNameId": "A46EF98A-79F8-4254-A90F-1A9C0C44412B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.9:final:*:*:*:*:*:*", "cpeNameId": "0207ACEA-69EE-44BB-A3D9-A8A147E8A18D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.9:rc1:*:*:*:*:*:*", "cpeNameId": "04EE4AF1-789E-449E-A3B5-4C5E51C5C803"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.9:rc2:*:*:*:*:*:*", "cpeNameId": "349B914E-94D6-45C4-A0BE-C004F7CAA64E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.9:rc3:*:*:*:*:*:*", "cpeNameId": "AB48A63A-1E9A-4898-999F-F2B9BD3AB6E9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.9:rc4:*:*:*:*:*:*", "cpeNameId": "8CAC05F6-6ADE-4CFA-902B-046FF30BF820"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*", "cpeNameId": "FD5A1616-E2CD-423B-986A-18DB1AA925FF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.10:-:*:*:*:*:*:*", "cpeNameId": "34BC934B-616A-4246-80B0-F38811D3C593"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.10:rc1:*:*:*:*:*:*", "cpeNameId": "E565C116-27A7-4014-A780-B605C4074F1B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*", "cpeNameId": "CBBC94D5-C555-4ABB-98E5-F2D49288D853"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.10:rc3:*:*:*:*:*:*", "cpeNameId": "FE8FAC31-D8A1-417C-B99C-CBB20C22619C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*", "cpeNameId": "ED1506E2-E8CD-46EB-B651-FF5539B99265"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.11:-:*:*:*:*:*:*", "cpeNameId": "9CB72A28-61C6-4357-B258-72F95917647D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc1:*:*:*:*:*:*", "cpeNameId": "2F959170-89C8-4D29-A4B4-A583E3BB855C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*", "cpeNameId": "2538A481-8325-4A21-80E2-126581E8F68B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*", "cpeNameId": "4045FB8E-C609-42E2-B897-F609F042D869"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*", "cpeNameId": "077E03AB-9887-432D-9534-73DDA9DAC95E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc5:*:*:*:*:*:*", "cpeNameId": "3983F5C4-9001-476D-BE72-BDD8AE96CCCF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*", "cpeNameId": "4941269A-ED6E-4026-8A32-A1C2188D077D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*", "cpeNameId": "E3FBE6AF-981D-422B-9459-7FBC8D8BA673"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*", "cpeNameId": "F9E3A9C8-6F02-4FC4-9508-CF68A6611FFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*", "cpeNameId": "B45D45D8-BCBC-40F8-AB85-7F27CA4C4E80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*", "cpeNameId": "4FC0A3D9-5B2F-4060-991D-A63A98B60A30"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*", "cpeNameId": "49A28E4C-D822-4A75-B13C-98C8D4B3987E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*", "cpeNameId": "E08D20DF-4D3A-421B-BEF8-11E4F7A91335"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*", "cpeNameId": "D39A84EF-5DCE-4E04-A97A-15FBBD1EE654"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*", "cpeNameId": "60990D54-763D-4AD7-96F6-7B77264DB4EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*", "cpeNameId": "67507948-D572-40E5-8008-DDCD69422D93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*", "cpeNameId": "A6147179-8F14-4C61-9CD1-759BF6B831A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*", "cpeNameId": "62D3BCD4-F795-47E5-B4B2-EE26CA1F8FD0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*", "cpeNameId": "95052DA2-96F5-4DEE-BAC5-74E44DE1C706"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.12:-:*:*:*:*:*:*", "cpeNameId": "92750F2E-8C1C-4D26-BC39-812F5EE6D41C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*", "cpeNameId": "DEAEAE4F-035C-4D8A-9B5E-37235CDBB66C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*", "cpeNameId": "A2C31105-7EE3-49BF-9D99-9D0D985B0A02"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*", "cpeNameId": "B6F7AE05-A4C0-4ED6-8E6A-ADDC0F929ACF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*", "cpeNameId": "1BFA0280-B20C-45B4-95EC-26F1BC2BF6F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*", "cpeNameId": "17A95A11-FDC8-409B-A606-271712C029C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc6:*:*:*:*:*:*", "cpeNameId": "2BFF67D6-997D-42C6-B16F-4DD3D5E3A10A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*", "cpeNameId": "A867D37C-372B-43F6-95B3-BCFD141758DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*", "cpeNameId": "E2171560-01D1-4C76-A37D-7A007ABC70BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*", "cpeNameId": "F44E7431-7746-4924-8267-973379A55C9C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*", "cpeNameId": "8689CE67-A0AA-49DB-97CB-C103FD236419"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*", "cpeNameId": "05D965C7-D8DB-47E2-BAE6-1637A93CD489"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*", "cpeNameId": "6E9D3EB5-1B92-471F-A14A-A159E3D7CF1A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.12.12:*:*:*:*:*:*:*", "cpeNameId": "5321FA64-0B4C-44FF-A25B-71BC8089333F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.12.22:*:*:*:*:*:*:*", "cpeNameId": "0F17C8FD-25B6-4A61-BB31-85BAEB680545"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*", "cpeNameId": "388ADE6F-11C9-4415-BC9A-8697B31FA27E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.13:-:*:*:*:*:*:*", "cpeNameId": "E0ED8652-3239-4DAD-A7FE-6939510A9338"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*", "cpeNameId": "E4E97497-874C-44E8-9C77-FAFD9E4901BA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc2:*:*:*:*:*:*", "cpeNameId": "602A749B-FF44-47E6-A0A3-61060815E33E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc3:*:*:*:*:*:*", "cpeNameId": "04E1BF43-BA11-407A-8BFB-EBAE4590F580"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*", "cpeNameId": "D67E5162-1C40-4582-8F3F-AA6256D15FB7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc5:*:*:*:*:*:*", "cpeNameId": "B922DCB9-51FD-4B5B-9219-FCA982B0EE7A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*", "cpeNameId": "8BF87194-F389-4069-9455-29D577E706EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*", "cpeNameId": "ED7DDAFD-79BC-4C36-8283-74583A337C72"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*", "cpeNameId": "FB695AF3-F47E-4CEA-A02B-FCC7EDF7756C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*", "cpeNameId": "524B46F7-14D0-4159-8367-75760DB6F23A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*", "cpeNameId": "4EA15FE0-5375-40DA-9715-68C4618C7813"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*", "cpeNameId": "1207EFC4-9E4E-429F-8975-A0EFB22803CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*", "cpeNameId": "C1E7396E-DEEF-43F2-A624-D61E034305D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*", "cpeNameId": "9BF42545-B415-49C0-8E1F-17664EEACB68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.14:-:*:*:*:*:*:*", "cpeNameId": "93E735B9-0621-4DA6-A49B-9169A67D37B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*", "cpeNameId": "3A5525C6-4252-46EC-8399-9EDEF7F39989"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*", "cpeNameId": "CBE7DC4D-D200-4173-B585-9A5D5365B34B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc3:*:*:*:*:*:*", "cpeNameId": "E7771F92-73BD-417D-B41A-053B851E9719"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc4:*:*:*:*:*:*", "cpeNameId": "324B89B8-87FB-4F07-9F6F-B7CD98B657BF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc5:*:*:*:*:*:*", "cpeNameId": "56DB9DF7-FDF3-44C8-AB4E-B3631C7CA29B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*", "cpeNameId": "68AA2406-C573-466E-88FC-35F7DDDB15A7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*", "cpeNameId": "6FDE0601-BD39-45BB-B9CB-A65999C80618"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*", "cpeNameId": "23DA914F-A588-4595-9EBC-8F77364659E4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*", "cpeNameId": "D88E90A8-F670-4294-B10C-0F252161A64B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*", "cpeNameId": "9F87CFB2-C2FF-40CD-A9A3-DA9B389F7AA9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*", "cpeNameId": "DBD9CA65-4DF8-4893-A205-A76EA64BD1CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*", "cpeNameId": "D03DCC4E-39DB-4B7A-AE43-79941136D54A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*", "cpeNameId": "352D1A5D-B1C5-44B5-B617-DED021A3D043"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.15:-:*:*:*:*:*:*", "cpeNameId": "C8E4BD45-7319-449E-90FC-3F43570BFC6C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc1:*:*:*:*:*:*", "cpeNameId": "53F4E7B1-D40A-42D2-81AC-4145230D0BD9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc2:*:*:*:*:*:*", "cpeNameId": "22D3FC80-31C0-4770-A5AA-FC1DF9FEA455"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc3:*:*:*:*:*:*", "cpeNameId": "BC2AB32A-12A9-43AD-9189-0DCBE0437F7C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc4:*:*:*:*:*:*", "cpeNameId": "AB024563-D5F5-4499-9309-77409381EB6A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc5:*:*:*:*:*:*", "cpeNameId": "6AA2619F-F8D6-435E-8F37-44D72F239143"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc6:*:*:*:*:*:*", "cpeNameId": "62DBB2E8-9EE4-450D-B243-A2438534A8C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc7:*:*:*:*:*:*", "cpeNameId": "F7C7637E-C1A2-4B46-8A68-7B6B11BC2019"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*", "cpeNameId": "3E486F6A-0AD2-4FA8-9247-A980C2A74462"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*", "cpeNameId": "A7783326-5AE4-487D-B3D6-E1CBFBFB4C27"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*", "cpeNameId": "3DA41A51-AC84-41D5-925B-7822866E1961"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*", "cpeNameId": "77D85E13-1A18-4E26-8102-04E799137135"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*", "cpeNameId": "7B4EB9A6-F78E-45B8-959B-927D5D46E27C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*", "cpeNameId": "38750E8F-FB6B-47A6-9862-A369FD8191EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*", "cpeNameId": "4A82AD99-9C08-442F-8737-16B3A4B2D4FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.15.8:*:*:*:*:*:*:*", "cpeNameId": "63BFBA8A-7EFC-4495-8ACF-584FC8CFB411"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.15.9:*:*:*:*:*:*:*", "cpeNameId": "6E76C52E-17D6-4480-A207-0C84D09E8EA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.15.10:*:*:*:*:*:*:*", "cpeNameId": "D6717E76-477B-4D32-8423-1FC2214FCC9B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.15.11:*:*:*:*:*:*:*", "cpeNameId": "DFDCF4BB-4013-4C2D-A5D2-1973772078F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*", "cpeNameId": "AE61F2EE-6A7D-46E1-9857-885A5DF5A2D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16:-:*:*:*:*:*:*", "cpeNameId": "174D83CE-0FE4-47F0-A163-62810826EE59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc1:*:*:*:*:*:*", "cpeNameId": "FE872156-B962-4720-82DD-587D82FA56D6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc2:*:*:*:*:*:*", "cpeNameId": "3CEB52B9-2691-4DBD-B172-DACFC59FF048"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc3:*:*:*:*:*:*", "cpeNameId": "1D8E6D9E-018C-4AF2-8DF1-3093E6B5E0CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc4:*:*:*:*:*:*", "cpeNameId": "37FF5680-FBFC-441F-9335-B088B2EE5384"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc5:*:*:*:*:*:*", "cpeNameId": "89851FAC-FF79-41DC-A88C-DFF906F20589"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc6:*:*:*:*:*:*", "cpeNameId": "51884B54-F4FB-4486-B332-15966D48C2D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc7:*:*:*:*:*:*", "cpeNameId": "B9314C17-D68B-4DA3-81F8-625D132FA486"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*", "cpeNameId": "DE562D63-72CD-474E-AB95-64B76FBFC53C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*", "cpeNameId": "88166C73-36EB-4860-8218-5B175452C475"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*", "cpeNameId": "8FC8BB73-D7F7-4F4A-BF47-E81FF3A8EE9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*", "cpeNameId": "CA6B32E2-2A2B-42A6-9D17-41F9149CC13A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*", "cpeNameId": "5D4A54A3-54F6-4DC8-A991-299A4C2AD237"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*", "cpeNameId": "6B326571-D6E7-48AF-ADBB-19ECC604EE84"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*", "cpeNameId": "2EBA85FA-3DA2-431E-B5A1-BA762625DA48"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*", "cpeNameId": "7306B929-3275-43A9-B504-CFF7954729FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*", "cpeNameId": "A7F28069-05B1-4AD4-A449-D4D1291A89C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*", "cpeNameId": "639D4CCE-CB78-4DE4-B256-86438E036721"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*", "cpeNameId": "5EFB6B25-B3B5-49DC-8807-19CDA3A99E4E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*", "cpeNameId": "8C11BD3A-D469-4F92-B30E-A93D369017DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*", "cpeNameId": "14A91962-F886-4A75-93DA-49E8537165FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*", "cpeNameId": "7D522947-39C2-42C5-B403-70E0D5805C22"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*", "cpeNameId": "8F33298C-D06B-448C-82DA-DC48EF44FF10"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*", "cpeNameId": "2F8AFDAE-1D5F-4E8A-94D5-026F75CEA4C9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*", "cpeNameId": "944431F2-EAD4-4442-AA69-57C31FAA2427"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*", "cpeNameId": "4A6BE924-3647-4AB8-84D5-9D7A19E20679"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*", "cpeNameId": "DD5110E0-CEAD-4530-8243-153F14651956"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*", "cpeNameId": "E2DFCCF8-B527-4CCD-B7B4-D26D35C3C9A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*", "cpeNameId": "E93B556D-2B1A-4B1E-B798-02776E456C65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*", "cpeNameId": "2129A427-CEB9-4AC1-A36F-DEA22E4D96A5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*", "cpeNameId": "5E9142CE-7B3F-4003-ABC9-08384BE83977"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*", "cpeNameId": "D86CC329-0C50-4D51-B140-A1D60473D769"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.25:*:*:*:*:*:*:*", "cpeNameId": "5DCA96E1-1AA3-4F1A-BC9C-4B9AA3B1BBFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.26:*:*:*:*:*:*:*", "cpeNameId": "E5ADCD84-117A-4B9D-8D5F-B9D72DB24AAB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*", "cpeNameId": "545A8C75-A56F-4460-90D8-588A9C8F7F6C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.28:*:*:*:*:*:*:*", "cpeNameId": "076232E6-01DF-4BAA-85EB-9EE47C8838E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.29:*:*:*:*:*:*:*", "cpeNameId": "2DEEC011-75FE-404F-945F-60753D8F0DE0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.30:*:*:*:*:*:*:*", "cpeNameId": "6E9CFC53-BDDB-4024-A7EA-1878E3A2B56D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.31:*:*:*:*:*:*:*", "cpeNameId": "FCB2E0B4-EA1C-4F05-AFD1-BA1B17848DE3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.32:*:*:*:*:*:*:*", "cpeNameId": "C59F9830-942C-4A26-A628-65F0F5F22CE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.33:*:*:*:*:*:*:*", "cpeNameId": "463CD740-54BA-49DD-B2BB-F77F1CB546FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.34:*:*:*:*:*:*:*", "cpeNameId": "DE9C3D58-780E-4442-9350-ECA9DE0E598C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.35:*:*:*:*:*:*:*", "cpeNameId": "E1C93D61-110C-441C-873D-9995FAF19136"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.36:*:*:*:*:*:*:*", "cpeNameId": "E4F2322B-CF60-4443-9B5F-920F78DD53E3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.37:*:*:*:*:*:*:*", "cpeNameId": "E792A0DD-FAF1-4C27-9870-00E6BAB94830"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.38:*:*:*:*:*:*:*", "cpeNameId": "E342CAC2-7E27-472A-9BF3-1700531BC7C9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.39:*:*:*:*:*:*:*", "cpeNameId": "8E56DD41-1B8E-4497-95AC-6D8BDBBF5564"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.40:*:*:*:*:*:*:*", "cpeNameId": "2E71DEA1-70E3-4CEA-A8BF-A8C771C5E380"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.41:*:*:*:*:*:*:*", "cpeNameId": "7E56F268-2D85-439B-A690-8D4472C91BFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.42:*:*:*:*:*:*:*", "cpeNameId": "E663B068-9CE7-40BC-915B-19B109B40F4C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.43:*:*:*:*:*:*:*", "cpeNameId": "CB35D71B-C613-40B0-98FD-204120711481"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.44:*:*:*:*:*:*:*", "cpeNameId": "8258690F-E6DF-4E27-ADF5-4B1E089E4344"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.45:*:*:*:*:*:*:*", "cpeNameId": "4EBD8C35-B4FC-42C3-B402-CB280DA0F44F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.46:*:*:*:*:*:*:*", "cpeNameId": "32AE1D02-1A39-432C-AB41-BC6DEF98725C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.47:*:*:*:*:*:*:*", "cpeNameId": "33155616-E047-41B0-8352-1A7B70199260"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.48:*:*:*:*:*:*:*", "cpeNameId": "7B81466F-1EE6-468B-8A0F-9E98166199A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.49:*:*:*:*:*:*:*", "cpeNameId": "2CA3F258-542A-4FAE-841D-1DFF440DEC1D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.50:*:*:*:*:*:*:*", "cpeNameId": "8FCF7FE7-9BD3-4704-A5F4-8528DB6220F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.51:*:*:*:*:*:*:*", "cpeNameId": "E9D3B8CA-146A-4F5E-8B6F-A9D7EBEA4A64"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.52:*:*:*:*:*:*:*", "cpeNameId": "BD8E753C-155A-483E-849D-DD27F0FF4507"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.53:*:*:*:*:*:*:*", "cpeNameId": "8D732D62-E61A-4770-8AB7-2C483A595BD9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.54:*:*:*:*:*:*:*", "cpeNameId": "C53E51C0-344D-4999-9397-4C2AF2E209DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.55:*:*:*:*:*:*:*", "cpeNameId": "90237CA4-7E0A-4DC6-BBD3-D777C53FCBFB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.56:*:*:*:*:*:*:*", "cpeNameId": "2E437365-6455-4C52-8AAE-64AB2DB06FA6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.57:*:*:*:*:*:*:*", "cpeNameId": "4A87DD28-FAFD-43D1-B19C-433B9AB468F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.58:*:*:*:*:*:*:*", "cpeNameId": "1049FB25-E060-40CA-BB86-6FA489DAF1D7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.59:*:*:*:*:*:*:*", "cpeNameId": "33B62B86-89DE-4047-B2FA-572CDF1D1593"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.60:*:*:*:*:*:*:*", "cpeNameId": "9552CC8A-12DD-4347-9B46-099AA26C63F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.61:*:*:*:*:*:*:*", "cpeNameId": "939A8266-2B11-4462-8AFE-B299DDCCA3F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.62:*:*:*:*:*:*:*", "cpeNameId": "A55E244B-E4AA-4362-8331-0AA6E5E8C41F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*", "cpeNameId": "7F2FE563-E605-451B-B029-781828E8A074"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.17:-:*:*:*:*:*:*", "cpeNameId": "A3CC92FE-0731-44B6-B9C2-030C82B4CABF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc1:*:*:*:*:*:*", "cpeNameId": "478C47C4-E968-4D85-884C-09B4BEDAB815"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc2:*:*:*:*:*:*", "cpeNameId": "34865087-1ADE-4088-8888-E4107E37CB6C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc3:*:*:*:*:*:*", "cpeNameId": "B33F1CAD-A981-4703-A34D-1EF578FDE5F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc4:*:*:*:*:*:*", "cpeNameId": "DEADBC67-033F-4F6D-AC3A-0713085A99C5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc5:*:*:*:*:*:*", "cpeNameId": "E3C8ACA4-5C16-4AC8-83E4-DBF94BDA9CE8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc6:*:*:*:*:*:*", "cpeNameId": "1AEBC09D-C423-4198-A3E3-B55A425926F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*", "cpeNameId": "C30EDDBD-0EDC-466B-B615-C5B42BFAD28E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*", "cpeNameId": "F71013D9-9CDD-4D92-B4E5-942056E565D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*", "cpeNameId": "0831BAAC-1FD2-4EBF-9511-A218D885D4B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*", "cpeNameId": "B511ED8F-F455-4845-975E-4F29C805F5AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*", "cpeNameId": "24A8B8ED-D26D-429B-8B52-E671A5938951"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*", "cpeNameId": "0ECDFB1A-237E-40FA-A36F-6CDE958BE2EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*", "cpeNameId": "F8D74FEA-D8AC-4691-B204-D32E0C6605B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*", "cpeNameId": "C3720CF7-DD88-499D-8461-985E5488EE03"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*", "cpeNameId": "7DDD59C2-6520-4E98-AD3B-B3B686BB34EE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*", "cpeNameId": "BF463B55-D54F-419C-93DF-5B842788F176"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*", "cpeNameId": "B87D7B1A-7432-447C-B257-DF293E59C4CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*", "cpeNameId": "AB38146F-61C8-4BFF-ADAA-B9790D6D2688"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*", "cpeNameId": "3CFB0322-5124-4840-9A7E-B3ADA0B290B8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*", "cpeNameId": "019F89B2-6D0A-492B-AB0F-B9D67DC02B8C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*", "cpeNameId": "3CF5F7CF-74E3-44E3-9467-F087163891DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.18:-:*:*:*:*:*:*", "cpeNameId": "B84AD8B1-97D4-44E1-9AAA-EB2833DC6F4F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*", "cpeNameId": "8A53347F-8F9B-4FF1-B80D-CEFEDFBC508A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*", "cpeNameId": "1ADFBB6B-58D2-44A0-8ED0-477E34D379D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*", "cpeNameId": "96E75324-FDDA-45D6-8FCA-9D8D9C80EF18"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*", "cpeNameId": "AC16DB99-6834-46F9-9521-201FFAC3057F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*", "cpeNameId": "6BFB0B02-D2EA-4194-A7B8-1EE3A703DDE7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*", "cpeNameId": "A675B686-8E46-42D2-BA05-C32B1CAE46E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*", "cpeNameId": "61D388F6-EAAB-4336-A039-A4CAE33FE77B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.18.0:*:*:*:*:*:*:*", "cpeNameId": "75F610AC-9A76-4CB1-85E7-B7DBD74C8DCF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*", "cpeNameId": "A4F08FEE-5F55-4EF3-BCD3-EEBA83F00D37"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*", "cpeNameId": "16A0E0AB-9DDA-43D3-86FF-0DF62072561B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*", "cpeNameId": "E791FC39-2A00-4471-9A3A-C75E1B1E64F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*", "cpeNameId": "BB3B89C1-1552-47E3-905A-FC1A64B9332D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*", "cpeNameId": "CA04A0FC-983F-4ACB-9A50-16FDF4787E4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*", "cpeNameId": "8900EE54-0738-4016-860B-A6B22C7DA5A3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*", "cpeNameId": "AC0C457A-323C-477D-AC78-D03871D4F569"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*", "cpeNameId": "F9F72925-119F-4E41-BD56-E53C0E99AA73"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*", "cpeNameId": "20EA1762-2A4D-4178-B223-1C96D246AE8C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.19:-:*:*:*:*:*:*", "cpeNameId": "814CA6EA-E5CF-4B9B-81F0-84AF1CAEF41B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc1:*:*:*:*:*:*", "cpeNameId": "1C3EA887-1E94-405E-BF75-DD15C71D041A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc2:*:*:*:*:*:*", "cpeNameId": "A1F1D101-0E54-474E-8667-9B6CFB524B8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc3:*:*:*:*:*:*", "cpeNameId": "51E01BA9-253D-4BDC-B22D-DA77224F71BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc4:*:*:*:*:*:*", "cpeNameId": "0B684AB1-90C4-4761-B136-F51F7D2C17CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc5:*:*:*:*:*:*", "cpeNameId": "59899822-E1DC-460D-A840-6725374EE633"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc6:*:*:*:*:*:*", "cpeNameId": "1E381AAD-2D0E-4859-90EC-A660E3B7B7CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.19.0:*:*:*:*:*:*:*", "cpeNameId": "E2AE40EE-377E-48F5-BAAF-72C7C8195993"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*", "cpeNameId": "B15089C6-57BF-4652-A050-929097D0D5A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*", "cpeNameId": "2E58516D-F481-4FB6-9BC8-88A95615E890"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*", "cpeNameId": "682240A3-8246-48AB-87B0-6BBB96ECBDC0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*", "cpeNameId": "F76A8B1F-AF42-4DEA-8414-6B625F6E316B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*", "cpeNameId": "D0BC611E-A8DA-4945-8776-8F266620BBBD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*", "cpeNameId": "42410926-2960-4368-9F5D-E6F62078B9B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*", "cpeNameId": "C0261393-AC10-423E-892C-9E421F6974A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*", "cpeNameId": "6B51DE9A-A4AA-4A0E-BBE6-897DB644F6AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20:-:*:*:*:*:*:*", "cpeNameId": "B97C9E25-7A4A-4C09-8051-663C5AA0A9F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20:rc1:*:*:*:*:*:*", "cpeNameId": "27D689A6-8079-45F9-9390-400AC012BFDD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20:rc2:*:*:*:*:*:*", "cpeNameId": "D43C5016-2DB9-4723-BA89-09FB74FCFBCD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20:rc3:*:*:*:*:*:*", "cpeNameId": "B3220E12-F16F-46D6-9769-D31840DD76C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20:rc4:*:*:*:*:*:*", "cpeNameId": "CFBF8DA4-A36C-4276-B1A8-688DB292F622"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20:rc5:*:*:*:*:*:*", "cpeNameId": "A1D12713-789A-46A7-8E1E-AD5B9E5BCC42"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20:rc6:*:*:*:*:*:*", "cpeNameId": "A255FBF3-5D44-4875-B13B-9D62E1243661"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20:rc7:*:*:*:*:*:*", "cpeNameId": "7E7AE308-2CFC-4492-894B-8D4A3A09E0CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*", "cpeNameId": "801FC206-DF3F-4B03-84EA-8340AD1F8037"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*", "cpeNameId": "63E639ED-60D3-4EFB-B20F-FD710A81944A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*", "cpeNameId": "AEB9FA66-7B8A-4FFD-BB9C-65F733E7D116"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*", "cpeNameId": "4CFF2BEC-F792-42FD-B933-3AB0BB7F3ECA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*", "cpeNameId": "45A09049-2699-4DCD-9CED-73A3D282DE7C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*", "cpeNameId": "8909D5F8-66FA-4EA4-ADF7-CDA0A67C30F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*", "cpeNameId": "58817446-1B83-4434-A54A-9BB63DE0D4B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*", "cpeNameId": "F217A5B3-C788-4F34-8D51-4E9FC1997497"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*", "cpeNameId": "CDC24E6C-5694-435D-8CED-6A9E5A0A2067"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*", "cpeNameId": "506CEF8D-211E-497E-AE6A-FDBF1A12167B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*", "cpeNameId": "36091D6E-873C-4C3B-964E-DFE734896ADB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*", "cpeNameId": "B353253D-5DCA-46A6-8E8F-23F7849D8323"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*", "cpeNameId": "0E4908DB-FEB4-4077-8309-1E45FC9595B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*", "cpeNameId": "3B9FC266-ACBC-4F9B-84C4-00871BE5F8EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*", "cpeNameId": "CB3A11BC-79F9-4651-A3DE-39AD6E18D1B1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*", "cpeNameId": "2353C8DD-9510-42DA-AE50-E8F8A5574459"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*", "cpeNameId": "C43CBDFE-2E2D-4FC7-9D7C-F4E1C7C495A0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*", "cpeNameId": "AFF658D9-AC30-483F-BF16-EF65B060E7BF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*", "cpeNameId": "962F6424-1A32-4F84-8105-B4357936B688"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*", "cpeNameId": "E8CAB38A-F9FD-4A6E-A283-5D62A92A1B49"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*", "cpeNameId": "510778E4-0178-4F95-8355-921C63FEE908"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*", "cpeNameId": "BCAB8A69-E8C8-4BEB-9DA1-131075AB484F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.21:-:*:*:*:*:*:*", "cpeNameId": "2AB8FE39-016F-46B6-80F1-7A5C9C1E9492"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.21:git1:*:*:*:*:*:*", "cpeNameId": "6DED897B-6273-48AF-917E-2B2972CA9122"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.21:git2:*:*:*:*:*:*", "cpeNameId": "3D9FD193-54F7-453F-9A9E-B6FCADCAB78E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.21:git3:*:*:*:*:*:*", "cpeNameId": "CB2D323D-D563-4AB9-B8AC-2997E857CD0E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.21:git4:*:*:*:*:*:*", "cpeNameId": "87ADBC5E-E9F7-45D3-9A24-A8F5682E60D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.21:git5:*:*:*:*:*:*", "cpeNameId": "E4BF7055-2FEA-4C32-AE63-780B8B9A382B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.21:git6:*:*:*:*:*:*", "cpeNameId": "9AAA38E7-2671-403A-AC6D-80769C9CE5B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.21:git7:*:*:*:*:*:*", "cpeNameId": "B2D7D320-D4FB-4E3E-BCCF-2E9FB36D2493"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc1:*:*:*:*:*:*", "cpeNameId": "6FCC2AED-A9F2-471C-A193-AAF31FB72E3F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc2:*:*:*:*:*:*", "cpeNameId": "12807753-BCDA-498F-98D6-54F5571A6FD3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc3:*:*:*:*:*:*", "cpeNameId": "614D10D9-2AED-46C7-85C6-FF6D4BA23EB2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc4:*:*:*:*:*:*", "cpeNameId": "EBC57252-6CBD-49BF-971D-B2ADF963A099"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc5:*:*:*:*:*:*", "cpeNameId": "AE9ACDEC-AC61-4FDB-8F94-3CBD7601BDAE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc6:*:*:*:*:*:*", "cpeNameId": "248135E7-8ECB-4747-98A2-92D61E8AE1D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc7:*:*:*:*:*:*", "cpeNameId": "7AF9C9FB-C50F-4BF9-B1B9-2F3072E24DAA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*", "cpeNameId": "46017C3E-4534-4835-96A2-CC2D826395A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*", "cpeNameId": "4768AC1E-5112-4C2D-A8DF-6E288CFA85EC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*", "cpeNameId": "12CC828E-E989-49EE-B4FA-12070327CF32"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*", "cpeNameId": "7F4B2F9F-85A6-4E2D-8CE3-F2D0F3F77D97"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*", "cpeNameId": "BD095BBF-A125-48E3-B17B-6B1BD4D136A6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*", "cpeNameId": "B6E2B00E-D117-4FC6-BB9C-2444EBAA7E00"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:*", "cpeNameId": "8B5450D5-ECB9-4193-93D7-EEF907731609"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*", "cpeNameId": "7F95E21F-D80B-4C5B-9A80-329E5C6D7A01"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22:-:*:*:*:*:*:*", "cpeNameId": "D8D13AB8-A6A2-4D95-B6D2-6279459B8E78"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22:rc1:*:*:*:*:*:*", "cpeNameId": "FE4F440D-2AAB-4F9D-895B-2BDBFE51F323"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22:rc2:*:*:*:*:*:*", "cpeNameId": "8C4E58A3-CEDC-49D5-8C0F-EF76DD421E3B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22:rc3:*:*:*:*:*:*", "cpeNameId": "68EE0C2F-FE6A-49FA-AF8B-D003123BC6F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22:rc4:*:*:*:*:*:*", "cpeNameId": "C85503AD-0D6A-421E-BEBA-98CEE922A04F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22:rc5:*:*:*:*:*:*", "cpeNameId": "2A79A98F-7C82-429F-8466-7C66FFBBE5E3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22:rc6:*:*:*:*:*:*", "cpeNameId": "2BBA39CF-A81F-4B07-8EC8-F2239B713BC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22:rc7:*:*:*:*:*:*", "cpeNameId": "8F11D134-5A81-42D4-9027-FDF9160EF978"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*", "cpeNameId": "1B839A54-B355-4661-88F7-0DDEEAE700E9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22.2:*:*:*:*:*:*:*", "cpeNameId": "B9758247-C486-49C2-8B1A-7C946587FB91"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*", "cpeNameId": "7C8FF21D-8105-4B74-846B-73AC40E505B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*", "cpeNameId": "F4FF69C8-CCA6-44F0-8D64-2D990B4D6BC2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*", "cpeNameId": "04A420F1-1A90-4B8F-B9C0-DCD8F7DBAEC2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*", "cpeNameId": "C733AB5C-5C26-4C61-BFCA-367F7BC01C45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*", "cpeNameId": "77E95C6F-6DE6-41A9-B58C-BD3C4A64F155"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22.8:*:*:*:*:*:*:*", "cpeNameId": "3159E118-52DD-438A-8539-68401E466DBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22.9:*:*:*:*:*:*:*", "cpeNameId": "6B4DDF81-97B5-4CF2-BB2A-A537BD27E3F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22.10:*:*:*:*:*:*:*", "cpeNameId": "4896543A-B707-4AF7-9309-29C9FC82EF9A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22.11:*:*:*:*:*:*:*", "cpeNameId": "937E3A71-01F0-4469-8F6A-93B3BBCE5375"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22.12:*:*:*:*:*:*:*", "cpeNameId": "F464711C-D915-4D76-A926-139D0965F14D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22.13:*:*:*:*:*:*:*", "cpeNameId": "735ECD89-7A68-48DA-AA51-769B2BB0D303"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22.14:*:*:*:*:*:*:*", "cpeNameId": "4953E7DD-BA0E-49B4-8DD3-201AFFDDB0EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22.15:*:*:*:*:*:*:*", "cpeNameId": "9A18CDC3-A241-42FB-8FBE-38F2679C67B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22.16:*:*:*:*:*:*:*", "cpeNameId": "E81C6D76-C9B6-49F2-AC07-E3543064A924"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22.17:*:*:*:*:*:*:*", "cpeNameId": "D8AE7F68-AAF9-487D-AD1D-AF0A6295363B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22.18:*:*:*:*:*:*:*", "cpeNameId": "3DF384B9-E2F5-4C7C-B657-C40B2B6A7531"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22.19:*:*:*:*:*:*:*", "cpeNameId": "7CEDA023-893A-4EA9-B40E-80186D084DA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22.20:*:*:*:*:*:*:*", "cpeNameId": "8E1C5897-7149-4E91-BA83-516C152FBB9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22.21:*:*:*:*:*:*:*", "cpeNameId": "71083EFC-9FF7-4EFC-A0C5-21EB4C2B5DA7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22.22:*:*:*:*:*:*:*", "cpeNameId": "FCD0B81B-640D-4BF0-8DCF-708E1BF44997"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*", "cpeNameId": "F899EDE8-660D-4179-8166-585CBD56912B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23:-:*:*:*:*:*:*", "cpeNameId": "0F9C73D7-24C5-4D6E-B7CA-7B0D858C7246"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc1:*:*:*:*:*:*", "cpeNameId": "0989C89A-74EA-408E-AC27-0F2B1116D972"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc2:*:*:*:*:*:*", "cpeNameId": "42392E36-6BE7-48B0-ABA6-BB822FC049EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc3:*:*:*:*:*:*", "cpeNameId": "8CF6751B-E269-40EC-ACC3-5F0BA888895E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc4:*:*:*:*:*:*", "cpeNameId": "78EFDE7D-F1A6-48EA-A930-7750EF03C813"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc5:*:*:*:*:*:*", "cpeNameId": "7B86BF4D-8E94-4273-A3AB-F4636ADE74FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc6:*:*:*:*:*:*", "cpeNameId": "4E201B7E-7829-4143-9B10-94F5405CCF14"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc7:*:*:*:*:*:*", "cpeNameId": "731BC0F5-0124-40C7-8952-4E861C892EFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc8:*:*:*:*:*:*", "cpeNameId": "C7C465B8-3A96-45E4-8A03-B1EC67683B28"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc9:*:*:*:*:*:*", "cpeNameId": "2CBFD323-BA51-473A-B2B3-DD293ABC871A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*", "cpeNameId": "562BF749-10BE-428C-B290-798F8B753286"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*", "cpeNameId": "741428B0-71BE-4319-AACB-91EFE03FA524"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*", "cpeNameId": "08EC977C-9DFA-4AAF-B0D1-B931AD1A51C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*", "cpeNameId": "F2777786-9633-4CFC-8CD6-AF1C114A913F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*", "cpeNameId": "0F6BBD72-4F59-40B8-802A-4AE975680033"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*", "cpeNameId": "141E6E61-E166-4111-AD8E-3FF747F3C70D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*", "cpeNameId": "F58426E0-FE1A-4702-8536-C4C46CC3A3DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23.8:*:*:*:*:*:*:*", "cpeNameId": "260C141F-D03D-4EAF-A53B-16272147A86B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*", "cpeNameId": "5968F83E-4924-4E51-9726-891079C59708"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23.10:*:*:*:*:*:*:*", "cpeNameId": "AFA3BEB9-5020-4130-A07D-2E3DDBB6FBA6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23.11:*:*:*:*:*:*:*", "cpeNameId": "3A0CB6DF-045E-48D4-893E-B36663E6125D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23.12:*:*:*:*:*:*:*", "cpeNameId": "325BE2DE-735F-40B5-92F8-C6E71BEF1A99"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23.13:*:*:*:*:*:*:*", "cpeNameId": "D1DC0074-5F78-4F15-AA90-5DFAC4FC5A4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23.14:*:*:*:*:*:*:*", "cpeNameId": "91BC293A-2CCB-4B70-9C72-24C8F693E568"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23.15:*:*:*:*:*:*:*", "cpeNameId": "F85C441B-085E-4F46-8C32-80F7A208EB0E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23.16:*:*:*:*:*:*:*", "cpeNameId": "09444FC7-3635-4436-AC17-113EF645FC01"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23.17:*:*:*:*:*:*:*", "cpeNameId": "80090E1D-5100-4D14-926D-6F350327FBA4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*", "cpeNameId": "FC1168AE-393B-4265-98F2-A3F04DBB528A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.24:-:*:*:*:*:*:*", "cpeNameId": "FE9EE0D6-1A6D-4F88-97C4-A9505A6F856D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc1:*:*:*:*:*:*", "cpeNameId": "B7F4E2CA-53B0-4DBF-B630-763F672CB234"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc2:*:*:*:*:*:*", "cpeNameId": "FABD206A-0F60-4E6F-9195-BDD662A90987"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc3:*:*:*:*:*:*", "cpeNameId": "DE794BF5-5DC4-4B5D-B491-4B82E6FEB27A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc4:*:*:*:*:*:*", "cpeNameId": "F987AC8B-EEDA-4220-BD6D-3619D6A78F2C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc5:*:*:*:*:*:*", "cpeNameId": "A04749DB-1911-444F-B99A-E8A864522140"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc6:*:*:*:*:*:*", "cpeNameId": "EAC3D561-5940-4070-8D81-CFDC1CEC7798"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc7:*:*:*:*:*:*", "cpeNameId": "E546F2AF-8DB1-485F-9806-2DFC97B4B863"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc8:*:*:*:*:*:*", "cpeNameId": "8DE9E5BC-C5E8-447D-AF65-EFA52E7A5B4F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.24.1:*:*:*:*:*:*:*", "cpeNameId": "FCCA316C-7837-4C3E-A49B-FAB6EB495BAC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.24.2:*:*:*:*:*:*:*", "cpeNameId": "8E97A26D-D55D-410B-AA72-34AC62F5CF66"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.24.3:*:*:*:*:*:*:*", "cpeNameId": "1C902BEC-02CB-4DBF-AA6C-8C7CB17EE3D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.24.4:*:*:*:*:*:*:*", "cpeNameId": "A9870A06-1B49-4F3A-8C2D-315A106A1215"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.24.5:*:*:*:*:*:*:*", "cpeNameId": "FED92B84-FE68-42C2-8574-0C08AECA70AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.24.6:*:*:*:*:*:*:*", "cpeNameId": "6492B539-4020-4A6E-BD8A-CD885FC90943"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.24.7:*:*:*:*:*:*:*", "cpeNameId": "AD36F01D-6AAE-4D7A-BF2C-539C8DC132F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*", "cpeNameId": "A1071BFF-898A-4DC6-93A3-E95A1F2941CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25:-:*:*:*:*:*:*", "cpeNameId": "F72C5AA2-75A5-4C3B-8F34-5B0D34904B6A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25:rc1:*:*:*:*:*:*", "cpeNameId": "983AB272-A210-48CB-A1F7-B62DE582CDCD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25:rc2:*:*:*:*:*:*", "cpeNameId": "5305D38B-310F-493C-9138-D6F350536680"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25:rc3:*:*:*:*:*:*", "cpeNameId": "DBD38A9D-ADEC-49FC-898C-C4A1756B4BFB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25:rc4:*:*:*:*:*:*", "cpeNameId": "A0986B4D-8125-479A-AD7D-6353AF47B587"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25:rc5:*:*:*:*:*:*", "cpeNameId": "CEEF21D6-6A5E-4B02-9200-73C9AA6AD91C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25:rc6:*:*:*:*:*:*", "cpeNameId": "4492946F-F7D0-4457-A825-BEF0F6837174"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25:rc7:*:*:*:*:*:*", "cpeNameId": "EA7D62FB-8298-489F-82DA-1E3A0487F2C9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25:rc8:*:*:*:*:*:*", "cpeNameId": "36275902-C509-4634-B93E-C1DE23024B17"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25:rc9:*:*:*:*:*:*", "cpeNameId": "784B0C9A-EDD9-4AEB-8D70-899520854A68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*", "cpeNameId": "C555BB67-EED7-4D9A-ADD7-A7AA577A269B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*", "cpeNameId": "4387A8F8-129A-41CA-BDBB-0948B2B2FDD0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:*", "cpeNameId": "5E85D136-1C00-4818-9FDC-387CD3F0D07A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:*", "cpeNameId": "BD3F2189-2F6B-4D38-BCA4-D6120C8E0EF4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:*:*:*:*:*:*", "cpeNameId": "B310130C-6AE4-4EDF-AA4C-652E32D8BC52"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:*:*:*:*:*:*", "cpeNameId": "23CE5AE6-B3ED-48AD-86EA-F6B9729AFB79"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:*:*:*:*:*:*", "cpeNameId": "0286C9EE-1A7A-4A37-BC89-91D55AF443BF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:*:*:*:*:*:*", "cpeNameId": "ADFE784D-1292-4323-9A6E-5D89BA06C938"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25.9:*:*:*:*:*:*:*", "cpeNameId": "1EA55A4C-7C6A-44DF-B78B-8EBB407765DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25.10:*:*:*:*:*:*:*", "cpeNameId": "F5B3E918-51C9-4C8D-A2BC-B86E1354FB4D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25.11:*:*:*:*:*:*:*", "cpeNameId": "5394B8A8-C0CF-4689-A45F-D7F6949C4916"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25.12:*:*:*:*:*:*:*", "cpeNameId": "96D17BC3-17F6-4236-ADCE-3522376A1091"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25.13:*:*:*:*:*:*:*", "cpeNameId": "E93E92D4-6D48-4E01-BE1B-1D10560AAD05"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25.14:*:*:*:*:*:*:*", "cpeNameId": "0BCCFB39-620C-415A-9BE9-C4DFB0F09F05"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25.15:*:*:*:*:*:*:*", "cpeNameId": "8CAD33BA-EA75-44C6-BD5F-995C0D0F3955"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25.16:*:*:*:*:*:*:*", "cpeNameId": "F1474B07-6068-4EDD-84E5-41CC13C9EB98"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25.17:*:*:*:*:*:*:*", "cpeNameId": "A2DD704B-0386-4F91-9518-D763CE8269C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25.18:*:*:*:*:*:*:*", "cpeNameId": "7EC54A62-DA8C-4BDA-B652-B7C98A99FE6E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25.19:*:*:*:*:*:*:*", "cpeNameId": "5E4B2B2E-6F75-4A0B-B37D-0D6B80B3310D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25.20:*:*:*:*:*:*:*", "cpeNameId": "0C30281F-8CA1-46A3-8BB4-CD36FEC99CD4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.26:*:*:*:*:*:*:*", "cpeNameId": "4A62D5E5-8773-4466-899D-2B0C99577A8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.26:-:*:*:*:*:*:*", "cpeNameId": "F615D17C-63EE-44BB-ABEB-E56B0324466D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.26:rc1:*:*:*:*:*:*", "cpeNameId": "46898195-81E5-4B6C-9979-0A7EEBBA100A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.26:rc2:*:*:*:*:*:*", "cpeNameId": "ED404F71-B3DD-4497-8FFD-3AA02DF9B50E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.26:rc3:*:*:*:*:*:*", "cpeNameId": "75EFA32A-138A-43FA-AFE9-7F4FE7A6CB53"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.26:rc4:*:*:*:*:*:*", "cpeNameId": "B46BBED3-2FA3-4663-9C06-618C1871D71B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.26:rc5:*:*:*:*:*:*", "cpeNameId": "4B6CED62-4106-4F88-A121-27AF4BB4C17D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.26:rc6:*:*:*:*:*:*", "cpeNameId": "3369829B-F537-446E-A8B3-2E7FF1205A9C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.26:rc7:*:*:*:*:*:*", "cpeNameId": "D0BC502A-D02E-4863-BACF-55C9041B327A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.26:rc8:*:*:*:*:*:*", "cpeNameId": "2C0A5E1B-DE35-4BD1-AD09-B847BA76CBC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.26:rc9:*:*:*:*:*:*", "cpeNameId": "AB19A9EE-8236-485A-8C7B-119580A6F3C5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.26.1:*:*:*:*:*:*:*", "cpeNameId": "DE3E36D5-4331-46E8-ACF6-AA1E94CA8869"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.26.2:*:*:*:*:*:*:*", "cpeNameId": "16062DAC-D861-479C-B4F3-B293A4391CC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.26.3:*:*:*:*:*:*:*", "cpeNameId": "DFA74C56-9354-490A-BE76-54D16AA99803"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.26.4:*:*:*:*:*:*:*", "cpeNameId": "F5D51B53-22C2-4E28-8052-9F2FFF10178E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.26.5:*:*:*:*:*:*:*", "cpeNameId": "A2B56597-8237-44FF-9EB5-4AAB2A53A91F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.26.6:*:*:*:*:*:*:*", "cpeNameId": "18E811C8-4BEB-4E26-BFF7-5885553C91AF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.26.7:*:*:*:*:*:*:*", "cpeNameId": "EF704FF9-35B8-40F6-9772-8AAF4835E281"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.26.8:*:*:*:*:*:*:*", "cpeNameId": "E32239A8-9CAA-413E-868F-B6A6D8CA8091"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27:*:*:*:*:*:*:*", "cpeNameId": "2790E826-ABA8-4AD2-8EA5-A9964BB534A9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27:-:*:*:*:*:*:*", "cpeNameId": "0DF899BD-4622-418D-97BD-9C1D4951C9C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc1:*:*:*:*:*:*", "cpeNameId": "5B20145D-3A00-4393-85EB-AB9013909AFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc2:*:*:*:*:*:*", "cpeNameId": "1A709E25-B7AA-4E0D-852B-6DBD7F880990"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc3:*:*:*:*:*:*", "cpeNameId": "150829BD-7F83-4EEF-832E-B77084FA7CE0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc4:*:*:*:*:*:*", "cpeNameId": "0DCE95CF-E111-4635-A3E8-A2FD4FBF0146"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc5:*:*:*:*:*:*", "cpeNameId": "0F92F357-AAE6-4B1D-A98B-14BC0D69C796"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc6:*:*:*:*:*:*", "cpeNameId": "56FEE000-39CE-407A-92FC-1A9B0FB30BA9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc7:*:*:*:*:*:*", "cpeNameId": "472867B2-3767-4AD0-AA56-AC131E92F74C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc8:*:*:*:*:*:*", "cpeNameId": "94046B34-8587-451A-88DB-08A21630F886"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc9:*:*:*:*:*:*", "cpeNameId": "958CD977-4936-4773-9510-AA4D4AD95A62"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.1:*:*:*:*:*:*:*", "cpeNameId": "E5E533E0-3433-4563-A5B1-4019A60967E3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.2:*:*:*:*:*:*:*", "cpeNameId": "1B8EA349-6D08-41EA-BFB5-BB54A6BA54D6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.3:*:*:*:*:*:*:*", "cpeNameId": "E2476EE2-74EB-4B7E-977D-838ADDD32BA0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.4:*:*:*:*:*:*:*", "cpeNameId": "A36309D9-EE60-4375-B533-2CFA96AB57B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.5:*:*:*:*:*:*:*", "cpeNameId": "05BDF88D-8BB4-4FA6-8750-3D3BE700756F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.6:*:*:*:*:*:*:*", "cpeNameId": "4BE8605D-64CE-48C0-B960-789A120AD07D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.7:*:*:*:*:*:*:*", "cpeNameId": "0E0B4678-634E-47EA-BB83-E8D93A08DC32"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.8:*:*:*:*:*:*:*", "cpeNameId": "DD4983E1-3798-49A1-BAA7-E4B841E66E4E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.9:*:*:*:*:*:*:*", "cpeNameId": "78BC09AF-A41A-40D8-A17B-4249CCCABD05"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.10:*:*:*:*:*:*:*", "cpeNameId": "EA82C261-9D48-49E5-9FD8-39DCD8E6A39F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.11:*:*:*:*:*:*:*", "cpeNameId": "65AD90CE-1720-45DE-BE98-887AA0BB844E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.12:*:*:*:*:*:*:*", "cpeNameId": "15826A72-064E-4D06-BFA8-5A6757FD26F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.13:*:*:*:*:*:*:*", "cpeNameId": "DD52275D-40E2-4253-85F1-1C71864B4CCD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.14:*:*:*:*:*:*:*", "cpeNameId": "347A8267-499B-4EC5-9D27-D6CBBB231A39"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.15:*:*:*:*:*:*:*", "cpeNameId": "0A70CE63-8D40-4DA5-8AB7-1487830FE3D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.16:*:*:*:*:*:*:*", "cpeNameId": "7A43F0B5-E415-426E-BA98-2185D4C4D818"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.17:*:*:*:*:*:*:*", "cpeNameId": "61E08977-1B97-405E-8D38-0F279138A1D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.18:*:*:*:*:*:*:*", "cpeNameId": "C818E1AE-E774-49FF-91F1-0C6C21C01F48"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.19:*:*:*:*:*:*:*", "cpeNameId": "CC57F9BC-E18A-4893-A6D6-5B964136B801"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.20:*:*:*:*:*:*:*", "cpeNameId": "52A97B62-35C0-4460-AB8A-A72333D73662"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.21:*:*:*:*:*:*:*", "cpeNameId": "7D6229A0-1E7C-412C-AD96-BA8DDFE0DA69"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.22:*:*:*:*:*:*:*", "cpeNameId": "04D91CD6-EE7C-48EC-89F0-EDABCC09D57F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.23:*:*:*:*:*:*:*", "cpeNameId": "099F70DF-74CE-4AFE-A236-7B810AC52A3A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.24:*:*:*:*:*:*:*", "cpeNameId": "E786E389-48B5-4F47-807C-B04BACE1DA31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.25:*:*:*:*:*:*:*", "cpeNameId": "C297DD6A-638A-4A39-AF16-C4EB8FBC6636"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.26:*:*:*:*:*:*:*", "cpeNameId": "F2174C61-0E63-46B3-B862-DB975200101F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.27:*:*:*:*:*:*:*", "cpeNameId": "88CDAE17-4187-46A5-B1E9-58A720560CD0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.28:*:*:*:*:*:*:*", "cpeNameId": "98B65B74-6BD5-4B4C-A755-71F7D5E86E49"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.29:*:*:*:*:*:*:*", "cpeNameId": "D2F56B19-53B0-4B46-BC10-A3A3C6ECBEC6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.30:*:*:*:*:*:*:*", "cpeNameId": "072FB2C5-BDB8-433A-97A1-9E03CC2AC5F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.31:*:*:*:*:*:*:*", "cpeNameId": "ADBF15ED-CF10-4594-82C5-E07C3ABFA91A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.32:*:*:*:*:*:*:*", "cpeNameId": "D39CF73F-85BA-4369-A922-66C2D378695D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.33:*:*:*:*:*:*:*", "cpeNameId": "BF4A56DD-0EA5-46A0-89F4-0B0C58243B7D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.34:*:*:*:*:*:*:*", "cpeNameId": "19F0D67E-631D-4CDE-B709-54157E35B9D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.35:*:*:*:*:*:*:*", "cpeNameId": "D1B36EA6-CF60-4C04-8287-D702B9E0E6F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.36:*:*:*:*:*:*:*", "cpeNameId": "45574092-C4A7-4717-ABF5-04A212518E46"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.37:*:*:*:*:*:*:*", "cpeNameId": "AE746EF3-51ED-4E27-B54F-730589843358"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.38:*:*:*:*:*:*:*", "cpeNameId": "223C86A8-448E-4061-933C-7192520DBF2D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.39:*:*:*:*:*:*:*", "cpeNameId": "0D81CEA2-087C-4454-97B1-DE8EA7A5D838"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.40:*:*:*:*:*:*:*", "cpeNameId": "DC82114E-0E4E-477B-B470-AE06B623816B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.41:*:*:*:*:*:*:*", "cpeNameId": "CDB6AB78-8D68-4F8A-8DD0-437C95D5ABE4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.42:*:*:*:*:*:*:*", "cpeNameId": "A43260B8-5585-4E18-B780-6687ABE8FB3E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.43:*:*:*:*:*:*:*", "cpeNameId": "C75BF8F5-D9C7-4AB3-A1C4-C582930D0131"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.44:*:*:*:*:*:*:*", "cpeNameId": "B270E648-24C9-4306-A9AA-9FAE95731FED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.45:*:*:*:*:*:*:*", "cpeNameId": "CDB23066-513D-4A5C-AACD-D2091830BFEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.46:*:*:*:*:*:*:*", "cpeNameId": "0AC68B1E-619E-41E5-8775-E18E8E134E04"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.47:*:*:*:*:*:*:*", "cpeNameId": "239EB815-BDE5-466A-A0AF-D69304E081EE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.48:*:*:*:*:*:*:*", "cpeNameId": "0E31D12F-2AF1-45F0-BDB3-BAEB6B422670"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.49:*:*:*:*:*:*:*", "cpeNameId": "EC1BD23B-8DA3-469D-9BDB-CEA32D29623C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.50:*:*:*:*:*:*:*", "cpeNameId": "BB74365F-01F9-42CA-ADA4-C8DF55F8A913"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.51:*:*:*:*:*:*:*", "cpeNameId": "08E8D5B2-9DAB-42F3-96A9-7A7EE3434E65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.52:*:*:*:*:*:*:*", "cpeNameId": "1DC0EB32-01BE-4EC8-AB44-4E157B999D0D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.53:*:*:*:*:*:*:*", "cpeNameId": "82B2940F-FC6E-4380-AFA9-D81897C7CE50"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.54:*:*:*:*:*:*:*", "cpeNameId": "6447E5AE-619E-444C-A23F-C287C0B20044"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.55:*:*:*:*:*:*:*", "cpeNameId": "86B8E235-B91D-41EE-8D45-BB912733ACC8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.56:*:*:*:*:*:*:*", "cpeNameId": "C5B65939-DB29-45A8-85D1-6C814C5DA778"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.57:*:*:*:*:*:*:*", "cpeNameId": "B73A29CD-2502-47AD-9061-000C559BB7E7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.58:*:*:*:*:*:*:*", "cpeNameId": "92FB187F-66E9-4DCD-BED9-522F3079D42F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.59:*:*:*:*:*:*:*", "cpeNameId": "EAC43A22-676C-42EB-8F81-994A51EDCD53"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.60:*:*:*:*:*:*:*", "cpeNameId": "343321F0-2753-47AA-BBA4-C20376BDCCE6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.61:*:*:*:*:*:*:*", "cpeNameId": "EEE9C54F-1BCE-4AF9-8C81-75FC8624A8CE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.62:*:*:*:*:*:*:*", "cpeNameId": "0BE18EBB-7FFE-4741-80F1-DEE19EC41708"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.28:*:*:*:*:*:*:*", "cpeNameId": "3E259BBA-BD85-456A-8F24-5CE2F9D73E0D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.28:-:*:*:*:*:*:*", "cpeNameId": "9C937810-3BE5-48C1-9FA0-1666E8309C50"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc1:*:*:*:*:*:*", "cpeNameId": "F6B6D177-8587-4DD2-B5A2-D7E1A7AACEBC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc2:*:*:*:*:*:*", "cpeNameId": "1D4B4CBD-528F-4381-8902-5E7338025136"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc3:*:*:*:*:*:*", "cpeNameId": "10C0C788-A8AA-4B42-8C36-BEE831DBF83B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc4:*:*:*:*:*:*", "cpeNameId": "4C530FAA-D8D8-4860-8133-DFE0837106B2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc5:*:*:*:*:*:*", "cpeNameId": "46B4F598-4A98-4943-9036-FCD94656EED1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc6:*:*:*:*:*:*", "cpeNameId": "0B4F7700-E64E-4CBA-A777-AF33E62E5F5C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc7:*:*:*:*:*:*", "cpeNameId": "AE60E3EE-BB1D-4BC8-945A-C71569C70EF6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc8:*:*:*:*:*:*", "cpeNameId": "770DFF4B-4436-45E8-A4DD-B5E2B43EF22A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc9:*:*:*:*:*:*", "cpeNameId": "6B08B85E-42B0-403F-876C-B5A926F1C7C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.28.1:*:*:*:*:*:*:*", "cpeNameId": "1ED7C557-830D-4B61-9C6E-7FF7717B544C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.28.2:*:*:*:*:*:*:*", "cpeNameId": "09B7E5EB-3F81-4957-B813-24BDE84F95C9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.28.3:*:*:*:*:*:*:*", "cpeNameId": "49668897-85CB-4870-96CB-BEBD3FE53A0A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.28.4:*:*:*:*:*:*:*", "cpeNameId": "0D226286-EDEF-467F-B430-4BD1D1932726"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.28.5:*:*:*:*:*:*:*", "cpeNameId": "BF7087A5-9A38-411F-B4A1-8CAD18FC6977"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.28.6:*:*:*:*:*:*:*", "cpeNameId": "F0B865E7-DCD7-4E6E-AA6F-92B15BBE57BE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.28.7:*:*:*:*:*:*:*", "cpeNameId": "9FEA0E3F-8F2A-4077-9985-8DE2A055F362"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.28.8:*:*:*:*:*:*:*", "cpeNameId": "BE173659-26D4-49E1-B1B2-EC6BCD3F5879"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.28.9:*:*:*:*:*:*:*", "cpeNameId": "4E897E7B-3284-4E9F-AE1C-1D3F7AD780B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.28.10:*:*:*:*:*:*:*", "cpeNameId": "195078CF-C766-44CB-A514-7589C94A315E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.29:*:*:*:*:*:*:*", "cpeNameId": "70E78C9F-AD53-46BB-9AC0-6981DE5BDB73"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.29:-:*:*:*:*:*:*", "cpeNameId": "0BB6EE8C-8C31-4D1A-828B-4818CF07343A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc1:*:*:*:*:*:*", "cpeNameId": "DB6B4A0E-C9DC-4009-B268-936590A92FA6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc2:*:*:*:*:*:*", "cpeNameId": "6C70B8CE-BAD8-4BB0-81B8-56C67BC63FEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc3:*:*:*:*:*:*", "cpeNameId": "6429C36E-A421-4F90-8A45-200DDD939119"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc4:*:*:*:*:*:*", "cpeNameId": "941CB1DE-140F-4A1E-AC50-E717D6925D03"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc5:*:*:*:*:*:*", "cpeNameId": "8041C971-6E89-49F2-9586-00EDAD482433"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc6:*:*:*:*:*:*", "cpeNameId": "22FA1B82-9783-40DB-B0D0-A8A5DFB267BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc7:*:*:*:*:*:*", "cpeNameId": "7E2BD170-B0AF-42DF-B5DC-03FCC30984AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc8:*:*:*:*:*:*", "cpeNameId": "54407239-6C32-438C-9FD4-30FA687A942B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.29.1:*:*:*:*:*:*:*", "cpeNameId": "555CA3F6-C7C4-4A45-8450-7EFB248F82C2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.29.2:*:*:*:*:*:*:*", "cpeNameId": "37861F7D-9F16-4A60-949B-39203B201457"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.29.3:*:*:*:*:*:*:*", "cpeNameId": "4ABE382F-45DC-4186-8EA6-27FE6C227677"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.29.4:*:*:*:*:*:*:*", "cpeNameId": "F75E3CDD-BC58-4E45-A90A-F84C4224FD6B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.29.5:*:*:*:*:*:*:*", "cpeNameId": "B827F93E-20F9-498D-9584-1B2904D75FF1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.29.6:*:*:*:*:*:*:*", "cpeNameId": "51C632EB-6311-456B-941F-0492D883387C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.30:*:*:*:*:*:*:*", "cpeNameId": "73C3197A-810E-4593-AFEF-9363ED7A8DCA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.30:-:*:*:*:*:*:*", "cpeNameId": "16391C3F-5031-4F6F-B71C-413686EEC4D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc1:*:*:*:*:*:*", "cpeNameId": "FA3E029C-5432-4B0D-83C6-772BDB315878"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc2:*:*:*:*:*:*", "cpeNameId": "6749D71C-BB66-41D6-BF5E-E83B96993755"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc3:*:*:*:*:*:*", "cpeNameId": "CD174C4D-AC77-4A7D-AC9F-C1E05BC5A9F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc4:*:*:*:*:*:*", "cpeNameId": "3EDFAC9B-F0DF-4114-8FF8-4DE1E17DC3F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc5:*:*:*:*:*:*", "cpeNameId": "D85B3958-576D-460F-A6B0-0396D6A3069A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc6:*:*:*:*:*:*", "cpeNameId": "28683ECD-A142-41FB-AC67-1F075BFDE039"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc7:*:*:*:*:*:*", "cpeNameId": "54506839-8D39-4E03-B4BB-B229BE47193C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc8:*:*:*:*:*:*", "cpeNameId": "E8176DC9-66B8-4B0F-A626-AE6717158078"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.30.1:*:*:*:*:*:*:*", "cpeNameId": "9765B610-1A09-42F3-B428-1E7734B8302A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.30.2:*:*:*:*:*:*:*", "cpeNameId": "07755770-3DD8-4B95-977D-EC4A9A170C60"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.30.3:*:*:*:*:*:*:*", "cpeNameId": "1791B124-A22B-4581-8902-610B41DA219D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.30.4:*:*:*:*:*:*:*", "cpeNameId": "D531D6F0-9334-4F50-8BFB-E8023947AD91"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.30.5:*:*:*:*:*:*:*", "cpeNameId": "4301138C-DC55-4E2F-B546-E5BDBFC2D223"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.30.6:*:*:*:*:*:*:*", "cpeNameId": "52BE2D83-F300-4738-A457-72AC1EC750D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.30.7:*:*:*:*:*:*:*", "cpeNameId": "82DC10BA-DF42-42BF-A85B-25B620BCBC50"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.30.8:*:*:*:*:*:*:*", "cpeNameId": "8FEE9116-082A-41DE-A603-55B9DBEC277C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.30.9:*:*:*:*:*:*:*", "cpeNameId": "37426594-067E-4E40-A219-F436A2A76B5A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.30.10:*:*:*:*:*:*:*", "cpeNameId": "E379641B-5EF1-418F-A573-1E257372FC2C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.31:*:*:*:*:*:*:*", "cpeNameId": "32107018-3176-4461-B695-CA90B11CEFF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.31:-:*:*:*:*:*:*", "cpeNameId": "904E45B0-596D-445F-88F0-4758329E965A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc1:*:*:*:*:*:*", "cpeNameId": "E78A3426-31D6-47C5-8530-7BBA5E0CFF7D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc2:*:*:*:*:*:*", "cpeNameId": "5683FD7B-3EBA-4E6D-A9D4-A058551335B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc3:*:*:*:*:*:*", "cpeNameId": "58A85B13-BC9D-4A66-8ABF-D57794F353C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc4:*:*:*:*:*:*", "cpeNameId": "676CC411-2EF1-42C1-816B-915E2341B7F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc5:*:*:*:*:*:*", "cpeNameId": "51486B24-0FA2-41AD-87D1-B7DE198ACCE7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc6:*:*:*:*:*:*", "cpeNameId": "F774E2E4-D630-4340-9460-D79869DDC5A3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc7:*:*:*:*:*:*", "cpeNameId": "372DEBD7-AC3B-4184-834B-D7E3EB4E7ECB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc8:*:*:*:*:*:*", "cpeNameId": "B211AAF4-D3CC-469A-9375-302029AD5090"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc9:*:*:*:*:*:*", "cpeNameId": "26F3FD0F-4668-43F3-BC8C-3888DB91440A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.31.1:*:*:*:*:*:*:*", "cpeNameId": "31AFDC12-3D37-4914-B0BC-0FA91FCC285B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.31.2:*:*:*:*:*:*:*", "cpeNameId": "B6D7824A-6FA0-4A30-8FCA-ABFB9ACB4854"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.31.3:*:*:*:*:*:*:*", "cpeNameId": "4FFF9DF3-ED46-4E5C-B13E-4AADB79EB422"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.31.4:*:*:*:*:*:*:*", "cpeNameId": "0EA0E052-1F4F-44F8-8882-633B5409F72B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.31.5:*:*:*:*:*:*:*", "cpeNameId": "88F0648F-F89A-4A16-B160-66C6E87D03AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.31.6:*:*:*:*:*:*:*", "cpeNameId": "49477242-0936-4F64-B8CF-78BE5DC44612"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.31.7:*:*:*:*:*:*:*", "cpeNameId": "9C9AA31E-7B53-4192-9AC0-76B0B071B88C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.31.8:*:*:*:*:*:*:*", "cpeNameId": "35F94EF7-A596-4915-B21B-28F17A2F5F79"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.31.9:*:*:*:*:*:*:*", "cpeNameId": "25508389-F678-48E7-BC50-A553D99833C5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.31.10:*:*:*:*:*:*:*", "cpeNameId": "CE889437-2B1D-4B63-8B38-7B59AA2C8547"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.31.11:*:*:*:*:*:*:*", "cpeNameId": "9724A842-594E-4FDC-B466-A44510F53A34"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.31.12:*:*:*:*:*:*:*", "cpeNameId": "B2CD6601-A07B-4F7B-BE19-603388314A80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.31.13:*:*:*:*:*:*:*", "cpeNameId": "EC02B61D-6176-41B7-A4A9-992BD0C677A0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.31.14:*:*:*:*:*:*:*", "cpeNameId": "018D332C-E9AD-4707-A626-D94DC66E4DD3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32:*:*:*:*:*:*:*", "cpeNameId": "B84DD25E-9236-47B3-A2F3-DEE51128FDB1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32:-:*:*:*:*:*:*", "cpeNameId": "FF1E2599-A7FD-4F08-9714-82CB19ADEA17"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32:rc1:*:*:*:*:*:*", "cpeNameId": "284975E1-4145-4019-B896-6DC6D43DE002"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32:rc2:*:*:*:*:*:*", "cpeNameId": "F748C7D3-B079-4291-B6F5-D54C343E71D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32:rc3:*:*:*:*:*:*", "cpeNameId": "06A9BF66-3407-478A-8062-5F888828DC87"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32:rc4:*:*:*:*:*:*", "cpeNameId": "5683DB07-E0C6-49B6-81BF-CF185778B8DE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32:rc5:*:*:*:*:*:*", "cpeNameId": "A8D2C95D-E6DC-4323-9C09-9AE6D3D280FF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32:rc6:*:*:*:*:*:*", "cpeNameId": "286D2CCA-C82F-476D-841E-9595F5BCB187"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32:rc7:*:*:*:*:*:*", "cpeNameId": "33353C58-1BE0-4934-8911-2A82243F8D81"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32:rc8:*:*:*:*:*:*", "cpeNameId": "6C925EB0-C9E7-4EDB-95A6-F44F0C3DD41D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.1:*:*:*:*:*:*:*", "cpeNameId": "7E7F5713-0396-4642-A4BA-CF19784AA92C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.2:*:*:*:*:*:*:*", "cpeNameId": "60F9012F-E04C-4114-AEDF-ED120B492993"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.3:*:*:*:*:*:*:*", "cpeNameId": "6BCC7080-4892-4BD1-A995-E81BEECC4532"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.4:*:*:*:*:*:*:*", "cpeNameId": "F011FFE9-8D65-4A60-AC17-8594D2945D9A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.5:*:*:*:*:*:*:*", "cpeNameId": "BB42DBF5-C816-4416-A89B-4A8E014AFFCB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.6:*:*:*:*:*:*:*", "cpeNameId": "E21ADCCB-8C05-4587-AAB0-A3FB9CB217B6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.7:*:*:*:*:*:*:*", "cpeNameId": "9F8F82AB-1FAD-4F64-808F-9BE482083837"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.8:*:*:*:*:*:*:*", "cpeNameId": "3C3C359B-1945-480D-A418-49BB5A98D4AF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.9:*:*:*:*:*:*:*", "cpeNameId": "8C4BBF9A-4D46-4E0B-9EB9-F232E3C850C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.10:*:*:*:*:*:*:*", "cpeNameId": "5BBB66FB-CC1C-4D83-8E12-395E1F9A224E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.11:*:*:*:*:*:*:*", "cpeNameId": "46F85D55-61F7-4133-8285-476B2B9502E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.12:*:*:*:*:*:*:*", "cpeNameId": "9FD63890-5E2D-4B82-AF8E-D694E734B255"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.13:*:*:*:*:*:*:*", "cpeNameId": "F763CEB2-BAD5-49B1-8A1C-4822499EFF4C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.14:*:*:*:*:*:*:*", "cpeNameId": "D8295337-F7C6-4A82-8E4A-D94D92DDB8CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.15:*:*:*:*:*:*:*", "cpeNameId": "88A39279-E679-413F-83EB-AEEC45FC635C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.16:*:*:*:*:*:*:*", "cpeNameId": "FDCB43C3-EED0-41DA-AEC7-DACF6C89D76B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.17:*:*:*:*:*:*:*", "cpeNameId": "04710DDC-353D-41C7-B64B-66947FAD65A5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.18:*:*:*:*:*:*:*", "cpeNameId": "E64C2B5B-8700-4F0F-A4F5-9947E078D4AD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.19:*:*:*:*:*:*:*", "cpeNameId": "A8E4C5F1-1E45-4E5B-9A6F-0DEE81FA9579"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.20:*:*:*:*:*:*:*", "cpeNameId": "0D0CF31A-64CE-4735-BFAE-3943C70868D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.21:*:*:*:*:*:*:*", "cpeNameId": "1A7F67CF-CA68-4EB4-972D-B4D77951FE8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.22:*:*:*:*:*:*:*", "cpeNameId": "F82E1D4E-F3A0-49CB-9ACA-DD50AAF65450"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.23:*:*:*:*:*:*:*", "cpeNameId": "7342B377-1EB4-4FEF-858E-FD01F39D028E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.24:*:*:*:*:*:*:*", "cpeNameId": "23A18BF8-F590-4E19-90F9-689A19F93D18"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.25:*:*:*:*:*:*:*", "cpeNameId": "DC29FE99-8420-4B3D-8422-71F239A8C83E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.26:*:*:*:*:*:*:*", "cpeNameId": "BFBADBE1-D59E-4AD6-8E51-D7819A06D11F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.27:*:*:*:*:*:*:*", "cpeNameId": "C72A0E7B-F4F7-47B5-8511-E82D0777CA59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.28:*:*:*:*:*:*:*", "cpeNameId": "B548C6E1-EBAA-4EC2-A5D8-CB65CCC0EA8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.29:*:*:*:*:*:*:*", "cpeNameId": "B3F260A1-6E92-4667-9576-FD6D42D98BF6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.30:*:*:*:*:*:*:*", "cpeNameId": "4D80339B-16C2-4099-B28D-F260ECCE66FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.31:*:*:*:*:*:*:*", "cpeNameId": "EF2DDA37-C9D0-499E-A22D-6002B7118796"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.32:*:*:*:*:*:*:*", "cpeNameId": "71898FCF-4471-4ED7-A1C2-7E657F50710C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.33:*:*:*:*:*:*:*", "cpeNameId": "ABCF5DCE-21E4-4FD3-8A99-8A187EC8268E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.33:test79:*:*:*:*:*:*", "cpeNameId": "CB1C0DE5-7A2E-4DD6-B809-114AE40251E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.34:*:*:*:*:*:*:*", "cpeNameId": "0A52F791-A986-4DDE-8EB9-DE44E056410C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.35:*:*:*:*:*:*:*", "cpeNameId": "0CD77DA5-2E91-4A98-B94C-0EEC06B93BFB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.36:*:*:*:*:*:*:*", "cpeNameId": "059A6461-4777-4A16-B2CE-98794F9370BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.37:*:*:*:*:*:*:*", "cpeNameId": "C04C8FF7-673B-4326-97CA-127564571C7C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.38:*:*:*:*:*:*:*", "cpeNameId": "4ACEECFB-4647-4204-AF6C-8317420C1943"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.39:*:*:*:*:*:*:*", "cpeNameId": "45BD9A96-7AA7-4CD6-AEF3-73C461EB633D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.40:*:*:*:*:*:*:*", "cpeNameId": "A8F94D8A-3C55-432D-A3BC-4F09725F35F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.41:*:*:*:*:*:*:*", "cpeNameId": "17703EB7-F195-49A7-B2DC-73E8431672D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.42:*:*:*:*:*:*:*", "cpeNameId": "764E27F8-EE1F-48CE-BFAA-F9DE29531A7D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.43:*:*:*:*:*:*:*", "cpeNameId": "E37D2797-038C-43F2-ABD4-AEF8F4CF2781"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.44:*:*:*:*:*:*:*", "cpeNameId": "F9CBC127-2CFB-4CC0-881F-58479DC3E9AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.45:*:*:*:*:*:*:*", "cpeNameId": "76DC87BF-E081-4C85-985B-A093A5C6AB98"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.46:*:*:*:*:*:*:*", "cpeNameId": "299AA2FA-C7C3-41B3-8C3B-E75092F52BD9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.47:*:*:*:*:*:*:*", "cpeNameId": "47F5C2B8-EEC2-469B-A01A-BB00F5450C75"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.48:*:*:*:*:*:*:*", "cpeNameId": "B3E73505-8209-495A-9B0B-5D15428E66A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.49:*:*:*:*:*:*:*", "cpeNameId": "51B8B995-D654-4877-A0F7-0649088750CC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.50:*:*:*:*:*:*:*", "cpeNameId": "59AF4A34-971B-41A5-A770-6C86DD6957C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.51:*:*:*:*:*:*:*", "cpeNameId": "0EBDC718-939A-4757-976B-6B015E2AE6D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.52:*:*:*:*:*:*:*", "cpeNameId": "7E9C15D4-1CEB-4FB1-A2E4-8D2D89A8968E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.53:*:*:*:*:*:*:*", "cpeNameId": "0939267C-0008-4970-B859-160FC265AA06"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.54:*:*:*:*:*:*:*", "cpeNameId": "6E1000E5-2C6E-485A-BDF5-693A60BF4D43"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.55:*:*:*:*:*:*:*", "cpeNameId": "71E7147B-F66E-453D-8340-848308CE841D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.56:*:*:*:*:*:*:*", "cpeNameId": "1A5F1F56-5613-46C8-A3C3-F52829AF2CB4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.57:*:*:*:*:*:*:*", "cpeNameId": "BFA176A4-D5D3-4D24-9490-6C1623EC09D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.58:*:*:*:*:*:*:*", "cpeNameId": "ED63AF7E-181E-4D8B-A93C-CD0A23F5D3AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33:*:*:*:*:*:*:*", "cpeNameId": "E0701937-B1E4-449C-8EDA-C25CF3CA068F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33:-:*:*:*:*:*:*", "cpeNameId": "41F18F48-7992-41E5-8E90-6699F61D402D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc1:*:*:*:*:*:*", "cpeNameId": "5DCECCE8-92EF-49BC-BC1B-491072D123D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc2:*:*:*:*:*:*", "cpeNameId": "28A987BC-7671-4454-961E-6FE744AE74AA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc3:*:*:*:*:*:*", "cpeNameId": "8DDB9D41-21A0-465E-B133-6C597CBF9536"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc4:*:*:*:*:*:*", "cpeNameId": "7E2C2957-3552-4DE7-B7E2-EED2BC12C6BF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc5:*:*:*:*:*:*", "cpeNameId": "0F35C08D-FD70-477B-8AD4-2BECB5328FA8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc6:*:*:*:*:*:*", "cpeNameId": "8B5C3794-D0A5-4955-A170-7C2549237C8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc7:*:*:*:*:*:*", "cpeNameId": "40FEA887-02C4-4C93-B63E-05D8BEA89FC1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc8:*:*:*:*:*:*", "cpeNameId": "A373875A-99F2-45FD-809D-D7C560688B99"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33.1:*:*:*:*:*:*:*", "cpeNameId": "FFB81A8B-9955-4803-B1AD-A238AB44F5A6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33.2:*:*:*:*:*:*:*", "cpeNameId": "2AA52B35-4765-49A9-8C1D-EE35B9861716"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33.3:*:*:*:*:*:*:*", "cpeNameId": "CB193280-16DB-466F-AA85-769366BFF06F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33.4:*:*:*:*:*:*:*", "cpeNameId": "AD765585-16C1-40BA-8D46-39F9229BF863"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33.5:*:*:*:*:*:*:*", "cpeNameId": "DB2393AC-C887-4E7A-B0B8-48F8995F00C7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33.6:*:*:*:*:*:*:*", "cpeNameId": "3AE609BD-09AC-4CF9-ACF2-5C523C508BDD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33.7:*:*:*:*:*:*:*", "cpeNameId": "F8863509-1699-46F8-AE0E-FA196D38FA70"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33.7:*:*:*:*:*:x86:*", "cpeNameId": "ABC7C1CB-8C78-442B-B917-372CFABA6899"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33.8:*:*:*:*:*:*:*", "cpeNameId": "9E8CB108-0630-4678-A138-558509FD4087"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33.9:*:*:*:*:*:*:*", "cpeNameId": "F749DFD5-086A-4420-A76D-1A02A09224A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33.10:*:*:*:*:*:*:*", "cpeNameId": "2B423029-28A5-436B-81E4-84BC4226DE6B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33.11:*:*:*:*:*:*:*", "cpeNameId": "6C06B714-F720-44C5-AB3D-E8FFC014D79E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33.12:*:*:*:*:*:*:*", "cpeNameId": "6E00BCAA-1C2E-4765-B0D1-0F0DAA9DD746"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33.13:*:*:*:*:*:*:*", "cpeNameId": "C09CD363-0B8A-4D46-B742-52A182D62DDB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33.14:*:*:*:*:*:*:*", "cpeNameId": "A3C0F51F-B47B-4939-9DE7-852BF0BA1DDA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33.15:*:*:*:*:*:*:*", "cpeNameId": "D3406D47-E643-45EA-938E-6237D7A796BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33.16:*:*:*:*:*:*:*", "cpeNameId": "0B989579-A07D-4FC4-A935-095269100AF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33.17:*:*:*:*:*:*:*", "cpeNameId": "37D4AC37-54BB-4243-B356-FD488E8E6AF7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33.18:*:*:*:*:*:*:*", "cpeNameId": "BE1B43E6-4E25-4B12-95B3-0959361E32F7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33.19:*:*:*:*:*:*:*", "cpeNameId": "C748F822-D4CF-4F3E-BBAA-9B7D191CB1E3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33.20:*:*:*:*:*:*:*", "cpeNameId": "16472F93-3A43-4ED4-A861-77E57C93FBAF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.34:*:*:*:*:*:*:*", "cpeNameId": "6E64BEEE-7AE2-41BC-9352-29FEB574E415"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.34:-:*:*:*:*:*:*", "cpeNameId": "B5624367-44EC-4607-9C48-9401AB9BBF9C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.34:rc1:*:*:*:*:*:*", "cpeNameId": "D8193475-2448-4475-86F0-350A9B00B0B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.34:rc2:*:*:*:*:*:*", "cpeNameId": "78583118-0C98-4634-81DB-257595D06332"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.34:rc3:*:*:*:*:*:*", "cpeNameId": "CA50680B-2826-4A93-96B3-27C6EE324433"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.34:rc4:*:*:*:*:*:*", "cpeNameId": "1573078B-0CBB-4B33-9C05-10E56B15C607"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.34:rc5:*:*:*:*:*:*", "cpeNameId": "AD966433-4E32-45DD-92FA-B11DF3D2039F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.34:rc6:*:*:*:*:*:*", "cpeNameId": "F3A17922-41D4-4885-8193-EE39C8A4DDD8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.34:rc7:*:*:*:*:*:*", "cpeNameId": "27A6BFE5-0DB4-41C2-991B-96E9B0746644"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.34.1:*:*:*:*:*:*:*", "cpeNameId": "97A96C2A-73E2-4A41-BFF9-36BA519F3887"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.34.2:*:*:*:*:*:*:*", "cpeNameId": "F2D9B0C3-4B00-4248-897E-6A1EB2432140"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.34.3:*:*:*:*:*:*:*", "cpeNameId": "E2B4241F-3464-46FC-9E4E-2AD9DDF8D3D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.34.4:*:*:*:*:*:*:*", "cpeNameId": "3C6AA2DA-DE73-4F04-BFB2-FC7A674C0E90"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.34.5:*:*:*:*:*:*:*", "cpeNameId": "F0D5F1A7-EA09-4F2D-AD13-8F683BA19114"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.34.6:*:*:*:*:*:*:*", "cpeNameId": "015FF8C4-4BD7-4F72-88C7-A10DFB459C9A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.34.7:*:*:*:*:*:*:*", "cpeNameId": "D246A09B-5EFA-4F8D-9F6B-A60F84CC1428"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.34.8:*:*:*:*:*:*:*", "cpeNameId": "0A842E50-77B3-4A6B-BD93-3EF41DFACAFB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.34.9:*:*:*:*:*:*:*", "cpeNameId": "EF373871-65CA-4495-A51E-9026A9037344"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.34.10:*:*:*:*:*:*:*", "cpeNameId": "495D4681-BB0F-49DA-A9E0-3B0F970522DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.35:*:*:*:*:*:*:*", "cpeNameId": "A5F1F57E-F1B3-439E-B8D7-D4118D46DFF3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.35:-:*:*:*:*:*:*", "cpeNameId": "F279C1AF-6DC6-4B6F-81E7-24B7FF90F2B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.35:rc1:*:*:*:*:*:*", "cpeNameId": "024E1EE8-95FC-4A51-BEDB-2182FE911FF4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.35:rc2:*:*:*:*:*:*", "cpeNameId": "5278D3A0-4EA0-463B-96D7-4DCC6DBF28B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.35:rc3:*:*:*:*:*:*", "cpeNameId": "E185549B-194C-4EB9-BB68-6D905CC754E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.35:rc4:*:*:*:*:*:*", "cpeNameId": "D0377D96-70CB-4FD4-B636-8AA945CF59C4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.35:rc5:*:*:*:*:*:*", "cpeNameId": "4FDA4A38-3B43-4F5A-9D27-8D2E8B947AD4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.35:rc6:*:*:*:*:*:*", "cpeNameId": "C22C75EC-2543-4E16-ABC8-F6633D8EB370"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.35.1:*:*:*:*:*:*:*", "cpeNameId": "59C4690C-390B-4D06-89BF-6031625EBAC6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.35.2:*:*:*:*:*:*:*", "cpeNameId": "7AFD2340-F190-4D3A-87C2-57E0E9093C41"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.35.3:*:*:*:*:*:*:*", "cpeNameId": "6CD6AE2D-F61F-4302-B88B-F66AD2D1167C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.35.4:*:*:*:*:*:*:*", "cpeNameId": "28B843FE-6F22-4A60-8B3E-2C0FA9EE29B6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.35.5:*:*:*:*:*:*:*", "cpeNameId": "8021995C-3681-4250-B6D6-5790663141DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.35.6:*:*:*:*:*:*:*", "cpeNameId": "0EC27DC3-B64F-4700-89C2-6CB7852F3B2B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.35.7:*:*:*:*:*:*:*", "cpeNameId": "A968AAD3-4259-4AAC-B27F-382B3385104B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.35.8:*:*:*:*:*:*:*", "cpeNameId": "57F231B2-7C02-403E-AC95-4F727EA3748E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.35.9:*:*:*:*:*:*:*", "cpeNameId": "D019B25B-C8C6-4FE1-94EF-6877DA90A629"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.35.10:*:*:*:*:*:*:*", "cpeNameId": "D8517CE5-5BDC-41FB-B86D-CCE2B8B9915F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.35.11:*:*:*:*:*:*:*", "cpeNameId": "F9324485-6097-467A-B22D-A8A8D68AFC60"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.35.12:*:*:*:*:*:*:*", "cpeNameId": "879A4E34-755F-4598-BCA5-D19C1E16617F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.35.13:*:*:*:*:*:*:*", "cpeNameId": "A14B3A65-4CF4-4DCC-8215-713F5BD54535"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.36:*:*:*:*:*:*:*", "cpeNameId": "830D5BE4-4429-4714-A820-D84A2D25E32E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.36:*:*:*:*:*:x64:*", "cpeNameId": "036A181A-AD95-4FD3-9860-85D95628861B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*", "cpeNameId": "0CCF1BAF-FDB8-4FAA-9CE7-9C696FE11EE6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*", "cpeNameId": "D933A11A-5D47-431A-9D07-6339FC545A8B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*", "cpeNameId": "BC4D0D78-E5E9-433E-AB14-36F55BAB1602"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*", "cpeNameId": "6D2D72E8-F623-45BB-A5EF-58806425F3E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*", "cpeNameId": "24696EA9-A364-4C08-B92C-E5A1E0E1075E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc5:*:*:*:*:*:*", "cpeNameId": "987D78AB-C6DD-405D-BA79-53689E0FEEC6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc6:*:*:*:*:*:*", "cpeNameId": "226F03E7-D1F4-45C2-B35A-5E6613A863BF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc7:*:*:*:*:*:*", "cpeNameId": "AA146A8B-3E23-458C-BA2C-7EEA7379042D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc8:*:*:*:*:*:*", "cpeNameId": "3C8FDDB9-496F-474B-AFA6-15F23FD5B5D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.36.1:*:*:*:*:*:*:*", "cpeNameId": "3D342653-002E-4305-84FB-FA98B7DF4588"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.36.1:*:*:*:*:*:x64:*", "cpeNameId": "2D224F8D-EA22-42EA-B8D7-5C6462F94F27"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.36.2:*:*:*:*:*:*:*", "cpeNameId": "578EEDCA-EC5F-4BF6-BD7F-D2C6C4AC57D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.36.2:*:*:*:*:*:x64:*", "cpeNameId": "D61E8A48-0014-416B-B3EC-229851F5F18E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.36.3:*:*:*:*:*:*:*", "cpeNameId": "833EC004-4D2B-4116-86C2-5D15F8C8234E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.36.4:*:*:*:*:*:*:*", "cpeNameId": "263852AE-50D9-4799-99FF-BF35AE06DA89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.37:*:*:*:*:*:*:*", "cpeNameId": "51A27A7D-C66E-4F9C-ABD0-F05198094D4B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*", "cpeNameId": "6EF76427-A8DC-4389-89A7-77E6A37822D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*", "cpeNameId": "CA385F2E-576D-49E3-AF29-8C18439233C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.37:rc2:*:*:*:*:*:*", "cpeNameId": "C7BC3820-42F5-44C8-B6BA-44685480B6FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.37:rc3:*:*:*:*:*:*", "cpeNameId": "888640C2-0A06-4E8D-BB58-3D7AF6F5EC6F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.37:rc4:*:*:*:*:*:*", "cpeNameId": "79FCA534-4DC0-4DA6-ACBF-4FC4998E7271"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.37:rc5:*:*:*:*:*:*", "cpeNameId": "8A73C3C8-D274-4780-82F7-37D801BF75F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.37:rc6:*:*:*:*:*:*", "cpeNameId": "ADB81B14-8E7F-4512-B94C-D020BF470A15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.37:rc7:*:*:*:*:*:*", "cpeNameId": "56258E42-3491-478B-8B36-8E5F7D50002E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.37:rc8:*:*:*:*:*:*", "cpeNameId": "7BF68433-6DEA-4AC3-8B7F-3B4F35C0D34A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.37.1:*:*:*:*:*:*:*", "cpeNameId": "89A6D27B-7A4D-4040-AAF2-984217F868CC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.37.2:*:*:*:*:*:*:*", "cpeNameId": "7CF2F010-7A5C-4B42-99CC-393BFB3137C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.37.3:*:*:*:*:*:*:*", "cpeNameId": "EE97F688-74A3-484A-9506-FBD006E43AC0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.37.4:*:*:*:*:*:*:*", "cpeNameId": "8939F2F9-9D6C-4933-8CC3-4D50A911A1F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.37.4:test14:*:*:*:*:*:*", "cpeNameId": "5CE81605-02FE-493E-8BDD-457648A206BA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.37.5:*:*:*:*:*:*:*", "cpeNameId": "3DACF4FD-898D-4D39-9439-20FF60985681"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.37.6:*:*:*:*:*:*:*", "cpeNameId": "1B9F51E7-5995-482F-A894-2DAEF202563A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.38:*:*:*:*:*:*:*", "cpeNameId": "B4588F83-FDA5-4BEE-8D33-CBAED99B1B3A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*", "cpeNameId": "7BC2979D-B277-4B3C-8AA3-84D988C1DB2A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*", "cpeNameId": "21E10EBE-70A5-4FD6-BA60-5EEE8C7F306E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.38:rc2:*:*:*:*:*:*", "cpeNameId": "63217640-5D4D-4A82-BFF7-EB376DBC124B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.38:rc3:*:*:*:*:*:*", "cpeNameId": "D6395AAF-8E1A-47C1-8C64-721CDBBB5418"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.38:rc4:*:*:*:*:*:*", "cpeNameId": "1C43D8BF-5A1A-4BDC-8FC9-D9C2A50608AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.38:rc5:*:*:*:*:*:*", "cpeNameId": "4F8C1BDE-4C9F-44A1-BB67-8B621C3C1432"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.38:rc6:*:*:*:*:*:*", "cpeNameId": "C875E3E4-2012-49F2-AA84-110E27576719"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.38:rc7:*:*:*:*:*:*", "cpeNameId": "A9FB268C-B873-4E21-879F-16DCBD5F6D3C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.38:rc8:*:*:*:*:*:*", "cpeNameId": "F54E1625-1EC6-45E7-8099-F0A18592EBD3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.38:test3:*:*:*:*:*:*", "cpeNameId": "6D866502-1259-42AD-A786-E41F6234FCDD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.38.1:*:*:*:*:*:*:*", "cpeNameId": "5D9A8D8A-E080-4EF7-A1C9-19BF64815CBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.38.2:*:*:*:*:*:*:*", "cpeNameId": "74026282-35D2-48B4-A821-66F3E9564750"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.38.3:*:*:*:*:*:*:*", "cpeNameId": "5B670C64-4EB7-48B1-9810-06DE4798A3F7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.38.4:*:*:*:*:*:*:*", "cpeNameId": "0E41F19F-6411-4FC5-BED6-A029C21E58F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.38.5:*:*:*:*:*:*:*", "cpeNameId": "9159401B-4BF5-4106-9B5A-522551978E46"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.38.6:*:*:*:*:*:*:*", "cpeNameId": "DBE2FFB6-D82B-4045-914E-59C2DC1C238C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.38.7:*:*:*:*:*:*:*", "cpeNameId": "59F0A69D-4B11-4976-9A8D-58E345421F41"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.38.8:*:*:*:*:*:*:*", "cpeNameId": "BC1799E7-0FFC-4A6D-9BDB-76D8549892EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.39:*:*:*:*:*:*:*", "cpeNameId": "D04C0ECE-DEFE-419B-85AA-F4B66284EA8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.39:-:*:*:*:*:*:*", "cpeNameId": "16E725A7-CC6E-43DF-8E88-D8C367279563"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.39:rc1:*:*:*:*:*:*", "cpeNameId": "8B8C2DCD-9CA5-402E-A242-64088376BE2C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.39:rc2:*:*:*:*:*:*", "cpeNameId": "FD737D2A-CEE3-49C7-8143-4EC50473F72B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.39:rc3:*:*:*:*:*:*", "cpeNameId": "E7064488-FFA2-4EF4-A4C2-111B4A2E4B68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.39:rc4:*:*:*:*:*:*", "cpeNameId": "9C245568-B83F-484E-89D2-C89506EB980E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.39:rc5:*:*:*:*:*:*", "cpeNameId": "442C4D3F-52DB-454B-A1FB-DE2ED005A059"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.39:rc6:*:*:*:*:*:*", "cpeNameId": "7329DBC0-CA51-46AE-AEA6-1C011EEDB7AA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.39:rc7:*:*:*:*:*:*", "cpeNameId": "DFDCDF61-299F-46F2-8B6E-DE8D022B99DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.39.1:*:*:*:*:*:*:*", "cpeNameId": "41589B0B-633E-4F26-AF4B-0A00EBE66C73"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.39.2:*:*:*:*:*:*:*", "cpeNameId": "BE8F0727-B5BD-40A5-BC56-3BAF281669D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.39.3:*:*:*:*:*:*:*", "cpeNameId": "85836889-D29B-4265-8509-4B356A3E0208"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.39.4:*:*:*:*:*:*:*", "cpeNameId": "D3F85891-4741-40CB-9CA3-B1630B886CFB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.7:*:*:*:*:*:*:*", "cpeNameId": "7EE48E7B-E04C-4947-8809-94455D5A6672"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.16.12:*:*:*:*:*:*:*", "cpeNameId": "5BDDD34D-C7A6-475A-A6B6-4217F2317262"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0:*:*:*:*:*:*:*", "cpeNameId": "E675CA19-0205-4D08-AD72-56813FC90E70"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0:-:*:*:*:*:*:*", "cpeNameId": "7378F6A7-89A4-4C9A-A54E-19252CD12A29"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*", "cpeNameId": "2C4825EF-D76D-4B26-9063-D92A4AB559D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*", "cpeNameId": "40C9F38D-6AF4-4F10-B006-CB1752879625"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0:rc3:*:*:*:*:*:*", "cpeNameId": "585940B2-EA29-4B97-BA4F-61B097C6CBEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0:rc4:*:*:*:*:*:*", "cpeNameId": "02128A6F-BD25-4C7E-96B0-E934E0800527"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0:rc5:*:*:*:*:*:*", "cpeNameId": "E3D54552-B5F7-483A-B434-50876D8BE038"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0:rc6:*:*:*:*:*:*", "cpeNameId": "7917FAA4-F74F-4EC3-8EFA-45271A7CB611"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0:rc7:*:*:*:*:*:*", "cpeNameId": "6705E5DC-2EA5-4339-A661-2FA31705DE42"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.0:*:*:*:*:*:*:*", "cpeNameId": "65A07F88-5A18-4758-8009-E7B920F40BB4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*", "cpeNameId": "19D521AB-0EC6-4522-B370-D65784E91786"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*", "cpeNameId": "11C5EA6B-3069-4756-8EB0-672A731B7AC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*", "cpeNameId": "CC519536-8DA7-4EC5-B61C-8681F99ACE91"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*", "cpeNameId": "4BCDC685-168E-45BA-B094-60AA9C952B59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*", "cpeNameId": "6207B1AE-0269-4BD5-BDA7-AA74F02D1FB5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*", "cpeNameId": "AA42AD78-B3F2-4383-B9C9-A1B638311A42"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*", "cpeNameId": "41480C9A-E551-486E-93FF-6A29A22BAAD1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*", "cpeNameId": "13AA137D-8350-44EC-8441-5BB5718682B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*", "cpeNameId": "1D9B8597-0D82-4787-8645-DE471DEFD11E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*", "cpeNameId": "87DFB95C-8CFD-42A1-BA96-FFEACF82588D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*", "cpeNameId": "45A9FDEE-219A-4C1D-8655-C2CFC646F7F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*", "cpeNameId": "403E8590-8BD5-4AAB-98B2-AAB85799E004"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*", "cpeNameId": "69DAA3C2-5DA7-4095-9494-EB95050D5C17"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*", "cpeNameId": "BF6CEA34-C360-46CC-A019-17C97110AB54"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*", "cpeNameId": "79AD64FE-8BBF-4223-8681-058D2C8372AD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*", "cpeNameId": "FC822FF0-8BBB-401D-809A-C21A970BEC3A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*", "cpeNameId": "8844B560-DA2A-4108-A9AB-EFF569DA827D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*", "cpeNameId": "9E7DCDFE-98E8-4B87-B7CF-588CA714E476"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*", "cpeNameId": "409F6C37-8840-46DD-85DB-41DF168EC50A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*", "cpeNameId": "F3EC1D7C-D551-4FE4-9D6C-F8DB800AD02A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*", "cpeNameId": "FBE11D30-3565-49A0-8FF6-5BE71775F59C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*", "cpeNameId": "F9C36003-FBD9-475C-80D6-50D950056F4C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*", "cpeNameId": "EC17CEC8-28AC-4AFA-BFCF-DB36D66DA96B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*", "cpeNameId": "45388B7F-6654-4BB0-9930-988F4074353C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*", "cpeNameId": "4863743C-6FAB-47B3-BD7E-02C91AD2F40A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*", "cpeNameId": "F9657A59-9283-4F6E-B331-BCB73DC618F4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*", "cpeNameId": "0FA42FBB-5EC9-4ACB-A6D9-3766140F1D71"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*", "cpeNameId": "4320A7E1-30F3-427F-97C3-F4367D341803"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*", "cpeNameId": "1B337381-F959-4399-A5F5-F0E8B61CDC14"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*", "cpeNameId": "2EE72F21-D55D-480B-9451-5E6BDF5E931C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*", "cpeNameId": "A77A6813-5267-4B56-941D-CC457FFDAE51"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*", "cpeNameId": "B834EA7C-1F83-41D8-B294-4D20D4FCDCCB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*", "cpeNameId": "436BC3D4-9452-4850-8FBE-347D8E07B15E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*", "cpeNameId": "3EF9D92E-9A9C-4853-904F-F0631D5A252D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.35:*:*:*:*:*:*:*", "cpeNameId": "02EDAB5F-5D03-47DD-9DE1-6ECACD88C6D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.36:*:*:*:*:*:*:*", "cpeNameId": "6A091D60-9CFD-444F-8A1E-5EE48F65D9B1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.37:*:*:*:*:*:*:*", "cpeNameId": "C151F6F7-9640-42E1-A90D-005D6A2DA4E5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.38:*:*:*:*:*:*:*", "cpeNameId": "441BF329-7728-4258-BC0F-1F862629857E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.39:*:*:*:*:*:*:*", "cpeNameId": "F469D65B-5013-4D44-97C6-6836DACD09F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.40:*:*:*:*:*:*:*", "cpeNameId": "C2ADD944-42AB-4840-8900-090BE1CF7E75"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.41:*:*:*:*:*:*:*", "cpeNameId": "FD8DB916-9217-43FE-9E10-09CB422FED1D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.42:*:*:*:*:*:*:*", "cpeNameId": "B373C2B9-8D11-424F-B2DB-96D87E0EE182"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.43:*:*:*:*:*:*:*", "cpeNameId": "63577543-E0B1-4295-83BA-AEC0CFE2CA67"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.44:*:*:*:*:*:*:*", "cpeNameId": "22C0156C-FD96-419C-B32B-B7094E00E141"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.45:*:*:*:*:*:*:*", "cpeNameId": "0C86BCD6-2EBB-4DA8-9FE6-B66F1D0F5C66"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.46:*:*:*:*:*:*:*", "cpeNameId": "70E25B32-6AD5-4801-93A2-B16A871A102C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.47:*:*:*:*:*:*:*", "cpeNameId": "40D74137-22F3-4AE3-AD16-2E83858740D7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.48:*:*:*:*:*:*:*", "cpeNameId": "7FAE531F-6ADB-4A5B-AD4D-C95BD3ADE7E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.49:*:*:*:*:*:*:*", "cpeNameId": "DB682532-CEBA-4F65-8A1F-8A5ADA6C1868"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.50:*:*:*:*:*:*:*", "cpeNameId": "7B38EDFF-EE60-42D1-B149-1726A0995C75"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.51:*:*:*:*:*:*:*", "cpeNameId": "8208AC95-1E18-4994-87B1-5FABA1C6DCC6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.52:*:*:*:*:*:*:*", "cpeNameId": "1292E697-8D68-493E-BC7E-A26C01903831"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.53:*:*:*:*:*:*:*", "cpeNameId": "989B896A-4115-40C8-8AF9-1A3C764C5FB4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.54:*:*:*:*:*:*:*", "cpeNameId": "0522C8A4-4663-4F43-AAAF-86074AA109F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.55:*:*:*:*:*:*:*", "cpeNameId": "7C1D5397-712D-4969-85F6-687827706FC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.56:*:*:*:*:*:*:*", "cpeNameId": "C2EA4C85-8FB2-4652-8896-1F80CA69B4CC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.57:*:*:*:*:*:*:*", "cpeNameId": "D62265EA-FE33-4366-AC2E-60EF6D2D844A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.58:*:*:*:*:*:*:*", "cpeNameId": "BD449DB4-A455-4DAA-9A5A-15C5C214E0E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.59:*:*:*:*:*:*:*", "cpeNameId": "2C207BA3-3196-4162-A095-1BF15C1A40C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.60:*:*:*:*:*:*:*", "cpeNameId": "6B52552D-E347-45FE-94C5-06CAF93047CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.61:*:*:*:*:*:*:*", "cpeNameId": "BA7D8FCF-CEFA-479A-AC26-E0C3E6B7F41F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.62:*:*:*:*:*:*:*", "cpeNameId": "831D56C8-73FC-4AB7-B0AE-6E97F2B6DEE8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.63:*:*:*:*:*:*:*", "cpeNameId": "92718423-DB5F-43F8-B50E-5A152FEB539C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.64:*:*:*:*:*:*:*", "cpeNameId": "8A1828A7-EA44-44CC-8B84-9AF45830D686"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.65:*:*:*:*:*:*:*", "cpeNameId": "5FADB7C1-8112-496C-91E4-8E433134A897"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.66:*:*:*:*:*:*:*", "cpeNameId": "70E429A5-8718-4201-8FA1-647CF2124B22"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.67:*:*:*:*:*:*:*", "cpeNameId": "4EE9D2D4-E60A-4B7C-AF46-939730C93FF7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.68:*:*:*:*:*:*:*", "cpeNameId": "7E91D5E5-AE29-4D71-B3DA-1DD89AEACFE6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.69:*:*:*:*:*:*:*", "cpeNameId": "2947D661-699F-428E-B711-88005A7133C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.70:*:*:*:*:*:*:*", "cpeNameId": "67B242CD-5A0E-495E-9144-297D99750A21"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.71:*:*:*:*:*:*:*", "cpeNameId": "628147F9-08F1-4660-A2BA-A56A13027ABE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.72:*:*:*:*:*:*:*", "cpeNameId": "FB49D42B-1F6C-4E5A-B4D2-848B86BD6415"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.73:*:*:*:*:*:*:*", "cpeNameId": "232E9DEE-969C-429A-8F35-E2BF995E5D9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.74:*:*:*:*:*:*:*", "cpeNameId": "E99EC0F2-5BC3-4E91-A664-08C56D488D65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.75:*:*:*:*:*:*:*", "cpeNameId": "CEB2EFD5-48BD-4F69-B231-B7833D4BF597"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.76:*:*:*:*:*:*:*", "cpeNameId": "3796A094-63F8-44FB-9A81-94D6C5CDE459"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.77:*:*:*:*:*:*:*", "cpeNameId": "A7A8A856-5781-4BBA-8329-FA71DCD6129B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.78:*:*:*:*:*:*:*", "cpeNameId": "68747D1F-FA23-444F-9602-07694CF7C245"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.79:*:*:*:*:*:*:*", "cpeNameId": "AF9BBD94-2571-45AF-98FA-7C1F9E48B476"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.80:*:*:*:*:*:*:*", "cpeNameId": "6100C07E-82B6-4EFC-B7E3-42E13A5EDFB9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.81:*:*:*:*:*:*:*", "cpeNameId": "721BA4C3-5D58-46D7-AFA7-CF4AFB5922E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.82:*:*:*:*:*:*:*", "cpeNameId": "15CAC92C-9CCE-408D-8E54-784800BE06A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.83:*:*:*:*:*:*:*", "cpeNameId": "2826A327-2B91-46DF-97AD-617D889DC5B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.84:*:*:*:*:*:*:*", "cpeNameId": "6419F315-F012-47BE-B150-600BDF5DAB5F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.85:*:*:*:*:*:*:*", "cpeNameId": "E42EB24B-5E95-482D-8606-3B68612956B6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.86:*:*:*:*:*:*:*", "cpeNameId": "2ADA9A58-7414-48C0-8E14-C4C52867BDBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.87:*:*:*:*:*:*:*", "cpeNameId": "88328D39-6E68-4A6B-96CD-8AF0DBC12851"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.88:*:*:*:*:*:*:*", "cpeNameId": "C7C076EB-891E-4BBF-A97B-4A77D39AC9D6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.89:*:*:*:*:*:*:*", "cpeNameId": "D2A0C560-0D1E-4D5C-A332-8CD32DF1C1D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.90:*:*:*:*:*:*:*", "cpeNameId": "744B6D49-F611-44B4-B39A-C204D21E3242"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.91:*:*:*:*:*:*:*", "cpeNameId": "725F0655-1AC5-4187-A185-FFC269DE6FEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.92:*:*:*:*:*:*:*", "cpeNameId": "F7187593-4AED-4E10-92E9-6D3F82DD8579"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.93:*:*:*:*:*:*:*", "cpeNameId": "76399886-4A4B-44BF-8E93-0B92F48C99C5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.94:*:*:*:*:*:*:*", "cpeNameId": "A3024F96-1973-43A6-A7FD-43343CF76EB6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.95:*:*:*:*:*:*:*", "cpeNameId": "690FFA55-4453-4857-91C2-0D88810A66DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.96:*:*:*:*:*:*:*", "cpeNameId": "3A1ABD5D-BAD9-44B6-A0D4-1344F61E77DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.97:*:*:*:*:*:*:*", "cpeNameId": "71A37886-3645-4B90-9390-6CAF4FE60D6A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.98:*:*:*:*:*:*:*", "cpeNameId": "D45B1D79-B01F-4320-9848-84F9EB4FE9AF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.99:*:*:*:*:*:*:*", "cpeNameId": "EC8D5342-4755-4A6D-BA20-77E5F5370DEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.100:*:*:*:*:*:*:*", "cpeNameId": "F5951A11-6C81-4D3B-91BE-5CE7330BB269"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.101:*:*:*:*:*:*:*", "cpeNameId": "D8180B1F-6D3F-4CB6-9A15-24563250EBB7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.1:*:*:*:*:*:*:*", "cpeNameId": "1A99542D-BF2C-4927-A675-45A94E909357"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.1:-:*:*:*:*:*:*", "cpeNameId": "8DCEFDB7-A0F1-4A58-B4F7-E4938647D892"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.1:rc1:*:*:*:*:*:*", "cpeNameId": "717D6C63-BFAA-4E03-9B6B-15AAC4F9407E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.1:rc2:*:*:*:*:*:*", "cpeNameId": "7313BBA3-2A42-4FE2-A6BB-65365FE1CF07"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.1:rc3:*:*:*:*:*:*", "cpeNameId": "48093C34-2181-4EAB-A2B4-591509C094FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.1:rc4:*:*:*:*:*:*", "cpeNameId": "DD0227A7-CC9C-4388-90DF-D06E801AF684"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.1.1:*:*:*:*:*:*:*", "cpeNameId": "BA7B47E4-ED28-4B5B-BD88-B5A1E86D045E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.1.2:*:*:*:*:*:*:*", "cpeNameId": "6769988D-645B-4085-A555-29C3B5A8D145"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.1.3:*:*:*:*:*:*:*", "cpeNameId": "B193E5C5-3B2C-4F7C-B904-A8FF6B790499"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.1.4:*:*:*:*:*:*:*", "cpeNameId": "7C3CAF66-E6E1-4714-A480-58CDA92428F4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.1.5:*:*:*:*:*:*:*", "cpeNameId": "21D6F078-9090-4B3A-8106-59A51323BE4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.1.6:*:*:*:*:*:*:*", "cpeNameId": "AF71BFF8-6FC9-4730-AE11-71DA868C5588"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.1.7:*:*:*:*:*:*:*", "cpeNameId": "7868FADA-294B-477B-802F-8E4BBC7E16E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.1.8:*:*:*:*:*:*:*", "cpeNameId": "679A0479-F91E-4214-9DCE-24EC498FBBC6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.1.9:*:*:*:*:*:*:*", "cpeNameId": "FC6F89EB-BC20-4CBB-9469-7FE7354BB051"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.1.10:*:*:*:*:*:*:*", "cpeNameId": "2CE5B5AD-8FE8-4A79-B181-64A7257B9177"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2:*:*:*:*:*:*:*", "cpeNameId": "C82F3FFF-8B8C-416B-A398-649413127215"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2:-:*:*:*:*:*:*", "cpeNameId": "142046C3-CA5B-4025-9411-EB541CDE90D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2:rc2:*:*:*:*:*:*", "cpeNameId": "316C0C5A-74B0-4A97-A7E5-813A39172BE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2:rc3:*:*:*:*:*:*", "cpeNameId": "7137A9B1-7A4B-4C4C-B199-E40D514AE762"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2:rc4:*:*:*:*:*:*", "cpeNameId": "365499E2-4E7E-4277-9FC9-E026ED6D2AC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2:rc5:*:*:*:*:*:*", "cpeNameId": "62A6EC9B-6434-4B3E-87FB-002EF98FB3ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2:rc6:*:*:*:*:*:*", "cpeNameId": "628D835E-E0A1-4261-A2FE-AE27FABB7E27"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2:rc7:*:*:*:*:*:*", "cpeNameId": "2A6A3167-3A00-4195-BFCE-F7293497B047"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.1:*:*:*:*:*:*:*", "cpeNameId": "06BE7B88-255B-49D0-A934-E81A66DD1B17"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.2:*:*:*:*:*:*:*", "cpeNameId": "C6B8D73E-0E31-44A4-98FF-914527843E1C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.3:*:*:*:*:*:*:*", "cpeNameId": "1D0A6492-1F10-4768-99E0-06D1ED8617AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.4:*:*:*:*:*:*:*", "cpeNameId": "D8B392AA-EFBD-4200-A1F1-1E5C1CEF8C15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.5:*:*:*:*:*:*:*", "cpeNameId": "EA189203-2158-4E92-A526-7E742E4C6B36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.6:*:*:*:*:*:*:*", "cpeNameId": "906FC19A-1DB3-4ED7-8889-1E3A5E212724"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.7:*:*:*:*:*:*:*", "cpeNameId": "7C2DC23E-215E-4973-AD3A-A28BEB5B9113"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.8:*:*:*:*:*:*:*", "cpeNameId": "3431E73A-E239-4EF5-8463-5DE3CF01F38F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.9:*:*:*:*:*:*:*", "cpeNameId": "A200B420-232A-433F-8CDE-ADA898D920A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.10:*:*:*:*:*:*:*", "cpeNameId": "3DF0E7D8-B8D0-4C89-A679-517A3C3BAAD2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.11:*:*:*:*:*:*:*", "cpeNameId": "E35AD74A-5E15-4528-91E4-B098F9FBB16F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.12:*:*:*:*:*:*:*", "cpeNameId": "BDA150E1-DCEE-4F0C-9280-126D1F954319"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.13:*:*:*:*:*:*:*", "cpeNameId": "1BC78E93-7B8F-432C-82AD-51F8A9A393C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.14:*:*:*:*:*:*:*", "cpeNameId": "9658E83F-D08C-4E8A-9133-2EC6AAE1D44D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.15:*:*:*:*:*:*:*", "cpeNameId": "CE33893B-F7EF-4D5C-BCA0-60AD5366E384"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.16:*:*:*:*:*:*:*", "cpeNameId": "18E74DD1-D0E9-444F-AAEB-D3CA998909EC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.17:*:*:*:*:*:*:*", "cpeNameId": "C392515E-4C53-4387-B556-82D87F083A13"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.18:*:*:*:*:*:*:*", "cpeNameId": "653C01CC-5895-420E-9664-9BE57DC5F876"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.19:*:*:*:*:*:*:*", "cpeNameId": "D09E709A-BD26-4493-9781-BACA3475336E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.20:*:*:*:*:*:*:*", "cpeNameId": "4B713D3E-DAD6-4620-B651-3563A957BA36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.21:*:*:*:*:*:*:*", "cpeNameId": "D823C65C-9D03-4124-ABAA-87E1CCB6DE3B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.22:*:*:*:*:*:*:*", "cpeNameId": "C75CB737-F344-4186-94F0-1097298815A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.23:*:*:*:*:*:*:*", "cpeNameId": "FEF99F56-94D5-4296-9901-AAA7B3D59E83"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.24:*:*:*:*:*:*:*", "cpeNameId": "D6BC9731-830A-4BAD-8FD5-34804F733854"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.25:*:*:*:*:*:*:*", "cpeNameId": "180488F5-5C9E-46E4-B3D3-1D8CD40A4F68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.26:*:*:*:*:*:*:*", "cpeNameId": "1A930330-058A-4709-A914-98A5DD1E6606"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.27:*:*:*:*:*:*:*", "cpeNameId": "6A2B3F95-32E2-4F75-888B-FD6D995B9212"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.28:*:*:*:*:*:*:*", "cpeNameId": "00AEA53A-CD82-4C14-90C6-48FAFEE855CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.29:*:*:*:*:*:*:*", "cpeNameId": "B7E70A5A-8202-4848-833D-BF0CCBE7CCFE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.30:*:*:*:*:*:*:*", "cpeNameId": "D9CCE96A-ED37-4DDF-BF43-857F343B4105"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.31:*:*:*:*:*:*:*", "cpeNameId": "52A5EAA5-C3B7-4EFC-9AE6-F5C3B711A632"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.32:*:*:*:*:*:*:*", "cpeNameId": "22431C69-AED0-4983-BD1C-704CA647C81C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.33:*:*:*:*:*:*:*", "cpeNameId": "5B1BB2D1-60F4-4504-9362-6548F78EC490"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.34:*:*:*:*:*:*:*", "cpeNameId": "CB2D7E22-F1CA-4E4A-BE3E-2559040658CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.35:*:*:*:*:*:*:*", "cpeNameId": "B3E2A74F-382B-42E0-8E93-B30DC87668CC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.36:*:*:*:*:*:*:*", "cpeNameId": "429AF5FC-B66D-41E2-9452-46F1DDF3F48A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.37:*:*:*:*:*:*:*", "cpeNameId": "81A05CDA-B968-415D-AFBD-3C5E8254454D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.38:*:*:*:*:*:*:*", "cpeNameId": "8618E6FF-54AE-4238-988E-28A0C522C38C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.39:*:*:*:*:*:*:*", "cpeNameId": "2F7B8E99-84A7-4707-85EF-49C9884C2D14"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.40:*:*:*:*:*:*:*", "cpeNameId": "E0D96BE3-5CC1-4BF8-A364-C20AE8A67C38"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.41:*:*:*:*:*:*:*", "cpeNameId": "6BBAAC8C-E86E-4B0D-9582-12E770A23E61"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.42:*:*:*:*:*:*:*", "cpeNameId": "1BAE21D2-E437-4889-87D8-9E94B9BAB181"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.43:*:*:*:*:*:*:*", "cpeNameId": "83B86D4E-DEDC-41AC-9030-634723C5EFC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.44:*:*:*:*:*:*:*", "cpeNameId": "DEE09A89-7D01-4E76-AD76-5329742D49E7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.45:*:*:*:*:*:*:*", "cpeNameId": "E0CC16F5-DF50-4020-BBE9-43BFDB29D211"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.46:*:*:*:*:*:*:*", "cpeNameId": "80407BC0-0457-4DA6-9EBE-49CAD337DD7D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.47:*:*:*:*:*:*:*", "cpeNameId": "885540C4-709A-46DF-B98C-A237628D9051"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.48:*:*:*:*:*:*:*", "cpeNameId": "2CC641C9-5A91-47E5-A332-928854306A88"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.49:*:*:*:*:*:*:*", "cpeNameId": "9A1FE922-9B98-4059-80B7-32F9EBB3BA15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.50:*:*:*:*:*:*:*", "cpeNameId": "78CEDB41-D210-4225-A89E-8ACE2FA7AC75"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.51:*:*:*:*:*:*:*", "cpeNameId": "7D5E05DB-8EDC-4B50-BEC4-89A2706BD3A9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.52:*:*:*:*:*:*:*", "cpeNameId": "33D503BA-CD64-4BC8-812D-548C75CFCC97"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.53:*:*:*:*:*:*:*", "cpeNameId": "420B543D-D702-4BAD-B9C3-C7BC9F55C253"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.54:*:*:*:*:*:*:*", "cpeNameId": "E26DEAEA-FBAB-48A5-8493-D5392940231A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.55:*:*:*:*:*:*:*", "cpeNameId": "20A94EF2-E013-41B8-B9C3-6D8FAAFC4749"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.56:*:*:*:*:*:*:*", "cpeNameId": "AFC5FCF3-421F-4FB8-AA51-79DECEAB93CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.57:*:*:*:*:*:*:*", "cpeNameId": "869BA085-2A7A-47B5-9983-364A9A85A29A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.58:*:*:*:*:*:*:*", "cpeNameId": "BC8906BF-B55E-4384-8F06-41732DE13A1D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.59:*:*:*:*:*:*:*", "cpeNameId": "653B786B-54D0-4EBB-90C4-7B2FB91A6865"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.60:*:*:*:*:*:*:*", "cpeNameId": "47D7F6C3-43D8-4B41-8DC3-C7169377DD54"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.61:*:*:*:*:*:*:*", "cpeNameId": "91BE8533-CEAE-4D12-8B71-75F81149DB79"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.62:*:*:*:*:*:*:*", "cpeNameId": "B3E4D758-9655-434E-8CF9-32F57D3DC028"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.63:*:*:*:*:*:*:*", "cpeNameId": "1913A11B-D750-4125-85DA-B7FBFB0F616C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.64:*:*:*:*:*:*:*", "cpeNameId": "B494BFB3-2991-4ED8-A6C2-FF35DBB3B81F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.65:*:*:*:*:*:*:*", "cpeNameId": "4807B2C5-66DD-43D0-AB28-2A645FDC6CFA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.66:*:*:*:*:*:*:*", "cpeNameId": "DE631770-040B-4FBC-8409-4F649697BD93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.67:*:*:*:*:*:*:*", "cpeNameId": "0143D4FC-B8AA-435D-B065-8A00A4E1F860"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.68:*:*:*:*:*:*:*", "cpeNameId": "66737E07-144A-4AD8-967C-A34C1024CA3C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.69:*:*:*:*:*:*:*", "cpeNameId": "D781F8E9-0E92-4879-B8AE-67FD07175184"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.70:*:*:*:*:*:*:*", "cpeNameId": "8320F56F-90A3-47FE-AA76-F470509A957F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.71:*:*:*:*:*:*:*", "cpeNameId": "3D480FDE-B0C6-47A7-9034-3C4E4266A8D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.72:*:*:*:*:*:*:*", "cpeNameId": "0BACD049-2C99-4393-BBC5-8D157511F6D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.73:*:*:*:*:*:*:*", "cpeNameId": "FB450388-7DF5-43E4-B9E6-98422EE4EECC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.74:*:*:*:*:*:*:*", "cpeNameId": "1E01BE1F-D164-4DDE-901B-CDE83773AC7F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.75:*:*:*:*:*:*:*", "cpeNameId": "AD91985D-7F93-4062-82C3-471FDEDAC385"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.76:*:*:*:*:*:*:*", "cpeNameId": "081514E8-D66B-4305-815E-5228A9445ACC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.77:*:*:*:*:*:*:*", "cpeNameId": "B29A99D9-1903-4C10-B637-5BA73E5CF91F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.78:*:*:*:*:*:*:*", "cpeNameId": "85DFB807-5015-48B1-8BA4-F78E1ED57E01"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.79:*:*:*:*:*:*:*", "cpeNameId": "F3A79ADD-F28F-4F4D-8A44-99592CAE87AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.80:*:*:*:*:*:*:*", "cpeNameId": "6D43B8AB-6A89-48F2-B814-0562507E0886"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.81:*:*:*:*:*:*:*", "cpeNameId": "FDAC9D48-6BC2-4148-91A4-5375B79F6194"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.82:*:*:*:*:*:*:*", "cpeNameId": "440DE5E6-BC9B-4F99-B4C4-74FB79557DBC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.83:*:*:*:*:*:*:*", "cpeNameId": "EC87BF5B-A78F-485C-8265-AEAF964E1048"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.84:*:*:*:*:*:*:*", "cpeNameId": "B1DBD1CA-3EBB-4FEA-930D-A463D3B5921B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.85:*:*:*:*:*:*:*", "cpeNameId": "DCDC762A-1384-4BCC-A3DD-43D1BFC02FCA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.86:*:*:*:*:*:*:*", "cpeNameId": "FBDBCA76-A7D1-43D3-B0E7-B2683167B1CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.87:*:*:*:*:*:*:*", "cpeNameId": "86FB8493-7660-4CDE-9547-2B6469544D95"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.88:*:*:*:*:*:*:*", "cpeNameId": "0116376E-167D-4241-A75D-FF792BAE4C49"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.89:*:*:*:*:*:*:*", "cpeNameId": "232DA74F-0A85-45E3-AFFE-75DF7D2E8316"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.90:*:*:*:*:*:*:*", "cpeNameId": "A94F5C70-1C71-4DC1-AF94-61988458182D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.91:*:*:*:*:*:*:*", "cpeNameId": "372857DB-A2E5-46B5-859C-5A447EB5EE9C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.92:*:*:*:*:*:*:*", "cpeNameId": "52550675-1EB8-4A92-87E9-02773E1A829C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.93:*:*:*:*:*:*:*", "cpeNameId": "0307A2A8-6976-4C84-B71C-E0A83C53961E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.94:*:*:*:*:*:*:*", "cpeNameId": "418FC315-F587-41E6-A4CF-F356DEF9AD5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.95:*:*:*:*:*:*:*", "cpeNameId": "05080F6D-2FF4-477E-B59C-AD9A38D2E69C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.96:*:*:*:*:*:*:*", "cpeNameId": "F48B03A9-7823-4CE1-B36E-C1DD86837F0E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.97:*:*:*:*:*:*:*", "cpeNameId": "6162425D-432F-4C49-8E27-04F75A166D60"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.98:*:*:*:*:*:*:*", "cpeNameId": "8EB3E252-D235-4E82-BC61-723C64DAA65B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.99:*:*:*:*:*:*:*", "cpeNameId": "613BAE28-98F8-4906-AA51-820B3335EBBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.100:*:*:*:*:*:*:*", "cpeNameId": "3B370497-B377-424D-8A2A-05614E33E414"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.101:*:*:*:*:*:*:*", "cpeNameId": "C3229A18-8555-4037-BBC0-8C0852EDA4A6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.102:*:*:*:*:*:*:*", "cpeNameId": "6EF92A3F-1DF7-4826-83C8-6AD59A39265D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3:*:*:*:*:*:*:*", "cpeNameId": "4C56AF79-C2B9-4C63-A51E-9D4CB7529269"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3:-:*:*:*:*:*:*", "cpeNameId": "216C7567-C83B-4498-B0CD-46431830482F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3:rc1:*:*:*:*:*:*", "cpeNameId": "3165F23C-852B-45C1-B6FA-188E656427A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3:rc2:*:*:*:*:*:*", "cpeNameId": "17CD7EFE-3E88-45D0-AC88-B03B00A4A0E9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3:rc3:*:*:*:*:*:*", "cpeNameId": "063AFF14-AB8B-4D13-8BFC-AF437607AE59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3:rc4:*:*:*:*:*:*", "cpeNameId": "DA6C4271-F035-42BD-A918-49966E65D9DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3:rc5:*:*:*:*:*:*", "cpeNameId": "260917D4-E4F2-4870-B50B-A942D3E00035"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3:rc6:*:*:*:*:*:*", "cpeNameId": "E2B66DF7-767D-4223-986E-018BE688F462"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3:rc7:*:*:*:*:*:*", "cpeNameId": "322E8592-6A21-4496-8DD7-F0E90FB0B08D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3.1:*:*:*:*:*:*:*", "cpeNameId": "D542D5ED-4CF2-4408-A91F-FA978B1C5334"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3.2:*:*:*:*:*:*:*", "cpeNameId": "271CBB6E-85D1-4ED7-958A-9ADF338CCB88"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3.3:*:*:*:*:*:*:*", "cpeNameId": "DFFF6BEB-FB02-424F-B4DA-DEE049E81395"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3.4:*:*:*:*:*:*:*", "cpeNameId": "A08B75A7-1E6E-4B08-B2F6-D25FC72C3E7A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3.5:*:*:*:*:*:*:*", "cpeNameId": "6A018015-0114-490B-80FC-B588B1F13E5F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3.6:*:*:*:*:*:*:*", "cpeNameId": "FC6A036B-228C-4A5D-A41E-A36CF4BEB971"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3.7:*:*:*:*:*:*:*", "cpeNameId": "BC9B3FC7-EC05-42E5-BBEC-CBA38E38BD5E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3.8:*:*:*:*:*:*:*", "cpeNameId": "3D1A21A4-5D3D-4FCD-8021-51F2E62F8719"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4:*:*:*:*:*:*:*", "cpeNameId": "7F9645DF-BD4B-4479-BD61-A818171E36D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4:-:*:*:*:*:*:*", "cpeNameId": "5C315BD5-D56F-498D-B5FC-77B6A6AF2571"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4:rc1:*:*:*:*:*:*", "cpeNameId": "9C50F743-0E91-4E50-B542-1DB40389CCFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4:rc2:*:*:*:*:*:*", "cpeNameId": "C7693E1E-3F4A-4B31-84DA-C32CC0A6B4A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4:rc3:*:*:*:*:*:*", "cpeNameId": "B869F0C3-5462-4A49-9C04-91717DAEBE48"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4:rc4:*:*:*:*:*:*", "cpeNameId": "9169DD50-1F78-4AB2-AF6A-9A87A55CD5F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4:rc5:*:*:*:*:*:*", "cpeNameId": "6DFDA097-AE0D-4C22-A612-6B43191ED494"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4:rc6:*:*:*:*:*:*", "cpeNameId": "A2A13DB3-7362-432E-9956-47476E3C8594"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4:rc7:*:*:*:*:*:*", "cpeNameId": "F7DC5C7C-F1E4-4876-BB23-5AE2E0837698"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.1:*:*:*:*:*:*:*", "cpeNameId": "9C88F8A3-ECCB-428C-A8C5-B9952B20B8EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.2:*:*:*:*:*:*:*", "cpeNameId": "0BBD2F2B-55D2-4E99-A64D-85552721CF89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.3:*:*:*:*:*:*:*", "cpeNameId": "3BFBDB35-0D9A-4AED-BC40-130C68E136E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.4:*:*:*:*:*:*:*", "cpeNameId": "8B78F0EB-512E-4DF3-BBB0-B863DE170D9B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.5:*:*:*:*:*:*:*", "cpeNameId": "6EC99C95-4E8A-4204-89A6-D55C83C78499"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.6:*:*:*:*:*:*:*", "cpeNameId": "58DB20D4-AD22-4075-9CC5-C4B2B758491C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.7:*:*:*:*:*:*:*", "cpeNameId": "42125DFB-604A-4336-BB50-FB32DBF2CDB2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.8:*:*:*:*:*:*:*", "cpeNameId": "BEC6A864-F607-43DC-9A5C-6C9881A1638E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.9:*:*:*:*:*:*:*", "cpeNameId": "ADE87835-B344-47B2-8734-3BCA1035C217"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.10:*:*:*:*:*:*:*", "cpeNameId": "847E7314-8B34-4579-B3D5-D9D742132804"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.11:*:*:*:*:*:*:*", "cpeNameId": "C47995DE-5F8C-41A6-AD25-656557A3851C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.12:*:*:*:*:*:*:*", "cpeNameId": "2E13CD82-764F-45B1-BD27-BD9BA15D9AC6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.13:*:*:*:*:*:*:*", "cpeNameId": "E892C72B-87E4-48C9-9425-2A40B8235644"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.14:*:*:*:*:*:*:*", "cpeNameId": "912F5A2C-795B-4A15-B3CD-DF691594C2A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.15:*:*:*:*:*:*:*", "cpeNameId": "3B4AC1FF-B222-4844-8AE1-9FA1685FA572"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.16:*:*:*:*:*:*:*", "cpeNameId": "66D514ED-5C2D-416B-B169-67B838575459"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.17:*:*:*:*:*:*:*", "cpeNameId": "48DFA50A-628C-4C55-961D-ABF2052B406B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.18:*:*:*:*:*:*:*", "cpeNameId": "E58E0E22-013B-43A0-8B3E-5E8854DDD393"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.19:*:*:*:*:*:*:*", "cpeNameId": "77E923D8-A9BC-42BD-8C28-CBF54959A042"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.20:*:*:*:*:*:*:*", "cpeNameId": "19FAA1FA-B770-4D3D-8FFA-CF117BF8FEC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.21:*:*:*:*:*:*:*", "cpeNameId": "1FD4A547-6D4D-483F-892A-DB616570302F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.22:*:*:*:*:*:*:*", "cpeNameId": "4533F044-1645-47CD-BD31-A7700CB4EE52"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.23:*:*:*:*:*:*:*", "cpeNameId": "755BD5E1-FC72-42F6-8C5C-40E449F32E0D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.24:*:*:*:*:*:*:*", "cpeNameId": "85CE79D8-3F06-40DE-B5EA-A99E9257D388"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.25:*:*:*:*:*:*:*", "cpeNameId": "D7CD3755-1AEE-41DA-BB81-AEAB2A339000"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.26:*:*:*:*:*:*:*", "cpeNameId": "BA83EAD2-B9D6-4AA6-B332-4D70AB1CE85C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.27:*:*:*:*:*:*:*", "cpeNameId": "725D03ED-1B8B-4F7F-94DE-D163679B25A6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.28:*:*:*:*:*:*:*", "cpeNameId": "7B46EA94-4CEA-413A-B300-4BC8207D587E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.29:*:*:*:*:*:*:*", "cpeNameId": "613792CE-5F01-4ECD-9273-74E35A76DACA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.30:*:*:*:*:*:*:*", "cpeNameId": "16DDCFE6-2FB0-4ADE-B11D-297DD2135CF1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.31:*:*:*:*:*:*:*", "cpeNameId": "74B55E1A-5C97-49F4-84B4-281E7C53EA9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.32:*:*:*:*:*:*:*", "cpeNameId": "732DD130-EDEF-48B4-AD0F-12010B578C01"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.33:*:*:*:*:*:*:*", "cpeNameId": "18F2FE88-3208-4608-AE5C-3443C0D03E0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.34:*:*:*:*:*:*:*", "cpeNameId": "DC0A746D-3887-488F-A374-EF35CBC969D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.35:*:*:*:*:*:*:*", "cpeNameId": "B46CD7B2-4950-4D52-BDD2-817DCC9D13EC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.36:*:*:*:*:*:*:*", "cpeNameId": "EB53E610-E9E2-4B1F-9816-2CEE82CCC4DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.37:*:*:*:*:*:*:*", "cpeNameId": "7380EA90-66F0-4EA0-B861-12AE47C28F9C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.38:*:*:*:*:*:*:*", "cpeNameId": "606E3372-BAE9-48A8-BC16-866AAB02533A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.39:*:*:*:*:*:*:*", "cpeNameId": "A1B8D27F-3388-4370-B95B-7568B6BA975E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.40:*:*:*:*:*:*:*", "cpeNameId": "9D346BC6-FFA5-473E-ACFD-DAC361B91C5A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.41:*:*:*:*:*:*:*", "cpeNameId": "268803F9-54B1-4A2E-A2F2-4CC26E6A84C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.42:*:*:*:*:*:*:*", "cpeNameId": "0904F99F-9733-447C-BF7E-FEBD996E5877"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.43:*:*:*:*:*:*:*", "cpeNameId": "D21701F8-F7C2-4916-A60D-AD66082E64E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.44:*:*:*:*:*:*:*", "cpeNameId": "8C57B372-D510-41A1-B427-0A796F78B306"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.45:*:*:*:*:*:*:*", "cpeNameId": "1B6AA52B-3A5F-4FA5-873D-00D3E3656401"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.46:*:*:*:*:*:*:*", "cpeNameId": "7DEE950A-5E8D-469E-8441-0CD012D6CD4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.47:*:*:*:*:*:*:*", "cpeNameId": "DA2E3BEC-E551-4742-BD82-5BC5E47EBE75"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.48:*:*:*:*:*:*:*", "cpeNameId": "1EDB923A-9B3C-46CE-976C-150970DDCF32"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.49:*:*:*:*:*:*:*", "cpeNameId": "A47A980A-97AC-40B9-AD50-1DA77D0A020B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.50:*:*:*:*:*:*:*", "cpeNameId": "730CBC8B-0C78-4C84-AFBE-D105CBD5C0F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.51:*:*:*:*:*:*:*", "cpeNameId": "A306D9A3-48CC-4DDC-99CC-E2D8183335DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.52:*:*:*:*:*:*:*", "cpeNameId": "EAC93D54-6A08-4475-B196-85F6673B3B6E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.53:*:*:*:*:*:*:*", "cpeNameId": "F5B7DFA5-C039-40CC-82D0-2916C7F971B6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.54:*:*:*:*:*:*:*", "cpeNameId": "786F2688-E780-46C4-8177-D9CABFC4AA9A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.55:*:*:*:*:*:*:*", "cpeNameId": "3B8D1625-531A-4A51-8567-142C05E10F6B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.56:*:*:*:*:*:*:*", "cpeNameId": "8385A08A-3F7B-43F8-8757-1667E3A28F42"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.57:*:*:*:*:*:*:*", "cpeNameId": "B21C66D5-9C50-403B-BAE5-98D1F1D7001E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.58:*:*:*:*:*:*:*", "cpeNameId": "AAB1ABC2-DCE1-4550-B433-C2B1B419B330"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.59:*:*:*:*:*:*:*", "cpeNameId": "A2D32DA0-65C4-4274-A0FD-E8220E6B407D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.60:*:*:*:*:*:*:*", "cpeNameId": "6B960E11-5BB3-4E40-AE5F-90CFB7F2980B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.61:*:*:*:*:*:*:*", "cpeNameId": "257F2EE3-72EF-4629-94A4-F01A901E85D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.62:*:*:*:*:*:*:*", "cpeNameId": "F128274D-5BF9-45BE-9C1E-3B08DF64E504"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.63:*:*:*:*:*:*:*", "cpeNameId": "EB67B16A-E5A8-4DAE-A8F6-6CD9189F95A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.64:*:*:*:*:*:*:*", "cpeNameId": "21587FC1-355D-4B3F-A06D-DD171F1C62AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.65:*:*:*:*:*:*:*", "cpeNameId": "3B826B1E-86CA-420D-8929-50E4BCAB927C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.66:*:*:*:*:*:*:*", "cpeNameId": "004E1589-DAFD-4B02-A65B-41814392F976"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.67:*:*:*:*:*:*:*", "cpeNameId": "9C287C03-7C7B-4567-ABD1-2860784AC063"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.68:*:*:*:*:*:*:*", "cpeNameId": "6CEEBDCA-447C-4D40-B1CF-1433091347D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.69:*:*:*:*:*:*:*", "cpeNameId": "B60431E1-FFBB-4708-A8E2-47D1BE957937"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.70:*:*:*:*:*:*:*", "cpeNameId": "AF905E35-EF7E-4F3A-B286-8202F6D883E9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.71:*:*:*:*:*:*:*", "cpeNameId": "1D7F6676-187E-4E98-816B-2D3ADD98271D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.72:*:*:*:*:*:*:*", "cpeNameId": "8D85776B-17BC-471E-A6C3-3405CEDEACC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.73:*:*:*:*:*:*:*", "cpeNameId": "58070F9F-FAC4-4033-A486-4275D7C14EAC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.74:*:*:*:*:*:*:*", "cpeNameId": "3908F399-E82F-4734-BFCC-DF569910954D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.75:*:*:*:*:*:*:*", "cpeNameId": "37F2005A-3B64-459E-BECF-5DDF3DC26198"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.76:*:*:*:*:*:*:*", "cpeNameId": "54E1E032-2977-43E0-A0E2-33EE4B8D605D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.77:*:*:*:*:*:*:*", "cpeNameId": "3CE3F6B9-7686-49FF-9E5D-A7FC5B22C04B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.78:*:*:*:*:*:*:*", "cpeNameId": "9A4F3A55-778F-4D01-BD21-BB057B317C80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.79:*:*:*:*:*:*:*", "cpeNameId": "A3B58A38-1DB3-425B-83CB-4D6E9B0D50CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.80:*:*:*:*:*:*:*", "cpeNameId": "013D0308-EFC0-48E6-ABE9-97E8677D7956"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.81:*:*:*:*:*:*:*", "cpeNameId": "C76DEE0E-3C76-4C34-AE57-4F269C0C8345"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.82:*:*:*:*:*:*:*", "cpeNameId": "E0ECA58C-8488-4280-8227-9FD106C4965D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.83:*:*:*:*:*:*:*", "cpeNameId": "B4592A01-0026-4F16-8862-E50EBED75F70"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.84:*:*:*:*:*:*:*", "cpeNameId": "A57E9CF5-FB3E-40F3-9C3F-2C5D3CD218A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.85:*:*:*:*:*:*:*", "cpeNameId": "6DA39A76-5294-44B8-A319-EC0B34E50AC1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.86:*:*:*:*:*:*:*", "cpeNameId": "A5C5F48A-B66E-4C7F-9FF2-C5F0A406CACE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.87:*:*:*:*:*:*:*", "cpeNameId": "2B757A0C-5A39-432A-9B8C-037BA527E46A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.88:*:*:*:*:*:*:*", "cpeNameId": "463F88B6-C5A7-4EE5-8FC4-8D7DE9BB2ADF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.89:*:*:*:*:*:*:*", "cpeNameId": "05E83609-D10C-43C4-82CC-F48ACFBA0C0E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.90:*:*:*:*:*:*:*", "cpeNameId": "AF639F1D-3DB5-4B65-A297-86F88DCEB6BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.91:*:*:*:*:*:*:*", "cpeNameId": "9BD75AFF-1561-4D4E-AEF7-08C63165754D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.92:*:*:*:*:*:*:*", "cpeNameId": "E43540C5-4034-4B55-9F86-EAD8C1B35822"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.93:*:*:*:*:*:*:*", "cpeNameId": "6A67D1C1-1FD3-4FDA-A30F-B9CF2557E49B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.94:*:*:*:*:*:*:*", "cpeNameId": "EE56E2B3-234B-428F-94CC-8284B83F0F80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.95:*:*:*:*:*:*:*", "cpeNameId": "7586CF73-B96D-40A6-B25A-CB257A3C0B1B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.96:*:*:*:*:*:*:*", "cpeNameId": "B3B099C7-C246-4260-BE85-5F4A32C48C8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.97:*:*:*:*:*:*:*", "cpeNameId": "226A5757-D8F7-464F-8061-3DFD1D7016F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.98:*:*:*:*:*:*:*", "cpeNameId": "8FD90207-404B-4137-A313-C80EF0209E29"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.99:*:*:*:*:*:*:*", "cpeNameId": "A0C62D21-AD27-457A-B628-B0FA831541FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.100:*:*:*:*:*:*:*", "cpeNameId": "22E87AE1-0C4D-481A-9AB6-122958F7B806"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.101:*:*:*:*:*:*:*", "cpeNameId": "5F633063-4C78-4FFE-9C72-DFE721C5B99D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.102:*:*:*:*:*:*:*", "cpeNameId": "644B6E4C-743F-4DDB-A586-AF5E6C336D22"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.103:*:*:*:*:*:*:*", "cpeNameId": "501E0F8B-5756-4E68-BEDA-3ABEA9EBECAC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.104:*:*:*:*:*:*:*", "cpeNameId": "67111E0D-8FA5-41D2-A1FE-96F1B3972EF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.105:*:*:*:*:*:*:*", "cpeNameId": "05B2F693-9415-403E-B362-3E90E78F5205"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.106:*:*:*:*:*:*:*", "cpeNameId": "7076EF21-2974-477F-A77F-028724B1ECF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.107:*:*:*:*:*:*:*", "cpeNameId": "CA13D9EC-2887-46B7-895C-E9FC341E03C9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.108:*:*:*:*:*:*:*", "cpeNameId": "434B3877-E6A2-433B-BAE5-71843920F36B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.109:*:*:*:*:*:*:*", "cpeNameId": "5E51C67B-8C45-4064-8260-480C281CBA63"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.110:*:*:*:*:*:*:*", "cpeNameId": "C34040E5-A03A-42A5-AF5B-F3DF66D0329F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.111:*:*:*:*:*:*:*", "cpeNameId": "8B9A38AA-B537-468D-8A06-3C4BB659EDEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.112:*:*:*:*:*:*:*", "cpeNameId": "C8F2983E-8CEE-474F-9B08-E9C13AD643D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.113:*:*:*:*:*:*:*", "cpeNameId": "A7A120EC-E789-4387-B8A3-FCB1DEAC68EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.5:*:*:*:*:*:*:*", "cpeNameId": "A5FD173E-DCE9-4A69-AFAB-4CD661963D1C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.5.1:*:*:*:*:*:*:*", "cpeNameId": "9B2B4A5A-182C-4EF3-9D8E-214596C544A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.5.2:*:*:*:*:*:*:*", "cpeNameId": "C76B49BF-115F-4134-BF91-EBB32275B777"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.5.3:*:*:*:*:*:*:*", "cpeNameId": "0A4A6E87-E6AA-4D67-B8AA-94C4024B4474"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.5.4:*:*:*:*:*:*:*", "cpeNameId": "D20FBE76-D905-4FDD-AC99-2F52A2BF36E4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.5.5:*:*:*:*:*:*:*", "cpeNameId": "5ED861D7-7EB8-497E-8D9C-7AC8A6BD5245"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.5.6:*:*:*:*:*:*:*", "cpeNameId": "F9C71974-A2F0-4B3D-8796-B8BD961BC536"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.5.7:*:*:*:*:*:*:*", "cpeNameId": "FE42B3DE-771E-4966-8642-AFC84050F1A9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6:*:*:*:*:*:*:*", "cpeNameId": "1A03B0CC-33D1-4F25-A957-2010FA603996"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6:-:*:*:*:*:*:*", "cpeNameId": "94EF24E5-AA7C-4277-B924-7F01A6E54EA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6:rc2:*:*:*:*:*:*", "cpeNameId": "BA0D05E0-1454-4C4F-9409-3DBAFC0ADF06"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6:rc3:*:*:*:*:*:*", "cpeNameId": "9191F237-1AB0-40B5-9AAF-04F6014FCDC4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6:rc4:*:*:*:*:*:*", "cpeNameId": "3CDE86D5-C3D3-4542-8F21-59142E917226"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6:rc5:*:*:*:*:*:*", "cpeNameId": "73692F50-41B2-415B-8861-6BC9B52A0AEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6:rc6:*:*:*:*:*:*", "cpeNameId": "105B97CB-41FC-45C9-A16C-EB81B3B5A329"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6:rc7:*:*:*:*:*:*", "cpeNameId": "F7C56EFA-52F1-42F7-9324-C4678DEF9F96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6.1:*:*:*:*:*:*:*", "cpeNameId": "A8A058FA-E4EE-416E-B539-00D8F5473CC6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6.2:*:*:*:*:*:*:*", "cpeNameId": "D5F87239-7A88-434F-9A9E-959FF775108E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6.3:*:*:*:*:*:*:*", "cpeNameId": "0BB0846D-DD56-4DE7-ABBC-B43558653DA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6.4:*:*:*:*:*:*:*", "cpeNameId": "B723EFC1-63BE-4D9A-A008-E02845D21C9A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6.5:*:*:*:*:*:*:*", "cpeNameId": "FB9206A1-D3F5-4400-82E6-34A78EAF67A0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6.6:*:*:*:*:*:*:*", "cpeNameId": "020B7DA4-CE48-49F2-991B-0DCB0AF4935A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6.7:*:*:*:*:*:*:*", "cpeNameId": "3606EADE-8161-4284-A09A-0FFA420DAE96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6.8:*:*:*:*:*:*:*", "cpeNameId": "6763F9A3-4305-41BF-946E-72CC19EE01F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6.9:*:*:*:*:*:*:*", "cpeNameId": "D2E19931-EB6A-4A08-9589-BBC4B2BA05E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6.10:*:*:*:*:*:*:*", "cpeNameId": "CD2E3A03-F96F-493D-9B0E-B96309D9AA93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6.11:*:*:*:*:*:*:*", "cpeNameId": "A0E05409-4816-417B-A5B2-55F4BBBF45C2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.7:*:*:*:*:*:*:*", "cpeNameId": "12E1A3C4-D097-4545-B736-EB5C3A3A3887"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.7.1:*:*:*:*:*:*:*", "cpeNameId": "268526F8-8DBF-4883-8CE7-55CD76A58517"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.7.2:*:*:*:*:*:*:*", "cpeNameId": "B2A9865E-EDBE-452A-9E87-394FF9A4DD2E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.7.3:*:*:*:*:*:*:*", "cpeNameId": "91F07A30-7EF7-4870-86F8-D4E479920742"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.7.4:*:*:*:*:*:*:*", "cpeNameId": "16D48241-0C39-40FF-9BDD-FAC0AE667976"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.7.5:*:*:*:*:*:*:*", "cpeNameId": "4ACA5D3D-9862-46D6-8025-C8B2FBFD0C63"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.7.6:*:*:*:*:*:*:*", "cpeNameId": "A9A20F11-EA62-4A06-B773-E0E0CA1DB1D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.7.7:*:*:*:*:*:*:*", "cpeNameId": "DAC40CB3-B9AC-4DDC-AD0E-EFBAF468A80D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.7.8:*:*:*:*:*:*:*", "cpeNameId": "6DA3C651-639E-49B7-91A6-9352A51BB428"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.7.9:*:*:*:*:*:*:*", "cpeNameId": "43546599-BC37-4DDF-8692-717B4E3F9D04"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.7.10:*:*:*:*:*:*:*", "cpeNameId": "168DEBA5-591C-4BE5-B321-3432CF2FBE1A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8:*:*:*:*:*:*:*", "cpeNameId": "793FEE4E-6EB3-4AD3-8C35-45212DB9045D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.0:*:*:*:*:*:*:*", "cpeNameId": "0874112F-8BB6-4619-A940-6E6B71E792F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.1:*:*:*:*:*:*:*", "cpeNameId": "01FC3991-C111-44A7-808F-0278121EA54A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.2:*:*:*:*:*:*:*", "cpeNameId": "8811DE61-6DB4-4ADE-8F83-41A29664D527"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.3:*:*:*:*:*:*:*", "cpeNameId": "EC3384F9-D061-46C5-9774-76248C5ACE93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.4:*:*:*:*:*:*:*", "cpeNameId": "516830CB-D744-432F-92FE-763EDE2CA5F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.5:*:*:*:*:*:*:*", "cpeNameId": "43AAC1FC-42D7-4D1A-A963-CAB639DD8B00"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.6:*:*:*:*:*:*:*", "cpeNameId": "50313D29-F34E-4C0D-9144-484B999408DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.7:*:*:*:*:*:*:*", "cpeNameId": "5072B87F-09B0-417E-AD87-62C547BACCCC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.8:*:*:*:*:*:*:*", "cpeNameId": "0B3A862B-7B4A-4047-8B20-95188E30CC05"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.9:*:*:*:*:*:*:*", "cpeNameId": "C2049E4B-7E7F-4EE7-9BB1-521933C89D8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.10:*:*:*:*:*:*:*", "cpeNameId": "B409C2ED-789D-4ED8-A8CB-01600CAAA35E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.11:*:*:*:*:*:*:*", "cpeNameId": "D0A3901E-C3E7-42ED-802E-A62C1062B5B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.12:*:*:*:*:*:*:*", "cpeNameId": "85546B06-87AF-486E-8CC0-938579A020EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.13:*:*:*:*:*:*:*", "cpeNameId": "342CDE85-BF76-4CEB-8BA4-67ADC711496D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9:*:*:*:*:*:*:*", "cpeNameId": "C9009932-A990-4A1B-BE48-BED9A9A7FC65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9:-:*:*:*:*:*:*", "cpeNameId": "1CCCD217-0A7E-40A1-9520-617E661F1645"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9:rc1:*:*:*:*:*:*", "cpeNameId": "A7AE781E-2F1A-4C28-9CC5-476CE68CF1D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9:rc2:*:*:*:*:*:*", "cpeNameId": "5A29C44C-C923-4D5B-931C-0CE194896E8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9:rc3:*:*:*:*:*:*", "cpeNameId": "8793DB1D-710C-41A5-8BE4-895C45978720"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9:rc4:*:*:*:*:*:*", "cpeNameId": "A2345A72-55AE-4255-A7C4-73FDC8CDEF5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9:rc5:*:*:*:*:*:*", "cpeNameId": "EB60446B-804B-4948-B1B3-754169BD691E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9:rc6:*:*:*:*:*:*", "cpeNameId": "24401905-3848-4876-894C-45120BA6A0CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9:rc7:*:*:*:*:*:*", "cpeNameId": "2076878B-89D6-47D8-9572-9B9689FC2BEF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9.0:*:*:*:*:*:*:*", "cpeNameId": "169A5C5F-B455-4F6F-BF24-A312ECAFCE52"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9.1:*:*:*:*:*:*:*", "cpeNameId": "FCFDFA6F-C701-4BB1-8735-6C1F0E706C8B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9.2:*:*:*:*:*:*:*", "cpeNameId": "34F883C1-8869-4871-A2C2-7A4EBE52A72A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9.3:*:*:*:*:*:*:*", "cpeNameId": "F698940C-F9F2-4ED7-9AB5-4D5A2A3D7CE8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9.4:*:*:*:*:*:*:*", "cpeNameId": "3126DB9D-16C5-48EB-8548-304D58230779"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9.5:*:*:*:*:*:*:*", "cpeNameId": "01A51FAA-3D22-4445-9C47-192575EEA608"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9.6:*:*:*:*:*:*:*", "cpeNameId": "750F5059-2C73-4554-9789-1D880CA5DEE7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9.7:*:*:*:*:*:*:*", "cpeNameId": "D928DDB6-091C-4CA2-804C-390334A896B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9.8:*:*:*:*:*:*:*", "cpeNameId": "4EEC2898-AB1B-482B-AFC9-4849B0140622"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9.9:*:*:*:*:*:*:*", "cpeNameId": "D1ADF9CE-CF40-44B5-A7D1-82EEAA8FCBB9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9.10:*:*:*:*:*:*:*", "cpeNameId": "73EAE99F-3F30-429A-8C6D-22AB052D61AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9.11:*:*:*:*:*:*:*", "cpeNameId": "58920DA7-409B-42BB-932E-76F0BE199BD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10:*:*:*:*:*:*:*", "cpeNameId": "627457F8-5AC8-4B56-90A8-F5817CEA1A02"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10:-:*:*:*:*:*:*", "cpeNameId": "B5D985BC-815C-4878-890F-A3CACB0B2C04"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10:rc1:*:*:*:*:*:*", "cpeNameId": "2B6DFE57-F18D-4466-8009-E56C1322A73B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10:rc2:*:*:*:*:*:*", "cpeNameId": "76E6C370-1859-4C7D-B9C3-C461D4932777"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10:rc3:*:*:*:*:*:*", "cpeNameId": "15784D14-3246-468A-8294-6B24FF62FDA8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10:rc4:*:*:*:*:*:*", "cpeNameId": "EB4B221D-C82B-4A7B-9143-25F7EA059041"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10:rc5:*:*:*:*:*:*", "cpeNameId": "A0635D56-7D89-4FE8-94DC-5E62E64EF17D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10:rc6:*:*:*:*:*:*", "cpeNameId": "CC3F67C3-CA69-4A13-8ACF-FC21990D5FAA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10:rc7:*:*:*:*:*:*", "cpeNameId": "5D39315F-8D24-4FCF-90B9-6E9369644DBE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.1:*:*:*:*:*:*:*", "cpeNameId": "36E0C37B-1059-4ECE-A8A8-4E7085ECB47E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.2:*:*:*:*:*:*:*", "cpeNameId": "36540352-DC52-4A5E-8E8C-9D05136A05BA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.3:*:*:*:*:*:*:*", "cpeNameId": "42630BB7-77F6-4E7E-8C9F-10D082BE9C86"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.4:*:*:*:*:*:*:*", "cpeNameId": "E35AB549-17AC-49BF-8ED9-15669310F079"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.5:*:*:*:*:*:*:*", "cpeNameId": "BDBF9D93-EFD8-4A4E-81C9-0F0C75FC16A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.6:*:*:*:*:*:*:*", "cpeNameId": "610F682A-AF20-4B5D-AA11-4F42C35B76D6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.7:*:*:*:*:*:*:*", "cpeNameId": "ADD79206-8D78-4BE9-B026-B1F822CDE556"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.8:*:*:*:*:*:*:*", "cpeNameId": "6F974AC6-0755-4F37-8412-02C361FEFB12"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.9:*:*:*:*:*:*:*", "cpeNameId": "890670E2-6785-47F4-86DE-93B58D48B91E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.10:*:*:*:*:*:*:*", "cpeNameId": "CE332AF0-A825-4216-B40B-930150C5CDF6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.11:*:*:*:*:*:*:*", "cpeNameId": "3E14F0B1-F85F-470B-B3DC-348B4784E611"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.12:*:*:*:*:*:*:*", "cpeNameId": "8D5DC9C4-BC9C-408F-AB6E-B71546668696"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.13:*:*:*:*:*:*:*", "cpeNameId": "25D38678-6147-4568-8FCC-CC82359417D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.14:*:*:*:*:*:*:*", "cpeNameId": "4EB118D0-AE6E-44C9-9969-CF2294698B06"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.15:*:*:*:*:*:*:*", "cpeNameId": "0A0706BE-9D8C-4781-B317-F73AFB379711"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.16:*:*:*:*:*:*:*", "cpeNameId": "64EE6331-F08C-4AD1-96F8-AB203BD22BFA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.17:*:*:*:*:*:*:*", "cpeNameId": "815A07AB-2704-473B-8438-AE69C1068040"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.18:*:*:*:*:*:*:*", "cpeNameId": "DBD88C4C-3287-43EE-ACB7-E5048E733D9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.19:*:*:*:*:*:*:*", "cpeNameId": "85991037-0786-4EED-81E7-6891E7A8DC2D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.20:*:*:*:*:*:*:*", "cpeNameId": "1403FE7F-53BC-4C3A-A0A6-0F284E097303"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.21:*:*:*:*:*:*:*", "cpeNameId": "7625E253-3F26-4923-9690-002AC4F18351"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.22:*:*:*:*:*:*:*", "cpeNameId": "55C8CD03-5BC7-48AE-AEF8-491EC0CCFBE8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.23:*:*:*:*:*:*:*", "cpeNameId": "DDBF32C8-F3C1-4FDD-94EC-2CB12DDD301A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.24:*:*:*:*:*:*:*", "cpeNameId": "F71917E6-D98D-4017-9410-E250F98E5150"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.25:*:*:*:*:*:*:*", "cpeNameId": "D1DB0CB7-8777-4FFA-BDA7-0E905821248D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.26:*:*:*:*:*:*:*", "cpeNameId": "5C216138-ADC4-4B4B-832A-0D5F45CB8601"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.27:*:*:*:*:*:*:*", "cpeNameId": "C0842F91-5527-418E-893E-2815B0B25B12"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.28:*:*:*:*:*:*:*", "cpeNameId": "455FB880-6681-4F6E-B7EE-DAB35E68ED00"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.29:*:*:*:*:*:*:*", "cpeNameId": "7ECF8E96-BB6C-48A1-A939-CAF7EEF01DAA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.30:*:*:*:*:*:*:*", "cpeNameId": "431061A4-8B29-44AC-8B5A-B00B492AF919"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.31:*:*:*:*:*:*:*", "cpeNameId": "C7A2D5DC-2AB9-4CB0-85B6-E9E3D52ECAE7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.32:*:*:*:*:*:*:*", "cpeNameId": "C9B41E65-9F6F-409B-AE9A-82BB1AE405AF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.33:*:*:*:*:*:*:*", "cpeNameId": "84FA7866-7446-4F3E-AFE7-B678A77F7678"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.34:*:*:*:*:*:*:*", "cpeNameId": "B37F635D-70D3-4A0F-BC7A-F724A00597EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.35:*:*:*:*:*:*:*", "cpeNameId": "6C02AEA8-E18E-4CE2-983F-FD54F170D970"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.36:*:*:*:*:*:*:*", "cpeNameId": "58D3B0A5-3DD9-46A6-AF11-FDC7670F9A5E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.37:*:*:*:*:*:*:*", "cpeNameId": "705AAD20-057F-4E96-8054-5ABFA09DEC45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.38:*:*:*:*:*:*:*", "cpeNameId": "59548517-C5F0-4917-ADF8-4C33A8590526"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.39:*:*:*:*:*:*:*", "cpeNameId": "27F7B769-9A4C-4AB9-9D07-18AAD41D0EEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.40:*:*:*:*:*:*:*", "cpeNameId": "9AAB506F-9A8F-40DD-ADD8-800C9EF8158F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.41:*:*:*:*:*:*:*", "cpeNameId": "92E1E10B-853E-4B5D-965A-EC219484816B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.42:*:*:*:*:*:*:*", "cpeNameId": "3E99C617-2C7C-49FB-A83C-8D425936A8EC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.43:*:*:*:*:*:*:*", "cpeNameId": "D6410957-5E95-48A0-BCA9-2235FAED1FE8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.44:*:*:*:*:*:*:*", "cpeNameId": "93A1603D-5749-4D3E-AEC4-2EA665A4682B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.45:*:*:*:*:*:*:*", "cpeNameId": "B739CA1D-E0B1-4D30-B7CE-E66FA1FFDBBC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.46:*:*:*:*:*:*:*", "cpeNameId": "E3725D22-0894-4887-A626-825BEB339578"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.47:*:*:*:*:*:*:*", "cpeNameId": "39640B61-C244-43C9-AB0C-6A220A1A5A56"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.48:*:*:*:*:*:*:*", "cpeNameId": "E6788528-AE41-473C-949B-710669D2D819"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.49:*:*:*:*:*:*:*", "cpeNameId": "D26658AF-CBE6-4E04-BF1A-F72C6E324B13"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.50:*:*:*:*:*:*:*", "cpeNameId": "524F7BF2-2CE3-4AF7-B2CE-27BDE272F5CE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.51:*:*:*:*:*:*:*", "cpeNameId": "5A46A50B-BE7A-422E-B5A5-85C4E7A9086B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.52:*:*:*:*:*:*:*", "cpeNameId": "BC501D66-6C4E-4287-B6B1-AF31DB34E6DE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.53:*:*:*:*:*:*:*", "cpeNameId": "A7F6AE2D-5239-42A4-BE47-B8405AFE4F15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.54:*:*:*:*:*:*:*", "cpeNameId": "FCAF15A4-5502-4988-972D-03C4FC1C8006"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.55:*:*:*:*:*:*:*", "cpeNameId": "6068E853-E361-413E-A374-6140BA7E3AEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.56:*:*:*:*:*:*:*", "cpeNameId": "4FC2A2C4-F834-43B1-8C2F-55BB48AD6576"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.57:*:*:*:*:*:*:*", "cpeNameId": "9EA2D1E4-4425-45AF-9C93-193BB49EA83A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.58:*:*:*:*:*:*:*", "cpeNameId": "74FD8119-9DCC-4CF1-BF22-CC9B0975F993"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.59:*:*:*:*:*:*:*", "cpeNameId": "97034175-79EB-4975-AEED-2C504169DAD3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.60:*:*:*:*:*:*:*", "cpeNameId": "F2AD8245-8B96-45BF-9E5D-0B24A3CE878D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.61:*:*:*:*:*:*:*", "cpeNameId": "2338CE12-153B-40A1-9200-757DE8EE2B31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.62:*:*:*:*:*:*:*", "cpeNameId": "BFA482D2-DAFA-43D9-BAD5-454D33FC986E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.63:*:*:*:*:*:*:*", "cpeNameId": "DE75E0A4-72AF-42DD-9A60-28DD82E24567"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.64:*:*:*:*:*:*:*", "cpeNameId": "57E7B27B-9D49-425A-AD27-D1FC5F1F5007"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.65:*:*:*:*:*:*:*", "cpeNameId": "FC5F79AC-A9F4-46F9-8390-21319C190DE2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.66:*:*:*:*:*:*:*", "cpeNameId": "267199FD-8267-4026-B0D5-8120C74CA81C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.67:*:*:*:*:*:*:*", "cpeNameId": "2FB70320-422D-41C6-9BE6-A90DA6C50C45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.68:*:*:*:*:*:*:*", "cpeNameId": "990F0E4A-3D05-4A24-93B9-821C5FA89E61"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.69:*:*:*:*:*:*:*", "cpeNameId": "86B87B65-18E8-46B1-BA2D-818DA2A97589"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.70:*:*:*:*:*:*:*", "cpeNameId": "14F9E78A-8939-4871-8C3A-176553FCE3F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.71:*:*:*:*:*:*:*", "cpeNameId": "AD18BF6A-8E8A-4F49-A685-7C52C567A804"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.72:*:*:*:*:*:*:*", "cpeNameId": "FBA9034E-BB55-4749-90A9-98D200B4655A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.73:*:*:*:*:*:*:*", "cpeNameId": "B7587B68-C990-47CF-BD9F-FC8A8AAAB01D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.74:*:*:*:*:*:*:*", "cpeNameId": "1EABE4F9-0363-4FE7-B6CE-415714E38C9E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.75:*:*:*:*:*:*:*", "cpeNameId": "2244EA46-B3EA-4AA6-A739-DC99BA897D8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.76:*:*:*:*:*:*:*", "cpeNameId": "54446C18-F95D-4767-9E2A-BBB520D1578B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.77:*:*:*:*:*:*:*", "cpeNameId": "8B94B3BD-37A2-46C8-B443-C69BAE2A93D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.78:*:*:*:*:*:*:*", "cpeNameId": "4B0A2778-F0C7-4932-9B59-5DBAC0E56BC1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.79:*:*:*:*:*:*:*", "cpeNameId": "E60581E5-899D-4C89-AB6F-CB591072FC40"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.80:*:*:*:*:*:*:*", "cpeNameId": "B264E855-88CD-4497-AD61-BAD605BDADB3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.81:*:*:*:*:*:*:*", "cpeNameId": "DF2C4C4B-9057-4E0E-9AB3-CFAEBB2B3FC4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.82:*:*:*:*:*:*:*", "cpeNameId": "FCD95819-4985-4986-836B-C60A6A7603A0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.83:*:*:*:*:*:*:*", "cpeNameId": "7857A3A2-6650-4E55-B69A-36A1C220AE69"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.84:*:*:*:*:*:*:*", "cpeNameId": "58854616-0E47-43CA-8F84-2820A63B578A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.85:*:*:*:*:*:*:*", "cpeNameId": "DED66AEB-55F2-4E73-9E63-A2A351B7C4A5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.86:*:*:*:*:*:*:*", "cpeNameId": "9AD4F8F7-DD35-4753-B28D-89AF3A118AE4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.87:*:*:*:*:*:*:*", "cpeNameId": "5DB0B4F9-191A-4190-B894-133F8D8D69D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.88:*:*:*:*:*:*:*", "cpeNameId": "4C7015DD-D345-46D2-BEDB-6C2371BA4CCB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.89:*:*:*:*:*:*:*", "cpeNameId": "4AB80BF4-4DA6-4A21-9170-271328D4BE10"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.90:*:*:*:*:*:*:*", "cpeNameId": "4DDE1841-2392-477A-AC6A-05EE08C442AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.91:*:*:*:*:*:*:*", "cpeNameId": "866D88DB-8640-4219-A519-C9D1DFE75A0A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.92:*:*:*:*:*:*:*", "cpeNameId": "CCF4FE02-E968-4718-B0C1-E34611B4A678"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.93:*:*:*:*:*:*:*", "cpeNameId": "3466DEC0-18B6-4CCC-9035-699DB58A08DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.94:*:*:*:*:*:*:*", "cpeNameId": "E2E267A5-F455-4F4B-B0DC-32695915F1F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.95:*:*:*:*:*:*:*", "cpeNameId": "1A09E587-339A-4653-897D-90351A1B1025"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.96:*:*:*:*:*:*:*", "cpeNameId": "C1173A8A-4845-4811-B351-EC99088D9CC2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.97:*:*:*:*:*:*:*", "cpeNameId": "164972DF-5261-4E50-AA72-0D593A06093E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.98:*:*:*:*:*:*:*", "cpeNameId": "959D88A5-1F60-4CC0-AA2A-FE4CA946B52C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.99:*:*:*:*:*:*:*", "cpeNameId": "83FA5052-1126-43B6-B154-9693B0DC5D68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.100:*:*:*:*:*:*:*", "cpeNameId": "FE74990F-736C-40A6-B9A6-5DB0862A3598"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.101:*:*:*:*:*:*:*", "cpeNameId": "65A3F087-7FDD-464B-B5E8-11A123B6FED0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.102:*:*:*:*:*:*:*", "cpeNameId": "4361D9D4-566F-48FA-A9B5-9DF5F480F87D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.103:*:*:*:*:*:*:*", "cpeNameId": "96462486-A899-4D91-AE51-05076698C747"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.104:*:*:*:*:*:*:*", "cpeNameId": "68B1A24A-226E-4C33-B506-68A97B8EB668"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.105:*:*:*:*:*:*:*", "cpeNameId": "DEDE9948-C1FC-49B3-8506-3D2951BFBB59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.106:*:*:*:*:*:*:*", "cpeNameId": "A4F41E53-E5A7-48F9-98A4-AD0AC46B29E5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.107:*:*:*:*:*:*:*", "cpeNameId": "D381BFF6-927D-4DCA-BB4F-4F42E77DEF75"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.108:*:*:*:*:*:*:*", "cpeNameId": "3398626D-D51A-4F5B-A24A-F23C0D2CB910"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11:*:*:*:*:*:*:*", "cpeNameId": "F75AFEC9-47FA-4037-90F6-A48AA82289C9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11:rc1:*:*:*:*:*:*", "cpeNameId": "5BEAC0E5-F63C-4AC6-95FC-CF80E30AA77E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11:rc2:*:*:*:*:*:*", "cpeNameId": "E5BBF478-F0EE-487A-B822-0C3E66912C59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11:rc3:*:*:*:*:*:*", "cpeNameId": "88CE34B4-9D9A-4AC8-B6F3-79A4DFA9D46A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11:rc4:*:*:*:*:*:*", "cpeNameId": "9C7C660C-5CB3-49CB-A94E-E772F275C30F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11:rc5:*:*:*:*:*:*", "cpeNameId": "91C8A273-5AF6-4E43-B09C-880A80B8CE77"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11:rc6:*:*:*:*:*:*", "cpeNameId": "B6A758CD-437D-4073-87A1-259DCE2BB31B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11:rc7:*:*:*:*:*:*", "cpeNameId": "B599BCFA-E2F9-4870-B34B-223562EA4FFC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11.1:*:*:*:*:*:*:*", "cpeNameId": "8D482F9D-E3F6-4C32-A00C-415D1326F573"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11.2:*:*:*:*:*:*:*", "cpeNameId": "952A504C-0AED-46A3-A44F-2804AC428A64"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11.3:*:*:*:*:*:*:*", "cpeNameId": "07351A9F-CF21-4D89-ABC4-595BA4B6117E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11.4:*:*:*:*:*:*:*", "cpeNameId": "D864C50A-53DD-4BFA-B846-4CB6EB1F718C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11.5:*:*:*:*:*:*:*", "cpeNameId": "2FB9015E-80F3-48F4-AF87-1A0308E755BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11.6:*:*:*:*:*:*:*", "cpeNameId": "2E8F4459-22C0-4006-8760-2A3DF30E1EBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11.7:*:*:*:*:*:*:*", "cpeNameId": "04ED3CC1-93AA-46B8-81B8-2A1EBF958C5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11.8:*:*:*:*:*:*:*", "cpeNameId": "E46B14D2-5050-4359-992A-E025238FB60E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11.9:*:*:*:*:*:*:*", "cpeNameId": "8F22E34B-3CBD-4F71-9C93-10511FEC2ECE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11.10:*:*:*:*:*:*:*", "cpeNameId": "53E5A537-6C5E-463B-8BBA-F29456EC0728"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12:*:*:*:*:*:*:*", "cpeNameId": "64B896A7-E835-4D8C-BA75-179A4A1C5A21"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.1:*:*:*:*:*:*:*", "cpeNameId": "A5798E8B-25FE-4B2F-8425-ADA099CB6469"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.2:*:*:*:*:*:*:*", "cpeNameId": "00133E45-0260-47F0-93EB-50C9DA890A91"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.3:*:*:*:*:*:*:*", "cpeNameId": "905F7914-1CF3-47AE-8017-2577783E2B1D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.4:*:*:*:*:*:*:*", "cpeNameId": "3C6255BD-73CA-4B3B-BA1A-2B0C6B21C127"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.5:*:*:*:*:*:*:*", "cpeNameId": "5AB5DA1C-54FE-4065-9A6C-CF4292F5C766"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.6:*:*:*:*:*:*:*", "cpeNameId": "F94EAD8F-C9AF-4A71-8833-BEBB089C650B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.7:*:*:*:*:*:*:*", "cpeNameId": "65DC5222-0DF1-4F28-B48D-1B6987E4A250"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.8:*:*:*:*:*:*:*", "cpeNameId": "501F73DF-5349-4A18-AEC2-2DDA0FE61C2C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.9:*:*:*:*:*:*:*", "cpeNameId": "614BF4FA-00CF-48BB-AB0B-24268FD8116B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.10:*:*:*:*:*:*:*", "cpeNameId": "EE2F0BFF-481B-4403-85E8-CD3BEF29C49F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.11:*:*:*:*:*:*:*", "cpeNameId": "9EED81CF-D6C3-4521-8AA7-1057F00F4A84"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.12:*:*:*:*:*:*:*", "cpeNameId": "07A81603-5E43-4FAF-950A-8E9C84F2A7EE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.13:*:*:*:*:*:*:*", "cpeNameId": "BE3BAA85-6B7B-4893-9B06-0743B846FAF4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.14:*:*:*:*:*:*:*", "cpeNameId": "5CA9D680-CF72-4880-A263-7B5053CCC57D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.15:*:*:*:*:*:*:*", "cpeNameId": "52A55F4F-315E-4768-B2E3-13E044CC2598"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.16:*:*:*:*:*:*:*", "cpeNameId": "6DD80A01-AF1D-451B-B71E-6C35D01D3582"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.17:*:*:*:*:*:*:*", "cpeNameId": "677145FC-D4B5-46BC-B20B-2E89A95A75C7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.18:*:*:*:*:*:*:*", "cpeNameId": "0AEA1E6B-EDCC-4C8B-B8BD-49EF072F9662"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.19:*:*:*:*:*:*:*", "cpeNameId": "67D3A852-7617-495D-90B6-F9162A2DA19B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.20:*:*:*:*:*:*:*", "cpeNameId": "A50A0202-7561-46CE-BB13-70B1C30B44F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.21:*:*:*:*:*:*:*", "cpeNameId": "D0C55472-843A-4E56-883B-FC8286BDA3D7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.22:*:*:*:*:*:*:*", "cpeNameId": "43C97962-E307-4C33-9E7B-67C5B93CC4B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.23:*:*:*:*:*:*:*", "cpeNameId": "987EFE31-3789-47AF-99E0-48473B4B4A50"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.24:*:*:*:*:*:*:*", "cpeNameId": "C4697F43-ADAD-45A8-BC55-DEF93AF196A7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.25:*:*:*:*:*:*:*", "cpeNameId": "8879CA5B-DB0D-4589-9CDE-DBD94EF6FBE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.26:*:*:*:*:*:*:*", "cpeNameId": "329DD992-7C17-47BA-B421-8CD73D49D6EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.27:*:*:*:*:*:*:*", "cpeNameId": "41303B07-D3D7-40F8-93F1-85CD3343490C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.28:*:*:*:*:*:*:*", "cpeNameId": "035C87B6-8568-4673-B414-7E2BC872AE43"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.29:*:*:*:*:*:*:*", "cpeNameId": "14E4850D-2E72-49C1-9977-072FFAFF85EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.30:*:*:*:*:*:*:*", "cpeNameId": "FDFE0F89-D3F8-4D4D-9CE1-0E88C232EFE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.31:*:*:*:*:*:*:*", "cpeNameId": "778A3B9C-55D6-43B6-A5F8-6EB19EB7516D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.32:*:*:*:*:*:*:*", "cpeNameId": "F0E31FB4-CC29-4E44-9497-00FA47A8E9BE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.33:*:*:*:*:*:*:*", "cpeNameId": "EBD62036-9111-43E7-A5F8-EACF7BCB75FA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.34:*:*:*:*:*:*:*", "cpeNameId": "BE875471-EB8B-4187-A218-79BF0160106F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.35:*:*:*:*:*:*:*", "cpeNameId": "A1D08608-8242-4271-ABA8-24F53563796A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.36:*:*:*:*:*:*:*", "cpeNameId": "87BAFA75-3062-4330-B30E-BB3379D61996"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.37:*:*:*:*:*:*:*", "cpeNameId": "DFD328E2-C1A1-443F-B9B2-61E154FEC308"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.38:*:*:*:*:*:*:*", "cpeNameId": "A0C6DBCC-E339-44A2-BF07-C4BFA0A75218"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.39:*:*:*:*:*:*:*", "cpeNameId": "B8A25CCA-C76A-4C4A-A287-4263E9F193F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.40:*:*:*:*:*:*:*", "cpeNameId": "F7FC78A4-49B1-4BD5-A239-2913792F0D38"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.41:*:*:*:*:*:*:*", "cpeNameId": "E61ADF4E-64CA-44F9-BB10-8E05E4F9A49E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.42:*:*:*:*:*:*:*", "cpeNameId": "DF51174B-8193-49A6-AA5F-A88E55B5689C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.43:*:*:*:*:*:*:*", "cpeNameId": "660F6036-C153-4C4D-9C1C-8251780FD091"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.44:*:*:*:*:*:*:*", "cpeNameId": "AC5B232F-9000-4773-ACC7-A089BD2D1F95"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.45:*:*:*:*:*:*:*", "cpeNameId": "61441944-DB00-4959-9CF1-2FB0ABA9BD3C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.46:*:*:*:*:*:*:*", "cpeNameId": "49C78690-FF34-46C0-90E0-C8364AB6302C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.47:*:*:*:*:*:*:*", "cpeNameId": "25525F05-9701-4C5F-A520-5CE5D3F098F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.48:*:*:*:*:*:*:*", "cpeNameId": "9E751725-7306-4149-8716-76DF78D28E0D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.49:*:*:*:*:*:*:*", "cpeNameId": "26C4C2E6-B873-4617-839A-CEB90C44DEB8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.50:*:*:*:*:*:*:*", "cpeNameId": "25B9F5A0-597A-4CDB-BAD2-7EFDED049ADB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.51:*:*:*:*:*:*:*", "cpeNameId": "23960434-54B9-4CD3-8259-27E868FAD8F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.52:*:*:*:*:*:*:*", "cpeNameId": "CDD83033-874F-48F5-87AA-954427858E93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.53:*:*:*:*:*:*:*", "cpeNameId": "DE70E58D-E54C-4EBF-AF80-073F06F48E96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.54:*:*:*:*:*:*:*", "cpeNameId": "A55F66D7-EFCC-4B69-A1DF-E079988DE459"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.55:*:*:*:*:*:*:*", "cpeNameId": "992B91FA-ED2E-472B-A540-8EDDDAB546DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.56:*:*:*:*:*:*:*", "cpeNameId": "C3E5ED56-2BFD-4B5B-A868-64FE8F556673"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.57:*:*:*:*:*:*:*", "cpeNameId": "5EB333E2-620D-4F48-9162-3A2A7269A5FA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.58:*:*:*:*:*:*:*", "cpeNameId": "91C923D0-3C2B-491F-BE0E-5283907AE153"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.59:*:*:*:*:*:*:*", "cpeNameId": "809D9A62-1091-437F-828C-E08C6DDA03D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.60:*:*:*:*:*:*:*", "cpeNameId": "402B78BE-A405-4665-9836-AD6043AD7D70"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.61:*:*:*:*:*:*:*", "cpeNameId": "A331CC45-D7C5-4930-8DA9-0FD2976C829B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.62:*:*:*:*:*:*:*", "cpeNameId": "B4FF0AA0-3B07-45DC-949B-053D7F53CC6B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.63:*:*:*:*:*:*:*", "cpeNameId": "B0B58B50-8AEA-449F-9AEF-89713152EAE3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.64:*:*:*:*:*:*:*", "cpeNameId": "0C9BB368-F2ED-4C3B-8E8A-295D5EA7B6D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.65:*:*:*:*:*:*:*", "cpeNameId": "2614B472-06A6-4DB5-99FE-6D6DB58EE9F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.66:*:*:*:*:*:*:*", "cpeNameId": "46C58247-7B77-4957-8C6C-256801A1BD7C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.67:*:*:*:*:*:*:*", "cpeNameId": "E79A8ECB-6A3E-458B-874A-246BF02438F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.68:*:*:*:*:*:*:*", "cpeNameId": "A66131F6-5BD1-4DE0-BD71-24B8F8E8A0E7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.69:*:*:*:*:*:*:*", "cpeNameId": "747F4A0A-795F-4764-84EA-F1E4B3C0AFA3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.70:*:*:*:*:*:*:*", "cpeNameId": "2BD55A5D-F95E-4980-838F-3D2C95475702"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.71:*:*:*:*:*:*:*", "cpeNameId": "D1DCC046-F7A5-4700-9F36-C18E6B97E247"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.72:*:*:*:*:*:*:*", "cpeNameId": "6418388D-4EA9-4676-B750-23B1E05EDB03"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.73:*:*:*:*:*:*:*", "cpeNameId": "2E62C9EE-C007-44BA-B1EE-B6F56AABFD62"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.74:*:*:*:*:*:*:*", "cpeNameId": "61D92C4C-6A59-45EA-B16A-A877DBF5267F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.13:*:*:*:*:*:*:*", "cpeNameId": "7675C9E5-D99B-4559-813B-08F5409902B8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.13:rc1:*:*:*:*:*:*", "cpeNameId": "704510E8-D773-421C-B4B8-F1B71978C66A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.13.1:*:*:*:*:*:*:*", "cpeNameId": "7179867B-6349-4785-A0E8-F5F482F45ED0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.13.2:*:*:*:*:*:*:*", "cpeNameId": "7C5BFB48-EF90-4264-BC04-7F16B6FED2A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.13.3:*:*:*:*:*:*:*", "cpeNameId": "FE5C9534-292E-4E03-8F5E-58B54CE6E1BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.13.4:*:*:*:*:*:*:*", "cpeNameId": "9B186AFD-8409-43C0-A7BE-FD3922148612"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.13.5:*:*:*:*:*:*:*", "cpeNameId": "0BB9D21D-FEA0-4AD0-B648-28D885F21C32"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.13.6:*:*:*:*:*:*:*", "cpeNameId": "1D6D97DE-0481-4C82-BB8A-832867572022"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.13.7:*:*:*:*:*:*:*", "cpeNameId": "7CA0A0D0-0BFB-4F04-B3C6-7E4392BBFF31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.13.8:*:*:*:*:*:*:*", "cpeNameId": "098C278A-3A8A-4510-9EAC-C3341B334B88"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.13.9:*:*:*:*:*:*:*", "cpeNameId": "BD4E7777-D71C-4C8F-891F-A0571D2B9107"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.13.10:*:*:*:*:*:*:*", "cpeNameId": "C6AEDFDC-DBD6-4D00-AE8C-45230E3B90C7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.13.11:*:*:*:*:*:*:*", "cpeNameId": "1D513E96-5147-4AC0-B88E-39D255397849"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14:-:*:*:*:*:*:*", "cpeNameId": "1D9BAB2A-ACD5-4894-ACF3-BB019C0D9DAE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14:rc1:*:*:*:*:*:*", "cpeNameId": "275C31DB-1803-404A-B330-5C8BDA278F3E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14:rc2:*:*:*:*:*:*", "cpeNameId": "F3F198B6-5F96-4DAA-AD09-6239B6A86D74"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14:rc3:*:*:*:*:*:*", "cpeNameId": "69BAE2C9-57F4-4215-8AFC-A08082F91F89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14:rc4:*:*:*:*:*:*", "cpeNameId": "EDD65366-2557-44F5-B9BA-DD37AE036110"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14:rc5:*:*:*:*:*:*", "cpeNameId": "E044E8FA-940A-4293-83C0-4F42F00E30B8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14:rc6:*:*:*:*:*:*", "cpeNameId": "D98D7A2C-5208-41E2-8E41-2EF23273F91C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14:rc7:*:*:*:*:*:*", "cpeNameId": "1CFADBD3-9088-42D7-AD96-2B90F566D83E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14:rc8:*:*:*:*:*:*", "cpeNameId": "C353F80F-94CD-4CE0-8B55-EFADABD82F01"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.1:*:*:*:*:*:*:*", "cpeNameId": "EFAAC9F0-0CBF-41F8-BFAA-792B68ACC080"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.2:*:*:*:*:*:*:*", "cpeNameId": "7C11DBE5-5367-4A8C-8892-1845187B0DAF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.3:*:*:*:*:*:*:*", "cpeNameId": "31D44284-BB44-4E6E-837C-3ACB4B6D3B98"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.4:*:*:*:*:*:*:*", "cpeNameId": "E0BEF371-B9BB-47D0-A565-4A5235548473"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.5:*:*:*:*:*:*:*", "cpeNameId": "3D16437E-1E60-4921-8A0D-D7A9D92B8765"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.6:*:*:*:*:*:*:*", "cpeNameId": "2F640FC6-6044-448F-8821-0CEED7B2FA99"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.7:*:*:*:*:*:*:*", "cpeNameId": "32195292-ACC9-4769-B0F5-B4A1556413D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.8:*:*:*:*:*:*:*", "cpeNameId": "F58DCB69-AF8A-46D0-908D-C46050B56588"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.9:*:*:*:*:*:*:*", "cpeNameId": "8A9A99A1-8548-4708-B249-945CAB4E0BDE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.10:*:*:*:*:*:*:*", "cpeNameId": "310204CE-EB36-4207-BE51-01B4EFA21612"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.11:*:*:*:*:*:*:*", "cpeNameId": "5EFDD809-F451-448D-BCA3-D8F1423877E3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.12:*:*:*:*:*:*:*", "cpeNameId": "5B4BD86F-D2A6-4800-8D5E-1F27F58F683F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.13:*:*:*:*:*:*:*", "cpeNameId": "1C190740-B2F4-4F2E-B6A0-98D96316968B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.14:*:*:*:*:*:*:*", "cpeNameId": "F655EE2A-0907-4AC1-969D-75421AA873BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.15:*:*:*:*:*:*:*", "cpeNameId": "CF8F0970-8DD7-4AFC-8BB3-CDDD4C0CCFCE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.16:*:*:*:*:*:*:*", "cpeNameId": "6E51D89B-7B3C-4B01-98F6-9EE63EECF0C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.17:*:*:*:*:*:*:*", "cpeNameId": "8C60A84F-4C1E-4745-8479-2DAB0F2AFA85"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.18:*:*:*:*:*:*:*", "cpeNameId": "7E2BED9C-EA21-4C51-924B-226BBFCED950"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.19:*:*:*:*:*:*:*", "cpeNameId": "EE4C5E0E-CE83-4E30-A6ED-F00D310F1007"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.20:*:*:*:*:*:*:*", "cpeNameId": "613E1F2F-51D2-47FB-9BEC-1500252E750F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.21:*:*:*:*:*:*:*", "cpeNameId": "46C29139-C9A6-4F18-922A-7B6B84739E19"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.22:*:*:*:*:*:*:*", "cpeNameId": "E3884214-BF14-43D5-AD47-28C63E8F2549"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.23:*:*:*:*:*:*:*", "cpeNameId": "1E15C7AB-DB2A-4383-9307-9ECDB67459D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.24:*:*:*:*:*:*:*", "cpeNameId": "3D260DE8-01A1-46E9-BA73-FC19FB9909E4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.25:*:*:*:*:*:*:*", "cpeNameId": "BE686202-3204-4E6D-94A1-DFBF267BE150"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.26:*:*:*:*:*:*:*", "cpeNameId": "0D6CB817-59F8-4416-95A7-0187B315FC43"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.27:*:*:*:*:*:*:*", "cpeNameId": "CDA9DAD3-11EE-4616-B437-8E5A016D2663"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.28:*:*:*:*:*:*:*", "cpeNameId": "87E8D5EC-7107-4A8B-90C6-EED05AC9F068"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.29:*:*:*:*:*:*:*", "cpeNameId": "477180AC-6496-43B7-BD33-B88FA9DF1BD8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.30:*:*:*:*:*:*:*", "cpeNameId": "69E9067D-3CDF-4A22-AF5F-64F8262A08A3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.31:*:*:*:*:*:*:*", "cpeNameId": "3197F63D-4282-4176-B9F0-3C9ED1852338"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.32:*:*:*:*:*:*:*", "cpeNameId": "BD3E1C90-E84E-4240-B5DB-EE0A640428D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.33:*:*:*:*:*:*:*", "cpeNameId": "D7DDB6E3-CAA5-4CDA-BC12-1051EB8A4915"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.34:*:*:*:*:*:*:*", "cpeNameId": "B4D681EA-C675-4F30-BA58-C00E1A1BF0C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.35:*:*:*:*:*:*:*", "cpeNameId": "10D5F3CC-5CE4-433A-8EE2-6C26D0B0F104"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.36:*:*:*:*:*:*:*", "cpeNameId": "2C87858B-A357-4109-8F4A-43F30D955337"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.37:*:*:*:*:*:*:*", "cpeNameId": "438D314D-81C9-46E2-A074-D3CDC8150A31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.38:*:*:*:*:*:*:*", "cpeNameId": "56FF2B04-ACFB-4CB5-B622-2500B7EBCF9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.39:*:*:*:*:*:*:*", "cpeNameId": "F188A8FC-42B2-484D-92F3-9820A0AFB215"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.40:*:*:*:*:*:*:*", "cpeNameId": "1C91D5D4-7E7C-4DE2-8485-580F7BC1DA94"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.41:*:*:*:*:*:*:*", "cpeNameId": "4FA8915E-F7A0-4EB2-B56B-A91F138153FF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.42:*:*:*:*:*:*:*", "cpeNameId": "CDE8EDFB-FA30-425F-AD32-F8BB598FE9DE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.43:*:*:*:*:*:*:*", "cpeNameId": "329775D3-608C-469E-9BF0-27B5743333B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.44:*:*:*:*:*:*:*", "cpeNameId": "5FCF03F5-EC66-466B-95F0-DCD0F290D8B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.45:*:*:*:*:*:*:*", "cpeNameId": "E46E69E4-EFEE-439E-9C2F-456ABD7FFFFC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.46:*:*:*:*:*:*:*", "cpeNameId": "AAE75E9F-C997-4361-85ED-01A12A505971"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.47:*:*:*:*:*:*:*", "cpeNameId": "4DCD068C-F3EC-4D35-909D-E00796FDF9D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.48:*:*:*:*:*:*:*", "cpeNameId": "072DDFA0-91FD-48BE-AC5C-B580C6CB6640"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.49:*:*:*:*:*:*:*", "cpeNameId": "5ABF4B87-D1FF-468F-BE3E-F00B44DD2DA8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.50:*:*:*:*:*:*:*", "cpeNameId": "6F239227-0791-4643-B831-84C1A08668CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.51:*:*:*:*:*:*:*", "cpeNameId": "D9D7B3F3-0FAD-4727-82ED-D1B01BEA5CAE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.52:*:*:*:*:*:*:*", "cpeNameId": "FA995237-C4AE-4356-AFCB-3ACFC2F06435"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.53:*:*:*:*:*:*:*", "cpeNameId": "97407565-A5B7-46B0-878B-76A598FD0DC4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.54:*:*:*:*:*:*:*", "cpeNameId": "73ED7AF3-B159-47BD-A2D7-3D2099B9549F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.55:*:*:*:*:*:*:*", "cpeNameId": "1C7DC9FB-31E4-4495-914C-BDF430224F2A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.56:*:*:*:*:*:*:*", "cpeNameId": "2B87E36E-C9C7-4287-B88E-B58CCDBEE8CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.57:*:*:*:*:*:*:*", "cpeNameId": "89CDF3D4-923A-42EB-B4F1-396752130549"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.58:*:*:*:*:*:*:*", "cpeNameId": "50F34BAE-FD72-4BA7-BDF3-2F063E263FE3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.59:*:*:*:*:*:*:*", "cpeNameId": "C17D896B-B112-4147-8B4E-D6809500DD0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.60:*:*:*:*:*:*:*", "cpeNameId": "CB0E701E-6E22-4C6B-ADC4-F7C9FED3490A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.61:*:*:*:*:*:*:*", "cpeNameId": "D5EC3A9F-488B-459B-B671-3CFF36C5264E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.62:*:*:*:*:*:*:*", "cpeNameId": "AAB9B2FA-7944-4BC7-9A19-C851CA4CA046"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.63:*:*:*:*:*:*:*", "cpeNameId": "7C8CFA70-2A89-4466-BF4E-58399541737F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.64:*:*:*:*:*:*:*", "cpeNameId": "2A0CBD6F-B950-4E1E-A538-EAC32B0F8D04"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.65:*:*:*:*:*:*:*", "cpeNameId": "302F00DB-6B4E-4974-9504-734827154FB8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.66:*:*:*:*:*:*:*", "cpeNameId": "D99E638B-B0EC-4DF7-8DFB-AA72926214AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.67:*:*:*:*:*:*:*", "cpeNameId": "2D123B44-2856-465B-BD85-533B959BB396"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.68:*:*:*:*:*:*:*", "cpeNameId": "6F411166-BE23-4D70-BAA4-2C37BCCCA795"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.69:*:*:*:*:*:*:*", "cpeNameId": "0DCE2177-093F-482E-8271-5BE75B5C4316"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.70:*:*:*:*:*:*:*", "cpeNameId": "829DAB82-FBA0-4C3D-852F-AF4920CE367B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.71:*:*:*:*:*:*:*", "cpeNameId": "8B763B63-7E89-4D31-B562-617198EB7A38"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.72:*:*:*:*:*:*:*", "cpeNameId": "DDEAEE70-1BEB-4C35-938A-7A2F0D5FF364"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.73:*:*:*:*:*:*:*", "cpeNameId": "5FBBDAD5-3210-49BC-B74C-1A3A59E38BD0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.74:*:*:*:*:*:*:*", "cpeNameId": "19C0B93D-C2D2-455F-BB51-70561B410251"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.75:*:*:*:*:*:*:*", "cpeNameId": "07647DB4-686E-4102-8A4B-FB7F7F4815D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.76:*:*:*:*:*:*:*", "cpeNameId": "225864D5-2AA2-4307-9AE4-36E4AE04110A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.77:*:*:*:*:*:*:*", "cpeNameId": "22C497DB-E1E3-4DFD-8E34-49796EAC1A3E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.78:*:*:*:*:*:*:*", "cpeNameId": "426F0C47-6D01-4224-92EF-986D75736A21"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.79:*:*:*:*:*:*:*", "cpeNameId": "D1756F76-C011-4755-82E3-997A11C5E1BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15:*:*:*:*:*:*:*", "cpeNameId": "F0E9A4B8-14FC-4869-AD9F-6246C6547675"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15:-:*:*:*:*:*:*", "cpeNameId": "E641A360-B4B9-4DF0-8F2E-7D5595E4CB00"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15:rc1:*:*:*:*:*:*", "cpeNameId": "118BFA5A-5522-46F1-8AE9-B68045907253"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15:rc2:*:*:*:*:*:*", "cpeNameId": "EC2F3273-918F-4CA8-8E3E-B0CBAE13039F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15:rc3:*:*:*:*:*:*", "cpeNameId": "85138DF9-2827-446B-B366-B0A20F1CAC4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15:rc4:*:*:*:*:*:*", "cpeNameId": "9EDCB3A7-36AC-4876-899D-C730BFBD51C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15:rc6:*:*:*:*:*:*", "cpeNameId": "513428B6-9ED7-429F-8EFA-414B66BB9A0A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15:rc7:*:*:*:*:*:*", "cpeNameId": "8C4E9BE9-AD91-4485-BE20-EBB81C5855B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15:rc8:*:*:*:*:*:*", "cpeNameId": "8706AA2E-64B2-412F-8C3C-C71110DE9BC9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15.1:*:*:*:*:*:*:*", "cpeNameId": "A0C9E4D7-B2A7-483B-98B7-A2CA6D9E0C7B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15.2:*:*:*:*:*:*:*", "cpeNameId": "D3F1222D-3C96-4F9A-B451-BA8C6AB11559"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15.3:*:*:*:*:*:*:*", "cpeNameId": "6D3E9B6B-73D6-47CD-83DF-D15B7FAE0B54"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15.4:*:*:*:*:*:*:*", "cpeNameId": "D09D6559-426F-401C-AAEA-50AA0131727F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15.5:*:*:*:*:*:*:*", "cpeNameId": "4576C52F-F54C-4DAF-99E7-64A078AFC64F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15.6:*:*:*:*:*:*:*", "cpeNameId": "F8ACD41C-8286-4481-AB2B-251455CA1DFF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15.7:*:*:*:*:*:*:*", "cpeNameId": "514EE5B7-BC9B-4A33-BFE3-F58F36176143"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15.8:*:*:*:*:*:*:*", "cpeNameId": "D7988546-C2DA-43EF-A366-BA433414B2BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15.9:*:*:*:*:*:*:*", "cpeNameId": "4A4616C1-AC52-4DAB-8A9E-EFF2995ACC3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15.10:*:*:*:*:*:*:*", "cpeNameId": "404717ED-8092-4310-B1D7-09DBE376FE7F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16:*:*:*:*:*:*:*", "cpeNameId": "0D147325-751C-4432-8659-4B28F342226C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.0:*:*:*:*:*:*:*", "cpeNameId": "978149A6-9A39-4896-AE9F-AE62071FF0B6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.1:*:*:*:*:*:*:*", "cpeNameId": "62B44D66-3148-4898-8789-85C8A7B27A40"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.2:*:*:*:*:*:*:*", "cpeNameId": "C76FB5C0-1C39-4E68-8F46-31FE00C018CC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.3:*:*:*:*:*:*:*", "cpeNameId": "88CCC2DD-0D9D-410C-8C24-92C5FC988B82"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.4:*:*:*:*:*:*:*", "cpeNameId": "033756ED-A578-42B2-93F2-36560EDDA0B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.5:*:*:*:*:*:*:*", "cpeNameId": "CAA952A3-3352-40F3-AD85-1764E26C6931"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.6:*:*:*:*:*:*:*", "cpeNameId": "EAF67B7C-FC7F-43DF-8238-C00AB67C30F7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.7:*:*:*:*:*:*:*", "cpeNameId": "2CC42649-1736-4748-8194-179E2F0576BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.35:*:*:*:*:*:*:*", "cpeNameId": "04FCF80C-585D-4A46-B874-49F9672541BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.36:*:*:*:*:*:*:*", "cpeNameId": "087658D7-B58E-49B5-AAF6-8268B05E6801"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.37:*:*:*:*:*:*:*", "cpeNameId": "01DE314D-2401-4FC2-8A9A-2D73356FDC23"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.38:*:*:*:*:*:*:*", "cpeNameId": "FCB85B1F-907F-4B32-B4D7-37B6BD2355F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.39:*:*:*:*:*:*:*", "cpeNameId": "1D6982FB-0E82-41B7-A209-5B5CF756BD9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.40:*:*:*:*:*:*:*", "cpeNameId": "B0B9A3E3-4FEC-413C-A97B-99E3FDDA1602"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.41:*:*:*:*:*:*:*", "cpeNameId": "65CBCBE3-A3F8-4CF6-BC30-24E77EBDE2A0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.42:*:*:*:*:*:*:*", "cpeNameId": "08CBF40F-1294-44E1-95AA-51B23466AD26"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.43:*:*:*:*:*:*:*", "cpeNameId": "68A8F4F3-A708-4BC7-B7FD-DCB35047847F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.44:*:*:*:*:*:*:*", "cpeNameId": "61DC1733-CCD9-47CD-8CA1-44C38CBFCC4F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.45:*:*:*:*:*:*:*", "cpeNameId": "ABB4790F-1BAE-4D38-BFAA-06F009031F1B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.46:*:*:*:*:*:*:*", "cpeNameId": "E9B9FB14-2860-4B64-AF08-18BA9BE7489B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.47:*:*:*:*:*:*:*", "cpeNameId": "26E01A49-3E16-4ED9-9681-62B3030AB68A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.48:*:*:*:*:*:*:*", "cpeNameId": "69C3C6D6-E1FA-4EC4-80C1-C02F61938549"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.49:*:*:*:*:*:*:*", "cpeNameId": "416FEB34-45F8-4398-8D94-3805E8C7F3DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.50:*:*:*:*:*:*:*", "cpeNameId": "BF545EBF-5A06-4463-A52C-939143C580E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.51:*:*:*:*:*:*:*", "cpeNameId": "5BD775DA-9D01-4314-96F7-743320925FA0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.52:*:*:*:*:*:*:*", "cpeNameId": "D0476FA4-F223-4687-AB62-A1AE985BF592"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.53:*:*:*:*:*:*:*", "cpeNameId": "B2F445F5-D0DA-4817-B4D5-137180AD5EE2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.54:*:*:*:*:*:*:*", "cpeNameId": "0C7A45E6-72C3-4478-BEFF-7BF02CB07848"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.55:*:*:*:*:*:*:*", "cpeNameId": "52C0AE2C-F11A-4174-ACBB-506C1945AB0C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.56:*:*:*:*:*:*:*", "cpeNameId": "C24A3322-D73A-4F67-9340-8EA61B5A9913"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.57:*:*:*:*:*:*:*", "cpeNameId": "5F55BFFB-BC77-4271-9D63-FBFC6DE367B2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.58:*:*:*:*:*:*:*", "cpeNameId": "09BE3ADC-1C8E-4BCC-A2D7-CCB66F4CE9B6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.59:*:*:*:*:*:*:*", "cpeNameId": "25C6AB87-321E-4ADB-9F0F-3F606FBDC85A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.60:*:*:*:*:*:*:*", "cpeNameId": "ADD78C70-C158-4BCE-950E-EDF40A095E89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.61:*:*:*:*:*:*:*", "cpeNameId": "F123EECC-8D3D-4E62-9071-7C1A6BCF61C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.62:*:*:*:*:*:*:*", "cpeNameId": "1DC81E13-D26C-4C7B-8932-91A5073057F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.63:*:*:*:*:*:*:*", "cpeNameId": "B3E66409-84A3-4541-9768-86B8A51FB328"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.64:*:*:*:*:*:*:*", "cpeNameId": "B0AEA29E-085F-407C-B0F3-20D641DBD474"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.65:*:*:*:*:*:*:*", "cpeNameId": "A025E699-97C5-4D0B-8082-84811E504EEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.66:*:*:*:*:*:*:*", "cpeNameId": "FF4394B2-3DAD-482E-9DB2-444FA72C90F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.67:*:*:*:*:*:*:*", "cpeNameId": "6ED98836-A7F3-43B9-838B-FF7C8C794A1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.68:*:*:*:*:*:*:*", "cpeNameId": "71C1BFAF-7826-4AB7-BE91-1AF3A92AC920"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.69:*:*:*:*:*:*:*", "cpeNameId": "9024E2C0-9705-46EE-BD72-1DC5C1D5D785"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.70:*:*:*:*:*:*:*", "cpeNameId": "97A1310D-F625-405E-8439-0B6C54C8F011"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.71:*:*:*:*:*:*:*", "cpeNameId": "BF4D80F6-8CAA-4B90-B41A-0BD714A4ED93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.72:*:*:*:*:*:*:*", "cpeNameId": "E54CF846-FAD0-4CF6-8A14-764972F7D25C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.73:*:*:*:*:*:*:*", "cpeNameId": "E31B871E-95F6-4B60-A6DA-3B354BC4EF44"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.74:*:*:*:*:*:*:*", "cpeNameId": "7920F5D1-2B11-49FF-B408-C65F37D88BA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.75:*:*:*:*:*:*:*", "cpeNameId": "A47B8AA9-37AC-49E5-B070-EE3DCE8C8677"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.76:*:*:*:*:*:*:*", "cpeNameId": "959BDC84-98A1-40BC-9D43-4D2EEF86C8EE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.77:*:*:*:*:*:*:*", "cpeNameId": "DEFA7CAA-BE16-492B-9870-4923CE650385"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.78:*:*:*:*:*:*:*", "cpeNameId": "55234DEE-0470-4F77-8FD7-B2DB8B6368B6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.79:*:*:*:*:*:*:*", "cpeNameId": "9824EA76-6C32-4A7B-B006-82D91D850B89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.80:*:*:*:*:*:*:*", "cpeNameId": "312A9A1F-D081-4587-A76D-C887235B4C72"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.81:*:*:*:*:*:*:*", "cpeNameId": "6B15290F-5938-4189-91FF-0B4C031D83C2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.82:*:*:*:*:*:*:*", "cpeNameId": "1EECAED3-55C7-4248-B820-CCCD7AC5E773"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.83:*:*:*:*:*:*:*", "cpeNameId": "CC455596-4F37-4CDE-9744-CC84AB6C0E0E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.84:*:*:*:*:*:*:*", "cpeNameId": "1BF22FC0-A0DE-4998-9596-36F1A60919B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.85:*:*:*:*:*:*:*", "cpeNameId": "8AA6F9DE-FBD3-4565-9C90-428D82F9E14C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.17:*:*:*:*:*:*:*", "cpeNameId": "1C3AFAF2-7B60-4F0C-B03C-5FB23A17280C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.17.1:*:*:*:*:*:*:*", "cpeNameId": "4CFBD0A5-3336-4C03-B114-6F24B3EDE0C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.17.2:*:*:*:*:*:*:*", "cpeNameId": "1A9A9411-A41C-4B05-AF63-0D77398E4BE4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.17.3:*:*:*:*:*:*:*", "cpeNameId": "3B1A96B9-0491-421C-A330-FC4942D56074"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.17.4:*:*:*:*:*:*:*", "cpeNameId": "8DA7D44B-1C84-4608-ADB0-36FEB71F4E44"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.17.5:*:*:*:*:*:*:*", "cpeNameId": "D706D66E-EEB4-431D-A085-7EB09F42E0F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.17.6:*:*:*:*:*:*:*", "cpeNameId": "74FB6A46-0FBA-4D8B-B54C-906EACFF73E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.17.7:*:*:*:*:*:*:*", "cpeNameId": "C5487351-49B5-43D6-8449-75C42F235EAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.17.8:*:*:*:*:*:*:*", "cpeNameId": "32C73375-6506-47D5-8DE9-749A737042B1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18:*:*:*:*:*:*:*", "cpeNameId": "F9D4BE1A-3B0A-4CDE-9B48-B4C0DD148C1C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18:rc1:*:*:*:*:*:*", "cpeNameId": "2C08DAAC-1B87-402B-B67D-A2E19BF96F72"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18:rc2:*:*:*:*:*:*", "cpeNameId": "B98E56E8-4D53-441B-A181-19DCB300435A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18:rc3:*:*:*:*:*:*", "cpeNameId": "EC696823-660D-4297-BA88-C66382298ABF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18:rc4:*:*:*:*:*:*", "cpeNameId": "8750CEAE-92CD-4BC5-991C-DF76F763EAB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18:rc5:*:*:*:*:*:*", "cpeNameId": "5D8CBF93-33A1-44E6-B546-246AAE0C400B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.0:*:*:*:*:*:*:*", "cpeNameId": "DDFDD9DC-91E2-469C-A81D-EF131DD78832"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.1:*:*:*:*:*:*:*", "cpeNameId": "915A4DF7-BFBB-4377-8FF5-F12B469805B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.2:*:*:*:*:*:*:*", "cpeNameId": "61EA132A-8D2F-4400-87BD-98DEB73C2F58"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.3:*:*:*:*:*:*:*", "cpeNameId": "B313C760-856E-4DBF-890C-240E2AA6BC95"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.4:*:*:*:*:*:*:*", "cpeNameId": "3591FD85-8FD0-46CE-9251-9C43339298A7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.5:*:*:*:*:*:*:*", "cpeNameId": "F31FEA15-EAFE-4BF4-8E2B-A8FC4A3367FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.6:*:*:*:*:*:*:*", "cpeNameId": "CB32ACB7-6117-4707-86A5-F913CA60E374"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.7:*:*:*:*:*:*:*", "cpeNameId": "D343B89B-7DEF-4D67-B107-05E6A2BD28C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.8:*:*:*:*:*:*:*", "cpeNameId": "7378B9B1-73C9-407B-AA9D-73E1F260005E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.9:*:*:*:*:*:*:*", "cpeNameId": "00178340-62AA-43C8-B841-7FAFFC043F5A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.10:*:*:*:*:*:*:*", "cpeNameId": "1863E12C-9335-4CA7-8903-1C678070902D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.11:*:*:*:*:*:*:*", "cpeNameId": "6EA68AAA-65DA-4CFE-9632-3B2A44EB40A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.12:*:*:*:*:*:*:*", "cpeNameId": "40E473C0-2FAB-413A-9682-D9D72FA7CCAF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.13:*:*:*:*:*:*:*", "cpeNameId": "CDC0061A-C366-48D4-950F-C46826707BE4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.14:*:*:*:*:*:*:*", "cpeNameId": "B233D49C-12C6-4F7E-B156-C7DCE793C029"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.15:*:*:*:*:*:*:*", "cpeNameId": "592E4CB0-FA15-40A8-9A88-1D2C798ED507"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.16:*:*:*:*:*:*:*", "cpeNameId": "E6EC955E-AD15-47A5-A573-7E9079D8B459"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.17:*:*:*:*:*:*:*", "cpeNameId": "99986C05-5DA3-45DF-8230-37B83B60F6DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.18:*:*:*:*:*:*:*", "cpeNameId": "FB1B3A35-091B-4474-A8F4-25C08D786F5E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.19:*:*:*:*:*:*:*", "cpeNameId": "1CAA99E1-8AC0-4AFA-8747-B4489B51AC66"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.20:*:*:*:*:*:*:*", "cpeNameId": "7DACC3BC-2976-4332-A117-7DF50B773BC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.21:*:*:*:*:*:*:*", "cpeNameId": "3F39EDFF-F17E-4502-90A7-4DA1F138372A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.22:*:*:*:*:*:*:*", "cpeNameId": "2FDAE819-7A17-4557-AD19-642879E1182F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.23:*:*:*:*:*:*:*", "cpeNameId": "FE2290B4-A963-40C6-AD68-34370800D2B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.24:*:*:*:*:*:*:*", "cpeNameId": "235EBC6D-7552-4A73-8E08-3AE548DBD5AF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.25:*:*:*:*:*:*:*", "cpeNameId": "336B63E1-2FB7-448D-A788-054BFEE89DD6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.26:*:*:*:*:*:*:*", "cpeNameId": "61F6061B-A43C-4C37-B595-B91E1F8B7105"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.27:*:*:*:*:*:*:*", "cpeNameId": "3C2E31EE-06B3-4846-9B90-489E8FB853F7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.28:*:*:*:*:*:*:*", "cpeNameId": "55CB6B1F-6698-47C6-8F29-E879975094F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.29:*:*:*:*:*:*:*", "cpeNameId": "89400C79-96C2-464F-B2A3-ADE57C4216BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.30:*:*:*:*:*:*:*", "cpeNameId": "9864D7F0-5414-4C5E-A30C-46A67178CB89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.31:*:*:*:*:*:*:*", "cpeNameId": "E54C1BE3-616D-40E5-B3E4-7FEF1926F641"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.32:*:*:*:*:*:*:*", "cpeNameId": "540C8FCB-ED21-42C2-AF0C-4FFDDC9EA949"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.33:*:*:*:*:*:*:*", "cpeNameId": "BF29E394-3C1F-48CA-89D7-F19C7D606EEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.34:*:*:*:*:*:*:*", "cpeNameId": "A898F0CF-0EF4-4314-A0E4-ACCA5888C8D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.35:*:*:*:*:*:*:*", "cpeNameId": "C823F021-BE62-47FD-B2A6-2B717AF21A49"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.36:*:*:*:*:*:*:*", "cpeNameId": "6F9F7FDA-3741-4D39-A0AB-A5378A54CAED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.37:*:*:*:*:*:*:*", "cpeNameId": "B12E94B9-0ACD-42A6-806F-C0F956BE7D0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.38:*:*:*:*:*:*:*", "cpeNameId": "046E1F1D-D2D5-4D3B-B02D-E509E52DC8F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.39:*:*:*:*:*:*:*", "cpeNameId": "F79826FA-BE26-40EF-8B58-992A444A016F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.40:*:*:*:*:*:*:*", "cpeNameId": "9E7E1DFB-6312-4620-8FD6-1678E7C0A930"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.41:*:*:*:*:*:*:*", "cpeNameId": "28D7776C-D60C-4278-88CF-3CD71BC7139B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.42:*:*:*:*:*:*:*", "cpeNameId": "2A963EE0-93C9-43DC-9ACC-E5609EC4CC59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.43:*:*:*:*:*:*:*", "cpeNameId": "73701687-A705-4A48-9984-996B82994F8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.44:*:*:*:*:*:*:*", "cpeNameId": "CDC11CC8-AA61-47D7-8AD0-B375F643AF6C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.45:*:*:*:*:*:*:*", "cpeNameId": "27D85C73-E2E1-4221-BA98-F5EF49839996"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.46:*:*:*:*:*:*:*", "cpeNameId": "08B323A1-7FC2-4B2E-8C08-71303053B4C4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.47:*:*:*:*:*:*:*", "cpeNameId": "46D96B0A-80FE-4FFD-A6E9-142BF845C350"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.48:*:*:*:*:*:*:*", "cpeNameId": "18D2D332-851F-4D9A-B3DD-E82627FC1A9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.49:*:*:*:*:*:*:*", "cpeNameId": "DE88F0D2-93F3-4A2B-BA54-E3A4BD34DECA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.50:*:*:*:*:*:*:*", "cpeNameId": "EEFB2967-F096-4CAE-9B1F-DD5AE90B7610"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.51:*:*:*:*:*:*:*", "cpeNameId": "B816BFFA-7439-479C-84DF-669697E09FEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.52:*:*:*:*:*:*:*", "cpeNameId": "E53F2A26-9D36-4950-85C8-39E4658EB9F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.53:*:*:*:*:*:*:*", "cpeNameId": "6729A6C7-F654-42CE-BF65-FF6D721D43E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.54:*:*:*:*:*:*:*", "cpeNameId": "26482DBA-47E0-4708-8F5E-C5FF92E44C33"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.55:*:*:*:*:*:*:*", "cpeNameId": "B39A27A3-C88B-4BF0-AADA-961257B1373E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.56:*:*:*:*:*:*:*", "cpeNameId": "FC7D4FF8-F7FE-4330-BADD-64738DA5954D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.57:*:*:*:*:*:*:*", "cpeNameId": "862F472A-9630-49AE-99CA-F03460E0FD2B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.58:*:*:*:*:*:*:*", "cpeNameId": "82FC879F-8E36-4045-89D9-2C2FE5EB03C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.59:*:*:*:*:*:*:*", "cpeNameId": "5E17937E-582B-4B6B-A9B1-004578BBD4E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.60:*:*:*:*:*:*:*", "cpeNameId": "40A3973B-6C46-4BEE-A0F2-B94ABD55B3A9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.61:*:*:*:*:*:*:*", "cpeNameId": "8F7DA9D6-8FD1-417B-92B2-342F88AAF757"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.62:*:*:*:*:*:*:*", "cpeNameId": "9FC70B62-2EF8-480C-B87F-B2538C2C92C5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.63:*:*:*:*:*:*:*", "cpeNameId": "65C52AE5-5F34-4C11-BAC5-BD8A2ECD5DA3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.64:*:*:*:*:*:*:*", "cpeNameId": "34401E8C-8EFA-44EF-8380-957152BE7BD8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.65:*:*:*:*:*:*:*", "cpeNameId": "BF906FA5-AAF6-4789-A72B-53210F4BA0E7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.66:*:*:*:*:*:*:*", "cpeNameId": "C303E030-6DC3-49CC-887D-A2E85FC91824"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.67:*:*:*:*:*:*:*", "cpeNameId": "2D980A8B-240A-44A1-A024-4A195F62DA46"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.68:*:*:*:*:*:*:*", "cpeNameId": "9B10FF41-0412-47D6-94A3-9FB0414972E5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.69:*:*:*:*:*:*:*", "cpeNameId": "BAD998E6-FBAB-4547-9812-C97362922FE3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.70:*:*:*:*:*:*:*", "cpeNameId": "FE042B21-3E19-4A1F-BC7B-5F412999C8D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.71:*:*:*:*:*:*:*", "cpeNameId": "8E589A57-9EEA-43A8-B751-65AEDCBA5EBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.72:*:*:*:*:*:*:*", "cpeNameId": "C0708F75-A272-461D-AC54-610C880B05FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.73:*:*:*:*:*:*:*", "cpeNameId": "9309A9A1-CCD2-4E14-ACCF-37CA3881E474"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.74:*:*:*:*:*:*:*", "cpeNameId": "C2B9924E-E542-4ED9-BF3B-6AA15288A545"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.75:*:*:*:*:*:*:*", "cpeNameId": "B4C12350-C8FC-45C9-A4E1-49EBAB0EABDF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.76:*:*:*:*:*:*:*", "cpeNameId": "9111BF49-BD08-43DC-A12A-DEBDA76D9639"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.77:*:*:*:*:*:*:*", "cpeNameId": "DB4ABECE-0600-4A46-A19C-CA856235940D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.78:*:*:*:*:*:*:*", "cpeNameId": "53BA34DD-CA76-4E31-9623-EEF2D80003E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.79:*:*:*:*:*:*:*", "cpeNameId": "0D20FC52-2D8E-4C84-9ED9-B9B67C41980F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.80:*:*:*:*:*:*:*", "cpeNameId": "B8CFFD61-70A0-40B9-8F6B-79DE799AFB34"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.81:*:*:*:*:*:*:*", "cpeNameId": "E87C6B62-BFE1-4E7F-8A08-BE3096DA3704"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.82:*:*:*:*:*:*:*", "cpeNameId": "A073A26A-0CD7-4859-BDCF-07C873E50EE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.83:*:*:*:*:*:*:*", "cpeNameId": "5D88F978-B18D-46CC-9CCA-63A39EEE0EE9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.84:*:*:*:*:*:*:*", "cpeNameId": "02B47410-42B7-4C91-B780-D4324FFE1BB5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.85:*:*:*:*:*:*:*", "cpeNameId": "9AE73ACC-86F0-4918-956F-81D6F33038B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.86:*:*:*:*:*:*:*", "cpeNameId": "5283AAAD-5F4D-46AA-9048-18103B049B8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.87:*:*:*:*:*:*:*", "cpeNameId": "A019755C-3B46-4FD3-BFAB-82CF5EAC84F7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.88:*:*:*:*:*:*:*", "cpeNameId": "54DCA64B-7B9C-4A8E-BC6C-B9D3D27FC058"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.89:*:*:*:*:*:*:*", "cpeNameId": "69894EDF-EFC1-41A2-BA9F-4E970B91B5C5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.90:*:*:*:*:*:*:*", "cpeNameId": "04FA57A5-0325-43E2-8FB8-96EBFDD3491D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.91:*:*:*:*:*:*:*", "cpeNameId": "1F4835B9-5B62-44D9-AACE-40C44269670C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.92:*:*:*:*:*:*:*", "cpeNameId": "955DE0A3-75D7-462A-9377-74292FBC6341"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.93:*:*:*:*:*:*:*", "cpeNameId": "D6E12C7F-315A-4EE0-B4FA-AD2AFB607360"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.94:*:*:*:*:*:*:*", "cpeNameId": "0934723A-985A-493A-A2D9-6D8C2229566F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.95:*:*:*:*:*:*:*", "cpeNameId": "20D1EC52-AAF2-4905-A653-EC8B98927F1B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.96:*:*:*:*:*:*:*", "cpeNameId": "666B8EDB-B957-4DE2-89E1-432393D0F4FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.97:*:*:*:*:*:*:*", "cpeNameId": "E60FE8A1-6A5D-4B84-9ADE-6ED50E56B3D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.98:*:*:*:*:*:*:*", "cpeNameId": "69DCB9B5-ECD8-4821-8301-657BC0EB5936"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.99:*:*:*:*:*:*:*", "cpeNameId": "A4BFD292-1CCF-49CE-BEF6-CCD2AD23BCBE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.100:*:*:*:*:*:*:*", "cpeNameId": "E2CC6E4F-2430-4053-B02A-E8D7BFB6D3AF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.101:*:*:*:*:*:*:*", "cpeNameId": "875D85CF-01D3-42D0-9F68-54F211512EA5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.102:*:*:*:*:*:*:*", "cpeNameId": "4015E4BA-544E-4034-A09D-0F26A37DC7DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.103:*:*:*:*:*:*:*", "cpeNameId": "9FF57CE8-73E2-4F25-8D82-B1D17024F4CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.104:*:*:*:*:*:*:*", "cpeNameId": "D3CB4966-9F15-459A-A1CA-DEFCDEF9CC2A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.105:*:*:*:*:*:*:*", "cpeNameId": "68DF0A6E-3B27-43B4-9FAE-EA4275B9F373"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.106:*:*:*:*:*:*:*", "cpeNameId": "B42541D4-595C-4FFE-839D-100EACCA6240"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.107:*:*:*:*:*:*:*", "cpeNameId": "A40753B8-610A-4157-AFA6-E5D4478B0336"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.108:*:*:*:*:*:*:*", "cpeNameId": "02084D31-1A6E-400E-AE2A-93E8D94F0E37"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.109:*:*:*:*:*:*:*", "cpeNameId": "E40A4E2C-FC77-4E2B-B9A2-948463D3BDAB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.110:*:*:*:*:*:*:*", "cpeNameId": "14CFFFE9-7DE0-4990-947F-07BFDD13FD96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.111:*:*:*:*:*:*:*", "cpeNameId": "2BF0E1DA-1756-4B18-BE30-EDEE9C61E1C2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.112:*:*:*:*:*:*:*", "cpeNameId": "C74C49FA-F24A-476C-BD5F-07458987BA4D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.113:*:*:*:*:*:*:*", "cpeNameId": "E298C83E-B3CB-407E-8552-50EBADDE68E4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.114:*:*:*:*:*:*:*", "cpeNameId": "D2EB3FF5-D7BF-4BD0-A7F6-3634CA03461A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.115:*:*:*:*:*:*:*", "cpeNameId": "752A887F-74E6-43F3-9A9F-70DC0CEF2054"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.116:*:*:*:*:*:*:*", "cpeNameId": "9E1D6133-AE78-4FA5-AE62-AB3A673D609E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.117:*:*:*:*:*:*:*", "cpeNameId": "8C4F542A-02E8-4044-B2E9-58394393AB14"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.118:*:*:*:*:*:*:*", "cpeNameId": "0065E5C1-1EE8-4646-8FD5-24F9BF694D6B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.119:*:*:*:*:*:*:*", "cpeNameId": "AFFDE9D3-AD3A-4F1A-B71F-F74505EBB108"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.120:*:*:*:*:*:*:*", "cpeNameId": "6A5FE4B4-896F-4A7E-9FAF-FDAD3DA8EED6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.121:*:*:*:*:*:*:*", "cpeNameId": "8534B956-8D0F-413D-8FAE-DCFD2044F8BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.122:*:*:*:*:*:*:*", "cpeNameId": "0EBA8A3C-CA75-41CA-AFAF-F51498E015BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.123:*:*:*:*:*:*:*", "cpeNameId": "AC45DD79-E0AA-4B4E-84F5-C98169C29661"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.124:*:*:*:*:*:*:*", "cpeNameId": "D2521793-534C-46AF-A53F-46FACB8CD23A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.125:*:*:*:*:*:*:*", "cpeNameId": "12CD0E92-5675-4FF0-9F98-427365913FC0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.126:*:*:*:*:*:*:*", "cpeNameId": "5AD835DC-8470-4BDC-8A50-0BF470B522A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.127:*:*:*:*:*:*:*", "cpeNameId": "FCC0AB74-D519-4931-8C2A-2E19ABD8CFE4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.128:*:*:*:*:*:*:*", "cpeNameId": "51C5B7F1-FBC7-472A-B1D2-FE0107EFED40"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.129:*:*:*:*:*:*:*", "cpeNameId": "EBC1F65E-5B87-48AA-84ED-EB4FF45F6CC5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.130:*:*:*:*:*:*:*", "cpeNameId": "0EE70948-23B6-42AD-8240-9E3C647B4AEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.131:*:*:*:*:*:*:*", "cpeNameId": "313E460E-3FF5-4346-BAF7-D4E40F2725BF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.132:*:*:*:*:*:*:*", "cpeNameId": "91FAE139-A381-4CB6-AD5C-BA097F8CA0F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.133:*:*:*:*:*:*:*", "cpeNameId": "11D0AF26-BA8B-48F4-83CB-564FBF3505F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.134:*:*:*:*:*:*:*", "cpeNameId": "EE94A171-F631-4BEC-B4D6-5DA5FE518A90"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.135:*:*:*:*:*:*:*", "cpeNameId": "99A0517F-6E2A-4257-8E0B-ABE31ED203D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.136:*:*:*:*:*:*:*", "cpeNameId": "353234F0-3D4F-4097-A9CE-19AFD3AC1141"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.137:*:*:*:*:*:*:*", "cpeNameId": "6CBCB4EB-B43A-456F-8347-78B6A0C77D9A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.138:*:*:*:*:*:*:*", "cpeNameId": "DAEAE81D-810E-470B-8771-C6D10318283C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.139:*:*:*:*:*:*:*", "cpeNameId": "09E363F2-7B35-494F-AB64-BC12A8F927F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.140:*:*:*:*:*:*:*", "cpeNameId": "B4CEB136-3486-42D6-BE13-A28F0130DFDC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.19:*:*:*:*:*:*:*", "cpeNameId": "C973645C-6420-4074-B349-D0258E3D194B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.19.1:*:*:*:*:*:*:*", "cpeNameId": "0615B00B-01C8-4962-B618-0F0077C902EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.19.2:*:*:*:*:*:*:*", "cpeNameId": "A989C578-40B5-4142-83F4-09DBB6C1D6C7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.19.3:*:*:*:*:*:*:*", "cpeNameId": "A00F6B4F-6EE2-4BE2-BDCF-D2B45F757BC9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.19.4:*:*:*:*:*:*:*", "cpeNameId": "B662D9C1-3A06-4D21-BE69-6C4CDD94904A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.19.5:*:*:*:*:*:*:*", "cpeNameId": "D52D426F-6E8E-4596-8A1C-3314BC96D9D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.19.6:*:*:*:*:*:*:*", "cpeNameId": "3AD744FD-0BEB-483F-815F-C6E51AFCF27E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.19.7:*:*:*:*:*:*:*", "cpeNameId": "7F6B22A7-0360-4212-B359-F3BB4407AE1A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.19.8:*:*:*:*:*:*:*", "cpeNameId": "743B104B-252C-4AFB-B236-9A67EB0AC44B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4:*:*:*:*:*:*:*", "cpeNameId": "D2B71FFC-740C-4263-B936-A3C1B18E5F9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0:*:*:*:*:*:*:*", "cpeNameId": "2467EFC2-0000-4EE5-AD91-D4EDD1009228"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0:-:*:*:*:*:*:*", "cpeNameId": "5738F26A-6508-4BF6-9CE4-A275613579B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0:rc1:*:*:*:*:*:*", "cpeNameId": "32082640-7AF2-43DC-861C-F7FDA79B77DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0:rc2:*:*:*:*:*:*", "cpeNameId": "F242212B-DE46-4CFF-B235-0B7C7ABAD0DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0:rc3:*:*:*:*:*:*", "cpeNameId": "A2FD0ED3-319A-4B99-A2B0-525C9A5EEAE0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0:rc4:*:*:*:*:*:*", "cpeNameId": "2837FE21-53FD-48DF-884C-B1D3118F280A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0:rc5:*:*:*:*:*:*", "cpeNameId": "05739160-269D-481A-BFB6-81FE05B65C37"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0:rc6:*:*:*:*:*:*", "cpeNameId": "8719C069-AD38-4A89-91A1-8029796ECD84"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0:rc7:*:*:*:*:*:*", "cpeNameId": "5CE65CCE-AFF6-4487-8CE9-8B45B2060D90"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0.0:*:*:*:*:*:*:*", "cpeNameId": "C74E8950-0E12-4101-95D1-E4ABEC24652B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0.1:*:*:*:*:*:*:*", "cpeNameId": "1405D246-2EB0-436A-88E3-C03CA8E8E3D7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0.2:*:*:*:*:*:*:*", "cpeNameId": "A0754CD9-F6FC-4BD9-A2AC-B00BD276E947"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0.3:*:*:*:*:*:*:*", "cpeNameId": "6A16B7AF-DE24-4294-9E0C-9B402E8A089D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0.4:*:*:*:*:*:*:*", "cpeNameId": "DC4F99B3-78CC-451C-A8B5-105EB9667877"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0.5:*:*:*:*:*:*:*", "cpeNameId": "0B384EE6-AE66-46B5-BBC4-30BF3DB7A9DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0.6:*:*:*:*:*:*:*", "cpeNameId": "EE0CD574-1AB5-4573-A704-B9CAF5530988"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0.7:*:*:*:*:*:*:*", "cpeNameId": "638DED59-9BB4-4E64-93F3-C949D3CF5A2D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0.8:*:*:*:*:*:*:*", "cpeNameId": "AF6AE96F-7CCD-461C-9355-98057BEC1163"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0.9:*:*:*:*:*:*:*", "cpeNameId": "4686AB63-EA79-4CFD-AFFF-25B474BD744B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1:*:*:*:*:*:*:*", "cpeNameId": "1FD3A881-A85E-46E6-9F04-0C314F91A869"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1:-:*:*:*:*:*:*", "cpeNameId": "C6DDBD3E-D424-41BB-B833-75F7C2F0C29D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1:rc1:*:*:*:*:*:*", "cpeNameId": "6B1B5862-39FF-4533-A6F8-59DB9CB0D48D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1:rc2:*:*:*:*:*:*", "cpeNameId": "3F509385-C4B5-4E24-90C5-EE164AFF3168"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1:rc3:*:*:*:*:*:*", "cpeNameId": "1CA1E37C-026B-4EF1-9E1A-4EDE68FD1DD2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1:rc4:*:*:*:*:*:*", "cpeNameId": "11740404-17D1-4BAA-8744-153C7F8FA01D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1:rc5:*:*:*:*:*:*", "cpeNameId": "806EB383-7517-4BB0-8942-BBBB362C0745"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1:rc6:*:*:*:*:*:*", "cpeNameId": "6353B931-84FF-4DD3-AB70-3019EDE9CBBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1:rc7:*:*:*:*:*:*", "cpeNameId": "225B922C-F2C3-4DCF-A5C6-D66E365CEA33"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1:rc8:*:*:*:*:*:*", "cpeNameId": "9695C06A-6BF6-4E18-9A6C-1469B44753DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.0:*:*:*:*:*:*:*", "cpeNameId": "EA6178D9-E4A5-4DFF-8D43-5AB0131EB529"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.1:*:*:*:*:*:*:*", "cpeNameId": "A38CD077-9F8E-4572-B614-18D8DA41CE25"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.2:*:*:*:*:*:*:*", "cpeNameId": "F0D170E2-6B84-4760-B53F-830D6160C302"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.3:*:*:*:*:*:*:*", "cpeNameId": "C13A70C1-8523-44FE-B12D-B9035AAA5E6F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.4:*:*:*:*:*:*:*", "cpeNameId": "1FFB4199-8707-4CAD-8070-7E3066F8C868"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.5:*:*:*:*:*:*:*", "cpeNameId": "4418AD31-4638-4D43-BB32-AFF4C9B8C430"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.6:*:*:*:*:*:*:*", "cpeNameId": "C4F667A2-5EEB-4749-8EE1-C095E9EF5EB8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.7:*:*:*:*:*:*:*", "cpeNameId": "23ED7B6D-AC5F-4D76-8232-EB87EB162D91"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.8:*:*:*:*:*:*:*", "cpeNameId": "17C5A2CC-1906-46F6-982C-BDC57416938F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.9:*:*:*:*:*:*:*", "cpeNameId": "5EA18DB4-A8D4-4A3B-9BA9-35A529203034"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.10:*:*:*:*:*:*:*", "cpeNameId": "14FD8473-B0D4-4769-B4F1-B8C02974B0C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.11:*:*:*:*:*:*:*", "cpeNameId": "B08A1A95-E122-4BFC-9D4E-968E285140AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.12:*:*:*:*:*:*:*", "cpeNameId": "6F2E15B4-A02A-4DCC-AD8F-C32754D76BE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.13:*:*:*:*:*:*:*", "cpeNameId": "B44A7452-7F4C-4256-A6BA-92386941F1F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.14:*:*:*:*:*:*:*", "cpeNameId": "89A0B4D3-D197-4ACF-AABB-235B577E8835"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.15:*:*:*:*:*:*:*", "cpeNameId": "3F9E4481-B888-43A6-900E-6D059E24F4DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.16:*:*:*:*:*:*:*", "cpeNameId": "F376E601-5D90-4101-9249-D18FB4F379AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.17:*:*:*:*:*:*:*", "cpeNameId": "951AD518-B4DB-407A-A06A-6DF0E89752BA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.18:*:*:*:*:*:*:*", "cpeNameId": "AE6C698F-784D-4841-9352-B1A0F17613FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.19:*:*:*:*:*:*:*", "cpeNameId": "2BB57DCF-EAFB-4662-BE1F-0878957F6D71"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.20:*:*:*:*:*:*:*", "cpeNameId": "FDDD9390-36CC-48A2-BB78-32670780CC92"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.21:*:*:*:*:*:*:*", "cpeNameId": "48BC0496-DEEC-4779-BE64-E5E48C91AA6E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.22:*:*:*:*:*:*:*", "cpeNameId": "D2B401B4-792A-4339-9798-C1FC1EB14397"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.23:*:*:*:*:*:*:*", "cpeNameId": "1604FFD1-E146-4F99-BDA2-5B214E88FFF7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.24:*:*:*:*:*:*:*", "cpeNameId": "4F575F6F-792C-4930-B91B-ED38EA9DA5EE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.25:*:*:*:*:*:*:*", "cpeNameId": "1118DD03-426F-4352-875B-57BDA42AF9C5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.26:*:*:*:*:*:*:*", "cpeNameId": "F8E3B08B-72FE-4D6C-8D4E-04887E5E219E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.27:*:*:*:*:*:*:*", "cpeNameId": "1CB06853-22B6-40EA-ADBA-E429E2F967E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.28:*:*:*:*:*:*:*", "cpeNameId": "7D4A498E-31B1-4840-BE23-5AA268DA7CAE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.29:*:*:*:*:*:*:*", "cpeNameId": "CC42303B-B170-4BD6-A178-EC4B45171DA6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.30:*:*:*:*:*:*:*", "cpeNameId": "A9DF6117-615B-44EC-A8CF-63531F4F8B96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.31:*:*:*:*:*:*:*", "cpeNameId": "B25FC13E-EF58-4754-8035-6DF270313557"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.32:*:*:*:*:*:*:*", "cpeNameId": "1AD020F9-7A83-4BD3-A2E0-2AA1621A5FDE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.33:*:*:*:*:*:*:*", "cpeNameId": "E8C8975E-91CB-4038-8B7E-D36B9F3B6FAC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.34:*:*:*:*:*:*:*", "cpeNameId": "ABF7E934-AAF2-4335-A0B1-99BB16D3F751"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.35:*:*:*:*:*:*:*", "cpeNameId": "799F3962-5C6C-499B-B281-D38FDDDDFA05"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.36:*:*:*:*:*:*:*", "cpeNameId": "2D3FECAF-623C-4B31-B72B-04AB4D4007D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.37:*:*:*:*:*:*:*", "cpeNameId": "C89EE90D-595D-4E01-9574-4168BE770CBD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.38:*:*:*:*:*:*:*", "cpeNameId": "F65CB61E-C061-4406-BB74-A274E0F13AC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.39:*:*:*:*:*:*:*", "cpeNameId": "193A927C-9887-4A27-9759-44EB6E639C37"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.40:*:*:*:*:*:*:*", "cpeNameId": "1BC48C28-CC5A-47C7-9BA5-80E19916D9FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.41:*:*:*:*:*:*:*", "cpeNameId": "D465391D-62E6-4FF3-893B-1CBCCB1B5AEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.42:*:*:*:*:*:*:*", "cpeNameId": "9554D22C-0782-46F4-86CD-E321E7BCDA3C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.43:*:*:*:*:*:*:*", "cpeNameId": "ED423577-D69F-4F39-9D75-87F23173AD7A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.44:*:*:*:*:*:*:*", "cpeNameId": "044011D5-1E1C-4714-9B25-DAE9851DDFD8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.45:*:*:*:*:*:*:*", "cpeNameId": "22EF791D-7C93-4259-963D-9B874F241973"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.46:*:*:*:*:*:*:*", "cpeNameId": "DEFA34B6-5C67-453A-9BCF-92468BC0AF3C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.47:*:*:*:*:*:*:*", "cpeNameId": "7429D270-4092-44FF-B09B-01982EEDBA7A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.48:*:*:*:*:*:*:*", "cpeNameId": "B52A9A77-1E36-4973-BF17-27C7809BC6A6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.49:*:*:*:*:*:*:*", "cpeNameId": "FA0B3866-E1F1-49FE-AFE1-50C763DE1577"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.50:*:*:*:*:*:*:*", "cpeNameId": "99E2646C-4911-4586-B948-35F31C67FF12"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.51:*:*:*:*:*:*:*", "cpeNameId": "83DD1B25-C576-4C00-8B5E-DE5C5E0F9BFB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.52:*:*:*:*:*:*:*", "cpeNameId": "432CA14E-8ED4-4D41-9A1A-FA2EDE5DB5BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2:*:*:*:*:*:*:*", "cpeNameId": "8CEC5C41-7D54-46C5-B51A-C5B7000A261F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2:-:*:*:*:*:*:*", "cpeNameId": "404233EA-3A42-4415-807C-2795535D8FBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2:rc1:*:*:*:*:*:*", "cpeNameId": "01F7FC99-0732-43C2-8441-6075EF18BB1F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2:rc2:*:*:*:*:*:*", "cpeNameId": "C762486A-6A4C-423C-A02C-6ADFD08E43BA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2:rc3:*:*:*:*:*:*", "cpeNameId": "90E588AC-AB0B-48E5-A4EC-9961E9446253"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2:rc4:*:*:*:*:*:*", "cpeNameId": "C00F12B9-3630-403F-BD9F-ECEE434557B6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2:rc5:*:*:*:*:*:*", "cpeNameId": "D9578F1C-2720-4A5A-ADA6-BECCFC1A06B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2:rc6:*:*:*:*:*:*", "cpeNameId": "E6A0149C-F476-4468-8E02-E086BA1ED75C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2:rc7:*:*:*:*:*:*", "cpeNameId": "6EC892D2-6A54-4C68-A736-41A37FAB43DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2:rc8:*:*:*:*:*:*", "cpeNameId": "B3C3E05F-1E32-4C9F-9985-7861C068651A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2.0:*:*:*:*:*:*:*", "cpeNameId": "E7F7C907-29DD-4C0A-B62F-238D64F9CA52"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2.1:*:*:*:*:*:*:*", "cpeNameId": "BD114713-34F2-4BB0-B53A-EDFE8CC646C7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2.2:*:*:*:*:*:*:*", "cpeNameId": "BD0AD63F-B1DF-45C3-98B9-29E84D6847F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2.3:*:*:*:*:*:*:*", "cpeNameId": "AF52399D-722B-4373-AEB0-048D636AC2D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2.4:*:*:*:*:*:*:*", "cpeNameId": "F7C3C103-F75A-4C0C-8360-F8E059CFFE6E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2.5:*:*:*:*:*:*:*", "cpeNameId": "B1A5B3B7-86C0-4DF5-AF49-AEE88B639819"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2.6:*:*:*:*:*:*:*", "cpeNameId": "8CEA01FC-7DCC-4A1B-A083-9628EF0C034C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2.7:*:*:*:*:*:*:*", "cpeNameId": "8C8CB29B-5E42-4AB5-ABDF-380C0B00A9C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2.8:*:*:*:*:*:*:*", "cpeNameId": "2019892E-BCC2-4F18-A09D-0C09DBB0B787"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3:*:*:*:*:*:*:*", "cpeNameId": "9C6EAC12-A07A-4F5F-B78B-EB96D2D331B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3:-:*:*:*:*:*:*", "cpeNameId": "73A7EEE5-C389-4C3B-BC22-FD0CDEC18F45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3:rc1:*:*:*:*:*:*", "cpeNameId": "69D84DB0-013C-4357-85CB-AB0756FAF083"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3:rc2:*:*:*:*:*:*", "cpeNameId": "20D634C6-571A-4D59-B99F-806C7C7548B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3:rc3:*:*:*:*:*:*", "cpeNameId": "ED000931-A13B-4853-B3D4-48D4DB46514D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3:rc4:*:*:*:*:*:*", "cpeNameId": "86DE3CD3-8810-4414-9AE9-230B9E548F43"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3:rc5:*:*:*:*:*:*", "cpeNameId": "9B329FAB-EC7B-4C85-A23B-F56E55260B89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3:rc6:*:*:*:*:*:*", "cpeNameId": "19AB03B2-6B8E-48A6-8D90-AD40402612EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3:rc7:*:*:*:*:*:*", "cpeNameId": "3A65D171-7A9B-43D9-BD44-4BD4AFCD61BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3.0:*:*:*:*:*:*:*", "cpeNameId": "554AE6B2-BA69-4DD7-A0E2-05897523452F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3.1:*:*:*:*:*:*:*", "cpeNameId": "AC05011D-579A-4D7B-9A9B-39BFE3CE1E00"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3.2:*:*:*:*:*:*:*", "cpeNameId": "0DCE2CF9-7D6A-4032-B153-628BB91676FA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3.3:*:*:*:*:*:*:*", "cpeNameId": "40C7AB11-ABD7-49EE-98A7-8E3E957B197B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3.4:*:*:*:*:*:*:*", "cpeNameId": "7A430ED7-4026-4E2C-967E-BCA3B17D9E39"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3.5:*:*:*:*:*:*:*", "cpeNameId": "B741D92F-7E21-4E6D-A751-19851AD4D07E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3.6:*:*:*:*:*:*:*", "cpeNameId": "75E10032-3935-488F-B062-EA74AD1C6F42"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4:*:*:*:*:*:*:*", "cpeNameId": "0CC82592-969E-42E2-995A-77254AC2858C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4:-:*:*:*:*:*:*", "cpeNameId": "DCDA1601-B9CC-4CAB-9045-7E418185A857"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4:rc1:*:*:*:*:*:*", "cpeNameId": "D57BA72B-FFA4-4EDD-8609-41604BD7A8FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4:rc2:*:*:*:*:*:*", "cpeNameId": "428C4926-D233-44E4-9B15-420D7DF499BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4:rc3:*:*:*:*:*:*", "cpeNameId": "B3340F47-0DC7-497C-A2C4-0A2ACCC36821"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4:rc4:*:*:*:*:*:*", "cpeNameId": "C349F878-71AE-4CB6-95C2-A0E2D2869BDB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4:rc5:*:*:*:*:*:*", "cpeNameId": "E13E25C1-84C9-4A2B-AB57-E2860569C7B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4:rc6:*:*:*:*:*:*", "cpeNameId": "8EC67A5C-56D4-48A6-9A12-290C0BAF8BB7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4:rc7:*:*:*:*:*:*", "cpeNameId": "72A4C1AB-870E-43CE-B616-36F9036E8040"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4:rc8:*:*:*:*:*:*", "cpeNameId": "0D491AC8-EF6D-49D2-ABE3-14C900AEDC84"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.0:*:*:*:*:*:*:*", "cpeNameId": "F76C4499-1C1F-40BB-B72D-3CCBE24F9983"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.0-96.119:*:*:*:*:*:*:*", "cpeNameId": "FA8FC4BC-B432-45F3-BA3A-36629C2FB2BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.1:*:*:*:*:*:*:*", "cpeNameId": "7FE8FBE3-1F3E-4E59-971E-80D2291E9F04"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.2:*:*:*:*:*:*:*", "cpeNameId": "933EC82A-7117-4C3B-BAC3-B730E8177D68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.3:*:*:*:*:*:*:*", "cpeNameId": "4E8A4278-3F30-4F35-9A7D-E4ACB320AB90"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.4:*:*:*:*:*:*:*", "cpeNameId": "EFCC9662-D66A-4E22-BCF6-D92D4FC3C9BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.5:*:*:*:*:*:*:*", "cpeNameId": "5E5D47B0-7380-4061-ACA1-07FA5F5EE3F7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.6:*:*:*:*:*:*:*", "cpeNameId": "5AAADD86-5C57-4D1C-BAF8-A41D33BA47B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.7:*:*:*:*:*:*:*", "cpeNameId": "C3A6FFE6-7A8C-4F45-9950-821FEDE12755"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.8:*:*:*:*:*:*:*", "cpeNameId": "CD6D9EA8-5907-480D-826A-CFD853176989"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.9:*:*:*:*:*:*:*", "cpeNameId": "697729A2-369A-4485-A6D2-9128FBDEF13D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.10:*:*:*:*:*:*:*", "cpeNameId": "9C401888-D849-494A-8807-0F4A1B7F3B90"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.11:*:*:*:*:*:*:*", "cpeNameId": "41ADE2D0-F20F-4609-BE2E-2A52D8B77B4C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.12:*:*:*:*:*:*:*", "cpeNameId": "4624CFD6-9443-42DD-BF38-1E4C0F85942A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.13:*:*:*:*:*:*:*", "cpeNameId": "BFC70B7E-E345-473D-B885-17CB43DEFDE5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.14:*:*:*:*:*:*:*", "cpeNameId": "BC242831-9967-4C30-81DC-DF10A52E8A9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.15:*:*:*:*:*:*:*", "cpeNameId": "68D73D19-ABB3-4703-8D3D-006872776B09"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.16:*:*:*:*:*:*:*", "cpeNameId": "3BBB71CE-8252-4DAF-B2E0-9D4895CFAFF4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.17:*:*:*:*:*:*:*", "cpeNameId": "61C83B74-8A5A-482F-B7CB-DFF85EE2A312"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.18:*:*:*:*:*:*:*", "cpeNameId": "87EF4F10-A5FA-4EA9-BB2C-B7AE2D0E2731"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.19:*:*:*:*:*:*:*", "cpeNameId": "6A3F3026-8C21-4CCB-A985-C93A889BEFF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.20:*:*:*:*:*:*:*", "cpeNameId": "156A1C57-B0CC-403A-9A99-F087A22AB63E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.21:*:*:*:*:*:*:*", "cpeNameId": "5B9FCBCD-BDA2-45BF-BF11-2DB2990B0E8F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.22:*:*:*:*:*:*:*", "cpeNameId": "FEB1E36A-8777-49D3-B7AD-75F2D75C9AFF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.23:*:*:*:*:*:*:*", "cpeNameId": "A5F83DF2-1CE5-4789-806F-A232112BDE55"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.24:*:*:*:*:*:*:*", "cpeNameId": "9812732F-FD5D-4295-ADE7-D9F6E4126590"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.25:*:*:*:*:*:*:*", "cpeNameId": "1EDD6CD5-A9B7-4969-BCA1-18A7E453F27F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.26:*:*:*:*:*:*:*", "cpeNameId": "5A3C3EA9-B55D-4700-82DA-253D22CD1099"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.27:*:*:*:*:*:*:*", "cpeNameId": "D6AC0EFD-9C1B-45F5-BAEB-B18D8B02AAF3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.28:*:*:*:*:*:*:*", "cpeNameId": "B31EBB97-91D1-4EAB-BB83-DBB22040DDB6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.29:*:*:*:*:*:*:*", "cpeNameId": "D3C8008A-8BFC-4A96-887F-416BE9E64691"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.30:*:*:*:*:*:*:*", "cpeNameId": "889B12BB-2EDF-4EA0-8A84-62F616E4053D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.31:*:*:*:*:*:*:*", "cpeNameId": "1FECAF9A-B388-429C-8ACA-9CD4E510E0B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.32:*:*:*:*:*:*:*", "cpeNameId": "FC81D3C5-1E0B-47F7-BB37-585C75FE67AD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.33:*:*:*:*:*:*:*", "cpeNameId": "F823ED2B-606F-4195-997D-331C64592007"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.34:*:*:*:*:*:*:*", "cpeNameId": "B45CC685-7AF6-45F4-8D75-1FCE15D97A6B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.35:*:*:*:*:*:*:*", "cpeNameId": "C850B81D-E6A8-4FCB-B155-B63AFC9A4832"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.36:*:*:*:*:*:*:*", "cpeNameId": "C61E381E-000B-4731-AF8D-90BF59F11A85"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.37:*:*:*:*:*:*:*", "cpeNameId": "24FED760-B194-43AE-9B94-115470E988D6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.38:*:*:*:*:*:*:*", "cpeNameId": "878B3AEA-B1D0-4A02-BC68-376A6286D5DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.39:*:*:*:*:*:*:*", "cpeNameId": "9774A99C-3F08-496D-AAF3-A830DB1E5717"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.40:*:*:*:*:*:*:*", "cpeNameId": "C179136B-E80A-4B7C-A763-39BA95DD48D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.41:*:*:*:*:*:*:*", "cpeNameId": "44E2FCC4-8347-446A-9CBD-BE5CCABCB0E4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.42:*:*:*:*:*:*:*", "cpeNameId": "451A60BC-B7FE-43C5-9F7D-99F56719B263"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.43:*:*:*:*:*:*:*", "cpeNameId": "05E45126-5143-4405-B7D6-679436FF23E9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.44:*:*:*:*:*:*:*", "cpeNameId": "F6BDB13D-4380-4230-A021-51155E9CD1B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.45:*:*:*:*:*:*:*", "cpeNameId": "356F009A-A387-4214-A12D-68F7FE52D6C9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.46:*:*:*:*:*:*:*", "cpeNameId": "CCAF1CFF-7B49-4A7C-ADFB-8EB68042F3D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.47:*:*:*:*:*:*:*", "cpeNameId": "8FDA50AF-A48C-496F-8BAA-1D39488F88B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.48:*:*:*:*:*:*:*", "cpeNameId": "9CCE40F5-05B5-44AA-BDA0-6268E8E16F89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.49:*:*:*:*:*:*:*", "cpeNameId": "47151518-D679-4658-8B7D-77F977FC6B20"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.50:*:*:*:*:*:*:*", "cpeNameId": "F2BEC0AE-3B47-4DC7-BBF2-FF7AFD9744AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.51:*:*:*:*:*:*:*", "cpeNameId": "03CF782E-4825-46C5-92C6-1F9958428D4E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.52:*:*:*:*:*:*:*", "cpeNameId": "CE25CEF9-6DE1-4CB6-8685-9ECE06228051"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.53:*:*:*:*:*:*:*", "cpeNameId": "44AD121F-711F-44FC-A42D-EEE3B49EF09B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.54:*:*:*:*:*:*:*", "cpeNameId": "D8545A61-0DE7-4887-A656-6AC1F6D99FA4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.55:*:*:*:*:*:*:*", "cpeNameId": "812EE9D9-8B2A-4184-B2A3-1AE01523E622"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.56:*:*:*:*:*:*:*", "cpeNameId": "8D293DF8-3B9F-4930-8F77-29BE00E2A3FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.57:*:*:*:*:*:*:*", "cpeNameId": "38589104-9F4F-4999-8D51-B1E5D6CE806B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.58:*:*:*:*:*:*:*", "cpeNameId": "E394318F-A063-476A-89D0-696A69816F05"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.59:*:*:*:*:*:*:*", "cpeNameId": "9942A355-2E0F-445D-914A-ABF78CCBC64F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.60:*:*:*:*:*:*:*", "cpeNameId": "4616A735-3236-4490-9E4A-CF13C9198115"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.61:*:*:*:*:*:*:*", "cpeNameId": "300906FB-8359-4D31-9C79-B8B654D390F4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.62:*:*:*:*:*:*:*", "cpeNameId": "2323C950-541C-42D2-AD38-2ED9A3870714"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.63:*:*:*:*:*:*:*", "cpeNameId": "9138BACD-3DB4-4D5B-A566-F9BCF825B1FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.64:*:*:*:*:*:*:*", "cpeNameId": "D4B84632-21BF-41F4-BE43-63DF430DD2DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.65:*:*:*:*:*:*:*", "cpeNameId": "7A6C5D5A-5258-4AF9-8102-E570944A3E58"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.66:*:*:*:*:*:*:*", "cpeNameId": "C9AF7B6B-F888-4211-AD00-F9B56C34D41C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.67:*:*:*:*:*:*:*", "cpeNameId": "EC917E6E-35A5-45BB-AE1E-1079402EA052"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.68:*:*:*:*:*:*:*", "cpeNameId": "ECE8EEAA-08BD-43F9-A8ED-CB46263E4373"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.69:*:*:*:*:*:*:*", "cpeNameId": "8C9C110C-0041-4B82-BDD7-F54A5030D278"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.70:*:*:*:*:*:*:*", "cpeNameId": "F751372D-061C-47E2-B8C5-CB32070152B1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.71:*:*:*:*:*:*:*", "cpeNameId": "B3729C0E-0348-4130-B789-2CE7EA174E4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.72:*:*:*:*:*:*:*", "cpeNameId": "CB32A8F5-4963-457B-AFA2-426B4EDB82AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.73:*:*:*:*:*:*:*", "cpeNameId": "D84BE462-BD26-4182-8BA9-0B9EAB4650D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.74:*:*:*:*:*:*:*", "cpeNameId": "D5ED1938-4B1C-4997-8083-C7E1CD229E72"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.75:*:*:*:*:*:*:*", "cpeNameId": "38E49F41-BA58-4A52-8420-6A2FF96516D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.76:*:*:*:*:*:*:*", "cpeNameId": "20077160-E24C-47C3-B452-81625E2B87BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.77:*:*:*:*:*:*:*", "cpeNameId": "1C995C66-DCAD-450A-8DEC-5480C57765E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.78:*:*:*:*:*:*:*", "cpeNameId": "06EA7B0F-FE44-439E-8B6E-DA05D4ACD725"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.79:*:*:*:*:*:*:*", "cpeNameId": "5185E87B-AE55-427C-A0E4-8E016F945043"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.80:*:*:*:*:*:*:*", "cpeNameId": "B145CA1C-23F8-46A4-97FC-57471354BC07"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.81:*:*:*:*:*:*:*", "cpeNameId": "B46BADB5-A906-4989-A597-BB056C289302"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.82:*:*:*:*:*:*:*", "cpeNameId": "395C2214-5D0D-4E6E-821C-93B4BA0B3D7E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.83:*:*:*:*:*:*:*", "cpeNameId": "C7F9481A-F00C-4A7D-A28C-52A2F0FA0DAF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.84:*:*:*:*:*:*:*", "cpeNameId": "E350E11E-1917-4413-BB8F-5D9EAEB49411"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.85:*:*:*:*:*:*:*", "cpeNameId": "0D076280-76F9-4824-A0C8-B5F6C086DCE6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.86:*:*:*:*:*:*:*", "cpeNameId": "2ABB7C71-884C-4E5D-85F3-4AC8FA166985"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.87:*:*:*:*:*:*:*", "cpeNameId": "DD6C21E4-7565-4317-B325-96EA55C92F33"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.88:*:*:*:*:*:*:*", "cpeNameId": "608B4295-455B-4572-A5A8-03BEB29D75CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.89:*:*:*:*:*:*:*", "cpeNameId": "88644B26-E539-4D71-91F5-9B2749B8706D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.90:*:*:*:*:*:*:*", "cpeNameId": "2997B73D-574C-45C1-88FA-7AD9B7C963F4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.91:*:*:*:*:*:*:*", "cpeNameId": "D55C911B-0765-456B-9985-8CBFFB0954AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.92:*:*:*:*:*:*:*", "cpeNameId": "4C8AF219-5201-49E9-94A4-1BE15403A27D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.93:*:*:*:*:*:*:*", "cpeNameId": "164A1A90-B36C-4454-B89D-6719CA368178"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.94:*:*:*:*:*:*:*", "cpeNameId": "31D8CD9C-DADC-46D8-B8CA-77FCD24C8691"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.95:*:*:*:*:*:*:*", "cpeNameId": "8CD707EB-3889-4DC9-839B-EB9F5CDD4587"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.96:*:*:*:*:*:*:*", "cpeNameId": "0CB79FE3-A3D1-4F1D-9A44-88FD75CE1C13"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.97:*:*:*:*:*:*:*", "cpeNameId": "F3990863-8D9C-4374-B274-E62B91534FC2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.98:*:*:*:*:*:*:*", "cpeNameId": "0726D23D-8D13-4988-8654-D33A1386B6FA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.99:*:*:*:*:*:*:*", "cpeNameId": "C3D8AB2A-6DEC-40D8-AD3E-7447A9736092"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.100:*:*:*:*:*:*:*", "cpeNameId": "F903471F-7DC5-4168-BAF1-AE02C3E43321"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.101:*:*:*:*:*:*:*", "cpeNameId": "C94D5AD3-E24B-4D44-AF5F-09128A434F3F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.102:*:*:*:*:*:*:*", "cpeNameId": "DBBDB1E6-0160-417F-8EBA-E4A143CA41D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.103:*:*:*:*:*:*:*", "cpeNameId": "18570476-ABFC-4A8C-BBEF-AED9E53F6C34"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.104:*:*:*:*:*:*:*", "cpeNameId": "1B28A2BA-810E-4B40-83E9-4BED770D72EC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.105:*:*:*:*:*:*:*", "cpeNameId": "C25BB8A0-D93C-4071-BBED-99386B18DAE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.106:*:*:*:*:*:*:*", "cpeNameId": "2B75F5E1-5335-4AD7-9441-F3CBA98EF747"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.107:*:*:*:*:*:*:*", "cpeNameId": "449985A4-B44D-4C2A-9413-1BDA709D9E01"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.108:*:*:*:*:*:*:*", "cpeNameId": "E04D3E71-E5C0-40B4-AC12-FFE336978A74"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.109:*:*:*:*:*:*:*", "cpeNameId": "F3940127-6BEE-4F2E-B44A-FAACA6BFF9F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.110:*:*:*:*:*:*:*", "cpeNameId": "7F88E543-8723-481B-BBE2-757F82EA8100"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.111:*:*:*:*:*:*:*", "cpeNameId": "ED95CF08-486A-43C7-9DFE-966644DCC377"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.112:*:*:*:*:*:*:*", "cpeNameId": "11F03D25-057A-4661-9D80-0287A9FC3E46"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.113:*:*:*:*:*:*:*", "cpeNameId": "B6607762-D34E-4781-B5FB-A0663816E6BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.114:*:*:*:*:*:*:*", "cpeNameId": "0543C55A-12A4-4B28-BA66-452EFFAC7098"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.115:*:*:*:*:*:*:*", "cpeNameId": "C8AFB8B7-895F-4DFE-A789-B5B8891EF694"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.116:*:*:*:*:*:*:*", "cpeNameId": "4C78171E-3ADE-4991-8A87-86C1CAB609EC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.117:*:*:*:*:*:*:*", "cpeNameId": "A52DAAA6-AEDB-4A29-AB9A-B6F61101C486"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.118:*:*:*:*:*:*:*", "cpeNameId": "5C8DB1F1-2B65-41C5-AAC5-4B49BB90F6F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.119:*:*:*:*:*:*:*", "cpeNameId": "7636EB46-4587-49F1-A3DE-E99CD375F5D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.120:*:*:*:*:*:*:*", "cpeNameId": "FFBA4ECA-45CC-480D-A349-474A02528A5F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.121:*:*:*:*:*:*:*", "cpeNameId": "53674370-5B99-49DE-B239-324189EB5699"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.122:*:*:*:*:*:*:*", "cpeNameId": "E2DD9DE8-2CB7-487E-846A-56FAD08E199A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.123:*:*:*:*:*:*:*", "cpeNameId": "C15400AA-A918-43A6-90B9-9C7975A9D308"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.124:*:*:*:*:*:*:*", "cpeNameId": "BBB6E83C-5BA4-4226-9E3B-C23F3FCE248D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.125:*:*:*:*:*:*:*", "cpeNameId": "58B7AA16-617E-40FE-B192-6ABD6C1E05C4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.126:*:*:*:*:*:*:*", "cpeNameId": "C4C1F614-3186-456E-BD0F-3715273D010F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.127:*:*:*:*:*:*:*", "cpeNameId": "5E2E2078-968E-4730-8CAA-59B48CC007CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.128:*:*:*:*:*:*:*", "cpeNameId": "19D36CCE-3249-41DA-926C-42ED9DAF91C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.129:*:*:*:*:*:*:*", "cpeNameId": "DEE1AE91-0A90-461F-962A-F92EDA0DEA6F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.130:*:*:*:*:*:*:*", "cpeNameId": "60B9BFCA-ADCF-466E-B401-8BE4E2D4F6A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.131:*:*:*:*:*:*:*", "cpeNameId": "246A3AC9-CCED-4A3B-B82F-F26E6A79E3F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.132:*:*:*:*:*:*:*", "cpeNameId": "EBDB64FC-B4F1-4680-B1B0-1C848129B1B1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.133:*:*:*:*:*:*:*", "cpeNameId": "246F341D-A30B-4398-9F47-E6007ADD9411"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.134:*:*:*:*:*:*:*", "cpeNameId": "7AA07554-42F7-481E-849B-AEA632431934"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.135:*:*:*:*:*:*:*", "cpeNameId": "90C944B1-DB85-4B52-BD32-DDEB7A2A549E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.136:*:*:*:*:*:*:*", "cpeNameId": "7B06530D-A42B-4037-9FDB-7193ADC8697B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.137:*:*:*:*:*:*:*", "cpeNameId": "2329C964-A06C-46AB-A09B-16FCD04225BF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.138:*:*:*:*:*:*:*", "cpeNameId": "C459456B-DAC6-4628-AD4D-07FEC30EDC0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.139:*:*:*:*:*:*:*", "cpeNameId": "E896A785-A21A-4E37-8FD7-6F648D85C73D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.140:*:*:*:*:*:*:*", "cpeNameId": "5B870D55-093B-4A4E-A4BA-92ADF186D4AA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.141:*:*:*:*:*:*:*", "cpeNameId": "EAF9150A-686D-46A2-9388-47A1A60D263D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.142:*:*:*:*:*:*:*", "cpeNameId": "2AAE9D72-ECB4-4C43-BE20-5AC5FAAAD7EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.143:*:*:*:*:*:*:*", "cpeNameId": "A929B4C2-CED9-48D3-BE7A-A06751C50A82"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.144:*:*:*:*:*:*:*", "cpeNameId": "D52CB870-E71C-4ED1-9575-89C55E22371F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.145:*:*:*:*:*:*:*", "cpeNameId": "07CAE2BD-3C40-4DB7-B7F4-7F3F188C288B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.146:*:*:*:*:*:*:*", "cpeNameId": "F66FDF27-78C6-4AE8-BFFF-74FD08E25D2B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.147:*:*:*:*:*:*:*", "cpeNameId": "6EF3FCC0-FBD5-4575-ACDC-14A6CBD4C33C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.148:*:*:*:*:*:*:*", "cpeNameId": "5E07F013-A8BD-4FAC-93E4-99A687FAC737"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.149:*:*:*:*:*:*:*", "cpeNameId": "A304D006-C083-43DB-814C-92AD93A16406"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.150:*:*:*:*:*:*:*", "cpeNameId": "FE1937F5-7F68-4712-A42B-352F98DBCB73"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.151:*:*:*:*:*:*:*", "cpeNameId": "302DB07A-BCEB-473E-B83D-7144D60975C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.152:*:*:*:*:*:*:*", "cpeNameId": "AF045BDA-D8EE-480F-B055-2C8F1F6BB441"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.153:*:*:*:*:*:*:*", "cpeNameId": "7E53F5F7-2160-4D23-A389-6C177EB97920"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.154:*:*:*:*:*:*:*", "cpeNameId": "A352CE2F-3599-42AA-A999-8D2A8AE77385"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.155:*:*:*:*:*:*:*", "cpeNameId": "68E34650-597F-4BB5-B655-AAF63A824DFC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.156:*:*:*:*:*:*:*", "cpeNameId": "A9B206FB-6ED1-43D6-93B6-E5D295B69BFA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.157:*:*:*:*:*:*:*", "cpeNameId": "83CB40AA-9524-4C0B-BB83-7DDCCE05A165"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.158:*:*:*:*:*:*:*", "cpeNameId": "98E50A5B-D1F8-4A2E-BFFA-DFD9318A4C0C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.159:*:*:*:*:*:*:*", "cpeNameId": "A68C2E01-EAD7-4504-AC51-B6895536A2A7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.160:*:*:*:*:*:*:*", "cpeNameId": "265719AB-6D6A-4AE3-A264-8998A6B51417"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.161:*:*:*:*:*:*:*", "cpeNameId": "29283AA7-C999-41CF-B9EA-AF62EBAE25AA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.162:*:*:*:*:*:*:*", "cpeNameId": "026D8844-B72E-449A-AD9D-6DA20D6B2461"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.163:*:*:*:*:*:*:*", "cpeNameId": "CF2684AA-9D52-4D0C-B9C0-EA458DBA0275"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.164:*:*:*:*:*:*:*", "cpeNameId": "CF99A96E-B230-41AD-8BC4-5870661F4FE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.165:*:*:*:*:*:*:*", "cpeNameId": "382060D4-41AC-4E8F-B469-5012B74CA970"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.166:*:*:*:*:*:*:*", "cpeNameId": "7C529480-7A93-4F29-B9B6-DC8415C2C224"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.167:*:*:*:*:*:*:*", "cpeNameId": "DF37EDB8-03D5-48A1-825C-6AF1031DAADF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.168:*:*:*:*:*:*:*", "cpeNameId": "6D13EE22-1FB2-4497-BD34-EE71D20FB8BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.169:*:*:*:*:*:*:*", "cpeNameId": "BC302B8B-8B9A-4824-97CE-7E6433BF32B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.170:*:*:*:*:*:*:*", "cpeNameId": "7CFD9E7B-FE01-4B66-A9A6-1368D013765A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.171:*:*:*:*:*:*:*", "cpeNameId": "DED1A683-EBE7-497B-929A-313AB2AC0925"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.172:*:*:*:*:*:*:*", "cpeNameId": "A0C2E3CD-4225-4F59-9399-141ECB64DCCA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.173:*:*:*:*:*:*:*", "cpeNameId": "64951069-6F32-4B2C-876D-F2768FAB072F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.174:*:*:*:*:*:*:*", "cpeNameId": "EBB28714-885F-44E1-A0F8-51679623F675"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.175:*:*:*:*:*:*:*", "cpeNameId": "1BA05B10-74CC-41CC-AC4B-5F983EB9EF6A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.176:*:*:*:*:*:*:*", "cpeNameId": "207CE836-9B16-4D97-A92E-937EA92B2454"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.177:*:*:*:*:*:*:*", "cpeNameId": "900CD12E-534F-4104-9453-98073C4B9FE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.178:*:*:*:*:*:*:*", "cpeNameId": "662D17D5-0313-498C-BE52-48C9C2164929"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.179:*:*:*:*:*:*:*", "cpeNameId": "FDA8B29F-BFF6-4550-832D-9E76E48FA652"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.180:*:*:*:*:*:*:*", "cpeNameId": "0E55779B-C14D-49B2-AAD3-9E02A0612FA0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.181:*:*:*:*:*:*:*", "cpeNameId": "08726DAC-BA17-4EC2-BADB-177D34704C1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.182:*:*:*:*:*:*:*", "cpeNameId": "00DADA74-AD7D-4030-81F7-B8024E9EDD39"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.183:*:*:*:*:*:*:*", "cpeNameId": "41DA6AEA-5407-416C-8E04-738A6BFD2AFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.184:*:*:*:*:*:*:*", "cpeNameId": "CB0669FC-A028-4A45-873B-C1E5B60A153F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.185:*:*:*:*:*:*:*", "cpeNameId": "EA578486-31F1-4809-81A3-09B130EFF1EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.186:*:*:*:*:*:*:*", "cpeNameId": "5A48466E-5175-48F2-AB12-20FF8FD39A91"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.187:*:*:*:*:*:*:*", "cpeNameId": "A0AF33BB-CCA4-4EF3-AD37-A6BDA592201E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.188:*:*:*:*:*:*:*", "cpeNameId": "C55F2CFE-9058-4F93-9D1A-9959655533E3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.189:*:*:*:*:*:*:*", "cpeNameId": "1923663A-BA21-4246-9A05-53EEB987A59F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.190:*:*:*:*:*:*:*", "cpeNameId": "3D3E3AC9-B829-41A9-A4BF-E0D25EE83CB3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.191:*:*:*:*:*:*:*", "cpeNameId": "0209D8A9-58CB-464D-98E9-C55849C5EFBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.192:*:*:*:*:*:*:*", "cpeNameId": "E5ADF739-9681-4488-91EF-1DEB057300AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.193:*:*:*:*:*:*:*", "cpeNameId": "7611677A-A4AF-496B-89BD-AD6FEE729557"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.194:*:*:*:*:*:*:*", "cpeNameId": "C4697BBB-B20E-4481-9CB1-47705D6B0A64"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.195:*:*:*:*:*:*:*", "cpeNameId": "58471B55-C8F3-462E-A365-CDE52A6BCBA9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.196:*:*:*:*:*:*:*", "cpeNameId": "7DE3F30B-22F8-4308-A4DD-69346EFAEC9C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.197:*:*:*:*:*:*:*", "cpeNameId": "0D16F9C5-E2D5-4A37-904F-9B882AD86309"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.198:*:*:*:*:*:*:*", "cpeNameId": "91BB87DE-E086-4D53-AB3A-69224410D542"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.199:*:*:*:*:*:*:*", "cpeNameId": "281A834B-F437-4D42-A128-2F404AD98C03"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.200:*:*:*:*:*:*:*", "cpeNameId": "CFDE6A44-7410-45AA-B03F-518BB2E3D029"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.201:*:*:*:*:*:*:*", "cpeNameId": "2F3696BC-9946-43EC-A5BE-FBF103B914C2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.202:*:*:*:*:*:*:*", "cpeNameId": "49E286A6-8D86-4F0C-AE46-70CE364D4D34"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.203:*:*:*:*:*:*:*", "cpeNameId": "F05F8B59-C598-4A9D-8598-95E486F03912"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.204:*:*:*:*:*:*:*", "cpeNameId": "9574762D-2B80-4DA6-B5C0-13BA8574BDF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.205:*:*:*:*:*:*:*", "cpeNameId": "E1592B19-0EBB-40A5-8E26-09D333620E42"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.206:*:*:*:*:*:*:*", "cpeNameId": "7A00E289-C1AF-4892-888E-FE2B71F9192B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.207:*:*:*:*:*:*:*", "cpeNameId": "66F586E3-6EA7-427E-B2A1-04C72BB3C0F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.208:*:*:*:*:*:*:*", "cpeNameId": "35D69FF2-A15F-4DEF-9042-8068FB161134"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.209:*:*:*:*:*:*:*", "cpeNameId": "494CAA62-F904-40B5-B57F-DD740D2CA896"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.210:*:*:*:*:*:*:*", "cpeNameId": "196CBDC8-9C64-42C8-ADA4-7D4BEA554878"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.211:*:*:*:*:*:*:*", "cpeNameId": "013EBDF8-3C0F-4215-931D-C3C29B435E0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.212:*:*:*:*:*:*:*", "cpeNameId": "7D6E2DB9-8680-4AEF-AD1A-3D69754035F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.213:*:*:*:*:*:*:*", "cpeNameId": "D49FC2AF-E5DA-418C-BE69-F7C7B25ECD30"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.214:*:*:*:*:*:*:*", "cpeNameId": "630B3919-9504-4EA4-82BF-3352DAE4FFAB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.215:*:*:*:*:*:*:*", "cpeNameId": "BFF8FD48-648F-4E98-BDDA-AF7832422E08"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.216:*:*:*:*:*:*:*", "cpeNameId": "44AD0235-927F-4286-AE7C-34E60481DCD2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.217:*:*:*:*:*:*:*", "cpeNameId": "D726E465-CB14-4F50-A3A5-05F5BEB544FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.218:*:*:*:*:*:*:*", "cpeNameId": "3BEA4D9C-4899-4E3F-AA4F-86AC93C26841"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.219:*:*:*:*:*:*:*", "cpeNameId": "155548FF-67CC-4BA7-BE08-2810EA12A181"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.220:*:*:*:*:*:*:*", "cpeNameId": "20FB805F-D821-49EF-969C-21CD8232CC97"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.221:*:*:*:*:*:*:*", "cpeNameId": "48B45DEA-86BB-4242-8F6E-CFF9BB37B19C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.222:*:*:*:*:*:*:*", "cpeNameId": "6C5D7A67-FB42-44EA-A569-7274E9F06E40"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.223:*:*:*:*:*:*:*", "cpeNameId": "B91D2396-F745-44E4-9794-8A7B191D0EBE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.224:*:*:*:*:*:*:*", "cpeNameId": "BFBEE827-A91F-455B-8C59-14CAF80BAC0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.225:*:*:*:*:*:*:*", "cpeNameId": "C905A295-285D-4D2C-A0F3-454FD5ED6071"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.226:*:*:*:*:*:*:*", "cpeNameId": "A9B06703-D925-4E2A-9FA0-2A6863A17CF0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.227:*:*:*:*:*:*:*", "cpeNameId": "6FAB2103-943D-4DA6-B967-00AEA85D70F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.228:*:*:*:*:*:*:*", "cpeNameId": "64D4B432-E3DD-4D99-85EE-7287EA5003D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.229:*:*:*:*:*:*:*", "cpeNameId": "94C0C578-4D2D-4BA0-9614-C5EFE5FAC97E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.230:*:*:*:*:*:*:*", "cpeNameId": "3C588990-79E8-4296-82F6-EECDADEC4FBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.231:*:*:*:*:*:*:*", "cpeNameId": "6CCFCFAC-B519-4B1C-BA37-C254526BFC5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.232:*:*:*:*:*:*:*", "cpeNameId": "852B8329-D924-4265-86D5-F92FDD268B05"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.233:*:*:*:*:*:*:*", "cpeNameId": "0C14D107-1D46-490A-9C9C-973325B77873"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.234:*:*:*:*:*:*:*", "cpeNameId": "355C0CE7-0FD8-47FE-A7A3-D0B4487DF610"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.235:*:*:*:*:*:*:*", "cpeNameId": "B0CEDF08-FDE9-4A9F-84D5-C73C341FB515"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.236:*:*:*:*:*:*:*", "cpeNameId": "0DCBF98D-881B-43B9-90C7-FCB4B493F70C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.237:*:*:*:*:*:*:*", "cpeNameId": "F97BF049-4C8A-4CBF-8848-6D8DDD81D75B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.238:*:*:*:*:*:*:*", "cpeNameId": "988EC493-0C82-46C8-8A4D-AF1501B35670"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.239:*:*:*:*:*:*:*", "cpeNameId": "4158AFE2-D4E1-4334-B313-F9CA5C7B0CB7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.240:*:*:*:*:*:*:*", "cpeNameId": "8B1E737A-F8D6-4FCF-A8B2-D8B9F4EC07F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.241:*:*:*:*:*:*:*", "cpeNameId": "81BB3A2B-0C6A-47B9-AB54-3763CE6314B8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.242:*:*:*:*:*:*:*", "cpeNameId": "21206177-2704-4E74-BDA1-1510124628DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.243:*:*:*:*:*:*:*", "cpeNameId": "10CD8A76-15D2-4B01-896E-086AB6DBB68F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.244:*:*:*:*:*:*:*", "cpeNameId": "1F928940-DFB6-4916-8382-A1C774194832"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.245:*:*:*:*:*:*:*", "cpeNameId": "0CC09134-0AD5-4091-BE00-0FDCE6C1B5AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.246:*:*:*:*:*:*:*", "cpeNameId": "7F445E26-C26F-4398-BA55-3903FC3AB3ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.247:*:*:*:*:*:*:*", "cpeNameId": "68E8E3E3-D2CB-4354-A0E4-AEE63E9AF94E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.248:*:*:*:*:*:*:*", "cpeNameId": "3949F9FD-1182-47FB-A635-AD39280555BE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.249:*:*:*:*:*:*:*", "cpeNameId": "4C7951C3-5951-4525-99F1-483B3B397CE3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.250:*:*:*:*:*:*:*", "cpeNameId": "7C354C5F-E5EF-4D0B-8854-3D5C163E59D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.251:*:*:*:*:*:*:*", "cpeNameId": "440E5A5E-E0D6-424A-A978-F34DEADDFA17"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.252:*:*:*:*:*:*:*", "cpeNameId": "551FE389-86EA-492D-A22F-C6D2C6BCDB2E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.253:*:*:*:*:*:*:*", "cpeNameId": "BB12F4A9-AE2A-4CDB-958F-5AF3C262067E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.254:*:*:*:*:*:*:*", "cpeNameId": "007D7060-D12B-46BD-B005-897B3E5290CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.255:*:*:*:*:*:*:*", "cpeNameId": "2FB1583A-1D2E-4B82-AFA4-81D623D681D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.256:*:*:*:*:*:*:*", "cpeNameId": "450021EA-3409-4C4F-9B49-97579C89E534"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.257:*:*:*:*:*:*:*", "cpeNameId": "28876801-3DD9-4992-B0CF-3160C9822D9C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.258:*:*:*:*:*:*:*", "cpeNameId": "133ED5C3-38BC-47CA-97C9-ACC9D33D93C9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.259:*:*:*:*:*:*:*", "cpeNameId": "2FC947E5-32F4-413E-864D-1F7BEE684504"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.260:*:*:*:*:*:*:*", "cpeNameId": "3727E506-D975-46B1-BA82-9E9DBF60864D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.261:*:*:*:*:*:*:*", "cpeNameId": "B7D5C3F2-7F88-4FF7-9D56-EBB35C7FA687"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.262:*:*:*:*:*:*:*", "cpeNameId": "FA3F037B-3AA8-4DC7-ABF8-37D4E7F72987"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.263:*:*:*:*:*:*:*", "cpeNameId": "B629674A-274B-4A00-B972-8E6AC7A125C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.264:*:*:*:*:*:*:*", "cpeNameId": "CCE21890-0782-4EA7-8C50-C16BA210EBEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.265:*:*:*:*:*:*:*", "cpeNameId": "61DC4A5D-8023-4703-9B5F-CF38623D5F4B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.266:*:*:*:*:*:*:*", "cpeNameId": "E7953AF3-4293-4FDC-9E2A-791F15CDBC96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.267:*:*:*:*:*:*:*", "cpeNameId": "A0A7C20B-1669-492F-8E45-B94457D9BA5B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.268:*:*:*:*:*:*:*", "cpeNameId": "74A43E1F-F22F-421F-BB43-6D313E186447"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.269:*:*:*:*:*:*:*", "cpeNameId": "F87C845A-E4F5-48C5-8BE7-A32DC9765770"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.270:*:*:*:*:*:*:*", "cpeNameId": "C9E3E563-0877-41A4-B911-9C1D96FC083D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.271:*:*:*:*:*:*:*", "cpeNameId": "AF7989DF-3745-43BE-BE62-C89975857EC0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.272:*:*:*:*:*:*:*", "cpeNameId": "9BEE5DF7-1F70-4B14-91E8-A6C4C75A6A15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.273:*:*:*:*:*:*:*", "cpeNameId": "D33F4F6B-4412-41B0-A647-71C2F3DEA100"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.274:*:*:*:*:*:*:*", "cpeNameId": "E414EB92-7254-44A9-A831-3739EC2C0339"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.275:*:*:*:*:*:*:*", "cpeNameId": "2E6BFFD9-5144-428A-B3B4-9D39DC57928F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.276:*:*:*:*:*:*:*", "cpeNameId": "8BB682EF-48EA-4014-8C3A-372DBBEDBDDB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.277:*:*:*:*:*:*:*", "cpeNameId": "57B18195-1374-4A01-A7BC-62CAB96836BF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.278:*:*:*:*:*:*:*", "cpeNameId": "B3439ABE-6A03-4C6E-8C65-5F340D3408CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.279:*:*:*:*:*:*:*", "cpeNameId": "3E65E40A-EBF1-4E15-BB6E-3F33C0607213"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.280:*:*:*:*:*:*:*", "cpeNameId": "158B02C6-BE88-4AAA-8D98-A2928FF494E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.281:*:*:*:*:*:*:*", "cpeNameId": "46960B28-AA2F-49A0-BD2A-B70031BAFE17"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.282:*:*:*:*:*:*:*", "cpeNameId": "6C488375-5CBF-4B6A-B5DE-4EE9D0D78D6A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.283:*:*:*:*:*:*:*", "cpeNameId": "89C004F6-5808-4140-8CA9-94B1BDFFFC08"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.284:*:*:*:*:*:*:*", "cpeNameId": "87E0D14B-2305-46E4-A1FF-56DF608C1795"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.285:*:*:*:*:*:*:*", "cpeNameId": "44F8F5F9-4842-4765-A551-2D2078DFC684"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.286:*:*:*:*:*:*:*", "cpeNameId": "1E4F8F79-CF58-424B-8884-424A00B283C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.287:*:*:*:*:*:*:*", "cpeNameId": "AFEC2AD9-E3ED-4ECE-BA80-1FD76248D514"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.288:*:*:*:*:*:*:*", "cpeNameId": "EEDEF216-9D62-4DF6-BD89-3EED6906292F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.289:*:*:*:*:*:*:*", "cpeNameId": "A02EA509-DF45-4CE8-90B1-C8BD7B8BAFD6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.290:*:*:*:*:*:*:*", "cpeNameId": "A2C66CF4-D5D7-4897-8E3F-5E47FED898A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.291:*:*:*:*:*:*:*", "cpeNameId": "9C4FE524-6E1E-4FB5-BC3C-9731F9F78E6A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.292:*:*:*:*:*:*:*", "cpeNameId": "35C28419-F80A-4875-88CE-4D4B6F00C8DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.293:*:*:*:*:*:*:*", "cpeNameId": "58BE8244-391B-4CF2-A805-E299B82C61D7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.294:*:*:*:*:*:*:*", "cpeNameId": "3B2A2979-293A-4DE2-8EEC-030AB3096C30"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.295:*:*:*:*:*:*:*", "cpeNameId": "15FA5BB0-94CE-4689-B8A6-EB344F983EC9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.296:*:*:*:*:*:*:*", "cpeNameId": "5DA05C25-355D-4C96-8D88-1E207C726AAF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.297:*:*:*:*:*:*:*", "cpeNameId": "36F176DB-DCF3-4FC2-88DD-A94222633A21"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.298:*:*:*:*:*:*:*", "cpeNameId": "459887C6-2292-4B2A-87AD-DD7714A00949"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.299:*:*:*:*:*:*:*", "cpeNameId": "181DBB6F-D9C2-4189-9F54-7B9CDDB80BD7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.300:*:*:*:*:*:*:*", "cpeNameId": "8BB51592-1D30-4CD6-863D-818A48FF2AE4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.301:*:*:*:*:*:*:*", "cpeNameId": "48216E63-EB92-4B3B-9CBD-E2A1D46EC013"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.302:*:*:*:*:*:*:*", "cpeNameId": "C5FA6C11-FE27-44EC-A4A6-25120C4848CE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5:*:*:*:*:*:*:*", "cpeNameId": "6752716B-480D-47F4-B011-9496A572E34A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5:-:*:*:*:*:*:*", "cpeNameId": "64E8469C-7D92-46CE-953D-C228C6751E3E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5:rc1:*:*:*:*:*:*", "cpeNameId": "2CCF74F9-BC2F-461A-98E6-DC98E271FCEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5:rc2:*:*:*:*:*:*", "cpeNameId": "55517ACC-4334-44E0-AD3D-0E1FF4E013DE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5:rc3:*:*:*:*:*:*", "cpeNameId": "BC105030-814B-4359-85B8-AB322E105737"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5:rc4:*:*:*:*:*:*", "cpeNameId": "DD78112E-F11E-46C2-AE52-9B48C7F0B03D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5:rc5:*:*:*:*:*:*", "cpeNameId": "599B6EE9-2C07-43A2-BC41-C96DE7502A8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5:rc6:*:*:*:*:*:*", "cpeNameId": "884AB775-5BA8-47A6-8556-CA9FBD4B3366"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5:rc7:*:*:*:*:*:*", "cpeNameId": "0C4F78B2-4531-4480-A171-1BAF9C8ED2FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5.0:*:*:*:*:*:*:*", "cpeNameId": "89D51C4A-2038-4CC3-BC96-B4B99709BB84"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5.0:rc1:*:*:*:*:*:*", "cpeNameId": "9479CFA4-0CFC-4DB3-9EFF-EAEA98B51CA3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5.0:rc2:*:*:*:*:*:*", "cpeNameId": "482E248D-31FE-428A-A427-D0E6692D0D6A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5.0:rc3:*:*:*:*:*:*", "cpeNameId": "BA2A8624-AAF8-4BFF-9B51-9E2B21104D1F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5.0:rc7:*:*:*:*:*:*", "cpeNameId": "A24295A6-C621-4249-B273-4EE57AD074BF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5.1:*:*:*:*:*:*:*", "cpeNameId": "4F48C1CE-B56D-4E32-8D36-CFA5CE37F833"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5.2:*:*:*:*:*:*:*", "cpeNameId": "3090C977-4C87-4DE7-B635-65DE0C95F1AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5.3:*:*:*:*:*:*:*", "cpeNameId": "E78188B1-4DD4-40F0-82A8-66F5CAB33C6C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5.4:*:*:*:*:*:*:*", "cpeNameId": "0D1A4F8C-D753-40D8-9EF6-E7D9E95E0CC6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5.5:*:*:*:*:*:*:*", "cpeNameId": "450C515D-9EB0-4F37-B3C1-EE55E128466E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5.6:*:*:*:*:*:*:*", "cpeNameId": "D171B92A-B9F2-4CF4-A51D-25DE12B1DAB7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5.7:*:*:*:*:*:*:*", "cpeNameId": "DDB68C52-02FF-4514-A37A-FAE660ECFAEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.6:*:*:*:*:*:*:*", "cpeNameId": "513E9C7E-9CD0-453D-8044-1DCF043ABFC5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.6.1:*:*:*:*:*:*:*", "cpeNameId": "4282AD9E-F4CF-406C-82C6-E9C9C374341F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.6.2:*:*:*:*:*:*:*", "cpeNameId": "79BFAA05-E0AE-4B27-ADD2-043A5F1765DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.6.3:*:*:*:*:*:*:*", "cpeNameId": "3E22E014-6635-4FF5-AA51-0DFED4F7E4CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.6.4:*:*:*:*:*:*:*", "cpeNameId": "8D6F4072-8DBE-4637-AEBD-4E9123A6C9FA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.6.5:*:*:*:*:*:*:*", "cpeNameId": "FCCB037F-6B5B-4B3D-AB98-DBD4A72D60B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.6.6:*:*:*:*:*:*:*", "cpeNameId": "8D7C846C-1336-4777-8B52-9F75E281AFA3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.6.7:*:*:*:*:*:*:*", "cpeNameId": "55DA9CF3-9708-4520-AAA8-49B56B5BE4EE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7:*:*:*:*:*:*:*", "cpeNameId": "496F7DCA-CD17-40FF-A146-993EACB85937"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7:-:*:*:*:*:*:*", "cpeNameId": "7071E45E-8875-403E-900D-B18B78B2CFEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7:rc1:*:*:*:*:*:*", "cpeNameId": "8C21D0B7-9E71-4213-9146-7A85711840A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7:rc2:*:*:*:*:*:*", "cpeNameId": "1FD38972-2F84-4D2B-9C4D-B2A9B6F87BD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7:rc3:*:*:*:*:*:*", "cpeNameId": "CED8F0FE-B0EC-4F8C-B1B3-9690A5B2C427"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7:rc4:*:*:*:*:*:*", "cpeNameId": "805AF26E-C23B-45A2-8D72-F90A1FA0EC45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7:rc5:*:*:*:*:*:*", "cpeNameId": "FD8D5C3C-1EB6-454A-9CE8-51593EFE60B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7:rc6:*:*:*:*:*:*", "cpeNameId": "BF98A71F-D556-470F-9ECA-BA0D03919E44"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7:rc7:*:*:*:*:*:*", "cpeNameId": "3EA4A517-42BA-47DE-9435-3B2EE041B824"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7.1:*:*:*:*:*:*:*", "cpeNameId": "CB86EA69-EE70-45B2-B01F-5C3056895ADA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7.2:*:*:*:*:*:*:*", "cpeNameId": "85FB5454-E1F2-46B8-9CC7-ED28B950CC79"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7.3:*:*:*:*:*:*:*", "cpeNameId": "700591B1-5F5E-406D-AFD2-C171814E1762"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7.4:*:*:*:*:*:*:*", "cpeNameId": "5BCFD5D4-7494-49AA-B48C-E7C0B8D1881E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7.5:*:*:*:*:*:*:*", "cpeNameId": "446BC346-E811-407B-A029-1E5B1D6AF131"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7.6:*:*:*:*:*:*:*", "cpeNameId": "27FBC7AE-CBC8-417E-87F2-1FCBA47FFED2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7.7:*:*:*:*:*:*:*", "cpeNameId": "A9D96B8D-35D8-4E1E-A12B-EBDC81FF5F3C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7.8:*:*:*:*:*:*:*", "cpeNameId": "9CB7C2A8-EF23-4612-94CE-F37623A35CE5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7.9:*:*:*:*:*:*:*", "cpeNameId": "C38910BF-3CEA-4EAD-B391-942E990DB44D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7.10:*:*:*:*:*:*:*", "cpeNameId": "CD211D99-AE1B-4259-9D88-978BF4BBE266"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8:*:*:*:*:*:*:*", "cpeNameId": "7FCAC593-0734-4D3F-AD38-55AA21A05DD0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8:-:*:*:*:*:*:*", "cpeNameId": "A4B6A9C4-8211-4E88-A2C7-C36BBBE48E24"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8:rc1:*:*:*:*:*:*", "cpeNameId": "AEC7ED2E-5B13-4144-9ED7-A60EDE512955"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8:rc2:*:*:*:*:*:*", "cpeNameId": "7463D464-9817-44F7-BCCA-16947B5F7348"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8:rc3:*:*:*:*:*:*", "cpeNameId": "75C6B48C-182A-42B6-8BA1-53057660DA89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8:rc4:*:*:*:*:*:*", "cpeNameId": "958A88C5-9246-464A-9E6E-4340B03A6C1A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8:rc5:*:*:*:*:*:*", "cpeNameId": "3412A731-F526-44FA-9E1C-42A77C9B1E29"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8:rc6:*:*:*:*:*:*", "cpeNameId": "293C40EC-887D-42A6-92E8-CDF12F0E0BAA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.1:*:*:*:*:*:*:*", "cpeNameId": "C08959E8-EC01-42E8-AA0C-9BD6621B5FE8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.2:*:*:*:*:*:*:*", "cpeNameId": "FCCE5C13-84F1-456D-8172-79A4B66D4563"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.3:*:*:*:*:*:*:*", "cpeNameId": "8DD556A5-950A-4386-B290-3BA23F8FAE74"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.4:*:*:*:*:*:*:*", "cpeNameId": "11C5676D-8CC7-4CD7-B0DA-E6266DD066AD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.5:*:*:*:*:*:*:*", "cpeNameId": "F2B231B1-804A-4ADF-A8A6-9A2DB05DDF48"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.6:*:*:*:*:*:*:*", "cpeNameId": "2DCDBE9F-80D3-4A9A-8ABD-89872C2BF47F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.7:*:*:*:*:*:*:*", "cpeNameId": "C673A048-7856-4547-8E56-BC3557D9FD38"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.8:*:*:*:*:*:*:*", "cpeNameId": "398EDB8C-C735-4B41-994E-C207F198D072"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.9:*:*:*:*:*:*:*", "cpeNameId": "8256347C-D1FF-4A19-BD31-F78F0085A475"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.10:*:*:*:*:*:*:*", "cpeNameId": "A63AAEE8-FEEB-4399-8FD5-F0A90A5C4363"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.11:*:*:*:*:*:*:*", "cpeNameId": "0F6E054C-2FB7-4F32-A653-87E436E30BFE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.12:*:*:*:*:*:*:*", "cpeNameId": "7CE8E210-4DFE-4E5D-A6D9-BD991AC6F8BF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.13:*:*:*:*:*:*:*", "cpeNameId": "744AC014-50ED-4FB4-B8AD-D5C7CF3C7CC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.14:*:*:*:*:*:*:*", "cpeNameId": "498DABA6-7087-4364-8C81-5346BE483975"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.15:*:*:*:*:*:*:*", "cpeNameId": "37255C42-4B93-475E-9935-1F0446011768"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.16:*:*:*:*:*:*:*", "cpeNameId": "A8695620-4D6E-44B4-9FE8-95C9960C240E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.17:*:*:*:*:*:*:*", "cpeNameId": "96D4758C-FE52-4DA8-87E1-577A3FCEF236"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:*:*:*:*:*:*:*", "cpeNameId": "72D7C54B-6ED2-4DCE-A67F-C71FB93A5823"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:-:*:*:*:*:*:*", "cpeNameId": "12D10173-3DCE-40E4-9B99-B6C7A7454106"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:rc1:*:*:*:*:*:*", "cpeNameId": "DBD96821-B70D-475C-A38B-8416AC3576D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:rc2:*:*:*:*:*:*", "cpeNameId": "221A17CE-03D4-4662-924E-23E6426BB693"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:rc3:*:*:*:*:*:*", "cpeNameId": "5B3F2BE9-697B-4E5D-93D6-2127CE19550C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:rc4:*:*:*:*:*:*", "cpeNameId": "AD35E83C-A016-47F3-8D62-9C4A0306FAD4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:rc5:*:*:*:*:*:*", "cpeNameId": "E166DE00-D241-44A0-B75B-F067310B6FEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:rc6:*:*:*:*:*:*", "cpeNameId": "65CAACB6-7E01-48F5-98DF-E1923A3F01C5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:rc7:*:*:*:*:*:*", "cpeNameId": "F12E246D-AC32-42AB-A20F-5B54C2FFC059"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:rc8:*:*:*:*:*:*", "cpeNameId": "9896B1C6-0127-4248-A9D1-ABB07588F87A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.0:*:*:*:*:*:*:*", "cpeNameId": "C477CC26-17BE-46DA-8B9D-218D8AA51AD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.1:*:*:*:*:*:*:*", "cpeNameId": "8AF8815B-4FEF-483D-9CF9-C8BDDD29308D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.2:*:*:*:*:*:*:*", "cpeNameId": "A36A1BD4-0C74-4284-99A4-A53FEE3C8D65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.3:*:*:*:*:*:*:*", "cpeNameId": "AF59D9D7-96F7-41F7-8125-50592CE96BFF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.4:*:*:*:*:*:*:*", "cpeNameId": "CDB03998-BA6F-4F00-83F7-B54515BA4725"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.5:*:*:*:*:*:*:*", "cpeNameId": "0F83014C-CE37-47EA-9906-94AA2FED7DD9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.6:*:*:*:*:*:*:*", "cpeNameId": "2DACA082-8E91-493D-890B-FF9A78EEBC9A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.7:*:*:*:*:*:*:*", "cpeNameId": "8823DC1A-2E25-4E13-9F8F-E347154A7F72"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.8:*:*:*:*:*:*:*", "cpeNameId": "60679951-3906-4497-8CBC-8891BEE953B6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.9:*:*:*:*:*:*:*", "cpeNameId": "76030A2F-567A-493B-BD6C-09DB84455253"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.10:*:*:*:*:*:*:*", "cpeNameId": "527F6E5F-FDE0-4BEF-AB6F-9EAC1F6F6978"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.11:*:*:*:*:*:*:*", "cpeNameId": "CE3D179E-83C1-4BAE-8CB1-DE413B7901D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.12:*:*:*:*:*:*:*", "cpeNameId": "BD502B1D-8E7D-4AD4-9011-E616315740C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.13:*:*:*:*:*:*:*", "cpeNameId": "4A96891C-E4D8-4BBD-8C3A-8BEC1EDD6DF7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.14:*:*:*:*:*:*:*", "cpeNameId": "049B9559-3317-43D0-BB9E-2008182328D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.15:*:*:*:*:*:*:*", "cpeNameId": "3BAD5668-2640-4602-9837-07D764990011"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.16:*:*:*:*:*:*:*", "cpeNameId": "B76E758C-F23C-4E81-8D89-6B3C331DF70A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.17:*:*:*:*:*:*:*", "cpeNameId": "558B0C0A-04D6-41D1-AED9-4D16159FAA64"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.18:*:*:*:*:*:*:*", "cpeNameId": "BC3F9201-BBD4-48C1-9254-14DDCC7A6B7E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.19:*:*:*:*:*:*:*", "cpeNameId": "E8A01AF1-8E23-40E5-A956-AF00A7A47BA0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.20:*:*:*:*:*:*:*", "cpeNameId": "2CAF46F1-2D12-41FC-ABF2-C6F56A9CE410"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.21:*:*:*:*:*:*:*", "cpeNameId": "7A2DC702-A782-4D15-9435-ACC0778F3FB3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.22:*:*:*:*:*:*:*", "cpeNameId": "D2916473-F575-4728-B2EC-60EE62AB8BF7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.23:*:*:*:*:*:*:*", "cpeNameId": "B6409273-5794-4B9E-BDD5-7FCFCF339511"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.24:*:*:*:*:*:*:*", "cpeNameId": "2893EFED-04F5-42B0-96B4-FB29EEFAA9EE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.25:*:*:*:*:*:*:*", "cpeNameId": "F1EC5B2F-8765-464D-A5A2-DEF282D3576A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.26:*:*:*:*:*:*:*", "cpeNameId": "CE231956-F740-4AA4-9750-A9F1E16C7429"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.27:*:*:*:*:*:*:*", "cpeNameId": "B08B4A4D-A673-49B9-9809-6C8EB2D8CCFA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.28:*:*:*:*:*:*:*", "cpeNameId": "25127A10-99C3-4B29-9037-752644FEDAA3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.29:*:*:*:*:*:*:*", "cpeNameId": "7C9B9FDE-13EC-442C-A753-05D753AF7F2F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.30:*:*:*:*:*:*:*", "cpeNameId": "60DFABB9-1C9B-4A43-8A5D-4B51C46D6CF2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.31:*:*:*:*:*:*:*", "cpeNameId": "55547C90-57BE-4B48-80BC-5248CF85A54D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.32:*:*:*:*:*:*:*", "cpeNameId": "4FEC2A07-6C9E-4B57-9F1D-A8C7A2531042"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.33:*:*:*:*:*:*:*", "cpeNameId": "3A3CC360-6DB0-4058-A637-BEA9F10F3ECC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.34:*:*:*:*:*:*:*", "cpeNameId": "74A4841B-22B2-45B0-A608-52579D2983E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.35:*:*:*:*:*:*:*", "cpeNameId": "F5D48DE7-BCE0-4195-B8E2-E3A8C9884647"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.36:*:*:*:*:*:*:*", "cpeNameId": "15A99A35-647E-4AFF-B6E2-0652FE1F9FFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.37:*:*:*:*:*:*:*", "cpeNameId": "51FDBF94-6126-4C97-9650-6902E77C1811"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.38:*:*:*:*:*:*:*", "cpeNameId": "9A7EA0F2-DFB9-4CF2-82D8-F5C569BA5CD7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.39:*:*:*:*:*:*:*", "cpeNameId": "6C245624-3821-4A71-8682-AB66074B82B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.40:*:*:*:*:*:*:*", "cpeNameId": "DD0E98E7-27A5-4BDD-8907-53DA5C31F7A0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.41:*:*:*:*:*:*:*", "cpeNameId": "C879D912-54D4-4C73-91B2-500D49230B7A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.42:*:*:*:*:*:*:*", "cpeNameId": "85E02B17-E410-42FE-A83B-B8B4E7EBB532"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.43:*:*:*:*:*:*:*", "cpeNameId": "56E7B421-D6F4-45BB-A4A7-37AA444554F7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.44:*:*:*:*:*:*:*", "cpeNameId": "146F13C7-D0C9-4829-99CB-36C12B673BF9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.45:*:*:*:*:*:*:*", "cpeNameId": "1BC5E0A8-84C0-44E1-9DFD-5C633FD66E42"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.46:*:*:*:*:*:*:*", "cpeNameId": "965C07B8-7491-41D5-BFFF-C2DC61675475"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.47:*:*:*:*:*:*:*", "cpeNameId": "6F99B518-6BC7-4B89-8C2F-2A61C8F1A66C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.48:*:*:*:*:*:*:*", "cpeNameId": "1654578E-2D00-498E-9EF1-D64BBBBA7070"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.49:*:*:*:*:*:*:*", "cpeNameId": "BC5CCADF-5DEA-4540-8D2F-478F3175DA62"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.50:*:*:*:*:*:*:*", "cpeNameId": "67B5EA2D-9D68-4247-8C79-6F92FD8D39F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.51:*:*:*:*:*:*:*", "cpeNameId": "62B20DEB-030A-4CED-93BC-3F6F4D5AD54B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.52:*:*:*:*:*:*:*", "cpeNameId": "66BDA9E0-B507-4116-9FFC-6DBFE79A3CD4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.53:*:*:*:*:*:*:*", "cpeNameId": "76AB10DC-B6FD-4E05-A1E6-09C04A8A1B13"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.54:*:*:*:*:*:*:*", "cpeNameId": "6461BBE3-2AAA-4975-A75F-F561D3C1B753"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.55:*:*:*:*:*:*:*", "cpeNameId": "957D4BA7-C0CC-482D-8844-03AEBFE9F966"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.56:*:*:*:*:*:*:*", "cpeNameId": "4B6981FD-9D76-418C-BC72-EC1900EA9C04"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.57:*:*:*:*:*:*:*", "cpeNameId": "22E939B7-D460-4BE9-9529-0E26B53304B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.58:*:*:*:*:*:*:*", "cpeNameId": "CC981857-5731-4095-92A2-D10F6F27F85E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.59:*:*:*:*:*:*:*", "cpeNameId": "EB3A0428-3B0E-4608-9D96-AC0687921B92"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.60:*:*:*:*:*:*:*", "cpeNameId": "F1134646-1E83-459B-9E11-B1893162D4B6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.61:*:*:*:*:*:*:*", "cpeNameId": "01F91BC8-9830-49E4-AFCA-5910983AFA96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.62:*:*:*:*:*:*:*", "cpeNameId": "C5611992-8FA6-489D-B4C7-9871472702C4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.63:*:*:*:*:*:*:*", "cpeNameId": "B7E52E14-5B55-4458-9BB8-5A1718BAD459"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.64:*:*:*:*:*:*:*", "cpeNameId": "8407449D-67A3-4594-9340-03C4A009828C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.65:*:*:*:*:*:*:*", "cpeNameId": "0B393B17-93FA-4A1F-AF33-86AFA723BC6C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.66:*:*:*:*:*:*:*", "cpeNameId": "3F002BC4-16F2-44FB-842E-7F1CDBA7D2D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.67:*:*:*:*:*:*:*", "cpeNameId": "AD88F263-F5B8-4027-A433-B33EB293F8C7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.68:*:*:*:*:*:*:*", "cpeNameId": "998A1D28-491B-49AF-BEBA-0B7C55016EDB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.69:*:*:*:*:*:*:*", "cpeNameId": "C00A621D-4F1D-4AD8-BE42-3E584F545757"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.70:*:*:*:*:*:*:*", "cpeNameId": "4A8C8214-FDDA-4A1B-9520-756DE05E1C8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.71:*:*:*:*:*:*:*", "cpeNameId": "69E6FBB1-D0B6-486C-B905-54D292ED0BBF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.72:*:*:*:*:*:*:*", "cpeNameId": "04D7688B-E9C8-4CA0-9564-06136BD00399"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.73:*:*:*:*:*:*:*", "cpeNameId": "A11B2E7E-F239-49F6-9B0A-EB897B935734"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.74:*:*:*:*:*:*:*", "cpeNameId": "09B990BA-BB96-40E6-936B-A42138DA410E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.75:*:*:*:*:*:*:*", "cpeNameId": "EE93F1AB-E1B2-4D42-8482-FC0D5232EDCF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.76:*:*:*:*:*:*:*", "cpeNameId": "E094CC04-C34E-45D2-B7BD-8344494F2AF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.77:*:*:*:*:*:*:*", "cpeNameId": "A7AD03A1-2D39-498C-B6FC-6288DFE6A0B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.78:*:*:*:*:*:*:*", "cpeNameId": "C7332F79-76CA-466E-974C-6D94B2028E83"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.79:*:*:*:*:*:*:*", "cpeNameId": "4C7E0132-E639-4C9E-ACD4-E68A1D16EE27"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.80:*:*:*:*:*:*:*", "cpeNameId": "0BA2A075-D652-4220-80D3-765F2E0F1248"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.81:*:*:*:*:*:*:*", "cpeNameId": "6D6C7CFE-7944-44FE-B8D0-13A87E781C59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.82:*:*:*:*:*:*:*", "cpeNameId": "BD198E06-E1B2-48AD-8236-1026D62FF668"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.83:*:*:*:*:*:*:*", "cpeNameId": "9E1B704D-FA55-4EE9-93AE-345D9CEC178C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.84:*:*:*:*:*:*:*", "cpeNameId": "2AD133E5-08E3-4456-9D3E-E2E42247222A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.85:*:*:*:*:*:*:*", "cpeNameId": "A038FF7C-6591-418B-89B7-AA36E91E4693"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.86:*:*:*:*:*:*:*", "cpeNameId": "17A55453-113E-4F83-9477-C3B94C21751D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.87:*:*:*:*:*:*:*", "cpeNameId": "64DA4194-F0DF-4AC6-A84F-00718C1D262B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.88:*:*:*:*:*:*:*", "cpeNameId": "19541D86-197B-4F32-9541-1ED6128DD8D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.89:*:*:*:*:*:*:*", "cpeNameId": "08118401-AEBB-4CE7-B76D-3017139D0153"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.90:*:*:*:*:*:*:*", "cpeNameId": "DEC38CAA-D49A-4D73-9E8B-92DD13268405"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.91:*:*:*:*:*:*:*", "cpeNameId": "B8923DAF-E99E-4721-B537-489F9195A78E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.92:*:*:*:*:*:*:*", "cpeNameId": "6979C8A1-9270-4687-9A67-0EDF32FB5003"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.93:*:*:*:*:*:*:*", "cpeNameId": "B30A094A-C263-431D-89B2-B54478A622BA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.94:*:*:*:*:*:*:*", "cpeNameId": "DC1C8AC1-972B-4950-AFAE-B2D68A94E1B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.95:*:*:*:*:*:*:*", "cpeNameId": "62FF165D-2752-4AB8-B3B9-CD8FBFABD3DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.96:*:*:*:*:*:*:*", "cpeNameId": "A0B93A29-FEE2-4EA3-87E8-DF6419F51030"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.97:*:*:*:*:*:*:*", "cpeNameId": "3C34F07E-8DBA-4D82-B8FE-1AFEEF9B2BF9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.98:*:*:*:*:*:*:*", "cpeNameId": "AAB29E6F-C210-4EA2-B2F8-5E1B2041B0B2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.99:*:*:*:*:*:*:*", "cpeNameId": "75652929-F44D-4DF1-8757-F7A8C10D9793"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.100:*:*:*:*:*:*:*", "cpeNameId": "C1AB8FB2-09C2-4A4F-B4EE-E581035E270E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.101:*:*:*:*:*:*:*", "cpeNameId": "0FCB52E4-4EA8-4555-B9A1-EEB1056DC5B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.102:*:*:*:*:*:*:*", "cpeNameId": "57C00F3F-2CEE-4A7F-947F-7A53CA00E52A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.103:*:*:*:*:*:*:*", "cpeNameId": "16CB7735-79B7-4335-8184-6D29A5C85840"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.104:*:*:*:*:*:*:*", "cpeNameId": "8ED9B3BD-8DDA-4465-BF33-9291986917AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.105:*:*:*:*:*:*:*", "cpeNameId": "3400C155-68D5-4DD8-807C-1EF4A4E1BB32"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.106:*:*:*:*:*:*:*", "cpeNameId": "A8B564E7-8A6F-466F-BC53-1B839D9FD3DE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.107:*:*:*:*:*:*:*", "cpeNameId": "F648ABD4-CD53-42CE-9C51-DFBD245FACB4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.108:*:*:*:*:*:*:*", "cpeNameId": "23D39FA8-42FB-43B7-92C7-D831548A0935"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.109:*:*:*:*:*:*:*", "cpeNameId": "5B96FEF9-EE49-4B1F-A218-B141E954CFD2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.110:*:*:*:*:*:*:*", "cpeNameId": "5A3CA9E6-CACE-4937-96F4-B8D45D43AAD2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.111:*:*:*:*:*:*:*", "cpeNameId": "B7084F8D-AD91-4EF1-9901-21AB7E8239CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.112:*:*:*:*:*:*:*", "cpeNameId": "3E544363-B63B-44C1-9F2E-597BE9EF2E65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.113:*:*:*:*:*:*:*", "cpeNameId": "B1C84F8A-2DA9-41BE-872B-B00A297AEA2D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.114:*:*:*:*:*:*:*", "cpeNameId": "6F69AA79-57C2-4B8E-9F8D-5AAFACAD0248"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.115:*:*:*:*:*:*:*", "cpeNameId": "FD6D4727-C95F-4515-8D4A-9D6FDC28C793"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.116:*:*:*:*:*:*:*", "cpeNameId": "01BC52F7-3028-480F-8E37-52A7715AC90A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.117:*:*:*:*:*:*:*", "cpeNameId": "60A7B794-E16E-477D-A4C1-ECA62111DC18"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.118:*:*:*:*:*:*:*", "cpeNameId": "F663FEC6-B040-4A0E-A396-83008CF0ABAB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.119:*:*:*:*:*:*:*", "cpeNameId": "BEFDB30B-BCC5-47F0-B733-2E581725D18A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.120:*:*:*:*:*:*:*", "cpeNameId": "4C86DF14-070B-4C3D-A141-31F7FCA61C34"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.121:*:*:*:*:*:*:*", "cpeNameId": "E3406F7B-D836-49DD-8EFE-AE315BBB19FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.122:*:*:*:*:*:*:*", "cpeNameId": "DB62435E-44D2-471D-BA63-8E6FAE8D278F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.123:*:*:*:*:*:*:*", "cpeNameId": "C28E5075-1E51-43C2-BC69-1E248F152A9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.124:*:*:*:*:*:*:*", "cpeNameId": "76B2228F-19B1-4B9B-9F0F-9DC7CE0DDEFB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.125:*:*:*:*:*:*:*", "cpeNameId": "0B3C0A1E-4727-4E70-8AB9-240A38FA2C5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.126:*:*:*:*:*:*:*", "cpeNameId": "78A85D5F-28F1-456B-A1F2-F73FCDCD8442"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.127:*:*:*:*:*:*:*", "cpeNameId": "07FFD4BD-5B60-41C7-818B-C3AB067ABCF8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.128:*:*:*:*:*:*:*", "cpeNameId": "B2882FB9-CA5D-4C93-BB74-931D3EC95036"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.129:*:*:*:*:*:*:*", "cpeNameId": "1CBF16B6-7148-41A0-8BDF-BAD70ECB2360"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.130:*:*:*:*:*:*:*", "cpeNameId": "F106F4F0-7318-4685-A521-D45D280E0BF8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.131:*:*:*:*:*:*:*", "cpeNameId": "81304DDD-B706-4473-9635-1659080883DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.132:*:*:*:*:*:*:*", "cpeNameId": "EB41A9BB-D88D-49F1-83CD-523699801BF2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.133:*:*:*:*:*:*:*", "cpeNameId": "F8E3204C-6023-4133-9A7F-43F9D2AB144D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.134:*:*:*:*:*:*:*", "cpeNameId": "2A36AD35-A964-4C7A-B1D8-0F78188EE2DE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.135:*:*:*:*:*:*:*", "cpeNameId": "8FAABE9A-8B07-4930-85A9-6616D502F568"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.136:*:*:*:*:*:*:*", "cpeNameId": "9D0664AA-A1FB-4ED3-913B-8390C5192A5A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.137:*:*:*:*:*:*:*", "cpeNameId": "668A5320-81CD-4C09-AE34-9EAAB732DBBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.138:*:*:*:*:*:*:*", "cpeNameId": "3FB2B6F3-F840-47ED-A6BD-2BCA441B6108"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.139:*:*:*:*:*:*:*", "cpeNameId": "9F422368-B0CB-4DD5-BC42-60E4BECD4404"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.140:*:*:*:*:*:*:*", "cpeNameId": "3D3E1A1F-0BED-4FE6-9E2F-745C782AFCB5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.141:*:*:*:*:*:*:*", "cpeNameId": "DACB210F-4E23-4FFE-B706-5889289531D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.142:*:*:*:*:*:*:*", "cpeNameId": "781F8D80-4176-4FC3-9B77-A1BB0C88AC65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.143:*:*:*:*:*:*:*", "cpeNameId": "1F4415C4-3002-4A32-A992-54DC73CAF533"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.144:*:*:*:*:*:*:*", "cpeNameId": "7089C196-FD3C-4675-9BE6-2666C406C5D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.145:*:*:*:*:*:*:*", "cpeNameId": "9590F0EF-8260-4B9F-B66C-3E184AC93E63"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.146:*:*:*:*:*:*:*", "cpeNameId": "4FA1CA12-EB95-48B5-98F3-953859E43ED5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.147:*:*:*:*:*:*:*", "cpeNameId": "ED73D0A6-55DA-4D5B-BA38-9BCD74613827"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.148:*:*:*:*:*:*:*", "cpeNameId": "BD154522-4E63-4FB9-ABC2-77F7850B502B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.149:*:*:*:*:*:*:*", "cpeNameId": "E765B3E4-E2B5-42A5-94AD-5E3D3283B7B2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.150:*:*:*:*:*:*:*", "cpeNameId": "AAC26F5B-06AE-49E2-8FE8-17D01ABD1BEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.151:*:*:*:*:*:*:*", "cpeNameId": "91B291A8-CD84-4201-93AD-4B7981CEBDBC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.152:*:*:*:*:*:*:*", "cpeNameId": "A13E73C3-8219-4909-B7FB-312605EFE682"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.153:*:*:*:*:*:*:*", "cpeNameId": "3439519B-F130-44DB-8EF6-C65A2EF5AF5C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.154:*:*:*:*:*:*:*", "cpeNameId": "B93C5FAB-C686-4B8C-B0D5-20C03F3847DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.155:*:*:*:*:*:*:*", "cpeNameId": "F241AC0B-B446-45F4-9A2E-B4B259F4F173"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.156:*:*:*:*:*:*:*", "cpeNameId": "93A18F08-8AD4-4FD2-9A02-E58939D514FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.157:*:*:*:*:*:*:*", "cpeNameId": "334BC1BD-BCDE-4017-930B-8E2E3685773A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.158:*:*:*:*:*:*:*", "cpeNameId": "27100D3E-E3D1-4917-959E-CF6C9CB4838A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.159:*:*:*:*:*:*:*", "cpeNameId": "E9B9F90B-EDBF-452D-9EED-5906465EC142"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.160:*:*:*:*:*:*:*", "cpeNameId": "4B9782F4-75EF-407A-A270-6B9F10B3AB61"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.161:*:*:*:*:*:*:*", "cpeNameId": "4E536BAB-E89A-4298-A620-65E2EA131D54"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.162:*:*:*:*:*:*:*", "cpeNameId": "0234E459-D46E-4FF6-97A0-78C8D0C1413F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.163:*:*:*:*:*:*:*", "cpeNameId": "5672A718-38DA-42BD-8D94-C44CB7EB5B0D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.164:*:*:*:*:*:*:*", "cpeNameId": "7F359B5A-FC0F-4AC9-B676-EE99B7ACF987"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.165:*:*:*:*:*:*:*", "cpeNameId": "C12A4D9B-491F-4FCD-8F98-ACE8680C3DB9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.166:*:*:*:*:*:*:*", "cpeNameId": "A616B27B-8D52-4876-B9DA-49AE47E47B14"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.167:*:*:*:*:*:*:*", "cpeNameId": "A9FB1FBC-3EAC-4068-95C6-A8449AA30236"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.168:*:*:*:*:*:*:*", "cpeNameId": "56F2978B-DD10-4874-9226-22B3EF53C34A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.169:*:*:*:*:*:*:*", "cpeNameId": "77DCE15B-B6AA-4BFA-9B0E-2A4AA9751AA5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.170:*:*:*:*:*:*:*", "cpeNameId": "5B59BFDD-BD40-46BB-BA2E-0AAD30C6906C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.171:*:*:*:*:*:*:*", "cpeNameId": "2BE79BFF-5683-4CA6-B2C9-6001FD77BC99"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.172:*:*:*:*:*:*:*", "cpeNameId": "50BE4FDF-F0EE-4CC4-837F-576E3E212A2F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.173:*:*:*:*:*:*:*", "cpeNameId": "96A6E180-7005-48FA-A98B-DC22F7815B81"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.174:*:*:*:*:*:*:*", "cpeNameId": "F6CD2092-770F-4F3E-9661-06699D965D76"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.175:*:*:*:*:*:*:*", "cpeNameId": "EBF1E1E4-AD08-4B18-9F12-B4EEE194638D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.176:*:*:*:*:*:*:*", "cpeNameId": "6A0486A1-F99F-4E4B-AC39-C12F5D674339"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.177:*:*:*:*:*:*:*", "cpeNameId": "DF9B41BC-B6C2-48AC-9AEE-67A846D344A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.178:*:*:*:*:*:*:*", "cpeNameId": "C2E8FEC6-59E1-4AF4-94EE-7A676B5A2C82"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.179:*:*:*:*:*:*:*", "cpeNameId": "60FF0BF4-4505-484E-8152-B3514FCF95F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.180:*:*:*:*:*:*:*", "cpeNameId": "5DAFDB50-AB4D-4F94-B465-07D40DA4AFE9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.181:*:*:*:*:*:*:*", "cpeNameId": "4CBFF0C0-9773-47CF-AD66-EE00279272C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.182:*:*:*:*:*:*:*", "cpeNameId": "BB407A40-747A-4CF3-8A14-8296DBB7BF38"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.183:*:*:*:*:*:*:*", "cpeNameId": "1386612C-94AB-4DD6-90F9-23D697BD76FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.184:*:*:*:*:*:*:*", "cpeNameId": "0476CD76-2D3E-45FA-88DB-83DA9330CD85"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.185:*:*:*:*:*:*:*", "cpeNameId": "5964859C-6BA3-4286-B050-83960EF7EF71"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.186:*:*:*:*:*:*:*", "cpeNameId": "CC9E8E7E-93FE-4DB7-AF1B-8F7E63CBA37F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.187:*:*:*:*:*:*:*", "cpeNameId": "223FEF84-695D-44FF-9C33-47F8CBFDD953"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.188:*:*:*:*:*:*:*", "cpeNameId": "0CE412FB-E60A-4DFB-8094-EFBE693FF4A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.189:*:*:*:*:*:*:*", "cpeNameId": "501D8AD1-97D7-49C1-B512-061538B8F73F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.190:*:*:*:*:*:*:*", "cpeNameId": "0A2332E6-CC09-486E-A662-9766D623BF34"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.191:*:*:*:*:*:*:*", "cpeNameId": "EDEFF704-F4A6-4282-9428-DEFEFEB4A93A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.192:*:*:*:*:*:*:*", "cpeNameId": "1181DE8F-7EE2-4EC3-8F84-8B313F65047A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.193:*:*:*:*:*:*:*", "cpeNameId": "78EF3A83-66F1-40F3-9C3C-25AFF40BE88C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.194:*:*:*:*:*:*:*", "cpeNameId": "8D611766-BB3A-4528-B1CE-74CB0EAE4467"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.195:*:*:*:*:*:*:*", "cpeNameId": "0C729423-E12A-4F19-9753-94CE465C6283"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.196:*:*:*:*:*:*:*", "cpeNameId": "8F11E143-CE43-4B63-BE73-0A33CD99110D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.197:*:*:*:*:*:*:*", "cpeNameId": "FEB027DD-E13F-4A38-876F-9AFB1E0BE409"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.198:*:*:*:*:*:*:*", "cpeNameId": "6737850B-DE08-4472-B2C7-F60DCDB95CBE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.199:*:*:*:*:*:*:*", "cpeNameId": "C6EA9B80-7284-47CF-954F-EEA349A002FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.200:*:*:*:*:*:*:*", "cpeNameId": "C33F1CE0-023E-4BD6-A32C-2AD5847A9797"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.201:*:*:*:*:*:*:*", "cpeNameId": "FE090B8A-1060-42D0-BB85-D17C7A299D65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.202:*:*:*:*:*:*:*", "cpeNameId": "7F50D385-2E96-471F-B48A-36C222DED1F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.203:*:*:*:*:*:*:*", "cpeNameId": "243CF5E0-1BA3-4C09-830B-F3E5CAE77985"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.204:*:*:*:*:*:*:*", "cpeNameId": "571B9EE4-5DD5-4B3C-842F-B230D4577C98"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.205:*:*:*:*:*:*:*", "cpeNameId": "55A5490D-D0D4-4F11-80E6-6CF300B18FF8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.206:*:*:*:*:*:*:*", "cpeNameId": "97286FA5-0BCE-42D1-A0D7-1B4AD3F78A31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.207:*:*:*:*:*:*:*", "cpeNameId": "C54631BB-ABC0-4711-A5EE-CCFA9870260F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.208:*:*:*:*:*:*:*", "cpeNameId": "0939F707-4609-42F2-B906-3FC03BBAC7A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.209:*:*:*:*:*:*:*", "cpeNameId": "257E4F1B-512E-4A55-9819-3A0A0EFC431F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.210:*:*:*:*:*:*:*", "cpeNameId": "6214CC75-234D-4219-9F50-28E5D54F6661"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.210-1:*:*:*:*:*:*:*", "cpeNameId": "11E87954-7E16-41C9-A673-08D5FD40B194"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.211:*:*:*:*:*:*:*", "cpeNameId": "F95B5FE1-6964-4158-9066-9B148AA7C8AD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.212:*:*:*:*:*:*:*", "cpeNameId": "E0268D70-A7DC-4B52-AE6F-C459A59F0CF9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.213:*:*:*:*:*:*:*", "cpeNameId": "51275AB0-D417-4CE6-8847-B338B340E913"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.214:*:*:*:*:*:*:*", "cpeNameId": "50D2F1EA-0B29-4FDB-8221-BD3C1A800B1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.215:*:*:*:*:*:*:*", "cpeNameId": "12A80615-D31E-44C9-A367-355599328039"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.216:*:*:*:*:*:*:*", "cpeNameId": "A38157E4-F68B-4E60-AF7E-FD7BF9F0E6A0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.217:*:*:*:*:*:*:*", "cpeNameId": "BC328F65-1554-4FF9-A440-C6A6DC08971F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.218:*:*:*:*:*:*:*", "cpeNameId": "E7E67420-ABB7-4AB3-8A93-EF6DEFFB08CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.219:*:*:*:*:*:*:*", "cpeNameId": "0176C290-5F23-4D25-90E0-CFC2FD39785E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.220:*:*:*:*:*:*:*", "cpeNameId": "D89672F3-3069-4FA7-876C-5486351A4210"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.221:*:*:*:*:*:*:*", "cpeNameId": "1C4FC865-E82F-4AAA-BDB2-48CBAF2CEDDB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.222:*:*:*:*:*:*:*", "cpeNameId": "E9641D38-4E53-4C16-9DCB-1ABEAB859051"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.223:*:*:*:*:*:*:*", "cpeNameId": "7D0DB446-81CF-48A4-8FDF-82DB13F9EEFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.224:*:*:*:*:*:*:*", "cpeNameId": "A36C68E0-7DAF-47AE-84CE-355D19D2A184"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.225:*:*:*:*:*:*:*", "cpeNameId": "1A4AF8D7-ABBC-406D-8A9B-6064D1C0FB3A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.226:*:*:*:*:*:*:*", "cpeNameId": "DB3D137C-BAFE-4A08-A5F6-CF9CE3ECF4BA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.227:*:*:*:*:*:*:*", "cpeNameId": "AE161CD5-8D27-4A12-B17B-D329F43349D6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.228:*:*:*:*:*:*:*", "cpeNameId": "0723CFAE-5DBC-4043-AF8F-0C597B0CEAB3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.229:*:*:*:*:*:*:*", "cpeNameId": "D47DB171-26CB-4971-9D2A-7E6B574DCB33"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.230:*:*:*:*:*:*:*", "cpeNameId": "5FFE79E1-68FA-45D6-81A7-DC9AEA1554EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.231:*:*:*:*:*:*:*", "cpeNameId": "2CF57430-4909-48C5-967D-3DB6853FAAFC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.232:*:*:*:*:*:*:*", "cpeNameId": "6BFB7AAB-A1B4-403E-A26B-F14B8FD509C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.233:*:*:*:*:*:*:*", "cpeNameId": "31E31C3B-F769-4B65-AC62-A281A99ECA2D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.234:*:*:*:*:*:*:*", "cpeNameId": "6CFE18B9-2BF3-4BDA-9A19-9A8F945F039F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.235:*:*:*:*:*:*:*", "cpeNameId": "3EF2F123-9B38-401A-81CD-DCDF786F1FBC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.236:*:*:*:*:*:*:*", "cpeNameId": "0B4E0DD4-C051-4F64-B333-B896B86813D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.237:*:*:*:*:*:*:*", "cpeNameId": "57C1E65F-0E87-4296-B131-25A82A0A9667"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.238:*:*:*:*:*:*:*", "cpeNameId": "2BD9177D-1F32-4B5A-A11F-F779CC665C49"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.239:*:*:*:*:*:*:*", "cpeNameId": "737F1344-63A8-42A5-BD48-891A8E17769A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.240:*:*:*:*:*:*:*", "cpeNameId": "E1BAD9D3-D0F2-42CC-93A3-F5B6A1CEC9D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.241:*:*:*:*:*:*:*", "cpeNameId": "CA99B95F-7BBC-40BE-AA68-6A10CE2C8D4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.242:*:*:*:*:*:*:*", "cpeNameId": "A93EB856-783D-4DF9-8387-0BD4C09F9AD0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.243:*:*:*:*:*:*:*", "cpeNameId": "48503212-F9A6-4AB5-8DE9-374622582C15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.244:*:*:*:*:*:*:*", "cpeNameId": "C8F1F3B2-9299-403A-8118-461511F3F50B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.245:*:*:*:*:*:*:*", "cpeNameId": "197B1275-A4E8-4582-ACE2-4C5C5C8C5474"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.246:*:*:*:*:*:*:*", "cpeNameId": "9B64D972-8C44-4B79-9E76-8ECDEBCEBC0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.247:*:*:*:*:*:*:*", "cpeNameId": "5754042A-B1DB-4AD4-B388-76DE9263DC67"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.248:*:*:*:*:*:*:*", "cpeNameId": "2E8BDAA4-D539-42BA-B41E-4EF7C8979B48"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.249:*:*:*:*:*:*:*", "cpeNameId": "03C647CD-10CD-446B-BE6E-3D76C120F364"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.250:*:*:*:*:*:*:*", "cpeNameId": "2F217035-1A6D-43B9-A24D-6F8990190B31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.251:*:*:*:*:*:*:*", "cpeNameId": "4B197B49-5F9B-4B96-B12A-2B471778F13C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.252:*:*:*:*:*:*:*", "cpeNameId": "2481C266-83AA-4815-8405-7C2734A77FB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.253:*:*:*:*:*:*:*", "cpeNameId": "93A07E06-FA31-4E3F-9DAB-CB3846386198"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.254:*:*:*:*:*:*:*", "cpeNameId": "A1AF307F-312C-4040-8F95-9ED0230288F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.255:*:*:*:*:*:*:*", "cpeNameId": "38C39A6F-9AE7-4CB6-B524-1E1F10665007"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.256:*:*:*:*:*:*:*", "cpeNameId": "97AFE000-934E-495E-90DA-C6B13B3C2585"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.257:*:*:*:*:*:*:*", "cpeNameId": "9A1B0076-9309-4165-84AB-3C627316F802"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.258:*:*:*:*:*:*:*", "cpeNameId": "02108CDE-7848-47AA-AC02-43FF6B596975"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.259:*:*:*:*:*:*:*", "cpeNameId": "1C0EC444-2A66-4716-AC4A-4660ECFC5619"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.260:*:*:*:*:*:*:*", "cpeNameId": "FEE507B5-A54C-4EBD-BD63-4CC37CE9C472"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.261:*:*:*:*:*:*:*", "cpeNameId": "D30AE27B-C292-40B5-9296-B58140B669F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.262:*:*:*:*:*:*:*", "cpeNameId": "381C2F4E-4F46-4C12-9112-0A0F60A2F50E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.263:*:*:*:*:*:*:*", "cpeNameId": "D3492ED4-57AE-495F-9627-20898D0BB155"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.264:*:*:*:*:*:*:*", "cpeNameId": "BC81C283-32BE-483A-8017-C90388AE2515"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.265:*:*:*:*:*:*:*", "cpeNameId": "47C4B68F-6562-41A2-B6BA-1E3C60FA2FA1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.266:*:*:*:*:*:*:*", "cpeNameId": "7DE0121E-5AD4-4D6C-8406-2FB7D997F256"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.267:*:*:*:*:*:*:*", "cpeNameId": "6A265E87-7736-450B-8A3C-93FC8AA776C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.268:*:*:*:*:*:*:*", "cpeNameId": "2640A395-FEBD-4AD6-9FC8-4D8D1A906F80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.269:*:*:*:*:*:*:*", "cpeNameId": "64CF3CC1-31A9-467A-847E-F03C704256C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.270:*:*:*:*:*:*:*", "cpeNameId": "6030D6B8-14B2-476D-9275-AF6F52DD4DD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.271:*:*:*:*:*:*:*", "cpeNameId": "BD41D072-F5AF-42E0-9922-B331CB051449"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.272:*:*:*:*:*:*:*", "cpeNameId": "E0212CDC-E613-4B2A-9B60-16D962136AFF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.273:*:*:*:*:*:*:*", "cpeNameId": "452DD917-1B22-4F9B-A9AA-5FD1F9F2C442"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.274:*:*:*:*:*:*:*", "cpeNameId": "6AD4B227-D8D4-42C9-B310-ADA3F37B72BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.275:*:*:*:*:*:*:*", "cpeNameId": "EFE5E55E-9BCB-44E1-BC58-3DF14B515429"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.276:*:*:*:*:*:*:*", "cpeNameId": "10D3145D-E10C-4590-833C-0AE554FF7897"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.277:*:*:*:*:*:*:*", "cpeNameId": "B01C199E-6C8B-4BFA-9DA9-7B1905680626"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.278:*:*:*:*:*:*:*", "cpeNameId": "762C856E-6757-4DFB-A512-B6F03DDC8929"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.279:*:*:*:*:*:*:*", "cpeNameId": "169A9512-5C6F-478E-B16E-82D181C58A97"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.280:*:*:*:*:*:*:*", "cpeNameId": "F8BC9746-521D-4801-AC1D-66A84A780A65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.281:*:*:*:*:*:*:*", "cpeNameId": "1B8D8A00-4E6C-4CD0-8BC5-6EB8BE73B529"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.282:*:*:*:*:*:*:*", "cpeNameId": "5B93AA93-ABD4-45F5-B571-4CAE3CEC6AF9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.283:*:*:*:*:*:*:*", "cpeNameId": "E46991B0-6A28-4411-AF4A-EAF75291B8A5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.284:*:*:*:*:*:*:*", "cpeNameId": "21984D32-DD5B-488B-83DB-77BD0A122405"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.285:*:*:*:*:*:*:*", "cpeNameId": "D0B6234C-571C-42EE-8FD1-334921F4F502"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.286:*:*:*:*:*:*:*", "cpeNameId": "C969671F-1264-4233-B73B-570A481B64CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.287:*:*:*:*:*:*:*", "cpeNameId": "2053D2FF-B750-4B7E-BDFA-2A0F276F15C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.288:*:*:*:*:*:*:*", "cpeNameId": "B221B69F-8204-49BA-8AF4-AFF146D46FB8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.289:*:*:*:*:*:*:*", "cpeNameId": "C8142E09-6E61-4652-A9DA-38072F891A96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.290:*:*:*:*:*:*:*", "cpeNameId": "A534AF2A-A909-45A6-B7E3-A4B2F782CC92"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.291:*:*:*:*:*:*:*", "cpeNameId": "53B57317-723A-4E6B-AAB3-71676106E4CC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.292:*:*:*:*:*:*:*", "cpeNameId": "15CCD6EA-C7F2-47C2-82F4-52F075759660"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.293:*:*:*:*:*:*:*", "cpeNameId": "F1E6DE51-B3AA-4790-A531-9AE7F458DEB1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.294:*:*:*:*:*:*:*", "cpeNameId": "DAEAC0AB-0B68-4970-987B-C7670A6BD22E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.295:*:*:*:*:*:*:*", "cpeNameId": "3187B482-8D58-434C-8E34-EF7AF68AB006"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.296:*:*:*:*:*:*:*", "cpeNameId": "FDE4B426-ED64-449F-9B09-0CD8EA2FFD26"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.297:*:*:*:*:*:*:*", "cpeNameId": "998E67F4-C650-4407-9C7C-339B164FCD92"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.298:*:*:*:*:*:*:*", "cpeNameId": "60CE826D-94F2-441E-A37E-85C4FCD86554"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.299:*:*:*:*:*:*:*", "cpeNameId": "3D327ABE-B8D3-4496-9A9C-62C030CC90D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.300:*:*:*:*:*:*:*", "cpeNameId": "51E9D896-6DD7-4163-81B4-3F44CAD9A2C2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.301:*:*:*:*:*:*:*", "cpeNameId": "D1D112AB-4F07-4CD9-94D4-185B7830316F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.302:*:*:*:*:*:*:*", "cpeNameId": "9BBA920A-1DC4-48A6-B0B6-E31D342537FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.303:*:*:*:*:*:*:*", "cpeNameId": "B039FA99-E67A-409B-A18E-E6BD888E7439"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.304:*:*:*:*:*:*:*", "cpeNameId": "55859E55-03E7-4B8A-BDF6-31710F02863F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.305:*:*:*:*:*:*:*", "cpeNameId": "5ECFC1EA-4DCB-4381-8066-52D9EF210ED7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.306:*:*:*:*:*:*:*", "cpeNameId": "F85A14FE-ADE4-44AB-9DB7-E2D9BE784326"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.307:*:*:*:*:*:*:*", "cpeNameId": "31BE7E06-85C8-422D-945A-0699DDCDD577"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.308:*:*:*:*:*:*:*", "cpeNameId": "394979DD-B2FE-4F43-A635-4BA1953944CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.309:*:*:*:*:*:*:*", "cpeNameId": "079C35C6-0C73-475F-B35D-BAA4318FAB25"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.310:*:*:*:*:*:*:*", "cpeNameId": "85C1B276-0232-4F9E-BCB1-271209082177"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.311:*:*:*:*:*:*:*", "cpeNameId": "5DE9B94E-2F63-48F3-9EE3-29F97357808B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.312:*:*:*:*:*:*:*", "cpeNameId": "472662F2-3E14-450F-A806-E44B1B6C57C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.313:*:*:*:*:*:*:*", "cpeNameId": "4151B004-BFC1-434B-8DD7-7D6857831591"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.314:*:*:*:*:*:*:*", "cpeNameId": "5EB1843D-66B2-4766-B25D-291A2DD4B43F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.315:*:*:*:*:*:*:*", "cpeNameId": "5AC67AE7-DE1E-4329-9E98-1266CDFDCD3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.316:*:*:*:*:*:*:*", "cpeNameId": "665EDCA8-FBE2-48C3-B2A2-E44620F9321A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.317:*:*:*:*:*:*:*", "cpeNameId": "53E4605F-2DAF-436F-9B66-5C9483E4B0F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.318:*:*:*:*:*:*:*", "cpeNameId": "19FF749F-D1B2-4608-A238-B6FD9202A31E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.319:*:*:*:*:*:*:*", "cpeNameId": "D160B5B1-B754-4FD1-ABBE-5CF8AC941935"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.320:*:*:*:*:*:*:*", "cpeNameId": "442FB5A9-9102-48F4-B63A-684FAFCEEF6C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.321:*:*:*:*:*:*:*", "cpeNameId": "34EB7DA8-8A3B-4710-B39F-268F72709105"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.322:*:*:*:*:*:*:*", "cpeNameId": "EC519279-B76A-42BE-B6CB-8C0418032372"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.323:*:*:*:*:*:*:*", "cpeNameId": "3F56BE42-4A5B-4EED-B538-EB93D1692BD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.324:*:*:*:*:*:*:*", "cpeNameId": "CD51D183-BC77-4CA5-B961-ED0F3C008967"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.325:*:*:*:*:*:*:*", "cpeNameId": "F160C172-25E9-49B4-A253-58D8E6AE0914"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.326:*:*:*:*:*:*:*", "cpeNameId": "7B3900FD-154B-4A5B-9A6B-5609E9113274"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.327:*:*:*:*:*:*:*", "cpeNameId": "EA753912-D612-4583-9A1A-3DAA2466D1D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.328:*:*:*:*:*:*:*", "cpeNameId": "8F78B7BB-07DA-4FD5-97CB-2A1C3B38ADA9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.329:*:*:*:*:*:*:*", "cpeNameId": "5D01F5BD-260A-45C9-A220-1B1F1ED05BAC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.330:*:*:*:*:*:*:*", "cpeNameId": "4757B741-0579-4F0D-93B6-4152C0ACEDE7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.331:*:*:*:*:*:*:*", "cpeNameId": "49CB08ED-A588-4C13-AF4E-B76BA560B121"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.332:*:*:*:*:*:*:*", "cpeNameId": "B235999E-D6AC-40F3-84C5-8CB6F78213C9"}]}} \ No newline at end of file diff --git a/cpematch/C2/C21B47E0-D54A-44C0-8196-BB0547213E89.json b/cpematch/C2/C21B47E0-D54A-44C0-8196-BB0547213E89.json new file mode 100644 index 00000000000..c8fed8825bb --- /dev/null +++ b/cpematch/C2/C21B47E0-D54A-44C0-8196-BB0547213E89.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "C21B47E0-D54A-44C0-8196-BB0547213E89", "criteria": "cpe:2.3:h:qualcomm:auto_4g_modem:-:*:*:*:*:*:*:*", "lastModified": "2025-01-09T16:10:57.697", "cpeLastModified": "2025-01-09T16:10:57.697", "created": "2025-01-09T16:10:57.697", "status": "Active"}} \ No newline at end of file diff --git a/cpematch/C7/C710C7CE-D93E-4382-BE22-0507312818EB.json b/cpematch/C7/C710C7CE-D93E-4382-BE22-0507312818EB.json index 24a1c4187e4..bd3c55307f7 100644 --- a/cpematch/C7/C710C7CE-D93E-4382-BE22-0507312818EB.json +++ b/cpematch/C7/C710C7CE-D93E-4382-BE22-0507312818EB.json @@ -1 +1 @@ -{"matchString": {"matchCriteriaId": "C710C7CE-D93E-4382-BE22-0507312818EB", "criteria": "cpe:2.3:a:wpmet:elementskit_elementor_addons:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "3.2.8", "lastModified": "2024-12-23T20:28:31.617", "cpeLastModified": "2024-12-23T20:28:31.617", "created": "2024-10-02T18:41:01.460", "status": "Active", "matches": [{"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:-:*:*:*:*:wordpress:*:*", "cpeNameId": "CCDEC17D-5272-4330-8BA0-69FC27D8319D"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:3.0.5:*:*:*:*:wordpress:*:*", "cpeNameId": "FEC51FE6-5433-4559-8FB3-26F22CD378F8"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:3.0.6:*:*:*:*:wordpress:*:*", "cpeNameId": "EDCD9DBA-17A1-4F84-B181-80A7E1F59173"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:3.0.7:*:*:*:*:wordpress:*:*", "cpeNameId": "6A5E95C7-B47B-4394-BB5B-0EB2180F65A9"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:3.1.0:*:*:*:*:wordpress:*:*", "cpeNameId": "4D8326AD-1A13-457E-B334-F8528636FF80"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:3.1.1:*:*:*:*:wordpress:*:*", "cpeNameId": "E793BFCB-3E32-468F-B502-480EC4FE22DB"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:3.1.2:*:*:*:*:wordpress:*:*", "cpeNameId": "42D33E6A-0752-4ECE-B671-4783338F5C54"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:3.1.3:*:*:*:*:wordpress:*:*", "cpeNameId": "FDBAE434-BDE7-4632-B6DF-F12F52A9BBDF"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:3.1.4:*:*:*:*:wordpress:*:*", "cpeNameId": "65765FEA-04A9-4CF8-B275-8DA86FCABD8A"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:3.2.0:*:*:*:*:wordpress:*:*", "cpeNameId": "B4D96849-E4EF-4BE8-984D-A462502CB6FF"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:3.2.1:*:*:*:*:wordpress:*:*", "cpeNameId": "815E6CF9-663D-4BE7-B4DF-33A38168D4EF"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:3.2.2:*:*:*:*:wordpress:*:*", "cpeNameId": "A2601131-DB21-4852-B97F-A22069C419F4"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:3.2.3:*:*:*:*:wordpress:*:*", "cpeNameId": "B415862F-28C6-4A7E-9720-E74A0D6BEFC9"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:3.2.4:*:*:*:*:wordpress:*:*", "cpeNameId": "8859925A-9CFA-4C80-AA93-44EC24A92E17"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:3.2.5:*:*:*:*:wordpress:*:*", "cpeNameId": "B8369AAA-5CC1-4AF4-8B2D-07FEED98C282"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:3.2.6:*:*:*:*:wordpress:*:*", "cpeNameId": "FF072DFB-8096-4035-B41B-8D644C38844F"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:3.2.7:*:*:*:*:wordpress:*:*", "cpeNameId": "3EA08D41-43D5-48E9-91BC-D60DCC806CDC"}]}} \ No newline at end of file +{"matchString": {"matchCriteriaId": "C710C7CE-D93E-4382-BE22-0507312818EB", "criteria": "cpe:2.3:a:wpmet:elementskit_elementor_addons:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "3.2.8", "lastModified": "2024-12-23T20:28:31.617", "cpeLastModified": "2025-01-09T17:44:38.630", "created": "2024-10-02T18:41:01.460", "status": "Active", "matches": [{"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:-:*:*:*:*:wordpress:*:*", "cpeNameId": "CCDEC17D-5272-4330-8BA0-69FC27D8319D"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:1.3.4:*:*:*:*:wordpress:*:*", "cpeNameId": "CC94DFD0-7846-469D-B08C-4EE6DA1EE818"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:1.3.8:*:*:*:*:wordpress:*:*", "cpeNameId": "B4C8E208-C662-479D-9C94-C6950E771790"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:1.3.9:*:*:*:*:wordpress:*:*", "cpeNameId": "0F2B95FC-90D7-4435-81CF-4D2E915F1B64"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:1.4.0:*:*:*:*:wordpress:*:*", "cpeNameId": "3F521B5E-D61A-47B9-ABFB-254D4820BA8D"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:1.4.1:*:*:*:*:wordpress:*:*", "cpeNameId": "B980AD58-921B-4FC4-BA37-322129AB0DAC"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:1.4.2:*:*:*:*:wordpress:*:*", "cpeNameId": "78CC48E9-E044-45C4-B728-0FACEAF66341"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:1.4.3:*:*:*:*:wordpress:*:*", "cpeNameId": "18885BFF-33DD-42EF-B735-1EAC435B411B"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:1.4.4:*:*:*:*:wordpress:*:*", "cpeNameId": "8CD1E1DB-65CE-4658-A034-8D2C64D59682"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:1.4.5:*:*:*:*:wordpress:*:*", "cpeNameId": "15CB2E0F-EB89-4126-A31B-1CE140CA80B6"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:1.4.7:*:*:*:*:wordpress:*:*", "cpeNameId": "0318BAC5-E96E-444A-B209-62A3D194A75B"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:1.4.8:*:*:*:*:wordpress:*:*", "cpeNameId": "1D6B9D36-23D4-4710-BAE8-703BE28F379D"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:1.4.9:*:*:*:*:wordpress:*:*", "cpeNameId": "A61F11FF-9869-4842-9E00-47266997DAAD"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:1.5.0:*:*:*:*:wordpress:*:*", "cpeNameId": "A65B6E55-BE92-4392-8B64-A19CA1BE6A2F"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:1.5.1:*:*:*:*:wordpress:*:*", "cpeNameId": "C2D32C46-090A-4A8F-B353-1444C840F40A"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:1.5.2:*:*:*:*:wordpress:*:*", "cpeNameId": "2966EB53-19E5-4CD8-A783-EACC546C032F"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:1.5.3:*:*:*:*:wordpress:*:*", "cpeNameId": "4B15B89E-B41E-4AD5-8939-76AA40ABBC8E"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:1.5.4:*:*:*:*:wordpress:*:*", "cpeNameId": "E138E010-0C47-48BE-BED4-7462409C1826"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:1.5.5:*:*:*:*:wordpress:*:*", "cpeNameId": "F1984F2B-E7DF-4972-86BD-8F5038F77931"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:1.5.6:*:*:*:*:wordpress:*:*", "cpeNameId": "F47EBEB9-D065-4110-A19D-2F4EAC2AE49D"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:1.5.7:*:*:*:*:wordpress:*:*", "cpeNameId": "5F2D5EB0-92A7-4432-97B5-0847CEA9D863"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:1.5.8:*:*:*:*:wordpress:*:*", "cpeNameId": "CC3C3C2C-E0D5-441F-96EC-0951CC0CE3A7"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:1.5.9:*:*:*:*:wordpress:*:*", "cpeNameId": "675FB260-F040-4C23-9BE8-E3AC2F7A4156"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:1.5.10:*:*:*:*:wordpress:*:*", "cpeNameId": "15FBBCC1-AA2B-45FD-A1BE-57360EFA4CA9"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:1.5.11:*:*:*:*:wordpress:*:*", "cpeNameId": "DD3C3F6E-672E-4B9E-9C15-B724A062B571"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:1.5.12:*:*:*:*:wordpress:*:*", "cpeNameId": "10E39DF6-1468-4B78-AC39-C948F580B1A2"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.0.0:*:*:*:*:wordpress:*:*", "cpeNameId": "416E7A39-A5CB-49E3-A178-AA831738F20F"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.0.1:*:*:*:*:wordpress:*:*", "cpeNameId": "C86EBDD3-3920-42A8-9CEF-C49E0BD94333"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.0.2:*:*:*:*:wordpress:*:*", "cpeNameId": "167C8EB6-CBA5-44F7-8C59-06662A6CFDB7"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.0.3:*:*:*:*:wordpress:*:*", "cpeNameId": "5358F408-DA2A-4EE9-857D-C645B48FE7B8"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.0.4:*:*:*:*:wordpress:*:*", "cpeNameId": "B0A3B1FB-5AD0-4D9E-8E08-E93B010D9360"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.0.5:*:*:*:*:wordpress:*:*", "cpeNameId": "91540B4C-CB95-4DEC-B5B5-E8AC1342E03F"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.0.6:*:*:*:*:wordpress:*:*", "cpeNameId": "8B79C810-91AC-471C-B3C4-BF14B5A5E08A"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.0.7:*:*:*:*:wordpress:*:*", "cpeNameId": "85BE819D-8658-44AC-8854-451BC10DA2EA"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.0.8:*:*:*:*:wordpress:*:*", "cpeNameId": "3B174E6C-8FEC-43FE-886E-263F63D644FE"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.0.9:*:*:*:*:wordpress:*:*", "cpeNameId": "E6421FD1-E8D4-4BF5-AB38-414529F18040"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.0.9.1:*:*:*:*:wordpress:*:*", "cpeNameId": "4A659525-CFC1-4D97-8AD9-26F842CAC135"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.0.9.2:*:*:*:*:wordpress:*:*", "cpeNameId": "7132E72B-3CA9-40B8-8BB3-01BEB9D8F754"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.0.9.3:*:*:*:*:wordpress:*:*", "cpeNameId": "FD0C9C93-A857-4C2D-847A-278185BFD4E6"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.0.10:*:*:*:*:wordpress:*:*", "cpeNameId": "DF7837B3-62AD-4EF0-BE34-D57878ED683D"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.0.11:*:*:*:*:wordpress:*:*", "cpeNameId": "108A7A79-D572-4C0F-98C3-6DE8161C2DAA"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.0.12:*:*:*:*:wordpress:*:*", "cpeNameId": "B99D60AD-0A98-4A84-AB06-382A30194B75"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.0.13:*:*:*:*:wordpress:*:*", "cpeNameId": "03EE17E0-A0ED-40B1-BA1E-5CD0D2D1B6F4"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.1.0:*:*:*:*:wordpress:*:*", "cpeNameId": "A2B0C3B6-A45C-4286-AF4A-0822B4558C0F"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.1.1:*:*:*:*:wordpress:*:*", "cpeNameId": "7E8020B2-3544-4DA7-AB56-E7C65CBD469F"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.1.2:*:*:*:*:wordpress:*:*", "cpeNameId": "379415C5-4A19-45BE-825B-DE02ECFF52D4"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.1.3:*:*:*:*:wordpress:*:*", "cpeNameId": "D202FA0F-0579-43C9-B105-FB4B77852C6D"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.1.4:*:*:*:*:wordpress:*:*", "cpeNameId": "9724795A-202E-433B-BCFC-752E8F42391E"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.1.5:*:*:*:*:wordpress:*:*", "cpeNameId": "4AB5439A-142F-401B-94CA-6F5544D11132"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.1.6:*:*:*:*:wordpress:*:*", "cpeNameId": "4CD8F4CF-1B3B-413D-A9FC-C07FB5C9B96C"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.1.7:*:*:*:*:wordpress:*:*", "cpeNameId": "189A6326-6ABE-4C26-A798-024695E31CBE"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.2.0:*:*:*:*:wordpress:*:*", "cpeNameId": "2964B18A-D1CC-4873-9C15-2D6675FA91AC"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.2.1:*:*:*:*:wordpress:*:*", "cpeNameId": "E3546C72-CC78-4F91-AEF4-60EA37985901"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.2.2:*:*:*:*:wordpress:*:*", "cpeNameId": "25494BF7-A651-4F1E-9845-371E6B3D4047"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.2.3:*:*:*:*:wordpress:*:*", "cpeNameId": "AD2099E0-6D30-42CD-B046-BE3E65D045DF"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.2.4:*:*:*:*:wordpress:*:*", "cpeNameId": "34288E57-E0A1-4F39-ABE6-FF6640BABDB5"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.3.0:*:*:*:*:wordpress:*:*", "cpeNameId": "9560E386-D279-40A5-A2C1-B10EEDDB9846"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.3.1:*:*:*:*:wordpress:*:*", "cpeNameId": "A6B073AC-7A3B-496A-81E8-C64DD1EBB6C1"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.3.1.1:*:*:*:*:wordpress:*:*", "cpeNameId": "7E6355D6-0501-4A5C-880F-248F670672CB"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.3.2:*:*:*:*:wordpress:*:*", "cpeNameId": "EF004CAF-7716-4ADA-99A1-69D88B94CA46"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.3.3:*:*:*:*:wordpress:*:*", "cpeNameId": "4005EF5C-C24F-4153-A826-E281A9CC3F98"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.3.4:*:*:*:*:wordpress:*:*", "cpeNameId": "ADCB2C6F-2E62-4A4E-8A2B-7604096563F3"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.3.5:*:*:*:*:wordpress:*:*", "cpeNameId": "8A22A671-1634-49A8-A3A5-1F697F0E8135"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.3.6:*:*:*:*:wordpress:*:*", "cpeNameId": "7B754E89-1426-4E48-85B9-8BFDE9F1189F"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.3.7:*:*:*:*:wordpress:*:*", "cpeNameId": "E3CE81F4-7D2A-43F6-8B4C-93B73DBD385F"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.4.0:*:*:*:*:wordpress:*:*", "cpeNameId": "24FF35EC-65A2-4115-BB7D-A3C97ED620C3"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.5.0:*:*:*:*:wordpress:*:*", "cpeNameId": "E567DF57-AB79-4A98-BF8C-32D3BFA36914"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.5.1:*:*:*:*:wordpress:*:*", "cpeNameId": "C7DD6953-8D69-44C4-AC8F-7A1A4A9F9E52"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.5.2:*:*:*:*:wordpress:*:*", "cpeNameId": "1964A2C2-7063-453A-B277-796248E1DFA1"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.5.3:*:*:*:*:wordpress:*:*", "cpeNameId": "DAC4D4E1-C276-4B2D-96B7-B87B1C8FE849"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.5.4:*:*:*:*:wordpress:*:*", "cpeNameId": "05B42F14-400A-41AD-8D9E-E48FA6E64FFD"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.5.5:*:*:*:*:wordpress:*:*", "cpeNameId": "DDE1DD91-DD49-4920-AE14-7EDEFD3C90A5"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.5.6:*:*:*:*:wordpress:*:*", "cpeNameId": "2CB4B5F5-8823-4F6C-9F3F-00D410DF6F2F"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.5.7:*:*:*:*:wordpress:*:*", "cpeNameId": "530F9CE3-A98C-4FC0-A4F5-C63D2ED6B5C2"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.5.8:*:*:*:*:wordpress:*:*", "cpeNameId": "C53C6315-9DA4-493F-8A8D-634CFCA12E1C"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.5.9:*:*:*:*:wordpress:*:*", "cpeNameId": "2CA52A2D-6504-4DCD-8185-691C508E2F68"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.5.10:*:*:*:*:wordpress:*:*", "cpeNameId": "18948B48-744D-4228-A51F-35E5FFCD7321"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.6.0:*:*:*:*:wordpress:*:*", "cpeNameId": "998EF0AD-226B-4FAD-A07D-4025932DA513"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.6.1:*:*:*:*:wordpress:*:*", "cpeNameId": "7DA6AB6A-301B-46B2-820E-B73EB794CB19"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.6.2:*:*:*:*:wordpress:*:*", "cpeNameId": "98F2943D-6AD1-41EF-BC4D-974B8B74F946"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.6.3:*:*:*:*:wordpress:*:*", "cpeNameId": "1DDB662B-A5C3-4B84-90BD-CFEE3A0D558D"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.7.0:*:*:*:*:wordpress:*:*", "cpeNameId": "80059FF8-75B8-4FFF-BF0D-98D45CA2DF1B"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.7.2:*:*:*:*:wordpress:*:*", "cpeNameId": "DDBBFEAB-1537-4771-8CC3-738ADA3D098C"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.7.3:*:*:*:*:wordpress:*:*", "cpeNameId": "FEF74B33-66AF-4B13-BD97-7111F7B490F6"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.7.4:*:*:*:*:wordpress:*:*", "cpeNameId": "2716FD90-5718-400F-B9EE-21C050662FA7"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.7.5:*:*:*:*:wordpress:*:*", "cpeNameId": "E0F46E0A-7CA4-45CD-876A-428E501F11BD"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.8.0:*:*:*:*:wordpress:*:*", "cpeNameId": "1B8A0A76-435D-4AFB-9CBE-D4E478BBB52D"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.8.1:*:*:*:*:wordpress:*:*", "cpeNameId": "BAA99239-A1D4-49E9-AA68-0D0E67EDBEEF"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.8.5:*:*:*:*:wordpress:*:*", "cpeNameId": "A3171B9C-89A1-46B5-B020-AB2CFC07A5A9"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.8.6:*:*:*:*:wordpress:*:*", "cpeNameId": "8A9793CA-A6AA-4A31-880E-375B421DE321"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.8.7:*:*:*:*:wordpress:*:*", "cpeNameId": "F3A29540-6163-46E0-B18B-12E9B63D50DE"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.8.8:*:*:*:*:wordpress:*:*", "cpeNameId": "48F8A896-0C7F-4972-A100-4F556498C563"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.9.0:*:*:*:*:wordpress:*:*", "cpeNameId": "DB030BBF-5351-405B-BF7D-3CD5306095EA"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:2.9.2:*:*:*:*:wordpress:*:*", "cpeNameId": "650E99D4-2DCA-4178-B2DD-CEB4CFC1EC28"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:3.0.0:*:*:*:*:wordpress:*:*", "cpeNameId": "A2681FDE-D694-4A28-B9C7-67A943DD1330"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:3.0.1:*:*:*:*:wordpress:*:*", "cpeNameId": "30A002BA-21FF-4628-88DF-06D3B814FF7D"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:3.0.2:*:*:*:*:wordpress:*:*", "cpeNameId": "2644B805-BF93-4BC4-916C-DF739AEDB4A3"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:3.0.3:*:*:*:*:wordpress:*:*", "cpeNameId": "7B90F082-323B-43EF-8861-6838AE06C2C0"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:3.0.4:*:*:*:*:wordpress:*:*", "cpeNameId": "8834DCF7-1BFF-4FB1-B316-EEE2741282EA"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:3.0.5:*:*:*:*:wordpress:*:*", "cpeNameId": "FEC51FE6-5433-4559-8FB3-26F22CD378F8"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:3.0.6:*:*:*:*:wordpress:*:*", "cpeNameId": "EDCD9DBA-17A1-4F84-B181-80A7E1F59173"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:3.0.7:*:*:*:*:wordpress:*:*", "cpeNameId": "6A5E95C7-B47B-4394-BB5B-0EB2180F65A9"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:3.1.0:*:*:*:*:wordpress:*:*", "cpeNameId": "4D8326AD-1A13-457E-B334-F8528636FF80"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:3.1.1:*:*:*:*:wordpress:*:*", "cpeNameId": "E793BFCB-3E32-468F-B502-480EC4FE22DB"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:3.1.2:*:*:*:*:wordpress:*:*", "cpeNameId": "42D33E6A-0752-4ECE-B671-4783338F5C54"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:3.1.3:*:*:*:*:wordpress:*:*", "cpeNameId": "FDBAE434-BDE7-4632-B6DF-F12F52A9BBDF"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:3.1.4:*:*:*:*:wordpress:*:*", "cpeNameId": "65765FEA-04A9-4CF8-B275-8DA86FCABD8A"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:3.2.0:*:*:*:*:wordpress:*:*", "cpeNameId": "B4D96849-E4EF-4BE8-984D-A462502CB6FF"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:3.2.1:*:*:*:*:wordpress:*:*", "cpeNameId": "815E6CF9-663D-4BE7-B4DF-33A38168D4EF"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:3.2.2:*:*:*:*:wordpress:*:*", "cpeNameId": "A2601131-DB21-4852-B97F-A22069C419F4"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:3.2.3:*:*:*:*:wordpress:*:*", "cpeNameId": "B415862F-28C6-4A7E-9720-E74A0D6BEFC9"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:3.2.4:*:*:*:*:wordpress:*:*", "cpeNameId": "8859925A-9CFA-4C80-AA93-44EC24A92E17"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:3.2.5:*:*:*:*:wordpress:*:*", "cpeNameId": "B8369AAA-5CC1-4AF4-8B2D-07FEED98C282"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:3.2.6:*:*:*:*:wordpress:*:*", "cpeNameId": "FF072DFB-8096-4035-B41B-8D644C38844F"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit_elementor_addons:3.2.7:*:*:*:*:wordpress:*:*", "cpeNameId": "3EA08D41-43D5-48E9-91BC-D60DCC806CDC"}]}} \ No newline at end of file diff --git a/cpematch/C9/C90873CE-F6F9-43EE-AD2F-ECA089BAC640.json b/cpematch/C9/C90873CE-F6F9-43EE-AD2F-ECA089BAC640.json new file mode 100644 index 00000000000..f2944c7b379 --- /dev/null +++ b/cpematch/C9/C90873CE-F6F9-43EE-AD2F-ECA089BAC640.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "C90873CE-F6F9-43EE-AD2F-ECA089BAC640", "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.10", "versionEndExcluding": "5.4.287", "lastModified": "2025-01-09T17:44:12.640", "cpeLastModified": "2025-01-09T17:44:12.640", "created": "2025-01-09T17:44:12.640", "status": "Active", "matches": [{"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10:*:*:*:*:*:*:*", "cpeNameId": "801F7D56-009B-4A66-A380-891D1C09EC0E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10:-:*:*:*:*:*:*", "cpeNameId": "737F8B22-35BD-4355-8726-CAB10284B0F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10:rc1:*:*:*:*:*:*", "cpeNameId": "378C4500-0CC7-4110-8E02-B8B89064CB59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10:rc2:*:*:*:*:*:*", "cpeNameId": "C3B39C83-E8E1-4DA7-8251-F2092C6B05D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10:rc3:*:*:*:*:*:*", "cpeNameId": "78D16190-2359-4F43-9816-2080B1827AC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10:rc4:*:*:*:*:*:*", "cpeNameId": "B8C99710-34D3-4AB2-B2D2-09F4B84AE4E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10:rc5:*:*:*:*:*:*", "cpeNameId": "4322E527-2823-41C7-85A2-7B41C74EAC58"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.1:*:*:*:*:*:*:*", "cpeNameId": "9C33CAE9-C906-493D-AE83-630F775358ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.2:*:*:*:*:*:*:*", "cpeNameId": "8F61A3BF-4522-4622-947D-00D359B55176"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.3:*:*:*:*:*:*:*", "cpeNameId": "1EB67AD1-84CA-4A13-838D-BCCA096F8A43"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.4:*:*:*:*:*:*:*", "cpeNameId": "F0EF9085-D82D-451F-B3AF-70E38633405F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.5:*:*:*:*:*:*:*", "cpeNameId": "13FE2FB3-6377-4579-8372-ED7D7601F139"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.6:*:*:*:*:*:*:*", "cpeNameId": "CAD06591-0516-4D81-B575-F6C582AFFDEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.7:*:*:*:*:*:*:*", "cpeNameId": "02EB240A-C24B-44BD-86EA-60D23F353699"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.8:*:*:*:*:*:*:*", "cpeNameId": "7F10C5D0-46D5-462D-8ADC-2E4E5916E34D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.9:*:*:*:*:*:*:*", "cpeNameId": "2FAAEF0C-02F6-4CB5-8452-2ADB5F96602C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.10:*:*:*:*:*:*:*", "cpeNameId": "597FA1BA-E530-477E-8B32-7A767ABD9779"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.11:*:*:*:*:*:*:*", "cpeNameId": "BB2F91B5-234B-4006-B083-4DCB240C7735"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.12:*:*:*:*:*:*:*", "cpeNameId": "86A9E5EB-A7B2-4551-96C3-D2F96B8807EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.13:*:*:*:*:*:*:*", "cpeNameId": "07E25F8D-B2C9-4E32-8DB7-B0B700EF87B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.14:*:*:*:*:*:*:*", "cpeNameId": "B72B8BC5-A491-423C-B3B3-49C3878062F4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.15:*:*:*:*:*:*:*", "cpeNameId": "92F730C1-4118-47C8-8077-34E9367D198C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.16:*:*:*:*:*:*:*", "cpeNameId": "340A6F80-AECA-45F2-A8C0-E75A51ADEB17"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.17:*:*:*:*:*:*:*", "cpeNameId": "5245DF5B-3563-44B6-B5AD-9E7AC85D8CE9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:*:*:*:*:*:*:*", "cpeNameId": "7DAEC1AA-D9DB-4969-8835-19DE5562750C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:-:*:*:*:*:*:*", "cpeNameId": "53233DB2-D8A4-4392-B5B9-43F109778BC0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:rc1:*:*:*:*:*:*", "cpeNameId": "F67207B1-581C-4560-A1BA-FBCC51A59367"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:rc2:*:*:*:*:*:*", "cpeNameId": "FBAE195B-6447-49D4-AAAA-D595A811677F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:rc3:*:*:*:*:*:*", "cpeNameId": "0491309A-660F-444C-89A9-FFE1FA1A9B79"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:rc4:*:*:*:*:*:*", "cpeNameId": "35274394-863C-4A7D-9EFB-B49A5900A33C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:rc5:*:*:*:*:*:*", "cpeNameId": "5779025A-A7C7-40BE-840B-EE69D3D1BE62"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:rc6:*:*:*:*:*:*", "cpeNameId": "0E052BC2-1D38-4E80-9D23-889E827E597C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:rc7:*:*:*:*:*:*", "cpeNameId": "DF4B5805-B18E-4733-9A8B-135508008D0A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.1:*:*:*:*:*:*:*", "cpeNameId": "0A040921-C942-4FE5-A49A-A55F24A8D54C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.2:*:*:*:*:*:*:*", "cpeNameId": "97AF733F-A86E-41A1-832C-CC20306F11FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.3:*:*:*:*:*:*:*", "cpeNameId": "5CC1CF35-345D-45F8-BF5C-6B9C6B9696B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.4:*:*:*:*:*:*:*", "cpeNameId": "137C1EF2-A31B-431E-8F29-546D88139D13"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.5:*:*:*:*:*:*:*", "cpeNameId": "BD008082-6870-4CE0-BC04-1001F619E011"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.6:*:*:*:*:*:*:*", "cpeNameId": "E4F8E539-321B-4263-BB4B-20AAF31088D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.7:*:*:*:*:*:*:*", "cpeNameId": "A93CF5C7-A951-446B-ADFD-4A099F87A003"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.8:*:*:*:*:*:*:*", "cpeNameId": "32373BAD-CD72-44AE-883B-2AAD48A81497"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.9:*:*:*:*:*:*:*", "cpeNameId": "D22968FC-60EE-4D07-B61E-8216515FDA3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.10:*:*:*:*:*:*:*", "cpeNameId": "278604F1-EE00-4BCD-8B4F-D52B1E83CC03"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.11:*:*:*:*:*:*:*", "cpeNameId": "C182B41E-1285-49CD-8537-F2B2BE11E5A6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.12:*:*:*:*:*:*:*", "cpeNameId": "AEDE877D-D8A5-4365-9354-355C5BDBF8D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12:*:*:*:*:*:*:*", "cpeNameId": "0975E1F0-0E5F-445B-BBAC-66294DC99443"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12:-:*:*:*:*:*:*", "cpeNameId": "DF7473CD-B405-4E90-9185-B9E682AB2EA8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12:rc1:*:*:*:*:*:*", "cpeNameId": "3704C17E-765C-494D-ABF4-6687AD9DCA2B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12:rc2:*:*:*:*:*:*", "cpeNameId": "576FB04F-8AE6-459C-B9B7-4B161AA533C9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12:rc3:*:*:*:*:*:*", "cpeNameId": "D1CC9AD0-BCFB-47FF-A991-F2D8D4241D7A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12:rc4:*:*:*:*:*:*", "cpeNameId": "5B131271-8353-4F4D-A802-6231F77D62F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12:rc5:*:*:*:*:*:*", "cpeNameId": "3871B8EE-EE4B-43DD-9B39-DAE15494AEF2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12:rc6:*:*:*:*:*:*", "cpeNameId": "2F22DBF5-138B-4E06-97A9-D48EE51DAD9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.1:*:*:*:*:*:*:*", "cpeNameId": "69B0A1AF-BDD2-4852-B63D-E4BF55573CAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.2:*:*:*:*:*:*:*", "cpeNameId": "654BD99C-D40D-4573-A72F-D135048F0BD6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.3:*:*:*:*:*:*:*", "cpeNameId": "2DFD73EB-B731-43EF-A6D9-0777823AA9ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.4:*:*:*:*:*:*:*", "cpeNameId": "50296B03-0A9B-497E-85CE-EDBABB8603B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.5:*:*:*:*:*:*:*", "cpeNameId": "184D3B86-723B-43AE-9B33-91CAD47275F7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.6:*:*:*:*:*:*:*", "cpeNameId": "2538F421-8C36-4DA8-8D4A-20811D6843BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.7:*:*:*:*:*:*:*", "cpeNameId": "E8D1E4A0-A0B2-4B0B-988F-984BF74D3B99"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.8:*:*:*:*:*:*:*", "cpeNameId": "43B25D3D-1D5D-4E14-A5CE-69FB57B0230D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.9:*:*:*:*:*:*:*", "cpeNameId": "BD4E83AA-561D-49FA-9703-CFF03AA235A3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.10:*:*:*:*:*:*:*", "cpeNameId": "109315CC-209F-40BF-A5E1-C307A1F780DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.11:*:*:*:*:*:*:*", "cpeNameId": "69494478-22B3-4371-B7C7-0558CDD786C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.12:*:*:*:*:*:*:*", "cpeNameId": "56632064-D578-4D87-9DF8-C06F096ABDFC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.13:*:*:*:*:*:*:*", "cpeNameId": "97C936CC-FC5C-4A0B-9F4A-BC253561E90D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.14:*:*:*:*:*:*:*", "cpeNameId": "0C13DFDE-0149-4EB6-9BA0-F62AC6FE5586"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13:*:*:*:*:*:*:*", "cpeNameId": "63D7AE43-6B91-47A7-9E3E-58B08ACEE5CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13:-:*:*:*:*:*:*", "cpeNameId": "94A3FF49-65AE-46A5-AF47-00094F5AF3E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13:rc1:*:*:*:*:*:*", "cpeNameId": "C5C9AA2D-4C67-496E-AE87-863FA0E9B8CE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13:rc2:*:*:*:*:*:*", "cpeNameId": "25E5D931-E147-4A6A-AD81-9AF12D4DCAB6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13:rc3:*:*:*:*:*:*", "cpeNameId": "853B280B-EC80-4D50-8494-0D3FBEF98F78"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13:rc4:*:*:*:*:*:*", "cpeNameId": "823B55ED-26FF-4111-A479-E477AAE70FF1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13:rc5:*:*:*:*:*:*", "cpeNameId": "8B7F3844-CA39-422C-8449-06CF8AD6672B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13:rc6:*:*:*:*:*:*", "cpeNameId": "9ECB08C7-B61F-415B-8091-4F5B47F8085F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.1:*:*:*:*:*:*:*", "cpeNameId": "226B0AC1-B943-40C0-8426-4BB9B25A2FBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.2:*:*:*:*:*:*:*", "cpeNameId": "101CC84F-1E9F-4945-AC58-F1A89AC868FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.3:*:*:*:*:*:*:*", "cpeNameId": "943EB2FE-E2B5-4056-8432-2E21A07AAE5A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.4:*:*:*:*:*:*:*", "cpeNameId": "30F2FA91-0299-4CF0-904F-CEB63D8421F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.5:*:*:*:*:*:*:*", "cpeNameId": "8A5862FC-697A-49B3-B018-683F56E40C33"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.6:*:*:*:*:*:*:*", "cpeNameId": "9907DA49-FBB8-4EA6-A3D3-D395343A6635"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.7:*:*:*:*:*:*:*", "cpeNameId": "2928EAC1-58D0-4D06-9080-D744192ED843"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.8:*:*:*:*:*:*:*", "cpeNameId": "69790995-A09C-4859-B6AF-6FD626D2F615"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.9:*:*:*:*:*:*:*", "cpeNameId": "AD833379-4556-4DFD-A670-98EE76636A5B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.10:*:*:*:*:*:*:*", "cpeNameId": "1D010FB8-D849-4388-8D10-74F4D6F59D3C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.11:*:*:*:*:*:*:*", "cpeNameId": "F659B20D-E773-4DEA-86E5-9914230B1A15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.12:*:*:*:*:*:*:*", "cpeNameId": "B779CDC3-8957-4B5C-8D66-00A277A1B3F4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.13:*:*:*:*:*:*:*", "cpeNameId": "EAC315D4-E0E0-41C8-A95B-AB5E895BFBBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.14:*:*:*:*:*:*:*", "cpeNameId": "1819E47A-069B-419A-8EF6-C9313A397178"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.15:*:*:*:*:*:*:*", "cpeNameId": "027145FE-2731-49DA-86A8-1D2FBC9FB086"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.16:*:*:*:*:*:*:*", "cpeNameId": "ECD3B257-E717-4928-B0C1-A784E553B3E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14:*:*:*:*:*:*:*", "cpeNameId": "A931E9A5-97C5-409C-A3BA-5FEC11A2C622"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.1:*:*:*:*:*:*:*", "cpeNameId": "C5A24D81-DC61-4E8E-A883-70A89D049530"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.2:*:*:*:*:*:*:*", "cpeNameId": "4E26113D-F6B7-453F-9387-E01F3FB22E21"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.3:*:*:*:*:*:*:*", "cpeNameId": "814EF758-607B-40CC-BE23-CE70074F76CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.4:*:*:*:*:*:*:*", "cpeNameId": "6720BFE9-C0EE-48BF-9DF5-EF2216114FA3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.5:*:*:*:*:*:*:*", "cpeNameId": "6AF9B2CB-A700-4D4B-99BD-68F8B1B60D27"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.6:*:*:*:*:*:*:*", "cpeNameId": "9FB8CFED-3C93-41CD-AA03-2B6383630B83"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.7:*:*:*:*:*:*:*", "cpeNameId": "2A024E18-8E2D-43F7-953C-15A11490F277"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.8:*:*:*:*:*:*:*", "cpeNameId": "B316EADE-3506-4B78-84D7-59222A7EA27C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.9:*:*:*:*:*:*:*", "cpeNameId": "22C19B12-730A-4C18-9414-277A199CDB44"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.10:*:*:*:*:*:*:*", "cpeNameId": "1C9ACEF0-E248-4B66-AF0C-F323FF758671"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.11:*:*:*:*:*:*:*", "cpeNameId": "CFE32D5E-B63B-4BBD-AF35-835F694D1946"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.12:*:*:*:*:*:*:*", "cpeNameId": "51A5C92D-0CAD-4718-8BD9-70AD3BF3ED1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.13:*:*:*:*:*:*:*", "cpeNameId": "70614E00-337E-4E52-9FD8-20E1C106B5DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.14:*:*:*:*:*:*:*", "cpeNameId": "6930B9C7-4CC9-4DCA-B201-2D9E690BFE80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.15:*:*:*:*:*:*:*", "cpeNameId": "9B2631F3-F6FE-4791-823F-695BE2F12D47"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.16:*:*:*:*:*:*:*", "cpeNameId": "092E3E03-A335-4443-8BED-47DDB83C5FA0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.17:*:*:*:*:*:*:*", "cpeNameId": "36D93C96-FC7E-4D4F-883E-3AF5A2FA3000"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.18:*:*:*:*:*:*:*", "cpeNameId": "7A290C14-ED57-4B9F-91FF-0FC4AAC9A1F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.19:*:*:*:*:*:*:*", "cpeNameId": "A8688970-830A-43D1-B07D-6013A971EC79"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.20:*:*:*:*:*:*:*", "cpeNameId": "17B788D0-A567-43B8-82A9-8FF9366015A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.21:*:*:*:*:*:*:*", "cpeNameId": "78A2B7F8-B9DE-4C98-A44D-EF1B61256567"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.22:*:*:*:*:*:*:*", "cpeNameId": "72C09BB8-DCC8-45E8-B7B5-993CFE154338"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.23:*:*:*:*:*:*:*", "cpeNameId": "D4585EAB-400F-4EDF-9DED-1F8CBD5B744F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.24:*:*:*:*:*:*:*", "cpeNameId": "FEFD7885-1EE8-416D-B7FE-8E11083ED450"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.25:*:*:*:*:*:*:*", "cpeNameId": "62184EBD-8376-48E6-BDA6-33DA7DA4DE55"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.26:*:*:*:*:*:*:*", "cpeNameId": "4E0A62E4-D6E6-472F-B7EB-0863D2CB2043"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.27:*:*:*:*:*:*:*", "cpeNameId": "B36914F3-9F0C-48F1-B721-8451FA606F40"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.28:*:*:*:*:*:*:*", "cpeNameId": "5406494D-C3A0-424C-A739-DF138E8457FA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.29:*:*:*:*:*:*:*", "cpeNameId": "2E069436-B02E-4F1D-BBFF-7C67DCBB1978"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.30:*:*:*:*:*:*:*", "cpeNameId": "0C8564AC-CE4D-4B8F-8588-CB6F8162FC34"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.31:*:*:*:*:*:*:*", "cpeNameId": "08176301-EEF5-439E-99BF-EB6055095F3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.32:*:*:*:*:*:*:*", "cpeNameId": "5050DE72-C59B-428C-B676-CD6A69950413"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.33:*:*:*:*:*:*:*", "cpeNameId": "6EF37D93-2185-4C48-932B-64AE54920BF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.34:*:*:*:*:*:*:*", "cpeNameId": "CD6EEA39-F27B-4E2F-ABF7-B979F9A60D16"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.35:*:*:*:*:*:*:*", "cpeNameId": "9601934D-422D-478C-932B-0B723ECF1AC8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.36:*:*:*:*:*:*:*", "cpeNameId": "117B9343-7A2A-4CF2-A3FC-5CF339397B49"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.37:*:*:*:*:*:*:*", "cpeNameId": "3DAF6A51-D407-4CAF-A800-E8C601AF7A88"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.38:*:*:*:*:*:*:*", "cpeNameId": "D818B0AA-263A-4AD4-8F30-D01F9F103771"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.39:*:*:*:*:*:*:*", "cpeNameId": "19410F95-E22A-4EA0-A64F-7334B338C559"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.40:*:*:*:*:*:*:*", "cpeNameId": "4C39B4AE-1893-4D41-A20B-E4DA4F05B12E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.41:*:*:*:*:*:*:*", "cpeNameId": "9E6243E5-7BAA-4061-BA98-AE3335BA90DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.42:*:*:*:*:*:*:*", "cpeNameId": "5289A6EE-1D01-4F96-806C-1843A14FDEF2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.43:*:*:*:*:*:*:*", "cpeNameId": "9ABCDB72-25A8-46CD-A422-35ADA558EF68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.44:*:*:*:*:*:*:*", "cpeNameId": "574EC3B6-21A3-47E9-9858-3CA9EF533E67"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.45:*:*:*:*:*:*:*", "cpeNameId": "38485FA4-4F72-4663-A066-8D01D3863321"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.46:*:*:*:*:*:*:*", "cpeNameId": "764D933F-58C1-48E3-9907-B0DDE1A4F8AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.47:*:*:*:*:*:*:*", "cpeNameId": "AE54A178-E51B-452A-9C64-DA3A3CC946AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.48:*:*:*:*:*:*:*", "cpeNameId": "B535E7F9-6273-497C-8D1E-27FC9FAECD72"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.49:*:*:*:*:*:*:*", "cpeNameId": "83203827-63F4-47AE-A1CA-217858D53769"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.50:*:*:*:*:*:*:*", "cpeNameId": "194931EE-DDB3-420C-9AF7-EC5AFD5D6E28"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.51:*:*:*:*:*:*:*", "cpeNameId": "6DBC9273-6F1D-497F-9664-184028BD6B4D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.52:*:*:*:*:*:*:*", "cpeNameId": "214855D8-7634-45D4-B464-65EDD37AF850"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.53:*:*:*:*:*:*:*", "cpeNameId": "67B2569B-44C2-4049-BDA4-2E773A4E29F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.54:*:*:*:*:*:*:*", "cpeNameId": "9EBDE6FE-5FF2-4F2D-B58A-25094E85BFB1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.55:*:*:*:*:*:*:*", "cpeNameId": "D0B5F04E-862B-490F-8305-60B811F4E6F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.56:*:*:*:*:*:*:*", "cpeNameId": "B668AD3F-F0E8-4A26-879B-046F18DD8A36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.57:*:*:*:*:*:*:*", "cpeNameId": "E16FC742-4DBD-4DB4-B969-9C064D464FE5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.58:*:*:*:*:*:*:*", "cpeNameId": "8B062B81-0F55-4FF6-B94C-C877DFA0E50B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.59:*:*:*:*:*:*:*", "cpeNameId": "3CEEC1DF-CF5C-4C9D-ADB4-671659A81424"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.60:*:*:*:*:*:*:*", "cpeNameId": "25D77D6D-411A-415B-9B4C-71C7DA916873"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.61:*:*:*:*:*:*:*", "cpeNameId": "65E712DB-951C-492B-A315-827459B80E5E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.62:*:*:*:*:*:*:*", "cpeNameId": "F11F0C93-C51B-4199-B8B7-D7B81A103E8C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.63:*:*:*:*:*:*:*", "cpeNameId": "35923443-2E09-4624-9DEE-9ACF12EAB448"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.64:*:*:*:*:*:*:*", "cpeNameId": "205E064B-A0B3-4DC9-A4F9-FA48BB6D7666"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.65:*:*:*:*:*:*:*", "cpeNameId": "B0E66BBD-FF9B-4FE2-955E-363B2426AAA4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.66:*:*:*:*:*:*:*", "cpeNameId": "65FADA8B-3BAE-4B74-805D-40121FF01EAF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.67:*:*:*:*:*:*:*", "cpeNameId": "8796300B-8BBD-4767-B13C-A04AA0BB6FEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.68:*:*:*:*:*:*:*", "cpeNameId": "EA1F0EFF-1D54-4D41-8791-38459690E25B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.69:*:*:*:*:*:*:*", "cpeNameId": "609603AF-3EA9-4959-BF95-65681DD73429"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.70:*:*:*:*:*:*:*", "cpeNameId": "626D150A-609E-46A3-9B99-2B5517D68FCF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.71:*:*:*:*:*:*:*", "cpeNameId": "54045011-3CF7-4D72-B47A-67352BD27C9B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.72:*:*:*:*:*:*:*", "cpeNameId": "A4A18A3C-C9E0-4640-A815-B4F19017E986"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.73:*:*:*:*:*:*:*", "cpeNameId": "101552E2-98D5-490C-8507-D8F3CD5E74CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.74:*:*:*:*:*:*:*", "cpeNameId": "306A3E6C-2907-416C-966D-810515DBCCCB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.75:*:*:*:*:*:*:*", "cpeNameId": "BAAF7099-2145-41D0-8529-A6065254637F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.76:*:*:*:*:*:*:*", "cpeNameId": "DDCDF175-DC63-49EC-A7AD-9BFEFE5527E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.77:*:*:*:*:*:*:*", "cpeNameId": "38B40852-28A0-490F-B4DC-3980A9C5B421"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.78:*:*:*:*:*:*:*", "cpeNameId": "6E17FF7C-84D2-4931-992C-A5E7ED78834F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.79:*:*:*:*:*:*:*", "cpeNameId": "BB0E9999-4D82-493C-98BB-FE9D9A569DED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.80:*:*:*:*:*:*:*", "cpeNameId": "4AC211FC-04A6-4405-9635-D73ECD955418"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.81:*:*:*:*:*:*:*", "cpeNameId": "92E16615-DDD7-4E66-8BF6-BAA740D2F0C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.82:*:*:*:*:*:*:*", "cpeNameId": "F7A93940-0210-4AD1-B8DD-329E01CF07C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.83:*:*:*:*:*:*:*", "cpeNameId": "31B6D10B-87F4-4EDC-B7B1-FD01674BF26E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.84:*:*:*:*:*:*:*", "cpeNameId": "4275466A-03C1-421C-A4B0-21B518067550"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.85:*:*:*:*:*:*:*", "cpeNameId": "CA858139-E95A-4FEE-B89B-63F8951AC6C5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.86:*:*:*:*:*:*:*", "cpeNameId": "E4F4C982-7F3B-45B2-84AB-3A0EA7B17608"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.87:*:*:*:*:*:*:*", "cpeNameId": "2343FBFC-440A-404C-BFBA-0C17D3A7A7DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.88:*:*:*:*:*:*:*", "cpeNameId": "D7E1A205-815C-4D28-8BA2-9BC9500AD4A7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.89:*:*:*:*:*:*:*", "cpeNameId": "39F2F19A-FB5E-4866-BAE2-356D068B45BA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.90:*:*:*:*:*:*:*", "cpeNameId": "50AD92DB-6E21-4AA8-9E00-052B90A9965E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.91:*:*:*:*:*:*:*", "cpeNameId": "F8DE7403-3DFA-4DEE-8780-A0DA10BF9528"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.92:*:*:*:*:*:*:*", "cpeNameId": "39EF80A8-F19C-4BE8-8D66-7C5CD424B4D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.93:*:*:*:*:*:*:*", "cpeNameId": "E5500E0F-C99A-4502-99E6-7981CA795BF2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.94:*:*:*:*:*:*:*", "cpeNameId": "74932CAC-8FBF-4367-9392-6D00F8FFFB99"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.95:*:*:*:*:*:*:*", "cpeNameId": "8101D71E-8866-4E44-879C-0C5B12D7EBE7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.96:*:*:*:*:*:*:*", "cpeNameId": "E3C79F48-C929-4535-A410-136A4CC98F26"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.97:*:*:*:*:*:*:*", "cpeNameId": "1BD7D338-728B-43EB-91A4-6827CD29192C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.98:*:*:*:*:*:*:*", "cpeNameId": "86B2C93A-A003-4AAA-AE7C-CD209F2063B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.99:*:*:*:*:*:*:*", "cpeNameId": "6A43476F-D00F-4E25-8FAC-647EEE0EDFF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.100:*:*:*:*:*:*:*", "cpeNameId": "4E019C3A-D2DB-457F-A70E-5E03CCA91476"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.101:*:*:*:*:*:*:*", "cpeNameId": "A73A2FC0-DC50-499F-A148-78FA51F8D760"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.102:*:*:*:*:*:*:*", "cpeNameId": "127E7A89-5961-457D-8BF7-4164707E025E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.103:*:*:*:*:*:*:*", "cpeNameId": "388373C0-5D21-45F9-BF7E-5E60B4E7318F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.104:*:*:*:*:*:*:*", "cpeNameId": "3B19EA98-6B97-4A3A-B3B0-DC182A51617F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.105:*:*:*:*:*:*:*", "cpeNameId": "EAF98B09-69E7-48C1-8B69-3AD3E29E5A2E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.106:*:*:*:*:*:*:*", "cpeNameId": "A2582828-CCCE-4D12-85D5-3A1F343C7E00"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.107:*:*:*:*:*:*:*", "cpeNameId": "AD5EA444-4A0C-4A51-A8BE-F15FE36EE0C5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.108:*:*:*:*:*:*:*", "cpeNameId": "F94B9FE0-697B-41B7-B791-B9A0C4D86168"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.109:*:*:*:*:*:*:*", "cpeNameId": "4F0FBDC5-4177-425F-ADF6-C57C3DCA5D4D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.110:*:*:*:*:*:*:*", "cpeNameId": "2D6859E3-FCB4-477E-845A-80388AC62521"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.111:*:*:*:*:*:*:*", "cpeNameId": "E63E0425-D6C3-4773-A69C-D9033B050A0E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.112:*:*:*:*:*:*:*", "cpeNameId": "B5B44EDD-66B1-47B4-BAAE-38DE4AECC0A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.113:*:*:*:*:*:*:*", "cpeNameId": "2F7F63C6-E1D8-40B9-A3BE-99A553814F5A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.114:*:*:*:*:*:*:*", "cpeNameId": "A3653829-0B32-4838-90F0-B2CCC32580DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.115:*:*:*:*:*:*:*", "cpeNameId": "758316DC-FEB4-4F05-994B-AE0A555D7AEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.116:*:*:*:*:*:*:*", "cpeNameId": "CEA596C8-E6AD-4C8C-BF8F-FEBF1BF73E80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.117:*:*:*:*:*:*:*", "cpeNameId": "D09DC33D-889B-4BA3-8311-057DCB5EB7D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.118:*:*:*:*:*:*:*", "cpeNameId": "446206CE-87D2-402D-8451-4F63D75B6CB6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.119:*:*:*:*:*:*:*", "cpeNameId": "CF788798-2DF1-4253-AA76-8B021DB84887"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.120:*:*:*:*:*:*:*", "cpeNameId": "7A8CE9D2-54CD-4BDA-AF50-12C170DC6E2E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.121:*:*:*:*:*:*:*", "cpeNameId": "08EAEBAF-0EC2-48A1-9B20-586269492003"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.122:*:*:*:*:*:*:*", "cpeNameId": "7E12FC79-A932-4613-A0E6-6E78D0916FC4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.123:*:*:*:*:*:*:*", "cpeNameId": "CEC4835E-515C-49EA-93A4-45ED21306EC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.124:*:*:*:*:*:*:*", "cpeNameId": "B8B08C25-A0CC-4BCB-BCC8-DF667EE56E09"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.125:*:*:*:*:*:*:*", "cpeNameId": "9FE63906-4FDE-46B8-A606-E814C0F6F44B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.126:*:*:*:*:*:*:*", "cpeNameId": "18D0E785-E281-4C1B-AAAB-1941B6652595"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.127:*:*:*:*:*:*:*", "cpeNameId": "F885AC80-EECE-4DD5-8FFB-6F71501CF7A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.128:*:*:*:*:*:*:*", "cpeNameId": "E98D93BF-9F5C-4817-B9A4-1EC01D911361"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.129:*:*:*:*:*:*:*", "cpeNameId": "0381E0F9-379F-4991-8218-0D49695A485C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.130:*:*:*:*:*:*:*", "cpeNameId": "70367F10-ACD6-4508-ACB5-DAC961B2DAD6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.131:*:*:*:*:*:*:*", "cpeNameId": "98C623C6-03CD-485B-BF39-D31296742AEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.132:*:*:*:*:*:*:*", "cpeNameId": "1E482272-30CF-4AC1-8D89-2594468F7D4B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.133:*:*:*:*:*:*:*", "cpeNameId": "111B8E60-2201-4175-8DF6-9254703F20FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.134:*:*:*:*:*:*:*", "cpeNameId": "E359DA12-908D-4DCE-863E-3FF8641CC7C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.135:*:*:*:*:*:*:*", "cpeNameId": "27A8264E-B347-4F33-8DB6-D654A8DF7008"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.136:*:*:*:*:*:*:*", "cpeNameId": "DFC17EF5-FF88-4BBE-AD7A-B6EF53741144"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.137:*:*:*:*:*:*:*", "cpeNameId": "DE9E6429-1CD7-4FA0-A2BB-9F73CFFA4AE6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.138:*:*:*:*:*:*:*", "cpeNameId": "3E2F69CE-601A-4558-820F-4D2101BC6DAA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.139:*:*:*:*:*:*:*", "cpeNameId": "AED13A18-393D-4413-80E6-5C8C1912C64C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.140:*:*:*:*:*:*:*", "cpeNameId": "DCCD3A03-0FA0-497E-938A-D4877C862C7D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.141:*:*:*:*:*:*:*", "cpeNameId": "A984AB3D-A744-45E7-B863-AFCE9F3BCA8D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.142:*:*:*:*:*:*:*", "cpeNameId": "8BA42A60-B968-4658-A593-5D6D1CDC2DD7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.143:*:*:*:*:*:*:*", "cpeNameId": "F1883261-CF7A-4133-BA12-E5A3648FFCD2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.144:*:*:*:*:*:*:*", "cpeNameId": "2ECB0A40-9134-477D-A33D-D1A21FD1D853"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.145:*:*:*:*:*:*:*", "cpeNameId": "37AD964D-982C-4491-9DD8-9BBEFB703649"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.146:*:*:*:*:*:*:*", "cpeNameId": "60D01110-32CE-4174-8305-9CC98A7954A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.147:*:*:*:*:*:*:*", "cpeNameId": "3C59A1B8-E591-4781-87FE-6652A4B865BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.148:*:*:*:*:*:*:*", "cpeNameId": "E3589E83-AB61-4638-83A5-4FCCDCF12939"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.149:*:*:*:*:*:*:*", "cpeNameId": "43561658-86C5-4F33-9BA9-959238156461"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.150:*:*:*:*:*:*:*", "cpeNameId": "65A8F7B6-A62D-4F12-BE5C-81E2C46F2C39"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.151:*:*:*:*:*:*:*", "cpeNameId": "359D1CB2-7092-4050-8BDE-EA9B90C2A4A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.152:*:*:*:*:*:*:*", "cpeNameId": "DCBA08B5-D75B-4EA4-8EB2-976C5EE5208C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.153:*:*:*:*:*:*:*", "cpeNameId": "AEF73713-2A2E-4202-9FAF-35F9007DC67F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.154:*:*:*:*:*:*:*", "cpeNameId": "F56CAAD2-0A98-4C49-948C-A58C81AF2136"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.155:*:*:*:*:*:*:*", "cpeNameId": "7293A6A3-0953-4BC3-8754-E3521CDDC181"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.156:*:*:*:*:*:*:*", "cpeNameId": "040458A8-9C8A-4F54-8667-DF55833A9D9B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.157:*:*:*:*:*:*:*", "cpeNameId": "47EEEBD8-F966-4731-84CE-95B543D1E665"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.158:*:*:*:*:*:*:*", "cpeNameId": "D8DD8154-1F2C-4E1F-8425-674EA9F33061"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.159:*:*:*:*:*:*:*", "cpeNameId": "23573A67-0200-408D-A6D3-92BB482B239E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.160:*:*:*:*:*:*:*", "cpeNameId": "DB501200-6B09-4237-92DA-8410374E41AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.161:*:*:*:*:*:*:*", "cpeNameId": "1654CFEE-4797-444C-BF7B-36E36EEFB3FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.162:*:*:*:*:*:*:*", "cpeNameId": "F7A73AFA-30D2-4C43-9A25-E516BB6077BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.163:*:*:*:*:*:*:*", "cpeNameId": "152842F1-FD0B-41B7-8361-62DC24194B9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.164:*:*:*:*:*:*:*", "cpeNameId": "1FB6E4A7-E49F-4CB2-B797-CDA9A3EE41F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.165:*:*:*:*:*:*:*", "cpeNameId": "86C98595-98AD-4914-BA7E-7D2EEEBDEEEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.166:*:*:*:*:*:*:*", "cpeNameId": "3A749A85-B1AF-45E0-952F-F07A3315F2B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.167:*:*:*:*:*:*:*", "cpeNameId": "F739A8BA-2722-4D43-8EE3-F0940D5C9962"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.168:*:*:*:*:*:*:*", "cpeNameId": "BA729078-2FD8-494D-80A0-A21A9C8A780C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.169:*:*:*:*:*:*:*", "cpeNameId": "B09E3BA3-FAE1-417D-802E-9FF6A63314CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.170:*:*:*:*:*:*:*", "cpeNameId": "A6354C45-5002-4677-94F6-2585EA37B4A0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.171:*:*:*:*:*:*:*", "cpeNameId": "E3DC59EC-5BDD-4E67-979E-ACF532D0AA0F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.172:*:*:*:*:*:*:*", "cpeNameId": "2915DD1D-0036-4591-921F-4ED4D6E543BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.173:*:*:*:*:*:*:*", "cpeNameId": "6AAAB0B0-C78E-4876-9C2D-5CF3FC83C87B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.174:*:*:*:*:*:*:*", "cpeNameId": "7F586C21-5084-4F3B-A5E2-20ABD2E73301"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.175:*:*:*:*:*:*:*", "cpeNameId": "31C57C02-B17B-45AC-BD33-BA14F2D2F960"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.176:*:*:*:*:*:*:*", "cpeNameId": "495DC903-2104-4E7A-ABDD-044701BEC0AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.177:*:*:*:*:*:*:*", "cpeNameId": "54ECE57B-46D2-4B43-88BA-72DFCC784626"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.178:*:*:*:*:*:*:*", "cpeNameId": "DF1994DB-64D8-449F-AB63-959905FDBED5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.179:*:*:*:*:*:*:*", "cpeNameId": "E998A6CB-5B6B-4698-93F8-60ADA5915CED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.180:*:*:*:*:*:*:*", "cpeNameId": "5780A3A7-D6D2-4597-8E20-64CAEBB9BEC5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.181:*:*:*:*:*:*:*", "cpeNameId": "943B03F2-38B3-48CF-AB60-B0CDCD3232D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.182:*:*:*:*:*:*:*", "cpeNameId": "DE1702E0-9C72-4E22-AD85-B4FF3F08BF12"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.183:*:*:*:*:*:*:*", "cpeNameId": "B448350B-6E82-4C55-BF6C-3416AA6DD09D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.184:*:*:*:*:*:*:*", "cpeNameId": "93D45017-75AC-4F34-B44B-BD725073C783"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.185:*:*:*:*:*:*:*", "cpeNameId": "17EE5023-DA86-42AA-80B8-0E03A8786DBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.186:*:*:*:*:*:*:*", "cpeNameId": "5083CC39-913E-47F4-8D17-DA2A4B3BDB38"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.187:*:*:*:*:*:*:*", "cpeNameId": "A9B26E5E-5D06-4AEE-B95C-BCCCF71E3C2A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.188:*:*:*:*:*:*:*", "cpeNameId": "F61DC571-CA27-43B5-B92E-FF49B2FA5128"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.189:*:*:*:*:*:*:*", "cpeNameId": "39A82CEC-EA57-4F55-AE22-EA9FF7F22411"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.190:*:*:*:*:*:*:*", "cpeNameId": "5C08BEA0-0968-4A2C-90A7-FBBC18870CB4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.191:*:*:*:*:*:*:*", "cpeNameId": "27C0FEC1-829C-410C-B37C-44CBE22D2714"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.192:*:*:*:*:*:*:*", "cpeNameId": "AAE8B6F5-BBF2-4EE5-BFF8-D3E64F6C7544"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.193:*:*:*:*:*:*:*", "cpeNameId": "B75C3C61-1456-4A7E-8175-FEBFECBD8887"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.194:*:*:*:*:*:*:*", "cpeNameId": "64CFCF85-0DB0-4BC3-9BAF-7752E969C6FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.195:*:*:*:*:*:*:*", "cpeNameId": "07D6C56C-CBC4-4E2B-BF3C-298D326A2515"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.196:*:*:*:*:*:*:*", "cpeNameId": "617F7A9C-A4AF-46E1-9B60-654F691A1ACA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.197:*:*:*:*:*:*:*", "cpeNameId": "D1BB57B0-9ED1-49CA-BAF9-9F32E751C423"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.198:*:*:*:*:*:*:*", "cpeNameId": "DFF76FFC-A6CE-4BCA-8BDA-A708D8CA524F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.199:*:*:*:*:*:*:*", "cpeNameId": "8D62E5E5-B08E-4B46-AFA9-9C11A8F2088C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.200:*:*:*:*:*:*:*", "cpeNameId": "4C6DC033-8105-45EB-8B7C-8AD380243F77"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.201:*:*:*:*:*:*:*", "cpeNameId": "02618C38-B7E6-468C-A240-77183CD793ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.202:*:*:*:*:*:*:*", "cpeNameId": "B133CCC3-3525-44C9-9BA6-07731081AF3B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.203:*:*:*:*:*:*:*", "cpeNameId": "2040E6FD-3C1D-4922-8A3E-D93B2024A64F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.204:*:*:*:*:*:*:*", "cpeNameId": "FC48B609-0A74-4ADF-BE7A-8E5A929FF9B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.205:*:*:*:*:*:*:*", "cpeNameId": "2D66C248-5CA3-46AF-819D-8EDC819E5DEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.206:*:*:*:*:*:*:*", "cpeNameId": "0EC2FE2D-3784-41D9-AD97-154F8E9D485A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.207:*:*:*:*:*:*:*", "cpeNameId": "890C3442-53E3-4F78-A62B-2A3DF161993D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.208:*:*:*:*:*:*:*", "cpeNameId": "3CFC3FF9-ABA7-4471-B42B-31B08DB57404"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.209:*:*:*:*:*:*:*", "cpeNameId": "62582930-FD26-41A5-A063-51CCE542611E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.210:*:*:*:*:*:*:*", "cpeNameId": "F0B251D3-1C8A-4EE4-BC8C-798633A46547"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.211:*:*:*:*:*:*:*", "cpeNameId": "6D317823-F155-4FD8-B745-D6A2CA0DCF4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.212:*:*:*:*:*:*:*", "cpeNameId": "93A1BCA4-151B-4C62-9321-C36060232635"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.213:*:*:*:*:*:*:*", "cpeNameId": "2A1F44F0-ED1D-4627-AFDD-52246F44FCA8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.214:*:*:*:*:*:*:*", "cpeNameId": "630134DA-8836-4D64-A8DB-C952FD0879B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.215:*:*:*:*:*:*:*", "cpeNameId": "F647FD73-A1BD-4519-96EF-BC5962B49049"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.216:*:*:*:*:*:*:*", "cpeNameId": "84F052BA-7078-4E5C-AF40-2E298CEBAA0D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.217:*:*:*:*:*:*:*", "cpeNameId": "8586BB5B-5356-497E-8039-D4718A8D233E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.218:*:*:*:*:*:*:*", "cpeNameId": "A7103A90-E7B5-46AC-B508-F3888B37524D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.219:*:*:*:*:*:*:*", "cpeNameId": "AAEF1C1C-6618-417A-A3EE-8BB6EB63F1C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.220:*:*:*:*:*:*:*", "cpeNameId": "00A3991D-98AC-4422-9B19-3B2515EF7B06"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.221:*:*:*:*:*:*:*", "cpeNameId": "CC8EF11A-F131-442A-B0F4-0810D38EB89E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.222:*:*:*:*:*:*:*", "cpeNameId": "E9CDB672-F2E0-42B9-8F20-B3BCAF324A36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.223:*:*:*:*:*:*:*", "cpeNameId": "1AC50DA1-BA05-43A5-A50F-8EF350DD96D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.224:*:*:*:*:*:*:*", "cpeNameId": "42E73115-25A7-4EDF-9402-81BA0AC8B470"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.225:*:*:*:*:*:*:*", "cpeNameId": "85B8548F-576C-442E-A2EA-30CFF43407AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.226:*:*:*:*:*:*:*", "cpeNameId": "3794F34E-4B0D-487C-890D-884AA41EF6D7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.227:*:*:*:*:*:*:*", "cpeNameId": "29337989-0DC4-4B35-BA5F-E157DAAD1557"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.228:*:*:*:*:*:*:*", "cpeNameId": "7F43F714-4550-416B-B228-EEF6FC8B1716"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.229:*:*:*:*:*:*:*", "cpeNameId": "9AC44F08-C276-4E15-811B-8CC5010672D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.230:*:*:*:*:*:*:*", "cpeNameId": "8EEDFC00-6778-4242-87AA-1BF8B788A7AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.231:*:*:*:*:*:*:*", "cpeNameId": "4F7C7BF1-9231-4FA0-A31F-A8A21DF8388E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.232:*:*:*:*:*:*:*", "cpeNameId": "B76B39F5-A59B-4C38-9381-5BCB6A78AC30"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.233:*:*:*:*:*:*:*", "cpeNameId": "97DA7801-C4EB-49B8-BCB6-B53FB848E2A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.234:*:*:*:*:*:*:*", "cpeNameId": "B249D0C2-FF7F-48DC-AF81-4B69D6844B27"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.235:*:*:*:*:*:*:*", "cpeNameId": "6B01EB29-4E04-41BD-BC2A-10619B7D39E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.236:*:*:*:*:*:*:*", "cpeNameId": "C81712BA-4FF9-4DD1-AD12-BABC49E8A004"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.237:*:*:*:*:*:*:*", "cpeNameId": "2EA256E4-3D89-4EEB-91B7-FFF529E84CAA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.238:*:*:*:*:*:*:*", "cpeNameId": "A0E92899-D97F-498F-8124-94BF18838682"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.239:*:*:*:*:*:*:*", "cpeNameId": "E4088748-A84D-4D3C-A8F9-479DB4DFEAAF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.240:*:*:*:*:*:*:*", "cpeNameId": "EBEBA8E4-803E-4EF0-A3EA-295960568227"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.241:*:*:*:*:*:*:*", "cpeNameId": "07C3F8E4-4820-447B-8D85-5297B73BD561"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.242:*:*:*:*:*:*:*", "cpeNameId": "EE853DB7-F2DA-4461-926E-E8586C8B9769"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.243:*:*:*:*:*:*:*", "cpeNameId": "EFB0DC56-2543-4A76-B959-03F1D12AFF46"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.244:*:*:*:*:*:*:*", "cpeNameId": "F491B8F2-2AEC-4382-9095-6C6C933316B2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.245:*:*:*:*:*:*:*", "cpeNameId": "EA198FA8-3EC5-458B-8210-D4176F4D2991"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.246:*:*:*:*:*:*:*", "cpeNameId": "45949E40-A94B-4C31-8110-9EB5F16CFA74"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.247:*:*:*:*:*:*:*", "cpeNameId": "D6CA348F-100D-4CB7-884C-05BCD92C93AD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.248:*:*:*:*:*:*:*", "cpeNameId": "774EFE10-D2D0-4C23-ACFC-AD61E9765BA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.249:*:*:*:*:*:*:*", "cpeNameId": "1B531DDE-03EC-4C95-B0DD-C316CE378AD8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.250:*:*:*:*:*:*:*", "cpeNameId": "7105F9F5-3435-481E-B46A-BE6F3AA78446"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.251:*:*:*:*:*:*:*", "cpeNameId": "CCB75783-8321-4164-9877-0AF392D531FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.252:*:*:*:*:*:*:*", "cpeNameId": "14D27D39-5785-461D-A4F7-46F07A67342D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.253:*:*:*:*:*:*:*", "cpeNameId": "3F9F5FE6-B76D-4F70-9F2D-0C647C026561"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.254:*:*:*:*:*:*:*", "cpeNameId": "0C15C6BC-2A46-4556-B847-17B7CA0F4DE3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.255:*:*:*:*:*:*:*", "cpeNameId": "F4FA95EA-4D16-4C6E-86D9-1D0E95E8AD42"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.256:*:*:*:*:*:*:*", "cpeNameId": "41A5A246-0D51-4C1E-A781-DA73D49C53B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.257:*:*:*:*:*:*:*", "cpeNameId": "339FB596-B009-493F-8DA9-19A69E175ED5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.258:*:*:*:*:*:*:*", "cpeNameId": "CCF5717D-F04D-4048-94EA-C4E7A4C45F95"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.259:*:*:*:*:*:*:*", "cpeNameId": "2A03EFB0-FD68-478A-B718-5D411878D8BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.260:*:*:*:*:*:*:*", "cpeNameId": "DA6AC544-7494-4683-83E9-D59AF89B5401"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.261:*:*:*:*:*:*:*", "cpeNameId": "5C4BFBA7-A9B0-425B-AE4F-0C6ED6E21759"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.262:*:*:*:*:*:*:*", "cpeNameId": "345ED523-FD6D-489D-ADBE-FC738A8816C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.263:*:*:*:*:*:*:*", "cpeNameId": "99653F61-52E2-4A51-80F3-C48F7059918B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.264:*:*:*:*:*:*:*", "cpeNameId": "424A4C5C-FB0F-4FCD-8D64-4EF4B44C04DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.265:*:*:*:*:*:*:*", "cpeNameId": "8C58D077-E378-4DA8-8AEA-9B41A26CCF78"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.266:*:*:*:*:*:*:*", "cpeNameId": "FF1979DA-6280-4D83-87A2-76F9B51A484B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.267:*:*:*:*:*:*:*", "cpeNameId": "9316876F-BD99-4370-B45A-622A21A1C234"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.268:*:*:*:*:*:*:*", "cpeNameId": "7364C13D-4E86-45D4-93CE-F8A77D11245E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.269:*:*:*:*:*:*:*", "cpeNameId": "A91EF74E-716D-4D53-B818-CE1FFA90561B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.270:*:*:*:*:*:*:*", "cpeNameId": "9F8B9A50-D4BF-455B-ACAE-9773F80690D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.271:*:*:*:*:*:*:*", "cpeNameId": "14B3F541-9955-4712-A8B1-4394A3D11DAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.272:*:*:*:*:*:*:*", "cpeNameId": "994323DF-37C1-48B8-BF6D-CF726E6ADED2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.273:*:*:*:*:*:*:*", "cpeNameId": "5794FF97-3D47-47A1-9934-DF5587AD915B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.274:*:*:*:*:*:*:*", "cpeNameId": "C853072E-5EC8-483D-A2CA-4AD2297E51FF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.275:*:*:*:*:*:*:*", "cpeNameId": "98009745-52F2-4846-B454-E90321008CFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.276:*:*:*:*:*:*:*", "cpeNameId": "9A192DE3-8954-4CE7-A200-FBCAE1BFF0D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.277:*:*:*:*:*:*:*", "cpeNameId": "651E5F82-D722-4636-B41C-17ECB9F614AD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.278:*:*:*:*:*:*:*", "cpeNameId": "8A8873EE-B55C-4EFF-8885-329450882E8B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.279:*:*:*:*:*:*:*", "cpeNameId": "CEC23D4D-DCBC-4269-904F-EB1829C48B4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.280:*:*:*:*:*:*:*", "cpeNameId": "6670595A-51D0-4860-A97D-CEF230135DCF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.281:*:*:*:*:*:*:*", "cpeNameId": "C6198A8B-6286-4E96-8629-D7C35E60DB89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.282:*:*:*:*:*:*:*", "cpeNameId": "E3D67109-1796-404D-8308-A39BF1338C3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.283:*:*:*:*:*:*:*", "cpeNameId": "D630C6EC-A2AB-480D-AA68-544966BFD6AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.284:*:*:*:*:*:*:*", "cpeNameId": "6BD57B4C-7ECD-41B1-9631-C1BFBBD6B049"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.285:*:*:*:*:*:*:*", "cpeNameId": "C8FCDB6A-75F8-4B62-A698-D9943A805CBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.286:*:*:*:*:*:*:*", "cpeNameId": "BA369E82-203F-4291-9419-56F1E4A53D15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.287:*:*:*:*:*:*:*", "cpeNameId": "A544C41E-F4FC-4293-A3D6-B5F91E5EF1A7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.288:*:*:*:*:*:*:*", "cpeNameId": "A0BDF59E-7C92-443B-B035-B250F80E4DC9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.289:*:*:*:*:*:*:*", "cpeNameId": "73D2125C-A474-417B-B135-1903D427F538"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.290:*:*:*:*:*:*:*", "cpeNameId": "477BA94B-EB37-4234-BA72-469682042745"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.291:*:*:*:*:*:*:*", "cpeNameId": "F1E29F38-68F3-4CEE-8AD5-828E7C63ED7A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.292:*:*:*:*:*:*:*", "cpeNameId": "6829F830-B295-4BEA-9037-EAE6C6D83D45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.293:*:*:*:*:*:*:*", "cpeNameId": "22CF6A05-5745-4A7F-8559-702E9C3C8830"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.294:*:*:*:*:*:*:*", "cpeNameId": "A36397CA-8253-443A-BEB3-EB7F21F084D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.295:*:*:*:*:*:*:*", "cpeNameId": "9597112C-DEE5-4DE7-A87B-A8CA716B2212"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.296:*:*:*:*:*:*:*", "cpeNameId": "98F92400-37C0-40CA-A0A7-AE36BA845F6B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.297:*:*:*:*:*:*:*", "cpeNameId": "48BF44DC-C00D-4964-B152-341BACB0F556"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.298:*:*:*:*:*:*:*", "cpeNameId": "0E913D3C-18EF-4895-98ED-42C69A1C76B2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.299:*:*:*:*:*:*:*", "cpeNameId": "B8D13EF3-4ECA-4429-8BE2-175CA0247B11"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.300:*:*:*:*:*:*:*", "cpeNameId": "4D091AD8-D0D7-4EBA-814C-88E1BA8374F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.301:*:*:*:*:*:*:*", "cpeNameId": "B1830564-E39A-448F-950A-1B20281BB3B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.302:*:*:*:*:*:*:*", "cpeNameId": "8EA0AAA8-D9AB-47A4-84B1-733B8A5685BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.303:*:*:*:*:*:*:*", "cpeNameId": "8271E5F1-FC03-47FC-9102-A0491D04E4A6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.304:*:*:*:*:*:*:*", "cpeNameId": "8A6B6167-7ED8-4001-BBE1-60520A1507D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.305:*:*:*:*:*:*:*", "cpeNameId": "D314E91D-4DB8-4F05-A3E9-D0AD324F2B40"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.306:*:*:*:*:*:*:*", "cpeNameId": "5DE889B3-0BAD-4FA8-9450-7ADAEA53BCB6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.307:*:*:*:*:*:*:*", "cpeNameId": "0A1ACC8A-123F-4239-8F9D-9DBB85D19A60"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.308:*:*:*:*:*:*:*", "cpeNameId": "2C104BF2-78BD-46F5-A42B-8A7737F08831"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.309:*:*:*:*:*:*:*", "cpeNameId": "3AB452D7-1B5C-4AEC-BA48-88EAE679521A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.310:*:*:*:*:*:*:*", "cpeNameId": "A2B6D891-8756-47AC-BB50-74EED68F5348"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.311:*:*:*:*:*:*:*", "cpeNameId": "CD98624C-BF2D-4AD5-8DC6-23C0376ADEDE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.312:*:*:*:*:*:*:*", "cpeNameId": "A353C4E5-BCD5-404E-BA32-E44D42939E26"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.313:*:*:*:*:*:*:*", "cpeNameId": "EA493CF9-9392-46DA-B897-F85D4EF3B00E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.314:*:*:*:*:*:*:*", "cpeNameId": "50DDF9BB-6311-4505-AA6A-6240E950DD68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.315:*:*:*:*:*:*:*", "cpeNameId": "6929ED83-8C13-41A6-9C4A-CA1F36116442"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.316:*:*:*:*:*:*:*", "cpeNameId": "41B4751B-1E9E-493B-AE0D-BF29E6317911"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.317:*:*:*:*:*:*:*", "cpeNameId": "8DAAD8CA-4620-48BE-95E9-9623F7AACD63"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.318:*:*:*:*:*:*:*", "cpeNameId": "2C0D3085-6703-41F9-81D9-28EA3A593F9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.319:*:*:*:*:*:*:*", "cpeNameId": "A439957C-0CFF-4BDF-A644-00A2602DF673"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.320:*:*:*:*:*:*:*", "cpeNameId": "3EDC01DA-28BA-4672-A0BE-8B3346F51F19"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.321:*:*:*:*:*:*:*", "cpeNameId": "77BA70B4-3A94-4325-BDC1-22564AF064F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.322:*:*:*:*:*:*:*", "cpeNameId": "0743F164-F7F4-485E-AFB7-35D7DC7455E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.323:*:*:*:*:*:*:*", "cpeNameId": "5FDB4BD5-157B-43B7-BA06-8C5FF941542F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.324:*:*:*:*:*:*:*", "cpeNameId": "DE4432A7-318F-4B7B-8CEB-9FA31468CC36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.325:*:*:*:*:*:*:*", "cpeNameId": "80F87AA1-DAEE-4931-ADF7-4183B893D8F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.326:*:*:*:*:*:*:*", "cpeNameId": "5C25C636-C95F-4E94-AC85-5E684E14069F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.327:*:*:*:*:*:*:*", "cpeNameId": "ED6E0851-1828-44F8-BF12-233B8E28DBC8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.328:*:*:*:*:*:*:*", "cpeNameId": "976DF29A-943C-4C28-A071-DA2911DEDECE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.329:*:*:*:*:*:*:*", "cpeNameId": "3EE5D34F-9BBA-4FBA-9157-A4A9FA953C68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.330:*:*:*:*:*:*:*", "cpeNameId": "27711BD8-D761-4F4F-8330-FB1150982CCD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.331:*:*:*:*:*:*:*", "cpeNameId": "CBD4F61B-627B-4ACC-B743-57C302AB29F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.332:*:*:*:*:*:*:*", "cpeNameId": "E5247303-B19B-42F3-B1F1-DED50AB8E3CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.333:*:*:*:*:*:*:*", "cpeNameId": "F7C8E776-3213-4F39-9637-25902C283906"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.334:*:*:*:*:*:*:*", "cpeNameId": "D9008EE6-5CED-451D-8E36-07626739C582"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.335:*:*:*:*:*:*:*", "cpeNameId": "3F094A53-6652-4404-AE4C-3CCA8BE6BAC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.336:*:*:*:*:*:*:*", "cpeNameId": "8540A828-6A7F-499A-9F47-861E278F7001"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:*:*:*:*:*:*:*", "cpeNameId": "D44D12DF-CC78-4ADD-AA64-D1FF33FCFC11"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:-:*:*:*:*:*:*", "cpeNameId": "82324BC8-B6FA-4FD7-B301-3CAA806DF77D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:rc1:*:*:*:*:*:*", "cpeNameId": "710D7761-A5EC-4338-BBC6-1EA829347DD9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:rc2:*:*:*:*:*:*", "cpeNameId": "A9B4765F-04DB-41A9-9BDC-D9EBC8A916CE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:rc3:*:*:*:*:*:*", "cpeNameId": "6D023E11-92E4-4DC4-A704-A653569DEF7E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:rc4:*:*:*:*:*:*", "cpeNameId": "BE180D29-2D25-4945-85F5-4FF1B61A755F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:rc5:*:*:*:*:*:*", "cpeNameId": "B550A739-A864-4C04-8B4F-DB875CCE5876"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:rc6:*:*:*:*:*:*", "cpeNameId": "EE7802F2-4421-4A8F-A5E7-10ABA30BB95D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:rc7:*:*:*:*:*:*", "cpeNameId": "913B33F6-C76A-415E-978B-DFE69DD12443"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.1:*:*:*:*:*:*:*", "cpeNameId": "885FF46B-AF78-41E0-9992-134FC5483062"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.2:*:*:*:*:*:*:*", "cpeNameId": "417EF125-85BE-4436-8270-385A03FBF5DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.3:*:*:*:*:*:*:*", "cpeNameId": "A60F0159-BE82-4549-A156-D0C420BCD669"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.4:*:*:*:*:*:*:*", "cpeNameId": "205719B0-36E0-490F-A726-DBF0A18C7B6D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.5:*:*:*:*:*:*:*", "cpeNameId": "F6FC9B68-7A46-413B-B2F2-B96FC679293B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.6:*:*:*:*:*:*:*", "cpeNameId": "860DB2BE-F0BD-4E93-ACAF-73AB5A4287EC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.7:*:*:*:*:*:*:*", "cpeNameId": "72F15093-84F6-4F64-AD90-9C0B8534002F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.8:*:*:*:*:*:*:*", "cpeNameId": "1241D778-09B7-41CF-A7F0-3F33365EAEEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.9:*:*:*:*:*:*:*", "cpeNameId": "85AF8455-0705-4C7B-A8D7-C827098D3CBC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.10:*:*:*:*:*:*:*", "cpeNameId": "59B6BDD9-9094-469D-B556-347EAFFAC84A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.11:*:*:*:*:*:*:*", "cpeNameId": "195BB390-1666-4C78-8E5E-E8BB8F7CD6C7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.12:*:*:*:*:*:*:*", "cpeNameId": "4611F4AE-C544-40B2-BAB0-4D75918253B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.13:*:*:*:*:*:*:*", "cpeNameId": "174828D2-1D1F-4A0F-9D4A-3D6CEEB670A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.14:*:*:*:*:*:*:*", "cpeNameId": "4A9AF5EF-2143-422E-9406-12394AE6F056"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.15:*:*:*:*:*:*:*", "cpeNameId": "0ED2B63D-794A-436E-98B2-8BB1746F8E37"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.16:*:*:*:*:*:*:*", "cpeNameId": "A3EE611D-A161-44D4-B8BC-3D77C35AC1DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.17:*:*:*:*:*:*:*", "cpeNameId": "77C22DEA-C18D-4F57-A5B2-D9432480F6F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.18:*:*:*:*:*:*:*", "cpeNameId": "98BC40B2-34EE-44D0-AD07-D41DA8D98FEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:*:*:*:*:*:*:*", "cpeNameId": "CE47DAE6-002F-46BE-8496-FC478C0B0928"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:-:*:*:*:*:*:*", "cpeNameId": "96F106B5-E746-4DE6-BCEB-07F1F572960D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:rc:*:*:*:*:*:*", "cpeNameId": "C0F0B475-896B-4239-8475-5B90B74BE05E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:rc1:*:*:*:*:*:*", "cpeNameId": "206EC973-ED2E-49E1-A4AC-54F7D30DD628"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:rc2:*:*:*:*:*:*", "cpeNameId": "AAD4C356-7CE1-4A45-96FE-6D75643AB293"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:rc3:*:*:*:*:*:*", "cpeNameId": "4BFA1B60-7E55-4547-8B4B-AFC1256015D6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:rc4:*:*:*:*:*:*", "cpeNameId": "78E3876E-D2C3-49BA-BE26-2066849638AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:rc5:*:*:*:*:*:*", "cpeNameId": "B9536FB8-C7B1-4C28-82CD-8D8150E7BCCB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:rc6:*:*:*:*:*:*", "cpeNameId": "BEC1B244-1D7B-47BC-A1BB-6F95945EA2C7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:rc7:*:*:*:*:*:*", "cpeNameId": "1D3A9DBB-AF78-4A75-A55E-C851D1277498"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.1:*:*:*:*:*:*:*", "cpeNameId": "C1BE1F09-D07F-4AE4-9764-73721620F745"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.2:*:*:*:*:*:*:*", "cpeNameId": "563DD6A5-BEDD-437A-BAD5-981FD66FAA1A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.3:*:*:*:*:*:*:*", "cpeNameId": "6DC9ED49-7975-48B1-B630-06680709899F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.4:*:*:*:*:*:*:*", "cpeNameId": "39F925A0-630B-4CBF-9BFC-C40C0E81BFA8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.5:*:*:*:*:*:*:*", "cpeNameId": "A0E5D15C-E27F-4B55-9668-078BA5CCD7AA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.6:*:*:*:*:*:*:*", "cpeNameId": "6DE6DECA-3142-43DA-B930-A48EAFF9CED3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.7:*:*:*:*:*:*:*", "cpeNameId": "0438E224-2F8A-4089-BF5E-D7763A431E39"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.8:*:*:*:*:*:*:*", "cpeNameId": "0814DBD3-2193-40B5-8CE1-5C992D4C59C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.9:*:*:*:*:*:*:*", "cpeNameId": "C75890A0-5944-4BB6-B44B-83FDDA55308A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.10:*:*:*:*:*:*:*", "cpeNameId": "50932CE7-4BA6-4944-839E-800831391197"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.11:*:*:*:*:*:*:*", "cpeNameId": "21B4D5C0-665E-4B96-8A71-F84E2731725A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.12:*:*:*:*:*:*:*", "cpeNameId": "26861D80-6855-42B4-A2C5-5A5314C63454"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.13:*:*:*:*:*:*:*", "cpeNameId": "161AE6FB-AF4F-4A02-A235-9BA4D3A8BFE7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.14:*:*:*:*:*:*:*", "cpeNameId": "04DDF552-0DBA-4D2D-97A9-05F348E45E2D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.15:*:*:*:*:*:*:*", "cpeNameId": "8D8D509C-F3B3-4D99-AE7B-85ACE6CDCE9A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.16:*:*:*:*:*:*:*", "cpeNameId": "F62EAE49-6093-4A2A-AEDC-DB4D450BCDCF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.17:*:*:*:*:*:*:*", "cpeNameId": "D4A046F1-9970-4BC2-A4F8-E58871919793"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.18:*:*:*:*:*:*:*", "cpeNameId": "9A7D44E8-1ABB-4FCA-900F-63CF5B432394"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:*:*:*:*:*:*:*", "cpeNameId": "3F9A62D1-EC46-4586-BF5B-075E503B34AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:-:*:*:*:*:*:*", "cpeNameId": "1355298F-E180-4ACE-BE37-E4671C6D87FA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:rc1:*:*:*:*:*:*", "cpeNameId": "869F2A88-8ECA-4277-8EF8-04722B6397F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:rc2:*:*:*:*:*:*", "cpeNameId": "E213D2C7-56A5-4CDB-9FFA-D562EBE66B32"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:rc3:*:*:*:*:*:*", "cpeNameId": "23DCE750-11FB-46DF-B936-8AEAE54EDCF1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:rc4:*:*:*:*:*:*", "cpeNameId": "95518E21-4F70-4E7F-8A5E-41A71733B838"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:rc5:*:*:*:*:*:*", "cpeNameId": "86A613D5-2EDD-46C6-BD54-6EE7E0BD677F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:rc6:*:*:*:*:*:*", "cpeNameId": "7ACCD69E-0ADE-4675-919A-6ADCADB4E243"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:rc7:*:*:*:*:*:*", "cpeNameId": "0CDA0188-9155-4355-B8E0-EC98BCA4D106"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.1:*:*:*:*:*:*:*", "cpeNameId": "8AFFDBAA-464C-4017-8E0B-80E70560BD9C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.2:*:*:*:*:*:*:*", "cpeNameId": "A00BC577-2BDB-4CB9-A918-5EFA87297409"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.3:*:*:*:*:*:*:*", "cpeNameId": "D03EB1B1-6645-4442-9A5B-084C2C086199"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.4:*:*:*:*:*:*:*", "cpeNameId": "4321A1DC-4069-4924-ADAF-060727BD410C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.5:*:*:*:*:*:*:*", "cpeNameId": "6E0A1034-4FFA-4B8B-BA2F-DDDF74911FD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.6:*:*:*:*:*:*:*", "cpeNameId": "0DA7186B-D3B7-4E95-B66E-8FF81C72BC75"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.7:*:*:*:*:*:*:*", "cpeNameId": "2F936CBB-766A-4DFB-A60A-72F1A37577EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.8:*:*:*:*:*:*:*", "cpeNameId": "CB3F392D-0A8A-4D3E-8E62-9E7FD830F988"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.9:*:*:*:*:*:*:*", "cpeNameId": "D1A962D5-849E-4799-B4E2-58BF062A8E35"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.10:*:*:*:*:*:*:*", "cpeNameId": "358D2C77-1EDB-44D7-914F-C1B93B184AE2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.11:*:*:*:*:*:*:*", "cpeNameId": "1B36CCD2-6734-4F62-887B-0B29DEAB8948"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.12:*:*:*:*:*:*:*", "cpeNameId": "939C2382-3F25-4D16-B047-662EF7362D14"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.13:*:*:*:*:*:*:*", "cpeNameId": "4787E970-6703-4A4A-8A25-2A6DF37E9115"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.14:*:*:*:*:*:*:*", "cpeNameId": "D9DE2C08-37BB-4B4E-9CC9-257FB5D0CC55"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.15:*:*:*:*:*:*:*", "cpeNameId": "56CA0D63-01A8-4C7D-9285-0FE01EE5A4CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.16:*:*:*:*:*:*:*", "cpeNameId": "0EB823BC-6F14-4123-AFE3-5BD35C06053B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.17:*:*:*:*:*:*:*", "cpeNameId": "8DB0A362-21DC-463F-8741-7983D7091926"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.18:*:*:*:*:*:*:*", "cpeNameId": "D52B62A2-3084-4DC4-A603-BCAC0CE52FEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.19:*:*:*:*:*:*:*", "cpeNameId": "A5AE9508-CB21-4232-B63E-532C504349B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:*:*:*:*:*:*:*", "cpeNameId": "817415B8-9A60-4887-9222-0D9F02CFB071"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:-:*:*:*:*:*:*", "cpeNameId": "8835D366-AAEA-40BE-A53D-C0C034420403"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:rc1:*:*:*:*:*:*", "cpeNameId": "2213E83B-F249-4DA4-A296-9AE97B5995D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:rc2:*:*:*:*:*:*", "cpeNameId": "48BFC151-DD12-4AA8-860C-CC88EC732BFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:rc3:*:*:*:*:*:*", "cpeNameId": "9FA2195C-1574-4F87-9EBF-C6C98F88BAFF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:rc4:*:*:*:*:*:*", "cpeNameId": "67BF2AB1-0C74-4B1F-8E1C-B1D82E89DDB4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:rc5:*:*:*:*:*:*", "cpeNameId": "AE91D0F4-8012-4BAC-A0C6-BB99AD9D2E46"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:rc6:*:*:*:*:*:*", "cpeNameId": "1766D430-184A-4072-B189-A1497C75D6BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:rc7:*:*:*:*:*:*", "cpeNameId": "CAA30654-34CD-4B4F-B233-29B87ED2FBB8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:rc8:*:*:*:*:*:*", "cpeNameId": "00096540-8FA8-46CA-BB68-93B1C5272D2D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.0:*:*:*:*:*:*:*", "cpeNameId": "A009147C-ACF6-4854-AAE6-3A23AE21C4CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.0-193.el8:*:*:*:*:*:*:*", "cpeNameId": "FCA98709-2F68-4E1B-9430-7D7166871698"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.1:*:*:*:*:*:*:*", "cpeNameId": "13793707-6FDB-4423-A8E6-2ADC8BD61C3A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.2:*:*:*:*:*:*:*", "cpeNameId": "EAB280BE-E42E-47BD-BC9B-9EE32D6C2A40"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.3:*:*:*:*:*:*:*", "cpeNameId": "587AE0EF-5106-4CEA-9358-2D066510D151"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.4:*:*:*:*:*:*:*", "cpeNameId": "A3318DEA-3BE2-4302-BC9B-A034934F9D1D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.5:*:*:*:*:*:*:*", "cpeNameId": "6DFCE771-61CC-4086-9ABA-D355FF8F3148"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.6:*:*:*:*:*:*:*", "cpeNameId": "445E159B-AA55-48BD-93C7-2B930AD4EB83"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.7:*:*:*:*:*:*:*", "cpeNameId": "B27A8950-AB89-4120-80DA-B349652A523D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.8:*:*:*:*:*:*:*", "cpeNameId": "8E631816-CFC2-4D77-AE17-D796C455F715"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.9:*:*:*:*:*:*:*", "cpeNameId": "8FD85D0C-385D-488A-A090-32B066B8C2EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.10:*:*:*:*:*:*:*", "cpeNameId": "FEEDBD99-9EB3-41AF-815C-571AF46B5D85"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.11:*:*:*:*:*:*:*", "cpeNameId": "7E7CBF51-E6C8-46E1-8DD3-CFBAB87EA47B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.12:*:*:*:*:*:*:*", "cpeNameId": "F965D923-D9D7-4EF1-B1FB-07EA2FEEBE31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.13:*:*:*:*:*:*:*", "cpeNameId": "E5834B3F-3734-4FEB-9440-7AE8BE96EBB5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.14:*:*:*:*:*:*:*", "cpeNameId": "09696490-5ABF-48D2-823F-C1822003B392"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.15:*:*:*:*:*:*:*", "cpeNameId": "E6911EAC-4DB4-41E9-9401-B4226373EE5A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.16:*:*:*:*:*:*:*", "cpeNameId": "AC125B64-72FD-4946-B3A7-663299025809"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.17:*:*:*:*:*:*:*", "cpeNameId": "EF3569D5-2C62-4458-974E-918A784BD62A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.18:*:*:*:*:*:*:*", "cpeNameId": "1FA907F8-0BCB-4507-8714-DC1D5781D42D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.19:*:*:*:*:*:*:*", "cpeNameId": "942860D3-A3FF-4932-A6FB-9459A59644BE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.20:*:*:*:*:*:*:*", "cpeNameId": "EC116A00-67FF-4F9B-9B3B-EFB39878E41F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:*:*:*:*:*:*:*", "cpeNameId": "A3163086-ED2B-4462-9265-6F1DCEAB4D54"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:-:*:*:*:*:*:*", "cpeNameId": "057CC752-CE29-466B-827D-3930C41F1C3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:rc1:*:*:*:*:*:*", "cpeNameId": "AFC357CC-56A5-4555-959A-34F88351D81B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:rc2:*:*:*:*:*:*", "cpeNameId": "ED61D354-4BB9-4D66-87FB-86662D7B6B12"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:rc3:*:*:*:*:*:*", "cpeNameId": "A84469B4-B1DD-4DED-AC99-EA9C2CA93CF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:rc4:*:*:*:*:*:*", "cpeNameId": "EE659E91-B594-49B5-BC25-C4BAB3BE192E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:rc5:*:*:*:*:*:*", "cpeNameId": "2B7349C1-F08A-44E5-8FB8-3F2804E5A07F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:rc6:*:*:*:*:*:*", "cpeNameId": "EB37BD16-E204-41BE-ADE4-01B875CBE896"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:rc7:*:*:*:*:*:*", "cpeNameId": "745C3308-0D37-4503-B9FD-1C7A675E7C3A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:rc8:*:*:*:*:*:*", "cpeNameId": "C09DBABE-8232-4196-8C42-2D4509AD02FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.1:*:*:*:*:*:*:*", "cpeNameId": "CBFE536A-5936-4037-A140-B381A09E0313"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.2:*:*:*:*:*:*:*", "cpeNameId": "E7375DDA-E673-4CB3-9A7A-751E0A34FC42"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.3:*:*:*:*:*:*:*", "cpeNameId": "99F55D5C-293A-4F8A-8C8C-D324BECF805D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.4:*:*:*:*:*:*:*", "cpeNameId": "C61FC074-FB83-48ED-8299-CF0565B28BF0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.5:*:*:*:*:*:*:*", "cpeNameId": "813A19FD-6C0F-442D-BD13-D924AAB177A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.6:*:*:*:*:*:*:*", "cpeNameId": "5387070B-08B1-4B14-ABD0-845D0DD8F84B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.7:*:*:*:*:*:*:*", "cpeNameId": "E39CE6E9-2A15-486F-881E-000CEB221CFC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.8:*:*:*:*:*:*:*", "cpeNameId": "3951D003-9ACB-4530-AD87-BA6495862F19"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.9:*:*:*:*:*:*:*", "cpeNameId": "16722D4A-04DC-40F0-B6BE-19B503E6F896"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.10:*:*:*:*:*:*:*", "cpeNameId": "1F88CB52-D7B5-4946-A367-45DE35034F51"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.11:*:*:*:*:*:*:*", "cpeNameId": "77B502BA-B846-4C9C-A8CE-3EF988CECC92"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.12:*:*:*:*:*:*:*", "cpeNameId": "23451725-61D8-4924-88FD-F296F0BB0BDD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.13:*:*:*:*:*:*:*", "cpeNameId": "2647DBE8-332D-4420-A7FE-971F97D450E5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.14:*:*:*:*:*:*:*", "cpeNameId": "EC80AF58-D2F3-439F-8A3D-0333C832805C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.15:*:*:*:*:*:*:*", "cpeNameId": "5FF48FD7-42B6-446C-9142-C46F87307A23"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.16:*:*:*:*:*:*:*", "cpeNameId": "27DD882E-6137-45D8-95CA-46E0A0E9D546"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.17:*:*:*:*:*:*:*", "cpeNameId": "3D79ECA3-B493-4422-B61B-F9D8725540BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.18:*:*:*:*:*:*:*", "cpeNameId": "D815E2B8-DD92-47E3-A1C3-E9B7859ED848"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.19:*:*:*:*:*:*:*", "cpeNameId": "3ED97E59-18F8-4970-8DCF-108DB66C0B64"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.20:*:*:*:*:*:*:*", "cpeNameId": "F5B56565-8277-4435-81A3-14A07CD1CFB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.21:*:*:*:*:*:*:*", "cpeNameId": "08DEF207-BE10-4D38-B198-E0E81A7D8DD8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.22:*:*:*:*:*:*:*", "cpeNameId": "6406E989-2DA9-4473-8A19-F34C0AA0A101"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.23:*:*:*:*:*:*:*", "cpeNameId": "BAB4A7B7-201A-49DD-8CEA-C8276A386DB5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.24:*:*:*:*:*:*:*", "cpeNameId": "C1807F8B-4224-4C20-A7E6-A1A37CFE804C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.25:*:*:*:*:*:*:*", "cpeNameId": "BC055247-93EC-4557-97C5-3F2476EE0F15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.26:*:*:*:*:*:*:*", "cpeNameId": "7D6369DC-902C-4BC1-A26D-C5C913143EB6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.26.1:*:*:*:*:*:*:*", "cpeNameId": "8C01371D-728D-41FF-8EDB-479FFEB181A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.27:*:*:*:*:*:*:*", "cpeNameId": "A32084B7-D6A4-4F74-B282-DDB6DEF0C5AA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.28:*:*:*:*:*:*:*", "cpeNameId": "E0A0C51F-ED33-48CF-927D-0CA8970B6D1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.29:*:*:*:*:*:*:*", "cpeNameId": "21FF2212-87CD-409F-8FA3-A36D8AA94607"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.30:*:*:*:*:*:*:*", "cpeNameId": "429E0577-DB63-4580-8B2F-9F00743EB4B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.31:*:*:*:*:*:*:*", "cpeNameId": "3371D4B5-E4D9-483E-AA24-B99A03C20991"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.32:*:*:*:*:*:*:*", "cpeNameId": "316A0495-6409-4E82-A2FF-2A3158DF6020"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.33:*:*:*:*:*:*:*", "cpeNameId": "2ADFFFEE-80CB-4EF8-8893-D1D2CDBF2687"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.34:*:*:*:*:*:*:*", "cpeNameId": "D3C47B41-3976-412A-877C-08C558B67F17"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.35:*:*:*:*:*:*:*", "cpeNameId": "C12B86A6-026B-4109-9E3B-5A334A73871F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.36:*:*:*:*:*:*:*", "cpeNameId": "855C5C5D-CC69-4629-9D55-4E25F1346965"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.37:*:*:*:*:*:*:*", "cpeNameId": "35B14A6C-CDA5-4E1F-B6C6-4E8305D32DFB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.38:*:*:*:*:*:*:*", "cpeNameId": "9CB2A48B-F8FC-47BE-9DF4-2B95585425F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.39:*:*:*:*:*:*:*", "cpeNameId": "E6A1D1E0-0373-4295-897D-C7E699C018E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.40:*:*:*:*:*:*:*", "cpeNameId": "970D15E0-EE86-4AAB-9840-3CD713AEF03B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.41:*:*:*:*:*:*:*", "cpeNameId": "0B47B7E6-5110-44D8-BDEA-4080A6A28FCF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.42:*:*:*:*:*:*:*", "cpeNameId": "2FF8D63B-85F6-43EC-B69F-231ECF7D0312"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.43:*:*:*:*:*:*:*", "cpeNameId": "935B8487-6BDD-4FFF-9F7E-00A86BB69CDD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.44:*:*:*:*:*:*:*", "cpeNameId": "48F99607-CA4F-4629-A68D-4349153DF423"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.45:*:*:*:*:*:*:*", "cpeNameId": "1CFB073B-B310-49DC-893B-B46DE6336F4E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.46:*:*:*:*:*:*:*", "cpeNameId": "8F2CA065-9492-44F8-9C69-B151B71803CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.47:*:*:*:*:*:*:*", "cpeNameId": "65D05643-4760-4FC5-97A3-BC5CCCA46CE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.48:*:*:*:*:*:*:*", "cpeNameId": "805F2CFA-C623-43A6-BA75-8A677011B7C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.49:*:*:*:*:*:*:*", "cpeNameId": "E9B45E20-6F1C-4909-95E4-17956AB05513"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.50:*:*:*:*:*:*:*", "cpeNameId": "02565DD0-1F69-44F5-9710-F4559686BCB5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.51:*:*:*:*:*:*:*", "cpeNameId": "4A2A0E35-E26F-470C-8293-E71B0D280E37"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.52:*:*:*:*:*:*:*", "cpeNameId": "E4259B27-55AA-4906-A88E-2F156833874F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.53:*:*:*:*:*:*:*", "cpeNameId": "2399AB59-0AAB-45C3-9359-778E0CEF66FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.54:*:*:*:*:*:*:*", "cpeNameId": "46C3AEDA-6F26-4416-BF76-1FEBBD354F3F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.55:*:*:*:*:*:*:*", "cpeNameId": "10F1A367-B071-4F9A-A2CB-0C7FF216A216"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.56:*:*:*:*:*:*:*", "cpeNameId": "DF3D3A29-EB49-483C-9737-67E18806F753"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.57:*:*:*:*:*:*:*", "cpeNameId": "D79FAF76-5403-4082-95B6-702810120DAA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.58:*:*:*:*:*:*:*", "cpeNameId": "93DF7061-A282-4290-9D97-63ACC7575826"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.59:*:*:*:*:*:*:*", "cpeNameId": "88CB7AC8-7CAA-4947-8578-AB8B5A9C7D8C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.60:*:*:*:*:*:*:*", "cpeNameId": "8B9A9641-54E1-40FE-AD41-551002220084"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.61:*:*:*:*:*:*:*", "cpeNameId": "04A60F34-73F7-49AB-AB09-1083721DE784"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.62:*:*:*:*:*:*:*", "cpeNameId": "D4A637B9-0057-4393-A19F-69879DA1CA8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.63:*:*:*:*:*:*:*", "cpeNameId": "AF1FE2CD-7236-4965-952B-6F172159373C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.64:*:*:*:*:*:*:*", "cpeNameId": "7D1F715A-1A92-4ECE-85BB-0CC907BEDD91"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.65:*:*:*:*:*:*:*", "cpeNameId": "4116C6D8-AF20-48AF-8ADA-0506911A3459"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.66:*:*:*:*:*:*:*", "cpeNameId": "4388B248-80C6-4086-B1E6-4CEE1BF7602F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.67:*:*:*:*:*:*:*", "cpeNameId": "50EF8BC5-16C3-4AD8-A2D1-1A2608CD7374"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.68:*:*:*:*:*:*:*", "cpeNameId": "5D10408F-E5C0-40B2-A497-3E71FB6DD431"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.69:*:*:*:*:*:*:*", "cpeNameId": "10504EA1-D9B1-44C8-A9EC-B8D32AAFCF5B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.70:*:*:*:*:*:*:*", "cpeNameId": "AA9003D3-8912-4A70-8B69-3F2F345FFD89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.71:*:*:*:*:*:*:*", "cpeNameId": "233CCC29-E4BB-4DAD-9F45-CEC77425C279"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.72:*:*:*:*:*:*:*", "cpeNameId": "B3336506-E63D-491E-B756-15C59D0B0EAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.73:*:*:*:*:*:*:*", "cpeNameId": "57449032-831C-45A0-9FE9-E630FB005BEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.74:*:*:*:*:*:*:*", "cpeNameId": "27086504-19AA-48F8-AAC3-FE71072F4AC6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.75:*:*:*:*:*:*:*", "cpeNameId": "858F7980-5197-42DE-B55C-CA706999F200"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.76:*:*:*:*:*:*:*", "cpeNameId": "31423569-8FBC-411E-9F95-9820746128BE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.77:*:*:*:*:*:*:*", "cpeNameId": "D3EB9447-CCF7-4803-ABBB-15477850C76B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.78:*:*:*:*:*:*:*", "cpeNameId": "68BD1635-2CE6-464F-B32D-D0AE25DEB9E5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.79:*:*:*:*:*:*:*", "cpeNameId": "8FFF3C74-22E6-4418-AD93-AA773E549428"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.80:*:*:*:*:*:*:*", "cpeNameId": "721DC148-9BCB-4B12-88AA-0BAF3A380C77"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.81:*:*:*:*:*:*:*", "cpeNameId": "9D3ED37A-08C8-4430-BB0A-EFA6D1AF1D5C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.82:*:*:*:*:*:*:*", "cpeNameId": "00536E1F-7C8D-4DDC-8629-ABE2B4EDA61B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.83:*:*:*:*:*:*:*", "cpeNameId": "6877CB77-34C0-4B45-BED7-7966B69D89F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.84:*:*:*:*:*:*:*", "cpeNameId": "614F4D67-484D-488A-8DB5-9FF8F939927B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.85:*:*:*:*:*:*:*", "cpeNameId": "C3D19825-51CE-43E1-904C-1344DB3775A9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.86:*:*:*:*:*:*:*", "cpeNameId": "2C509040-DF4B-4BD3-8428-4BB9ED4D3BEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.87:*:*:*:*:*:*:*", "cpeNameId": "4455DE42-A354-4EF5-A49A-345954CD65EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.88:*:*:*:*:*:*:*", "cpeNameId": "0F57DC5F-F143-44EE-9037-3BBF9BF3A1E7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.89:*:*:*:*:*:*:*", "cpeNameId": "D4475A2E-E667-4618-A347-10EC5EA6657D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.90:*:*:*:*:*:*:*", "cpeNameId": "2C94A5E1-6EC8-4F69-8C81-18BA6B3E22CC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.91:*:*:*:*:*:*:*", "cpeNameId": "31EE797A-51CC-46B2-B768-1FA25A37706D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.92:*:*:*:*:*:*:*", "cpeNameId": "4748A9ED-7812-4451-81CD-B75547B3C532"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.93:*:*:*:*:*:*:*", "cpeNameId": "119FC260-DEC1-4E63-AF81-2F3360E78EB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.94:*:*:*:*:*:*:*", "cpeNameId": "25A22D4C-1973-4287-B791-87F903F64B97"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.95:*:*:*:*:*:*:*", "cpeNameId": "ACD2D3C9-BA85-4EEE-9A65-FE83E3495315"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.96:*:*:*:*:*:*:*", "cpeNameId": "3B169D06-CA15-4A4A-980A-A056E6C81881"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.97:*:*:*:*:*:*:*", "cpeNameId": "A18ABB80-25F6-4328-B68F-A3B4B23763E4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.98:*:*:*:*:*:*:*", "cpeNameId": "F8BEC111-87BF-4B6C-BBF6-62EE9A763119"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.99:*:*:*:*:*:*:*", "cpeNameId": "2CE59324-24EA-46B0-939D-BA1815313EA7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.100:*:*:*:*:*:*:*", "cpeNameId": "86C29F08-DF43-426C-9E23-1E3416463DBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.101:*:*:*:*:*:*:*", "cpeNameId": "81DE128C-6A1B-4676-A99B-58B77482593A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.102:*:*:*:*:*:*:*", "cpeNameId": "FDA36DFA-EE0A-4DEE-B7C2-A2AF9F84E0CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.103:*:*:*:*:*:*:*", "cpeNameId": "FE71C8C4-8159-49DC-87F0-4A98BEA448C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.104:*:*:*:*:*:*:*", "cpeNameId": "35D6D06A-7705-4EA0-9209-55B7ED61E83A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.105:*:*:*:*:*:*:*", "cpeNameId": "B2DA3294-00F2-4509-A8B2-0F53D69F2B36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.106:*:*:*:*:*:*:*", "cpeNameId": "D337E554-D6A9-4CFC-9985-F670B7654434"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.107:*:*:*:*:*:*:*", "cpeNameId": "FE52DA4B-3ACB-4510-AA7A-9CCFE25E5B87"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.108:*:*:*:*:*:*:*", "cpeNameId": "82BED585-BBDF-41AE-B925-D4CA36F697BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.109:*:*:*:*:*:*:*", "cpeNameId": "C1526792-F597-4674-B998-9A4FF075956E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.110:*:*:*:*:*:*:*", "cpeNameId": "B48E2837-F8E0-42BA-A7D2-B9EA5A770E1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.111:*:*:*:*:*:*:*", "cpeNameId": "B52E1607-47C2-4AD5-95D0-F35A901E5D3F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.112:*:*:*:*:*:*:*", "cpeNameId": "0CDD6E73-775F-49CF-A3D6-E9054EB43D36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.113:*:*:*:*:*:*:*", "cpeNameId": "8A144377-4D4C-48F7-80AB-A8B50F86D132"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.114:*:*:*:*:*:*:*", "cpeNameId": "4B6DF9A7-218F-435C-A5AB-61A5575D9DBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.115:*:*:*:*:*:*:*", "cpeNameId": "8D64C2A7-DF73-481A-8A55-790CD5DABBC0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.116:*:*:*:*:*:*:*", "cpeNameId": "36E4D70D-9E0D-44AC-9CE9-168111BE078D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.117:*:*:*:*:*:*:*", "cpeNameId": "BFF2F68A-DA2E-4118-A4CB-E7FA7C719C97"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.118:*:*:*:*:*:*:*", "cpeNameId": "B8DEB967-1BA5-43BA-B659-5AC369F5527B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.118-2:*:*:*:*:*:*:*", "cpeNameId": "8BDE7B9C-7D49-4FB9-9095-89B0FD601AC4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.119:*:*:*:*:*:*:*", "cpeNameId": "1EBD0B5F-457A-4365-B3B0-45E4C0B21B93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.120:*:*:*:*:*:*:*", "cpeNameId": "0C712977-921D-4FD3-BCBB-6F4A86AA7594"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.121:*:*:*:*:*:*:*", "cpeNameId": "0D8947E0-FBE1-424F-BA96-F5A83CF87A3E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.122:*:*:*:*:*:*:*", "cpeNameId": "A79D9A4E-58CD-4825-9EC3-0B0499C90BF3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.123:*:*:*:*:*:*:*", "cpeNameId": "A61315CE-EC4F-4734-8B07-9670C7DAF959"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.124:*:*:*:*:*:*:*", "cpeNameId": "8B2AB2CC-ED8F-40C0-A027-7A93B70D0ABF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.125:*:*:*:*:*:*:*", "cpeNameId": "DF0EBF12-4078-42F7-A92B-5D54056AE5EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.126:*:*:*:*:*:*:*", "cpeNameId": "A2A07202-24D9-4929-93CE-AD808F353C60"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.127:*:*:*:*:*:*:*", "cpeNameId": "1AB674F5-1B69-4DE7-AF61-50787A69A5D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.128:*:*:*:*:*:*:*", "cpeNameId": "3D2F68B8-736E-4899-9B1B-ED6E8DE6CF3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.129:*:*:*:*:*:*:*", "cpeNameId": "76CD5FC7-448D-4F20-864B-3567B07D1B56"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.130:*:*:*:*:*:*:*", "cpeNameId": "C61BEEDC-1AA7-4453-9C1F-1B61D1EA024F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.131:*:*:*:*:*:*:*", "cpeNameId": "418276D9-F035-4B0B-BCCB-D5FB488D5B31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.132:*:*:*:*:*:*:*", "cpeNameId": "C5D35F68-0A1C-44A4-952A-DDDF21BC09EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.133:*:*:*:*:*:*:*", "cpeNameId": "1F548D92-C48B-4886-A2B3-6E74E8E0F55B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.134:*:*:*:*:*:*:*", "cpeNameId": "F20B9429-FA58-466C-9DFA-9E806AF804B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.135:*:*:*:*:*:*:*", "cpeNameId": "36A1C0D1-63B5-4817-8BA5-C60D3D6B6B38"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.136:*:*:*:*:*:*:*", "cpeNameId": "33C1E0F9-16D2-4829-A3BE-88C14FF70938"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.137:*:*:*:*:*:*:*", "cpeNameId": "C7C55512-FBE6-47D5-8A7A-BBD5577D17E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.138:*:*:*:*:*:*:*", "cpeNameId": "769005B9-5005-411C-B4EE-CF0C62490EF8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.139:*:*:*:*:*:*:*", "cpeNameId": "06D197F7-661E-4C49-B099-4545C422C7A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.140:*:*:*:*:*:*:*", "cpeNameId": "776A104E-F94D-406D-BF76-9B11C3365D7A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.141:*:*:*:*:*:*:*", "cpeNameId": "5035E747-DEF4-4DA3-83CF-5BD2A6A9A54A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.142:*:*:*:*:*:*:*", "cpeNameId": "D4080EBB-DEB7-4E16-BE55-BEFAFB7E93E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.143:*:*:*:*:*:*:*", "cpeNameId": "853BB9C3-4467-4FD8-9A46-E2009C5F4357"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.144:*:*:*:*:*:*:*", "cpeNameId": "2AEB23BA-8389-4940-B626-9E7DAF29822D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.145:*:*:*:*:*:*:*", "cpeNameId": "84991F4A-4107-48A6-8D6E-D85F2EF55EBF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.146:*:*:*:*:*:*:*", "cpeNameId": "7A9370E6-CF76-4989-9368-76B2E434A857"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.147:*:*:*:*:*:*:*", "cpeNameId": "DEE46645-5E8C-4F37-BCD0-322E77397F59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.148:*:*:*:*:*:*:*", "cpeNameId": "2093C809-0485-44CC-B0ED-5C2B7DBFEA99"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.149:*:*:*:*:*:*:*", "cpeNameId": "98DAC7B2-8F21-49EF-B53B-23B8A22A8975"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.150:*:*:*:*:*:*:*", "cpeNameId": "E28A93DC-B824-4692-A0F3-B5CAB77B3A48"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.151:*:*:*:*:*:*:*", "cpeNameId": "365D8293-E1BC-4F24-A5FF-B7E12943EE70"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.152:*:*:*:*:*:*:*", "cpeNameId": "FFEFA6D6-3D07-4911-A0D8-3C7A27A95143"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.153:*:*:*:*:*:*:*", "cpeNameId": "051C7A5C-25A0-408C-AFFA-19DB17B0DFE2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.154:*:*:*:*:*:*:*", "cpeNameId": "34798860-1C32-431D-8095-4D25E900D047"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.155:*:*:*:*:*:*:*", "cpeNameId": "BCB220C7-6880-4054-B512-91A8A5F683CE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.156:*:*:*:*:*:*:*", "cpeNameId": "3DDC9F23-49BA-42AE-9251-D0DE0DEF8DD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.157:*:*:*:*:*:*:*", "cpeNameId": "B65EAD3A-8DA1-40A2-B14F-C3D61E19D592"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.158:*:*:*:*:*:*:*", "cpeNameId": "D8A0F47B-9F15-4DC9-9134-C2410BF8E55E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.159:*:*:*:*:*:*:*", "cpeNameId": "FD07FFAC-9B06-43E9-A1AE-F085B99D2A65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.160:*:*:*:*:*:*:*", "cpeNameId": "B6133234-102E-4B8C-A0F0-E9E1538BD098"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.161:*:*:*:*:*:*:*", "cpeNameId": "E03ADD0A-1D87-4772-BE21-A5ED5FC96BE8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.162:*:*:*:*:*:*:*", "cpeNameId": "39EDA362-7B7A-4D97-B8FB-B7B9696B05E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.163:*:*:*:*:*:*:*", "cpeNameId": "6D54CD36-C5A1-437B-85B6-B59A45D1E007"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.164:*:*:*:*:*:*:*", "cpeNameId": "00F1FD43-244A-4CC2-B16C-BC98C99FBB27"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.165:*:*:*:*:*:*:*", "cpeNameId": "D34CA2D9-09FB-473B-9C0F-0C392B3132F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.166:*:*:*:*:*:*:*", "cpeNameId": "4AE874DA-0375-4E7E-84DC-BCAB385B5C30"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.167:*:*:*:*:*:*:*", "cpeNameId": "DD93F0EB-9B9D-4F5B-BDE0-F0F251381EB2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.168:*:*:*:*:*:*:*", "cpeNameId": "D28DA286-D5D2-40D2-82CA-FC8C79CC5F23"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.169:*:*:*:*:*:*:*", "cpeNameId": "8A84A955-ECC0-4B19-B09D-5BB422561099"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.170:*:*:*:*:*:*:*", "cpeNameId": "79343991-197E-4074-A17D-DA9A050EED4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.171:*:*:*:*:*:*:*", "cpeNameId": "BD8EBDB7-7226-4A65-8E8E-74D5A3F671B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.172:*:*:*:*:*:*:*", "cpeNameId": "0CA2E704-2400-4391-9D42-637DC8C25BED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.173:*:*:*:*:*:*:*", "cpeNameId": "8A6A2923-E6F6-4B77-9F0E-BA6FD58DE8D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.174:*:*:*:*:*:*:*", "cpeNameId": "18805724-EB20-4960-8D96-D7D17DDBDE30"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.175:*:*:*:*:*:*:*", "cpeNameId": "5BD11FEB-E163-4734-823A-A784C4C6FE9A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.176:*:*:*:*:*:*:*", "cpeNameId": "960EB99C-0D42-4892-9989-4473683490E4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.177:*:*:*:*:*:*:*", "cpeNameId": "5A04EB31-D67D-4DF0-81D6-D2EB42FCDCD2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.178:*:*:*:*:*:*:*", "cpeNameId": "B2F1908E-4EA9-490A-A154-8B4621189CAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.179:*:*:*:*:*:*:*", "cpeNameId": "66E97557-5D46-4DEB-B1DE-C668E5B8B3FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.180:*:*:*:*:*:*:*", "cpeNameId": "9979A105-8BA0-4AE2-BDFB-7D79DE2FBBFB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.181:*:*:*:*:*:*:*", "cpeNameId": "90E6E2D5-7A6D-4E95-9A52-FF7B9A8A2441"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.182:*:*:*:*:*:*:*", "cpeNameId": "69A2955B-EC3D-41AF-978F-CBFBC556F92D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.183:*:*:*:*:*:*:*", "cpeNameId": "D3F33DDF-A839-49B6-B3B8-EEACA952A9E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.184:*:*:*:*:*:*:*", "cpeNameId": "19F1F05C-A087-44E8-983E-2EB143DC1D8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.185:*:*:*:*:*:*:*", "cpeNameId": "F145BE0F-E7F0-442E-BDA7-C63C7E168E2B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.186:*:*:*:*:*:*:*", "cpeNameId": "B4D0C3FD-6476-413B-BF42-8C2641E289AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.187:*:*:*:*:*:*:*", "cpeNameId": "8D0F70F4-570E-4C9E-B51B-42BB544A72EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.188:*:*:*:*:*:*:*", "cpeNameId": "780D6AF4-4E15-4413-832E-0F50248A4B0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.189:*:*:*:*:*:*:*", "cpeNameId": "20F1C4AC-ECCF-4001-8CEA-457D8E6BDE3E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.190:*:*:*:*:*:*:*", "cpeNameId": "2CCC5886-AA10-470F-B2E9-B38438848CD2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.191:*:*:*:*:*:*:*", "cpeNameId": "0E0DFF46-8703-4A82-B4CB-DD923D09ACA8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.192:*:*:*:*:*:*:*", "cpeNameId": "3456DA2C-41BD-4021-B3F4-C0C7EFBA35B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.193:*:*:*:*:*:*:*", "cpeNameId": "44D8482E-577B-4B3E-A84D-A1FA11CE744D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.194:*:*:*:*:*:*:*", "cpeNameId": "278C5BBE-D4E2-43AC-B338-0B4C819B16FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.195:*:*:*:*:*:*:*", "cpeNameId": "30A50973-7C58-419D-8FED-111FD1615CD3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.196:*:*:*:*:*:*:*", "cpeNameId": "68839FE1-F3CD-49BF-902D-28A47A024FC8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.197:*:*:*:*:*:*:*", "cpeNameId": "8C685C52-5BE6-4D58-BBE3-AE69FF1B758C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.198:*:*:*:*:*:*:*", "cpeNameId": "2F461C57-E447-4647-BFFC-C44767B5CDEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.199:*:*:*:*:*:*:*", "cpeNameId": "65EF0724-0838-446F-85BC-A51CDD060978"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.200:*:*:*:*:*:*:*", "cpeNameId": "16752BB9-187D-48B0-8E87-D676FF91C631"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.201:*:*:*:*:*:*:*", "cpeNameId": "2BDCFC6A-E39A-4AD7-ABFA-5F15BDB22286"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.202:*:*:*:*:*:*:*", "cpeNameId": "CD1E47CB-CE3F-4154-8131-133CE38302D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.203:*:*:*:*:*:*:*", "cpeNameId": "73D48406-40CE-4D07-B08C-6C6ED58D13A3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.204:*:*:*:*:*:*:*", "cpeNameId": "6231157D-84BB-46D9-B0CF-AAF2FD31D3C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.205:*:*:*:*:*:*:*", "cpeNameId": "253E528A-1462-4B93-9978-C23C7DD14FF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.206:*:*:*:*:*:*:*", "cpeNameId": "2233D818-CCDB-4166-901F-29D032F730AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.207:*:*:*:*:*:*:*", "cpeNameId": "25D133DF-5D1B-46EA-9019-C81A1623C74D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.208:*:*:*:*:*:*:*", "cpeNameId": "1172736D-6A80-4AD1-B861-43797791A6F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.209:*:*:*:*:*:*:*", "cpeNameId": "FD71CF2C-F734-4E31-AAB7-41AC133EBFDA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.210:*:*:*:*:*:*:*", "cpeNameId": "2BA3CAE2-A53E-4516-9E32-DCF40D28A710"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.211:*:*:*:*:*:*:*", "cpeNameId": "50B9C1D0-7B42-43CC-9103-A96EA1B8D3B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.212:*:*:*:*:*:*:*", "cpeNameId": "D12B8C79-B286-47EA-86E0-4C415154600F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.213:*:*:*:*:*:*:*", "cpeNameId": "C90B250E-D388-459F-91FF-19CF7A6292AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.214:*:*:*:*:*:*:*", "cpeNameId": "EE578B4A-6420-46EA-8C33-994379131EB6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.215:*:*:*:*:*:*:*", "cpeNameId": "5581DCBE-D268-477A-AA1F-B4204F1CE309"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.216:*:*:*:*:*:*:*", "cpeNameId": "4633CDC1-D620-43BD-A59B-1CCE17C70740"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.217:*:*:*:*:*:*:*", "cpeNameId": "62DDB6C3-A7A1-466E-A101-6FE1AA552C94"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.218:*:*:*:*:*:*:*", "cpeNameId": "F6798282-7FF8-43E0-8B9D-1A9BDB0E3E48"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.219:*:*:*:*:*:*:*", "cpeNameId": "57D287C6-0EF3-4B47-A893-F3712CC12478"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.220:*:*:*:*:*:*:*", "cpeNameId": "A0B09A4E-2318-48CE-810F-84F2E721D722"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.221:*:*:*:*:*:*:*", "cpeNameId": "0F3D6297-A92E-479B-91F3-4162BFDC9184"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.222:*:*:*:*:*:*:*", "cpeNameId": "14FFED1D-629A-428E-A473-8327DB224D64"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.223:*:*:*:*:*:*:*", "cpeNameId": "9625BCC9-FBBE-42C7-82C2-F7D75F866E53"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.224:*:*:*:*:*:*:*", "cpeNameId": "D5BC9FF8-1337-4A3B-A66C-CC31C701B22C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.225:*:*:*:*:*:*:*", "cpeNameId": "2ED5BE75-F496-47BA-B521-36F6844FFE01"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.226:*:*:*:*:*:*:*", "cpeNameId": "02E6B2D5-DA63-4574-90D7-15F7EAA70DA1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.227:*:*:*:*:*:*:*", "cpeNameId": "EB84BCF0-8987-46AC-9E6F-D9E17DEFD1D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.228:*:*:*:*:*:*:*", "cpeNameId": "7ACE67A9-9EAD-4AB0-A99D-F37993392E37"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.229:*:*:*:*:*:*:*", "cpeNameId": "ED71AA15-673C-416E-9CAF-3440D41A1E22"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.230:*:*:*:*:*:*:*", "cpeNameId": "CB9E000D-CEAE-488E-B9F7-756EF13ECBE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.231:*:*:*:*:*:*:*", "cpeNameId": "F79CB637-6B2C-46DC-BD81-8B0583AAC33C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.232:*:*:*:*:*:*:*", "cpeNameId": "6CDDD19B-7E18-4A0E-AC09-B86E9401F516"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.233:*:*:*:*:*:*:*", "cpeNameId": "3EF64EBF-557B-4AB2-B2E5-0D03035197DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.234:*:*:*:*:*:*:*", "cpeNameId": "9E2D001E-2282-4A78-AB00-B37189C8CD59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.235:*:*:*:*:*:*:*", "cpeNameId": "31A795CF-5B8E-4B6C-94DC-3B37A8423823"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.236:*:*:*:*:*:*:*", "cpeNameId": "813866EF-11A3-41D9-9735-ECFEFCDBA1AD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.237:*:*:*:*:*:*:*", "cpeNameId": "C0F81506-A565-4F17-BEC9-1B54FAD059CC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.238:*:*:*:*:*:*:*", "cpeNameId": "1509FEA6-FA47-46C8-A117-8913CCFDB5AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.239:*:*:*:*:*:*:*", "cpeNameId": "C05A4F03-15E3-4C08-8958-6A057F7911B8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.240:*:*:*:*:*:*:*", "cpeNameId": "4EAF2417-3F1E-446A-AD33-77B21AE04E06"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.241:*:*:*:*:*:*:*", "cpeNameId": "8FFB9F0D-3B6F-494F-89AC-EAC4438C0B1C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.242:*:*:*:*:*:*:*", "cpeNameId": "A27EEF03-9001-4C7D-B063-C1FE8FC05EE0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.243:*:*:*:*:*:*:*", "cpeNameId": "529CAB2E-5F5C-4699-BC48-E93341EE6B67"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.244:*:*:*:*:*:*:*", "cpeNameId": "9FF0D590-EAB2-4B36-BBE2-008A4E800722"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.245:*:*:*:*:*:*:*", "cpeNameId": "590BFECB-A2B4-4C3F-9017-6D565899E1F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.246:*:*:*:*:*:*:*", "cpeNameId": "CB0BB20C-811F-4B9B-B827-3A42CA5539D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.247:*:*:*:*:*:*:*", "cpeNameId": "B532E91C-FEBE-4C29-B9C7-E899AF134D48"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.248:*:*:*:*:*:*:*", "cpeNameId": "8222442A-C4EC-45CD-9A4C-76E562756CBE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.249:*:*:*:*:*:*:*", "cpeNameId": "444D84A8-CE8F-4BE2-A463-B4E693104BA6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.250:*:*:*:*:*:*:*", "cpeNameId": "7243A073-0900-4470-98B8-FE5839442E3F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.251:*:*:*:*:*:*:*", "cpeNameId": "B4EAB6D9-28E2-45CD-BE10-5EF905373AF3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.252:*:*:*:*:*:*:*", "cpeNameId": "CF09CCB5-9276-41A3-8330-8037A633B793"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.253:*:*:*:*:*:*:*", "cpeNameId": "9BB592D7-81CC-4DE7-9256-FAE66467FFD7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.254:*:*:*:*:*:*:*", "cpeNameId": "C78BD176-2DFC-4BAE-95C1-3A495252A65A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.255:*:*:*:*:*:*:*", "cpeNameId": "2AF01112-197B-43DE-9BF8-940F1114DC73"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.256:*:*:*:*:*:*:*", "cpeNameId": "220C4EBF-9B86-4AB1-AD37-100994B4606D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.257:*:*:*:*:*:*:*", "cpeNameId": "34F7CCEF-8221-4005-A144-93D314E39C81"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.258:*:*:*:*:*:*:*", "cpeNameId": "19A0EB8D-1846-4C52-BEEA-F6CC1691C50C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.259:*:*:*:*:*:*:*", "cpeNameId": "B6F4132F-B9B0-4168-98D7-23FCCBDD4034"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.260:*:*:*:*:*:*:*", "cpeNameId": "E7F6FAE1-DF95-48E5-94D9-C505AF592766"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.261:*:*:*:*:*:*:*", "cpeNameId": "3BCD7AF9-57AB-41EC-99D4-59DD6DCA3703"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.262:*:*:*:*:*:*:*", "cpeNameId": "64A647E0-3291-4C17-9D9A-2BC6DDF24E90"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.263:*:*:*:*:*:*:*", "cpeNameId": "1BCAE71C-8745-49B7-BE6F-5CB2A8D517AF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.264:*:*:*:*:*:*:*", "cpeNameId": "7C4D53E7-3844-4706-815D-BD08282AF4B8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.265:*:*:*:*:*:*:*", "cpeNameId": "F18EF476-4996-436A-B878-1F7704C4BA6B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.266:*:*:*:*:*:*:*", "cpeNameId": "6318BBB0-A46C-48AE-9E42-7F578BCE43DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.267:*:*:*:*:*:*:*", "cpeNameId": "70B14EE0-CF5D-4C62-9890-766155C47DAE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.268:*:*:*:*:*:*:*", "cpeNameId": "ABF8E5BF-203F-406C-9375-6A59B113BBD9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.269:*:*:*:*:*:*:*", "cpeNameId": "B09A3D45-168E-4202-99BC-79DFB2B525C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.270:*:*:*:*:*:*:*", "cpeNameId": "145FF0A9-3D06-4565-8889-49C01832E864"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.271:*:*:*:*:*:*:*", "cpeNameId": "5433BF7F-2B40-4A88-BD8A-74EBE7EAE74C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.272:*:*:*:*:*:*:*", "cpeNameId": "28BF7326-B002-4098-96DB-D8FADE599CA5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.273:*:*:*:*:*:*:*", "cpeNameId": "94E36506-E573-4DEA-888B-744D1C8405D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.274:*:*:*:*:*:*:*", "cpeNameId": "2A72354A-578E-4F14-93EB-43F27D1576A9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.275:*:*:*:*:*:*:*", "cpeNameId": "426D0CBB-8FB3-41BC-A8A9-A736E70DAC53"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.276:*:*:*:*:*:*:*", "cpeNameId": "25BF6B74-B708-44E5-9B77-A5D761C23F46"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.277:*:*:*:*:*:*:*", "cpeNameId": "DAAAE94E-0CB1-45F6-B0C3-F635B18E632E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.278:*:*:*:*:*:*:*", "cpeNameId": "7B05EE50-A29E-4B6E-A5EE-9BCAA71189B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.279:*:*:*:*:*:*:*", "cpeNameId": "499DEB1C-5D4D-4BE5-8C11-6FD0625F2C36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.280:*:*:*:*:*:*:*", "cpeNameId": "82BC603A-39C9-4AF9-825C-D60073FD89E9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.281:*:*:*:*:*:*:*", "cpeNameId": "AA26E4CE-A2EC-4364-B383-EE0D9C01E0FF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.282:*:*:*:*:*:*:*", "cpeNameId": "A71BD6DD-9C99-4280-9CE6-2317277093B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.283:*:*:*:*:*:*:*", "cpeNameId": "96B8EF49-D308-498E-9453-CCDEDFD6F1CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.284:*:*:*:*:*:*:*", "cpeNameId": "635FD61D-F2A4-4489-AD75-12D1139945DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.285:*:*:*:*:*:*:*", "cpeNameId": "8211CA20-56DB-414D-A7EB-61321EA0634F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.286:*:*:*:*:*:*:*", "cpeNameId": "186F5E6F-D0A3-4136-9F39-956426280FC1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.287:*:*:*:*:*:*:*", "cpeNameId": "236744C4-C218-40C5-8C9E-9072697D85E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.288:*:*:*:*:*:*:*", "cpeNameId": "971D0042-FFBE-4691-ABAD-B3165231CA50"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.289:*:*:*:*:*:*:*", "cpeNameId": "6FAF8454-2869-4D87-979E-9A4D4DD049B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.290:*:*:*:*:*:*:*", "cpeNameId": "5EEE72A7-AE8B-416E-86F4-C879A022DD84"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.291:*:*:*:*:*:*:*", "cpeNameId": "178F9E75-B366-4C4F-9935-07403284159E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.292:*:*:*:*:*:*:*", "cpeNameId": "BFB882D2-DC9B-4211-9265-594F1FEE3D8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.293:*:*:*:*:*:*:*", "cpeNameId": "F181ED04-D2A3-4E9C-B80D-F57C0617297B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.294:*:*:*:*:*:*:*", "cpeNameId": "8AFA87B0-C839-4A7F-961B-ABE5CA349819"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.295:*:*:*:*:*:*:*", "cpeNameId": "9BFFCA5D-A751-449A-B8AB-2D26A90AFBE3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.296:*:*:*:*:*:*:*", "cpeNameId": "7247CC3C-3671-4C0D-AD87-559BEDAAEBC5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.297:*:*:*:*:*:*:*", "cpeNameId": "498B3288-2A00-4DB0-8426-A5FD866506EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.298:*:*:*:*:*:*:*", "cpeNameId": "D6251071-E7F2-4748-9DF7-27FCA27BD552"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.299:*:*:*:*:*:*:*", "cpeNameId": "03440F15-FEB8-42BC-BD63-6E954F0750DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.300:*:*:*:*:*:*:*", "cpeNameId": "E4568623-9282-496E-AA3F-E3E790BDFC1F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.301:*:*:*:*:*:*:*", "cpeNameId": "7CB5DA04-B4B0-4349-85B2-1342A953EED9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.302:*:*:*:*:*:*:*", "cpeNameId": "A3F297C6-A6AB-4C5F-9821-76E8E3411796"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.303:*:*:*:*:*:*:*", "cpeNameId": "8B892759-81F1-45AE-A7F5-2D0641A039E4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.304:*:*:*:*:*:*:*", "cpeNameId": "0936A133-FA0A-44C7-AE7F-5C4C1B16DDD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.305:*:*:*:*:*:*:*", "cpeNameId": "FC874434-AC4D-41A1-8B43-757808B2C957"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.306:*:*:*:*:*:*:*", "cpeNameId": "49CE5CB3-4BA8-41AF-B5EB-9C17E66E0423"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.307:*:*:*:*:*:*:*", "cpeNameId": "A8607B67-F6D3-4684-ADDC-CBACCC6DA92C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.308:*:*:*:*:*:*:*", "cpeNameId": "A4130D9C-E192-4437-A85F-6D04F21F2922"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.309:*:*:*:*:*:*:*", "cpeNameId": "B5E4DA49-77F3-4693-90B0-FC8C2C38F402"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.310:*:*:*:*:*:*:*", "cpeNameId": "2E6D4833-8E6A-45E4-A620-2BE985362CF2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.311:*:*:*:*:*:*:*", "cpeNameId": "79DA4B1F-6BE0-40B0-8496-6499C590D8F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.312:*:*:*:*:*:*:*", "cpeNameId": "0268D7D3-1545-4DC8-A418-AA77BC04C9E7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.313:*:*:*:*:*:*:*", "cpeNameId": "3B30BB14-4B29-4EC6-A810-DC776B5C6E34"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.314:*:*:*:*:*:*:*", "cpeNameId": "369CEBAF-43F1-4E56-B6B9-C0057CF18CB9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.315:*:*:*:*:*:*:*", "cpeNameId": "D1C8EC15-FFB1-440F-9EEA-2F306393A1EE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.316:*:*:*:*:*:*:*", "cpeNameId": "7D65AEC1-209F-4CE2-A5FA-4D3FB56FD265"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.317:*:*:*:*:*:*:*", "cpeNameId": "E9C2D84D-3412-4889-868B-AEA2AD1982C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.318:*:*:*:*:*:*:*", "cpeNameId": "BFC397A0-62B9-4BCF-8907-501A3CDF1CD6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.319:*:*:*:*:*:*:*", "cpeNameId": "ACE5B4F6-6FB3-41D2-AA6D-E2586039CC21"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.320:*:*:*:*:*:*:*", "cpeNameId": "3FDC48E9-0721-483D-A020-FEF09F03EA18"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.321:*:*:*:*:*:*:*", "cpeNameId": "8D6E7C06-CA6C-4909-90F2-2FC40A514CF9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.322:*:*:*:*:*:*:*", "cpeNameId": "D7FA71FA-20D6-4321-80E4-B25B40B76038"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.323:*:*:*:*:*:*:*", "cpeNameId": "B72EE284-1EC1-4237-813A-3E67D1F179F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.324:*:*:*:*:*:*:*", "cpeNameId": "43FA688C-7739-40FD-976B-5FACDDE03C7F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.325:*:*:*:*:*:*:*", "cpeNameId": "1EC6A2D9-C8EB-4DAE-8A58-A9B47A8DA4B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20:*:*:*:*:*:*:*", "cpeNameId": "8C67D194-B1D7-4051-AA33-92C51027DFD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20:-:*:*:*:*:*:*", "cpeNameId": "FD6751D9-F3BF-44A1-96E9-14200EFB10F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20:rc1:*:*:*:*:*:*", "cpeNameId": "2E165BBB-7ACE-4705-A561-4148FDEA5546"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20:rc2:*:*:*:*:*:*", "cpeNameId": "F1D314A9-1DF2-4F05-A2AC-A4E19C87344D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20:rc3:*:*:*:*:*:*", "cpeNameId": "62C17388-85F5-4B5C-8B00-C7E8FD35347D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20:rc4:*:*:*:*:*:*", "cpeNameId": "6CC936D0-B763-4020-BC02-D86893FAEDA5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20:rc5:*:*:*:*:*:*", "cpeNameId": "5502C362-1E75-45CF-A175-41ADAD728EC1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.1:*:*:*:*:*:*:*", "cpeNameId": "30D0FBCC-5241-4766-BF83-F895B210AEFF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.2:*:*:*:*:*:*:*", "cpeNameId": "19FD564F-6544-473E-AE92-E9F3A34A3915"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.3:*:*:*:*:*:*:*", "cpeNameId": "440CABC7-91B1-45F6-A7D0-7D651E83E4C4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.4:*:*:*:*:*:*:*", "cpeNameId": "687316F0-7676-4930-B35C-65F5785ACDB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.5:*:*:*:*:*:*:*", "cpeNameId": "08A1755A-6A9C-46E0-AF0D-114FBF5AD672"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.6:*:*:*:*:*:*:*", "cpeNameId": "E20224EA-90C0-488A-A112-50B24770FB18"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.7:*:*:*:*:*:*:*", "cpeNameId": "C7DC8B10-AA07-4A31-B69D-1F80B66B87A5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.8:*:*:*:*:*:*:*", "cpeNameId": "8308368B-FBD0-47FF-BBB5-31B3F2137230"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.9:*:*:*:*:*:*:*", "cpeNameId": "C6D9451D-8272-441F-BE73-D603AD128A54"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.10:*:*:*:*:*:*:*", "cpeNameId": "1A7CEC42-FD0B-42FC-8535-425F343C800B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.11:*:*:*:*:*:*:*", "cpeNameId": "24C953F7-E916-4832-8B61-7E38B4DC8D3E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.12:*:*:*:*:*:*:*", "cpeNameId": "5C414ABD-B2DB-462C-8158-C8BBD94F140B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.13:*:*:*:*:*:*:*", "cpeNameId": "585B3F97-9003-4712-BA9E-79321E91B741"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.14:*:*:*:*:*:*:*", "cpeNameId": "53CB87AA-41C1-46DC-9856-CA45D75B0014"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.15:*:*:*:*:*:*:*", "cpeNameId": "A15CF5B3-5D88-4D8E-AD1F-7713BEB5C30F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.16:*:*:*:*:*:*:*", "cpeNameId": "C046C34D-86F8-4C72-9ADC-FA20CEE3F445"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.17:*:*:*:*:*:*:*", "cpeNameId": "4F253460-0D25-4B15-BEFB-2C9D38696714"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:*:*:*:*:*:*:*", "cpeNameId": "F1A9DC6E-F2B2-49B8-967F-B40F23FAFB7E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:-:*:*:*:*:*:*", "cpeNameId": "68861FE5-8011-45EC-81E6-CAD841D55D3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:rc1:*:*:*:*:*:*", "cpeNameId": "C4BD32F7-499E-4227-AF6D-59072E60F157"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:rc2:*:*:*:*:*:*", "cpeNameId": "DD1A0E3E-284D-4F8D-BF08-4AE49A833CC9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:rc3:*:*:*:*:*:*", "cpeNameId": "2445098F-589D-4D79-8677-4B95F63C151A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:rc4:*:*:*:*:*:*", "cpeNameId": "2D923219-DCF7-4DC8-AE44-20988AA062A0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:rc5:*:*:*:*:*:*", "cpeNameId": "02886709-FD0A-4947-8146-A318E301776F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:rc6:*:*:*:*:*:*", "cpeNameId": "03288CF7-0A3E-48CB-BBA7-F9EE8ABBC436"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:rc7:*:*:*:*:*:*", "cpeNameId": "7FDFAB88-77F1-48D7-ADBF-0E44ECE86EBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.1:*:*:*:*:*:*:*", "cpeNameId": "D72D410B-8C2E-4851-99A3-F77FBECB7192"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.2:*:*:*:*:*:*:*", "cpeNameId": "985EBB6A-4987-4667-B8DE-311EBD874180"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.3:*:*:*:*:*:*:*", "cpeNameId": "DC64E4B7-3DB1-4E70-8BCC-CDECB8D31362"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.4:*:*:*:*:*:*:*", "cpeNameId": "B277C12A-C8A3-4E99-B157-821EF02AAD43"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.5:*:*:*:*:*:*:*", "cpeNameId": "D7759414-6475-4870-B8D1-EC7CC9251787"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.6:*:*:*:*:*:*:*", "cpeNameId": "4FD20397-5105-42E9-A718-85812EC83A0C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.7:*:*:*:*:*:*:*", "cpeNameId": "3E7A5DCA-0363-44FE-B21B-17BD8D97542B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.8:*:*:*:*:*:*:*", "cpeNameId": "FD8EA77C-B293-4769-962F-F04BF5671CE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.9:*:*:*:*:*:*:*", "cpeNameId": "50FF6FD7-302E-4015-82D5-647A4C6330EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.10:*:*:*:*:*:*:*", "cpeNameId": "AF3FD6C7-DA7B-4070-92DE-6B670AD96588"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.11:*:*:*:*:*:*:*", "cpeNameId": "BDB9CFFC-3980-48D5-94A2-7B8BB9141797"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.12:*:*:*:*:*:*:*", "cpeNameId": "479AF2D1-C2BD-4C9A-A595-737A34153CA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.13:*:*:*:*:*:*:*", "cpeNameId": "567ACE3B-A900-44C1-8E1A-CED4090B1BE8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.14:*:*:*:*:*:*:*", "cpeNameId": "F3477A97-8034-4BB5-9E2D-1401A7346F7A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.15:*:*:*:*:*:*:*", "cpeNameId": "06CFCE19-7968-4803-BB10-B0FC75D8CD98"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.16:*:*:*:*:*:*:*", "cpeNameId": "75E407ED-7B92-420D-81F5-62766D1CB144"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.17:*:*:*:*:*:*:*", "cpeNameId": "F5B8EAB8-B0FA-4766-9008-A04B31F2A44B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.18:*:*:*:*:*:*:*", "cpeNameId": "E04C3C10-48FE-466C-A251-7862AF2EAE03"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.19:*:*:*:*:*:*:*", "cpeNameId": "2F0ADCFD-FCE8-4617-BEB1-7FA793BC11E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.20:*:*:*:*:*:*:*", "cpeNameId": "BDDC588A-C797-45AC-A0BB-DAD27E22B169"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.21:*:*:*:*:*:*:*", "cpeNameId": "ADFBAC21-4341-4D67-BA2C-832D6C60DAE0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:*:*:*:*:*:*:*", "cpeNameId": "54A3A8C8-F682-431C-B4CD-1F0A788869DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:-:*:*:*:*:*:*", "cpeNameId": "67CBC5E4-B5FE-477E-A138-EDED2966BE18"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:rc1:*:*:*:*:*:*", "cpeNameId": "F39A244D-E0F0-4DCC-AD7F-E15708AB2EC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:rc2:*:*:*:*:*:*", "cpeNameId": "77CA693C-812E-4A6E-A089-665FDADA5C0A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:rc3:*:*:*:*:*:*", "cpeNameId": "DFDA10B2-0129-4B2C-A521-15357B8A1915"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:rc4:*:*:*:*:*:*", "cpeNameId": "757115D8-A302-4C43-8E3D-147732BC8D76"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:rc5:*:*:*:*:*:*", "cpeNameId": "D945FFB9-09EC-432E-8ADC-8DD7BF1425D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:rc6:*:*:*:*:*:*", "cpeNameId": "D49F9C63-A58E-4B0D-BEF2-747DC11400DE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:rc7:*:*:*:*:*:*", "cpeNameId": "41B60E1E-725B-49BB-BAD2-49F4782B541B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.1:*:*:*:*:*:*:*", "cpeNameId": "9208299B-C868-470C-AB8C-3A30CC019E6E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.2:*:*:*:*:*:*:*", "cpeNameId": "2D16B549-05AC-4BA5-82C1-4427346FCCF4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.3:*:*:*:*:*:*:*", "cpeNameId": "5431B6CE-299C-491D-92AD-1A8D9072719B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.4:*:*:*:*:*:*:*", "cpeNameId": "F26D0108-392B-453D-9A12-FCF4079344BE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.5:*:*:*:*:*:*:*", "cpeNameId": "F897824B-28D1-4016-9917-A2A1797B62D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.6:*:*:*:*:*:*:*", "cpeNameId": "C9CA624B-39C9-4830-B160-05E7FCF09D31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.7:*:*:*:*:*:*:*", "cpeNameId": "994E581F-695C-4184-8A34-1E9FE8B84F93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.8:*:*:*:*:*:*:*", "cpeNameId": "D33D7A54-7ACE-438C-9ECC-1E06D0C93588"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.9:*:*:*:*:*:*:*", "cpeNameId": "48DFF9BD-88B8-48DB-950E-281038152F6F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.10:*:*:*:*:*:*:*", "cpeNameId": "12542ACC-E1CB-47D7-AFC8-0B24BB2F7DA4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.11:*:*:*:*:*:*:*", "cpeNameId": "CDDEA9C3-FB0A-4C54-AF83-BBE40DFE29A3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.12:*:*:*:*:*:*:*", "cpeNameId": "E4ACF724-E5E7-4B3E-9457-E52CF676CBB5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.13:*:*:*:*:*:*:*", "cpeNameId": "DB88B940-85D4-4644-8772-90F42B7DC544"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.14:*:*:*:*:*:*:*", "cpeNameId": "F60C9252-9886-478D-9343-2232B706DA06"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.15:*:*:*:*:*:*:*", "cpeNameId": "6868170C-EE5E-4A7F-A201-B854E66C0240"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.16:*:*:*:*:*:*:*", "cpeNameId": "42B36DEC-CDB3-4CA4-9DB4-24F1A6FD275E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.17:*:*:*:*:*:*:*", "cpeNameId": "878CFEA9-CB28-4BFA-8360-D439385AD5BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.18:*:*:*:*:*:*:*", "cpeNameId": "64D36E7C-F03D-4C82-A5FA-2884D5544CAC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.19:*:*:*:*:*:*:*", "cpeNameId": "30EEE361-F28F-4B03-ADEE-CF34BB6BE917"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.20:*:*:*:*:*:*:*", "cpeNameId": "C4D5E875-B03B-40D6-88EA-0F26A8C86E29"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.21:*:*:*:*:*:*:*", "cpeNameId": "E5EE3A38-80F6-4427-ADDD-DE8598A449C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2:*:*:*:*:*:*:*", "cpeNameId": "708DF5F1-3FC2-4692-8628-23A2BCD56CDC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2:-:*:*:*:*:*:*", "cpeNameId": "4A9A1D62-6315-4B91-BEC9-AF9EF6F6FDAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2:rc1:*:*:*:*:*:*", "cpeNameId": "84163FF3-5555-41C3-B321-35C2D89A6854"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2:rc2:*:*:*:*:*:*", "cpeNameId": "F7A55C0A-44F2-4CD3-8A0F-9CFECF21F0D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2:rc3:*:*:*:*:*:*", "cpeNameId": "A5798A8D-D141-4085-B19B-9D32403E837C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2:rc4:*:*:*:*:*:*", "cpeNameId": "6AD74851-D9E8-4C2D-9E0E-176FF60A600D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.1:*:*:*:*:*:*:*", "cpeNameId": "7E156392-773D-4495-A4CE-F5D843C5FEBF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.2:*:*:*:*:*:*:*", "cpeNameId": "A11D4292-91CC-4F12-AF01-769D20986BC1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.3:*:*:*:*:*:*:*", "cpeNameId": "DF31FE84-23CC-48CD-BACC-C2F5879023E9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.4:*:*:*:*:*:*:*", "cpeNameId": "CDF894F7-EB7A-4A0E-AC8F-F87B6AFE4311"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.5:*:*:*:*:*:*:*", "cpeNameId": "992ABD6A-693C-4DB3-B023-B37D66796BD0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.6:*:*:*:*:*:*:*", "cpeNameId": "D8674307-6283-4A09-BF4E-3FACDF808289"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.7:*:*:*:*:*:*:*", "cpeNameId": "12B6C6F1-32F2-4C0F-82EA-492CBC7185D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.8:*:*:*:*:*:*:*", "cpeNameId": "0541FF1A-3588-4B1B-971D-7EBAEBD703EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.9:*:*:*:*:*:*:*", "cpeNameId": "E3FD35AB-B680-4EED-BCAB-106AAC3E9E46"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.10:*:*:*:*:*:*:*", "cpeNameId": "0A60430B-1D1E-43B4-BEEA-190D558DD6E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.11:*:*:*:*:*:*:*", "cpeNameId": "E35007C9-A8F4-4E0B-B996-627F9F3CA3A9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.12:*:*:*:*:*:*:*", "cpeNameId": "EF4B624E-6F70-4C9B-A9DE-2C711C45053A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.13:*:*:*:*:*:*:*", "cpeNameId": "48762B71-2980-485A-843C-0566FDA8F7AD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.14:*:*:*:*:*:*:*", "cpeNameId": "25A6C343-6D24-43CB-966C-DD6A57DB8AD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.15:*:*:*:*:*:*:*", "cpeNameId": "A6E25845-65F8-4B58-8B1F-645850B981D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.16:*:*:*:*:*:*:*", "cpeNameId": "FD154B36-EEE2-45F4-B035-738854DB8463"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.17:*:*:*:*:*:*:*", "cpeNameId": "BD8F511F-9901-411A-A340-71B7A714411E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.18:*:*:*:*:*:*:*", "cpeNameId": "747B8381-BCB7-48A7-99E3-3660A9FBF3F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.19:*:*:*:*:*:*:*", "cpeNameId": "035E9DE8-63BA-4EC7-8425-1EE27BA8CE55"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.20:*:*:*:*:*:*:*", "cpeNameId": "1E4CDC34-80B7-4F05-BB90-6C2714A0FA8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.21:*:*:*:*:*:*:*", "cpeNameId": "68BFF46E-9B1A-4A4C-B03C-587844610AFB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3:*:*:*:*:*:*:*", "cpeNameId": "21F5CD7B-AC95-4D78-9757-99093ED2094B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3:-:*:*:*:*:*:*", "cpeNameId": "961A0592-0690-4383-AA0C-FF52F896EA74"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3:rc1:*:*:*:*:*:*", "cpeNameId": "C67AB208-B2AD-4B21-BB6B-C839E0874C9B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.1:*:*:*:*:*:*:*", "cpeNameId": "81E3B88A-DC72-457D-BCCE-F773A198FFFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.2:*:*:*:*:*:*:*", "cpeNameId": "E64FB740-133B-4AAA-A2DC-2198C0F58D1B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.3:*:*:*:*:*:*:*", "cpeNameId": "D5F4E9B2-BB7B-425C-80D9-06AFBED0D808"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.4:*:*:*:*:*:*:*", "cpeNameId": "49D5583E-E8A9-4897-A2C6-AE3481D580DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.5:*:*:*:*:*:*:*", "cpeNameId": "25187C15-1C36-41FB-A90F-2385F6A9C349"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.6:*:*:*:*:*:*:*", "cpeNameId": "8409B0CA-6F72-4643-8146-ABEF90EE2DB3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.7:*:*:*:*:*:*:*", "cpeNameId": "17F798CD-1EC1-40BC-B535-9A41768D5BA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.8:*:*:*:*:*:*:*", "cpeNameId": "9025DD8F-91D2-404E-969C-2BEF62B5FF8F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.9:*:*:*:*:*:*:*", "cpeNameId": "E66D9744-32E2-4BF8-84B0-8E0A85F62F53"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.10:*:*:*:*:*:*:*", "cpeNameId": "EA942BE3-366A-463B-8C3C-A4C36C894385"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.11:*:*:*:*:*:*:*", "cpeNameId": "69C576AC-72FD-4696-9426-3E2D8F97B7AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.12:*:*:*:*:*:*:*", "cpeNameId": "F20292FB-DDAA-4331-8CCC-E0339B6E309F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.13:*:*:*:*:*:*:*", "cpeNameId": "CF1EC873-6878-4EF3-B478-3A435984B295"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.14:*:*:*:*:*:*:*", "cpeNameId": "76ECB189-F757-45C4-AB63-BC7499A4E9D6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.15:*:*:*:*:*:*:*", "cpeNameId": "37721982-4E3D-40B1-AC6A-DBDA2DD9E489"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.16:*:*:*:*:*:*:*", "cpeNameId": "06812A7C-411D-4A39-9158-D4B8B43A8D7B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.17:*:*:*:*:*:*:*", "cpeNameId": "E8C9CCC6-3D5B-43E5-BE69-3BF8A3DFDE96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.18:*:*:*:*:*:*:*", "cpeNameId": "37BCD5D2-D0A2-44E6-8375-F98117F02B9B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:*:*:*:*:*:*:*", "cpeNameId": "30F8A912-AEBA-4E8E-A946-D5FF48283C90"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:-:*:*:*:*:*:*", "cpeNameId": "38597FA2-E6FA-4060-A67D-C2441E02BC11"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:rc1:*:*:*:*:*:*", "cpeNameId": "0381F214-3BC5-4D07-A22F-18E0C97C33D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:rc2:*:*:*:*:*:*", "cpeNameId": "7058D69E-78BC-4917-A2ED-2D9A20503F8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:rc3:*:*:*:*:*:*", "cpeNameId": "A581FE35-F56F-44A9-B6AD-3900F6C4E830"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:rc4:*:*:*:*:*:*", "cpeNameId": "09E1C6F8-674B-4766-9267-69F9D2584B2B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:rc5:*:*:*:*:*:*", "cpeNameId": "D8331CE4-CE6E-45D2-9267-688218C5FA66"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:rc6:*:*:*:*:*:*", "cpeNameId": "E25FA831-4D9A-43A0-8520-18B2B425CC89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:rc7:*:*:*:*:*:*", "cpeNameId": "B36308F6-FE14-40AE-836F-ADE4A02943B1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.0:rc1:*:*:*:*:*:*", "cpeNameId": "1AD9C3F6-3A0B-4AA0-8B15-3E5F14BF88CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.0:rc2:*:*:*:*:*:*", "cpeNameId": "02FEACE2-E424-4F2E-938B-464CBB64228B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.0:rc6:*:*:*:*:*:*", "cpeNameId": "9E511445-4E4D-44ED-A39F-BF79061A44B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.1:*:*:*:*:*:*:*", "cpeNameId": "1C281E83-7893-4458-9E7C-BC2E857281DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.2:*:*:*:*:*:*:*", "cpeNameId": "A3D762F0-7229-48BE-A593-90AF341A2B12"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.3:*:*:*:*:*:*:*", "cpeNameId": "FB304A30-43E2-4CB7-BDF6-D02968DE2769"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.4:*:*:*:*:*:*:*", "cpeNameId": "283FA41E-5A43-4BFF-B51A-D1FB18F8DE7D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.5:*:*:*:*:*:*:*", "cpeNameId": "02511C03-2EB5-4DDD-B4D5-F46566461307"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.6:*:*:*:*:*:*:*", "cpeNameId": "EE95F16F-BFE6-4880-80BE-0F30ED1E944A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.7:*:*:*:*:*:*:*", "cpeNameId": "FAEE1F59-C796-4E59-B6FB-5D16B39695BA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.8:*:*:*:*:*:*:*", "cpeNameId": "3D6FE7E7-6008-4B70-9614-B6F2C599131E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.9:*:*:*:*:*:*:*", "cpeNameId": "99B2EAA8-667C-487F-B0BF-3710995B951E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.10:*:*:*:*:*:*:*", "cpeNameId": "6FDA9090-C62C-4030-BB12-A0112FDCBF5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.11:*:*:*:*:*:*:*", "cpeNameId": "91DB3188-8E8C-4940-82C3-530F1FCF342A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.12:*:*:*:*:*:*:*", "cpeNameId": "4227319D-32DC-46E1-BB7E-9457C1F4F2C2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.13:*:*:*:*:*:*:*", "cpeNameId": "9E0E22BD-ED8B-4F4F-A0F1-402B94D84DD3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.14:*:*:*:*:*:*:*", "cpeNameId": "501029E0-B4D2-4145-8B1D-D1101340CBF1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.15:*:*:*:*:*:*:*", "cpeNameId": "7C3BE561-3C2B-4784-ACAE-960E3788F8A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.16:*:*:*:*:*:*:*", "cpeNameId": "01AC5F1D-CFD1-4B99-B90D-3A7F9E7C4F83"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.17:*:*:*:*:*:*:*", "cpeNameId": "3DAB053F-F9CF-47D5-BE1B-7C31F90B290F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.18:*:*:*:*:*:*:*", "cpeNameId": "73C26194-FDEA-45E7-80A8-65515A3AAF8F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.19:*:*:*:*:*:*:*", "cpeNameId": "7FC45267-94B3-49F5-B69F-5AE3AB28E1A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.20:*:*:*:*:*:*:*", "cpeNameId": "5ACE9C2C-D667-4936-BB37-72D8117CCBEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.21:*:*:*:*:*:*:*", "cpeNameId": "4CE3E880-139D-4507-BCFE-1624D74B0C80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.22:*:*:*:*:*:*:*", "cpeNameId": "DAC48916-1563-4077-A414-ADB689B1FDBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.23:*:*:*:*:*:*:*", "cpeNameId": "F322D1AA-8286-430D-B02A-5BDDB8C1122A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.24:*:*:*:*:*:*:*", "cpeNameId": "63EA159A-C722-4C17-A32E-20026026B727"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.25:*:*:*:*:*:*:*", "cpeNameId": "DF965E16-45D2-4E37-A24E-D362554D1F8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.26:*:*:*:*:*:*:*", "cpeNameId": "1066FD9A-2313-40A4-A0B2-9C0263C26982"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.27:*:*:*:*:*:*:*", "cpeNameId": "6EC9BCEC-2231-455C-B28D-0DF13CB13479"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.28:*:*:*:*:*:*:*", "cpeNameId": "64D65D7E-E68D-49A1-AA45-CEFE1DBC20D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.29:*:*:*:*:*:*:*", "cpeNameId": "1ADDA3E8-2C58-47CD-A70D-DA04F3A431F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.30:*:*:*:*:*:*:*", "cpeNameId": "EF04CFE2-5DF9-4DE0-8E8F-FB4786456345"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.31:*:*:*:*:*:*:*", "cpeNameId": "8000B946-CAAE-4883-9745-A61904A0247A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.32:*:*:*:*:*:*:*", "cpeNameId": "770B138D-EB04-4F3A-8FA6-3637A3683AEF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.33:*:*:*:*:*:*:*", "cpeNameId": "0B322150-1C25-4F57-844C-BF85420500E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.34:*:*:*:*:*:*:*", "cpeNameId": "DD3EDA18-4BBD-4AD7-9661-5D47B62F591E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.35:*:*:*:*:*:*:*", "cpeNameId": "9C73DBB9-FC61-4E93-B2B0-955791097636"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.36:*:*:*:*:*:*:*", "cpeNameId": "0289901E-E986-443D-A30B-ED22F06A7638"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.37:*:*:*:*:*:*:*", "cpeNameId": "4F5E4958-95CD-4C22-BD8B-3794C74CCD47"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.38:*:*:*:*:*:*:*", "cpeNameId": "EB2A8683-5741-4161-8109-B7788AD97247"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.39:*:*:*:*:*:*:*", "cpeNameId": "8EF7B26D-4943-4DCC-9D59-0AADBEDDAED8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.40:*:*:*:*:*:*:*", "cpeNameId": "E32CC068-8B1A-45C4-8AB0-278C5A74B61C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.41:*:*:*:*:*:*:*", "cpeNameId": "6916813D-E2BF-4D74-BE79-EACD1ED1AFAC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.42:*:*:*:*:*:*:*", "cpeNameId": "9CA95178-D4D4-44FD-AC62-CA6CC68A8D65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.43:*:*:*:*:*:*:*", "cpeNameId": "F95E6F47-0F75-41A3-B478-1F34A602D7EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.44:*:*:*:*:*:*:*", "cpeNameId": "09B818EE-5D8B-4728-8FBA-4C46A9233AEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.45:*:*:*:*:*:*:*", "cpeNameId": "C340CD96-6163-499E-960C-F8C77A190CA7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.46:*:*:*:*:*:*:*", "cpeNameId": "D56E537C-FBC5-4C9C-ACEB-0265AB8DA1BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.47:*:*:*:*:*:*:*", "cpeNameId": "4F62EACD-F957-4121-A129-5514BED8A209"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.48:*:*:*:*:*:*:*", "cpeNameId": "8A9A30F9-762F-496F-B154-FAA7F5B35201"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.49:*:*:*:*:*:*:*", "cpeNameId": "588B838C-6578-4616-850F-59E58692EB1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.50:*:*:*:*:*:*:*", "cpeNameId": "88925256-EBA9-4999-B534-02A3F1514E8B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.51:*:*:*:*:*:*:*", "cpeNameId": "CB3ED166-B1C8-458D-8D95-8D03C00A669E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.52:*:*:*:*:*:*:*", "cpeNameId": "5C242B7B-208A-43C7-BA04-79E1F6E1C5FF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.53:*:*:*:*:*:*:*", "cpeNameId": "D9F0FC36-D6FA-408D-8921-009B98466D10"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.54:*:*:*:*:*:*:*", "cpeNameId": "496B7A05-51DC-43DC-890F-86578ED35874"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.55:*:*:*:*:*:*:*", "cpeNameId": "D015DA7D-CDFF-4FC4-924C-541E663FCC4E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.56:*:*:*:*:*:*:*", "cpeNameId": "B853157A-8731-436A-979A-BA2871A3CF9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.57:*:*:*:*:*:*:*", "cpeNameId": "FF8B97BB-61A3-4CAB-BE7B-A6EA63D575F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.58:*:*:*:*:*:*:*", "cpeNameId": "58F8F42F-DE39-4963-BBCD-2AF4B13B8152"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.59:*:*:*:*:*:*:*", "cpeNameId": "D20CCD61-4FC1-4E23-A134-0B93A8099C3C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.60:*:*:*:*:*:*:*", "cpeNameId": "C66ED101-4E13-4838-901E-A73F76499BBD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.61:*:*:*:*:*:*:*", "cpeNameId": "F4125335-934B-4535-9983-3E2BA61E96F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.62:*:*:*:*:*:*:*", "cpeNameId": "A583E905-8A22-42B5-9D96-B51FFD0614FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.63:*:*:*:*:*:*:*", "cpeNameId": "6D54EE82-FEC8-449B-B648-C736D4E26388"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.64:*:*:*:*:*:*:*", "cpeNameId": "AD9F8955-6D21-4FE1-B814-B7B5B6E51C1D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.65:*:*:*:*:*:*:*", "cpeNameId": "AA1F4832-E754-48FF-90A7-C83B71865F79"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.66:*:*:*:*:*:*:*", "cpeNameId": "7FA63DB7-AF4D-4ADA-AA62-E7E780629C01"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.67:*:*:*:*:*:*:*", "cpeNameId": "68125684-9408-4FF0-9691-78CE2C43472D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.68:*:*:*:*:*:*:*", "cpeNameId": "887CCD5A-CC1E-4F61-9A22-33CD3DB9590E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.69:*:*:*:*:*:*:*", "cpeNameId": "79E482C6-C081-4307-920F-E0C4DA650C4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.70:*:*:*:*:*:*:*", "cpeNameId": "BDBD2808-2754-4C34-81D4-C944911306CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.71:*:*:*:*:*:*:*", "cpeNameId": "33A308BB-8E22-4AD8-BDA8-3711554B706D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.72:*:*:*:*:*:*:*", "cpeNameId": "DD3870C8-2652-4D75-AAE0-3CEF3CF665D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.73:*:*:*:*:*:*:*", "cpeNameId": "44142F88-98AA-4496-B640-6FA14C77CEC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.74:*:*:*:*:*:*:*", "cpeNameId": "AF5903C8-5637-45BD-9A92-AEAFA81D93BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.75:*:*:*:*:*:*:*", "cpeNameId": "DACFFC27-6EB1-4433-B9F3-E58F2C6FB2B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.76:*:*:*:*:*:*:*", "cpeNameId": "55971333-67C2-40F0-AA0C-3382C5622911"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.77:*:*:*:*:*:*:*", "cpeNameId": "3BEED01C-4CCB-4958-8E29-DCC951578EF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.78:*:*:*:*:*:*:*", "cpeNameId": "4F171F41-EFAC-4188-B720-4C6840AF4261"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.79:*:*:*:*:*:*:*", "cpeNameId": "284FEF7C-A0D0-4494-8F98-9129D6A58041"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.80:*:*:*:*:*:*:*", "cpeNameId": "DD648053-6D4E-41CB-9113-66151119FDA0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.81:*:*:*:*:*:*:*", "cpeNameId": "82E37ED2-64A7-4300-BF90-20AF181B6F97"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.82:*:*:*:*:*:*:*", "cpeNameId": "AF69E066-55C4-4A86-B15F-BA9549CEB5AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.83:*:*:*:*:*:*:*", "cpeNameId": "D1721424-8F46-4939-A665-4621D22D7279"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.84:*:*:*:*:*:*:*", "cpeNameId": "E27F0C29-711F-4838-8481-F932273C9034"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.85:*:*:*:*:*:*:*", "cpeNameId": "087A9FF9-13D3-4192-A81A-FD3D742FAAEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.86:*:*:*:*:*:*:*", "cpeNameId": "24FE8157-16DC-4670-81B5-B35131D0D3E3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.87:*:*:*:*:*:*:*", "cpeNameId": "FEA33B3F-6CB7-4138-A92A-AD3C8258FC74"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.88:*:*:*:*:*:*:*", "cpeNameId": "6D4674AC-D1BA-41F6-B9B7-E276352BEDA6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.89:*:*:*:*:*:*:*", "cpeNameId": "D416D23A-A4AE-4C6A-926A-202ED3167667"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.90:*:*:*:*:*:*:*", "cpeNameId": "5CE1A537-5A52-474B-AAF0-E0A7D2952B45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.91:*:*:*:*:*:*:*", "cpeNameId": "F5999482-9471-4351-B0B3-0DB7907B9CED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.92:*:*:*:*:*:*:*", "cpeNameId": "C97C06E4-2C93-436C-ABA6-15AA6599A35A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.93:*:*:*:*:*:*:*", "cpeNameId": "1031888B-A914-4DC7-A6E9-392CCC45A76E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.94:*:*:*:*:*:*:*", "cpeNameId": "404206E9-E734-42FC-900E-BD6E0A8A4461"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.95:*:*:*:*:*:*:*", "cpeNameId": "511842CB-909F-4861-8D7C-28B54497BF86"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.96:*:*:*:*:*:*:*", "cpeNameId": "A9657041-BEE6-4EE8-94AD-4447DDE7D048"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.97:*:*:*:*:*:*:*", "cpeNameId": "0A9E3B65-5FB8-4A6A-A2D8-CA2453AF07EC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.98:*:*:*:*:*:*:*", "cpeNameId": "22048CDC-DCAC-4609-95F0-929AEE830465"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.99:*:*:*:*:*:*:*", "cpeNameId": "627DBE54-010D-4F1C-9001-CC5E02BF3050"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.100:*:*:*:*:*:*:*", "cpeNameId": "938FECE2-6792-451E-8311-7E3E38A036FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.101:*:*:*:*:*:*:*", "cpeNameId": "5432BFDA-778D-4E2E-A1D3-CBED78826AD4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.102:*:*:*:*:*:*:*", "cpeNameId": "3AA63EBE-68D6-44E3-BAF2-581B3E42DA43"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.103:*:*:*:*:*:*:*", "cpeNameId": "82A4E722-C3C7-437B-97C7-010E4E7FB1F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.104:*:*:*:*:*:*:*", "cpeNameId": "FEF2BA89-9777-4690-A1E0-5A9539F19063"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.105:*:*:*:*:*:*:*", "cpeNameId": "0FEBCB84-25C5-4B8F-84AD-2840655A9CB7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.106:*:*:*:*:*:*:*", "cpeNameId": "CA4865C8-CD0B-4624-B878-C160F5793EBF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.107:*:*:*:*:*:*:*", "cpeNameId": "8CD6838F-3F26-49B5-9826-3481D09DD0FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.108:*:*:*:*:*:*:*", "cpeNameId": "F925DF95-F46A-41A4-A0D4-FF783FAAF1AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.109:*:*:*:*:*:*:*", "cpeNameId": "2CEDA5AF-C713-4643-B009-513BA2E3C74D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.110:*:*:*:*:*:*:*", "cpeNameId": "A53BF0C3-2C50-4301-8616-02277328F4BF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.111:*:*:*:*:*:*:*", "cpeNameId": "CC8637E1-FDE1-40A6-BE9A-64596A91042E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.112:*:*:*:*:*:*:*", "cpeNameId": "A29F5C22-296D-438A-A22F-7F59BD3C77A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.113:*:*:*:*:*:*:*", "cpeNameId": "42237EE2-4AF1-49D8-8C47-53936F3F6D15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.114:*:*:*:*:*:*:*", "cpeNameId": "DF5875E7-C829-41E7-B637-7C7FD45469B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.115:*:*:*:*:*:*:*", "cpeNameId": "9EEEB133-6D86-45B8-8F2E-4CD7E1677D4D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.116:*:*:*:*:*:*:*", "cpeNameId": "EFB125EB-E097-459C-BB6C-8CA683495E49"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.117:*:*:*:*:*:*:*", "cpeNameId": "8AB69237-A001-4D78-B1DC-05E19113CAEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.118:*:*:*:*:*:*:*", "cpeNameId": "F529F470-E283-4E30-A94D-9155B2F4D0E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.119:*:*:*:*:*:*:*", "cpeNameId": "E393B29E-8B63-4003-9C92-11923EDDF4FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.120:*:*:*:*:*:*:*", "cpeNameId": "9142B8C8-A1A2-4597-9736-08F85EA6DF0A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.121:*:*:*:*:*:*:*", "cpeNameId": "6ED37745-F2C8-4CAB-B848-E3F1D5B92D5A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.122:*:*:*:*:*:*:*", "cpeNameId": "73345EA5-BC19-481D-9E8D-BC43F1B2A009"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.123:*:*:*:*:*:*:*", "cpeNameId": "D1B464F3-C13B-4562-9A1D-9A52A83F8CE4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.124:*:*:*:*:*:*:*", "cpeNameId": "E7237F6D-DA3F-4755-97C0-72C41F937096"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.125:*:*:*:*:*:*:*", "cpeNameId": "EF179B39-F479-4FF0-9853-5C41F4138C80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.126:*:*:*:*:*:*:*", "cpeNameId": "D623E6BE-F45C-4E2D-83EB-883633218B57"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.127:*:*:*:*:*:*:*", "cpeNameId": "7634F69F-587C-4861-B1E1-2F144582DD36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.128:*:*:*:*:*:*:*", "cpeNameId": "23B07FF3-3EC0-487F-B76D-C86CBF6426EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.129:*:*:*:*:*:*:*", "cpeNameId": "E3AB773D-5743-4A09-AB6F-139D852B344E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.130:*:*:*:*:*:*:*", "cpeNameId": "1C0588B6-8690-46A5-AE2E-73E7BF0CACDB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.131:*:*:*:*:*:*:*", "cpeNameId": "AF351F54-8187-410D-86F1-B3F82AD2ED55"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.132:*:*:*:*:*:*:*", "cpeNameId": "067199B5-CFA0-4568-BA4D-6288A392D99C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.133:*:*:*:*:*:*:*", "cpeNameId": "CF1D7CCF-56EB-4D68-AED7-D187649BA593"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.134:*:*:*:*:*:*:*", "cpeNameId": "5446FBC8-EDD6-449D-B4FC-7C9C2679FDE4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.135:*:*:*:*:*:*:*", "cpeNameId": "3B8D2DC6-E618-4E03-ABF0-0BD7B4B8EB69"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.136:*:*:*:*:*:*:*", "cpeNameId": "94473DCF-880F-4134-9004-72FB278A583E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.137:*:*:*:*:*:*:*", "cpeNameId": "F3AE7B24-62E3-4995-B088-1484F2073EEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.138:*:*:*:*:*:*:*", "cpeNameId": "17D753C7-C945-4B66-AA44-7CA3F4512771"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.139:*:*:*:*:*:*:*", "cpeNameId": "60F84A69-CC41-4E35-BED3-8967F672C006"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.140:*:*:*:*:*:*:*", "cpeNameId": "704BA190-B269-4E2E-B176-2E609688075D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.141:*:*:*:*:*:*:*", "cpeNameId": "FEF922EA-398E-42BB-A3D4-617330FE8BA5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.142:*:*:*:*:*:*:*", "cpeNameId": "E13D9FC4-EA1C-4834-A8DD-9F8B32080526"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.143:*:*:*:*:*:*:*", "cpeNameId": "2749EF98-5412-46F6-8D49-0EDD6A58E528"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.144:*:*:*:*:*:*:*", "cpeNameId": "1CBA264D-9620-40D3-A6E9-BDD0378FBBE4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.145:*:*:*:*:*:*:*", "cpeNameId": "9753CAB1-3E31-4FB0-8901-B66F68248C4B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.146:*:*:*:*:*:*:*", "cpeNameId": "D6BBAA0A-DC53-4541-A7C9-02B7CC882C6F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.147:*:*:*:*:*:*:*", "cpeNameId": "75DD6B1D-A210-439C-BB15-5A9857869B4C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.148:*:*:*:*:*:*:*", "cpeNameId": "83C33FEE-E6EE-42A4-B71C-36B017ADA254"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.149:*:*:*:*:*:*:*", "cpeNameId": "7594839C-A015-437B-843D-443C74240AFC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.150:*:*:*:*:*:*:*", "cpeNameId": "85681E7B-7D21-4391-88BB-F24FCC85B69E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.151:*:*:*:*:*:*:*", "cpeNameId": "CAD0E871-57D4-4E39-B8BE-B48B56E383AD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.152:*:*:*:*:*:*:*", "cpeNameId": "8B9FBF3A-7807-4307-AA5A-AFB027788A0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.153:*:*:*:*:*:*:*", "cpeNameId": "45B35B38-1583-4FDE-A76C-F489FC1661B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.154:*:*:*:*:*:*:*", "cpeNameId": "B5CBD335-2006-441B-B668-D4C4E5361E92"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.155:*:*:*:*:*:*:*", "cpeNameId": "1BB865B8-A4BD-46DC-8C13-31A508A1C470"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.156:*:*:*:*:*:*:*", "cpeNameId": "020363CE-5C5B-427C-A15C-F5C1C1975467"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.157:*:*:*:*:*:*:*", "cpeNameId": "941EBBFB-C6F1-48D5-9B2B-CA5C89D87AAE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.158:*:*:*:*:*:*:*", "cpeNameId": "C6F4FAFB-B2D4-4C6A-A2FD-279349D1B6B8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.159:*:*:*:*:*:*:*", "cpeNameId": "D6E8DC84-DA54-45C7-A50D-CB982342FBA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.160:*:*:*:*:*:*:*", "cpeNameId": "B06561F9-9A69-45F5-8E38-E4ACD6603562"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.161:*:*:*:*:*:*:*", "cpeNameId": "387585D8-ED6F-4F42-B695-CBEE28059C70"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.162:*:*:*:*:*:*:*", "cpeNameId": "D3B66B2E-4E69-4FA5-8B87-289E005FDE04"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.163:*:*:*:*:*:*:*", "cpeNameId": "5EE4932A-8EC9-4F83-B39E-43949583A002"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.164:*:*:*:*:*:*:*", "cpeNameId": "23613ABA-9AF6-4994-BEA5-72EADE59E05D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.165:*:*:*:*:*:*:*", "cpeNameId": "274A8333-1FF8-4D90-9F8F-6ED87E4D38C2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.166:*:*:*:*:*:*:*", "cpeNameId": "D2E5BB0E-741E-4F29-A740-36E5944DA22E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.167:*:*:*:*:*:*:*", "cpeNameId": "A0D34177-A31C-4A31-95EC-FC51AAFDCCA4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.168:*:*:*:*:*:*:*", "cpeNameId": "91D62EB4-F2E8-490E-B95E-8795D3419321"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.169:*:*:*:*:*:*:*", "cpeNameId": "D07F44B5-8B12-4624-806B-3926EE9DFEC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.170:*:*:*:*:*:*:*", "cpeNameId": "F96D2A95-B029-4CF9-B156-05CF4447C703"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.171:*:*:*:*:*:*:*", "cpeNameId": "8ECD8767-3374-4B80-A15B-F5238068915B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.172:*:*:*:*:*:*:*", "cpeNameId": "360CFD8E-8542-4074-A12A-DBA9971EA65B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.173:*:*:*:*:*:*:*", "cpeNameId": "E8C8A6D8-B27B-4F5B-8E51-61E11B3F215F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.174:*:*:*:*:*:*:*", "cpeNameId": "15A35FE0-6FEE-41DC-8BF0-6915C879C270"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.175:*:*:*:*:*:*:*", "cpeNameId": "37C5FB0A-CA6D-4613-8A8B-A18D0FDA6F64"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.176:*:*:*:*:*:*:*", "cpeNameId": "FFE0EDBC-A325-48BA-ACB3-9F8D08670377"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.177:*:*:*:*:*:*:*", "cpeNameId": "E5195C74-6E40-48DB-B840-6064E935C3EE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.178:*:*:*:*:*:*:*", "cpeNameId": "12D64B6B-F676-44EF-9DC6-C177E27260EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.179:*:*:*:*:*:*:*", "cpeNameId": "A05ECB81-2B19-4D35-8D1F-4434137A84DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.180:*:*:*:*:*:*:*", "cpeNameId": "9C361490-6959-42D0-BCC4-83D577D132F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.181:*:*:*:*:*:*:*", "cpeNameId": "D0326F99-0B11-462B-8D94-064C0A3241B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.182:*:*:*:*:*:*:*", "cpeNameId": "D15195DE-63BF-4173-905B-E7D6FA91CA75"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.183:*:*:*:*:*:*:*", "cpeNameId": "68713BB8-A777-453A-A8DF-73D9D7BF2E85"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.184:*:*:*:*:*:*:*", "cpeNameId": "4CAD090F-0814-485B-8E21-4D47722887FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.185:*:*:*:*:*:*:*", "cpeNameId": "9959172B-D94C-4CB9-BF46-DD313AA048F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.186:*:*:*:*:*:*:*", "cpeNameId": "24962B43-D41C-4D08-B761-2DC8B7CA6266"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.187:*:*:*:*:*:*:*", "cpeNameId": "38C0DBA3-BE34-4386-9A2E-157382F3225A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.188:*:*:*:*:*:*:*", "cpeNameId": "7ACF7B19-A720-4BA7-BED3-568CC376C778"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.189:*:*:*:*:*:*:*", "cpeNameId": "B7B05048-9CFF-419B-86B0-EE2F56B47B83"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.190:*:*:*:*:*:*:*", "cpeNameId": "BAE9F693-4B6C-4E3E-A9A0-511AE8544242"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.191:*:*:*:*:*:*:*", "cpeNameId": "9D62345B-E1AE-4963-B5CF-35F5162E8801"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.192:*:*:*:*:*:*:*", "cpeNameId": "B355E118-131B-406B-B4BA-152ECC8A3BBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.193:*:*:*:*:*:*:*", "cpeNameId": "F03D2948-9154-4DBA-BACE-7C345323033A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.194:*:*:*:*:*:*:*", "cpeNameId": "FBCB3E35-2179-4C11-AB45-FF4ED4FDF319"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.195:*:*:*:*:*:*:*", "cpeNameId": "C3EE187D-F47C-4715-9DB8-E907435E01EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.196:*:*:*:*:*:*:*", "cpeNameId": "0C0A8C7F-62FD-4514-AA66-564CAADC6E45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.197:*:*:*:*:*:*:*", "cpeNameId": "B3CE9D05-5F55-4B0E-B305-0A3B005018DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.198:*:*:*:*:*:*:*", "cpeNameId": "2317D623-D839-407E-A14E-F5F852B84FEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.199:*:*:*:*:*:*:*", "cpeNameId": "EB66E33F-BA65-49D7-B9EA-4A98B64ACC4E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.200:*:*:*:*:*:*:*", "cpeNameId": "011BFD26-2596-4913-9424-0AECA7030C16"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.201:*:*:*:*:*:*:*", "cpeNameId": "D4ACDED5-7B2F-49A2-A926-D916CFDB0C63"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.202:*:*:*:*:*:*:*", "cpeNameId": "B7F9F37A-7A22-49AD-A0B1-F71767104083"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.203:*:*:*:*:*:*:*", "cpeNameId": "2AD7A4A5-2505-4B4D-8783-F0A51E6A046A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.204:*:*:*:*:*:*:*", "cpeNameId": "95FA5A9A-3EEF-40F7-A80B-F714544B33EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.205:*:*:*:*:*:*:*", "cpeNameId": "2E6CB57E-4C3F-42E5-B9FB-AB8280BE7A6F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.206:*:*:*:*:*:*:*", "cpeNameId": "7676F080-CF07-4DA1-AF8D-9EF7B716A3E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.207:*:*:*:*:*:*:*", "cpeNameId": "825F2314-2B15-4F76-B6CD-5C9DADC5BE95"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.208:*:*:*:*:*:*:*", "cpeNameId": "7B6DA918-9935-4683-A67B-08144DD82180"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.209:*:*:*:*:*:*:*", "cpeNameId": "95865082-502B-4EAF-BB46-FF14CB436ACA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.210:*:*:*:*:*:*:*", "cpeNameId": "E291ACF9-9E86-4E1E-BCB5-E208F959C0B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.211:*:*:*:*:*:*:*", "cpeNameId": "0A1A262D-D3CD-49B4-84ED-3064C2FED37A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.212:*:*:*:*:*:*:*", "cpeNameId": "57B76811-C4C0-4A91-A8EF-F37450F7F017"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.213:*:*:*:*:*:*:*", "cpeNameId": "205B4275-EF2F-4D30-9EC3-8E0571547292"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.214:*:*:*:*:*:*:*", "cpeNameId": "F5586B8B-CDBF-434C-A994-8D07A0DDB39C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.215:*:*:*:*:*:*:*", "cpeNameId": "D37B51B4-57EC-4373-9428-3C3D4A29208F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.216:*:*:*:*:*:*:*", "cpeNameId": "398941C0-8C2C-41F5-A1C9-9585DAC725E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.217:*:*:*:*:*:*:*", "cpeNameId": "7B403008-68BC-4E2D-9684-EA7D660D620C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.218:*:*:*:*:*:*:*", "cpeNameId": "FEE28F9A-4B9B-44F3-96E9-B98FB0AC8528"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.219:*:*:*:*:*:*:*", "cpeNameId": "2AF545DD-D84F-46B2-AA73-55A6B4659260"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.220:*:*:*:*:*:*:*", "cpeNameId": "A062E707-3089-4A1F-A78C-D2B8FF520A2B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.221:*:*:*:*:*:*:*", "cpeNameId": "CE524691-6654-439A-ACAC-6B617AF5AF1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.222:*:*:*:*:*:*:*", "cpeNameId": "7ACB644E-9AED-4BE0-AA14-66A4391EC095"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.223:*:*:*:*:*:*:*", "cpeNameId": "FF39B72D-B1B2-4DC2-B709-C6693BC9A5E7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.224:*:*:*:*:*:*:*", "cpeNameId": "517DC3B4-3906-44AE-8AA5-EF2587DBDC72"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.225:*:*:*:*:*:*:*", "cpeNameId": "BF5626A2-7798-4612-B4A5-BA04E42E0BED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.226:*:*:*:*:*:*:*", "cpeNameId": "F43E60E1-E9FB-44BC-BC12-DE00249731EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.227:*:*:*:*:*:*:*", "cpeNameId": "640CDE67-2025-448F-AA11-6B110B29D2A5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.228:*:*:*:*:*:*:*", "cpeNameId": "D2FA83FC-CF87-4E06-B474-4EEF45D68215"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.229:*:*:*:*:*:*:*", "cpeNameId": "66BF34B9-77D9-4194-A0B7-B4475B335F2E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.230:*:*:*:*:*:*:*", "cpeNameId": "299E37F1-CADB-4659-916C-6212694A18E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.231:*:*:*:*:*:*:*", "cpeNameId": "6485B4A3-B4A4-4051-BF33-D2CE21DA64EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.232:*:*:*:*:*:*:*", "cpeNameId": "B4F3A62A-C3EE-48BD-B70D-61471639DC9C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.233:*:*:*:*:*:*:*", "cpeNameId": "69E1C22D-523B-4340-A48B-2DB4BEB9248F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.234:*:*:*:*:*:*:*", "cpeNameId": "9F851704-26CF-4676-8855-D74AF799B382"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.235:*:*:*:*:*:*:*", "cpeNameId": "7C708908-5963-46DC-B508-3A5F7499055C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.236:*:*:*:*:*:*:*", "cpeNameId": "6C87ADCB-B88B-4DFA-992F-26B4947C3458"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.237:*:*:*:*:*:*:*", "cpeNameId": "6BB385D9-D9D8-470E-89CE-902222E39ADC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.238:*:*:*:*:*:*:*", "cpeNameId": "B4DAD459-71A8-44A5-861A-1BAF66749233"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.239:*:*:*:*:*:*:*", "cpeNameId": "1897BE2D-B7E6-4886-8CAC-C6AE563CBEE5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.240:*:*:*:*:*:*:*", "cpeNameId": "CE8BA9F0-78BC-4495-801A-2D41AC5B3187"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.241:*:*:*:*:*:*:*", "cpeNameId": "A5EC3DC7-E2C0-431A-A2EC-B6C3828C4BCA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.242:*:*:*:*:*:*:*", "cpeNameId": "E7DD7787-5F9A-4EB3-80D5-122199BE1430"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.243:*:*:*:*:*:*:*", "cpeNameId": "CEA6083C-45E3-459C-A5E7-04CABE3258FF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.244:*:*:*:*:*:*:*", "cpeNameId": "A046118E-2030-4FA1-AB54-FA3166B389EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.245:*:*:*:*:*:*:*", "cpeNameId": "798F9326-D8B4-47C7-A887-279D9837B680"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.246:*:*:*:*:*:*:*", "cpeNameId": "95624FFF-60D2-4964-9EBB-A6AFA64F213D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.247:*:*:*:*:*:*:*", "cpeNameId": "29DEE5F4-3ADD-4E88-9187-7135A238F9C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.248:*:*:*:*:*:*:*", "cpeNameId": "8E8D2C97-D48F-4BD9-BED5-88EE4813F6E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.249:*:*:*:*:*:*:*", "cpeNameId": "5A1E1612-3E81-4021-9A85-34B86AFBC77C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.250:*:*:*:*:*:*:*", "cpeNameId": "EA54F6F0-C64D-41B4-A582-92D43FDD3CB2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.251:*:*:*:*:*:*:*", "cpeNameId": "1B17D69F-3CC2-4B00-B2D5-A4434E4C2402"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.252:*:*:*:*:*:*:*", "cpeNameId": "AAC99975-FBC6-439C-B9E6-011CABDAE8F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.253:*:*:*:*:*:*:*", "cpeNameId": "5375B4A1-C18E-453D-9179-672CB459B0D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.254:*:*:*:*:*:*:*", "cpeNameId": "730B192E-0CAB-41AE-8EE8-57F381628032"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.255:*:*:*:*:*:*:*", "cpeNameId": "59A6D935-0EBF-4499-A8F9-5BB002FF5417"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.256:*:*:*:*:*:*:*", "cpeNameId": "60604FAE-6D70-4DF3-9A88-CC3F6A614F58"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.257:*:*:*:*:*:*:*", "cpeNameId": "28E9A455-1593-4AF5-9451-B313D622E813"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.258:*:*:*:*:*:*:*", "cpeNameId": "B5718D89-967C-42C8-AA82-C97D345B3B10"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.259:*:*:*:*:*:*:*", "cpeNameId": "87BB858F-8D92-452F-B51C-12ACE0798353"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.260:*:*:*:*:*:*:*", "cpeNameId": "AE07B665-D693-4561-A9B4-9932CD77333B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.261:*:*:*:*:*:*:*", "cpeNameId": "EF86313B-7F46-43B8-8338-AE692B75A0A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.262:*:*:*:*:*:*:*", "cpeNameId": "E1B563A5-0659-4D95-89A0-8FCC2A436214"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.263:*:*:*:*:*:*:*", "cpeNameId": "8D53F67C-F067-4BF8-AE22-78A1176571BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.264:*:*:*:*:*:*:*", "cpeNameId": "7111A17A-1784-4740-B976-38B722A838CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.265:*:*:*:*:*:*:*", "cpeNameId": "2D41AA24-795C-4C26-8A5A-D07B59EBD394"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.266:*:*:*:*:*:*:*", "cpeNameId": "A97784BF-DCF7-40A8-87DA-0CB401BEC707"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.267:*:*:*:*:*:*:*", "cpeNameId": "073D9BD8-4FBC-4DF6-8017-37FB83733D26"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.268:*:*:*:*:*:*:*", "cpeNameId": "91DAF395-305E-4836-A12C-1E2377F31FA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.269:*:*:*:*:*:*:*", "cpeNameId": "5FCE10E6-EC75-4696-82C2-8958D55E379A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.270:*:*:*:*:*:*:*", "cpeNameId": "431FAE79-4814-471C-ADD1-50E98CA62255"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.271:*:*:*:*:*:*:*", "cpeNameId": "90DCF88A-E713-42F3-9D1E-2CCCAA5074ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.272:*:*:*:*:*:*:*", "cpeNameId": "6B454F24-35C3-4974-86AC-E42EC930E187"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.273:*:*:*:*:*:*:*", "cpeNameId": "02AE5EE4-8747-4828-AC90-7DC0689482DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.274:*:*:*:*:*:*:*", "cpeNameId": "F006D7E9-C3E7-43D0-BFF9-1905CC924F0E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.275:*:*:*:*:*:*:*", "cpeNameId": "81C1BF7F-E953-42D0-965C-B5F736085500"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.276:*:*:*:*:*:*:*", "cpeNameId": "CFCF98F3-408F-4FB9-B097-3CE467D5C047"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.277:*:*:*:*:*:*:*", "cpeNameId": "8B64B495-66D8-4EE8-9391-2078D025F252"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.278:*:*:*:*:*:*:*", "cpeNameId": "25928F5C-D970-404D-B6CB-E3DFCD7EC853"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.279:*:*:*:*:*:*:*", "cpeNameId": "478BD5C9-EF9A-4FBB-9BCF-DF23EA8F3492"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.280:*:*:*:*:*:*:*", "cpeNameId": "9513977F-A95A-4F0F-AADE-B21201231052"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.281:*:*:*:*:*:*:*", "cpeNameId": "14DBE587-6D62-4B91-BC57-0C84D152E7EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.282:*:*:*:*:*:*:*", "cpeNameId": "6057E10C-DE66-4645-A2B5-44203C31F784"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.283:*:*:*:*:*:*:*", "cpeNameId": "951347D3-550A-41E6-B000-E2D716A96A20"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.284:*:*:*:*:*:*:*", "cpeNameId": "5979A8F6-3B9D-4C0C-8C75-9FA49E82A345"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.285:*:*:*:*:*:*:*", "cpeNameId": "F1278C94-D023-48BF-A6D6-36D0DF76CFF3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.286:*:*:*:*:*:*:*", "cpeNameId": "7E65B46E-A161-4126-9E85-B9F5B4C0005D"}]}} \ No newline at end of file diff --git a/cpematch/C9/C91B88B4-DC83-449D-95B0-DF1A76D37F54.json b/cpematch/C9/C91B88B4-DC83-449D-95B0-DF1A76D37F54.json new file mode 100644 index 00000000000..459df25fe55 --- /dev/null +++ b/cpematch/C9/C91B88B4-DC83-449D-95B0-DF1A76D37F54.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "C91B88B4-DC83-449D-95B0-DF1A76D37F54", "criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*", "versionStartIncluding": "13.10.3", "versionEndExcluding": "14.10.21", "lastModified": "2025-01-09T16:24:51.060", "cpeLastModified": "2025-01-09T16:24:51.060", "created": "2025-01-09T16:24:51.060", "status": "Active", "matches": [{"cpeName": "cpe:2.3:a:xwiki:xwiki:13.10.3:*:*:*:*:*:*:*", "cpeNameId": "0A60D729-42DB-4EE4-8946-E90F2EBF1289"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.10.4:*:*:*:*:*:*:*", "cpeNameId": "047152F4-9E85-48BF-91A7-E525237302E5"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.10.5:*:*:*:*:*:*:*", "cpeNameId": "41DB3074-7B14-40EB-8545-074C7D4FAE17"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.10.6:*:*:*:*:*:*:*", "cpeNameId": "776DA325-AD58-42DA-9CEE-F0CF6E928FC9"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.10.8:*:*:*:*:*:*:*", "cpeNameId": "B161E05A-B5C4-4CCD-ABE1-FC3BFD8E1DAF"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.10.10:*:*:*:*:*:*:*", "cpeNameId": "8246E4A1-3683-4C2E-B088-07A4EE15773A"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.10.11:*:*:*:*:*:*:*", "cpeNameId": "6F84CAF1-41B2-4078-A68A-497D0AA99991"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.0:*:*:*:*:*:*:*", "cpeNameId": "7824EA81-53C1-4674-B114-0411C8206FC9"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.0:-:*:*:*:*:*:*", "cpeNameId": "B9C5C207-D4FB-414D-BA4F-6467BCBFAEA3"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.0:rc1:*:*:*:*:*:*", "cpeNameId": "2023855C-D781-4F9B-9D7B-6AB6A986C892"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.1:-:*:*:*:*:*:*", "cpeNameId": "D4EA6BF4-EDD0-49DF-819F-4F04C9DB69D3"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.1:rc1:*:*:*:*:*:*", "cpeNameId": "938A5549-2358-4C1E-BBB6-D3A50AE8CC9C"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.2:-:*:*:*:*:*:*", "cpeNameId": "8DD27F7C-BC13-4545-8633-E3200B6DE350"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.2:rc1:*:*:*:*:*:*", "cpeNameId": "1FBA61F1-ED50-4398-838D-EC9DC059D55C"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.2.1:*:*:*:*:*:*:*", "cpeNameId": "85A4FE01-3BE7-4F78-9AB3-124C36D7420C"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.3:-:*:*:*:*:*:*", "cpeNameId": "F97B0B70-7D2D-40BC-BE3E-2294BF2EAA2F"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.3:rc1:*:*:*:*:*:*", "cpeNameId": "63AC2F95-3C47-4B89-9E7B-49FC8BA51829"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.3.1:*:*:*:*:*:*:*", "cpeNameId": "DC84B566-5CD9-4766-8733-ECD1440602C8"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.4:*:*:*:*:*:*:*", "cpeNameId": "C8DD6789-4E8D-4725-8CFB-5E6AD8A927AD"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.4:rc1:*:*:*:*:*:*", "cpeNameId": "A1C287AA-0A0F-44A9-A199-ADE2E5B8391B"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.4.3:*:*:*:*:*:*:*", "cpeNameId": "11795995-6F15-47BB-89C7-67683A34929E"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.4.4:*:*:*:*:*:*:*", "cpeNameId": "885A1911-DB26-4E84-BF2B-1DA574200D89"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.4.5:*:*:*:*:*:*:*", "cpeNameId": "A8078299-277B-4D24-9B10-D998ABD725F6"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.4.6:*:*:*:*:*:*:*", "cpeNameId": "7A0E717A-B952-4032-9D87-2DBF950D8A7B"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.4.7:*:*:*:*:*:*:*", "cpeNameId": "F745D23C-7AF2-4832-8145-5E0A75E3B441"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.4.8:*:*:*:*:*:*:*", "cpeNameId": "5D73E7B5-143C-447C-9908-75212E828796"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.5:*:*:*:*:*:*:*", "cpeNameId": "2B739769-CDFA-42D1-9265-44A1D5783FCB"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.5.0:*:*:*:*:*:*:*", "cpeNameId": "84EA4DCE-8DBF-452F-82BC-8ADE6621E10D"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.6:*:*:*:*:*:*:*", "cpeNameId": "32582E82-7DD3-49CF-92C4-CAAE81B772D1"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.6:rc1:*:*:*:*:*:*", "cpeNameId": "FC61BED5-3A72-4227-9839-3F25C0453EC8"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.7:rc1:*:*:*:*:*:*", "cpeNameId": "497FC3C9-F49B-4BAD-B2B3-B7778C736BA9"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.9:-:*:*:*:*:*:*", "cpeNameId": "41C08E94-C771-4B15-8C2B-EB28421EE380"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.9:rc1:*:*:*:*:*:*", "cpeNameId": "889B6E18-FB37-456D-A289-17221683FC3E"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10:*:*:*:*:*:*:*", "cpeNameId": "D72A14EF-A21A-4075-BBE5-46A386715FE6"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10:rc1:*:*:*:*:*:*", "cpeNameId": "A071E854-3AFE-4FED-8C49-CEF3B9A54400"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.1:*:*:*:*:*:*:*", "cpeNameId": "E0075C9A-8BAD-4D9D-A339-A8D5184C8115"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.2:*:*:*:*:*:*:*", "cpeNameId": "6093CBD3-B3B7-4525-9D1D-56EF15A9AA15"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.3:*:*:*:*:*:*:*", "cpeNameId": "E4477D13-EBFF-4E21-9E35-E5C5219D31CC"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.4:*:*:*:*:*:*:*", "cpeNameId": "F1850A72-3461-4C1F-AC98-D923E6BD93E7"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.5:*:*:*:*:*:*:*", "cpeNameId": "6E4501C7-F455-443F-ADCF-8E6562B8659F"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.6:*:*:*:*:*:*:*", "cpeNameId": "593AAACA-1FFA-45D9-9FD0-8CC10F024689"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.7:*:*:*:*:*:*:*", "cpeNameId": "0042CF0D-EB49-405C-A844-02EC5EACC887"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.8:*:*:*:*:*:*:*", "cpeNameId": "E90B879F-5593-4EA6-B38C-2DCA73E61D54"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.9:*:*:*:*:*:*:*", "cpeNameId": "29AEA4F5-476C-4CDA-803C-C9020692B637"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.10:*:*:*:*:*:*:*", "cpeNameId": "5DAFA70B-FDC2-4ACF-AD39-793EE0C2A371"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.11:*:*:*:*:*:*:*", "cpeNameId": "0BF31F07-CDC0-4BD8-AF2F-01EDB06D519A"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.12:*:*:*:*:*:*:*", "cpeNameId": "C9A0176B-0A6F-4712-A300-AA801CBC88D3"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.13:*:*:*:*:*:*:*", "cpeNameId": "5656040E-3E90-4DED-904A-0A9B5DB45EAE"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.14:*:*:*:*:*:*:*", "cpeNameId": "6A401EB7-B169-44F4-A51F-99644CB2E338"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.15:*:*:*:*:*:*:*", "cpeNameId": "23918E08-4CCE-4B32-9545-579EE4569103"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.16:*:*:*:*:*:*:*", "cpeNameId": "4FD0CE1A-4168-4A7E-A64C-EC0136778D87"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.17:*:*:*:*:*:*:*", "cpeNameId": "4AAE8694-F060-4C88-A785-72A6F99CAE05"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.18:*:*:*:*:*:*:*", "cpeNameId": "1EC53B79-4B2F-4731-9A8D-CBAC103D7308"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.19:*:*:*:*:*:*:*", "cpeNameId": "0C6F5CD5-ACF9-4EB2-8496-114A2392EE11"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.20:*:*:*:*:*:*:*", "cpeNameId": "0A42CBCA-E61E-4A78-AAF2-13958340F92B"}]}} \ No newline at end of file diff --git a/cpematch/C9/C98B05F5-893C-40C4-A707-4230DF901C0B.json b/cpematch/C9/C98B05F5-893C-40C4-A707-4230DF901C0B.json new file mode 100644 index 00000000000..0d19cb8d59a --- /dev/null +++ b/cpematch/C9/C98B05F5-893C-40C4-A707-4230DF901C0B.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "C98B05F5-893C-40C4-A707-4230DF901C0B", "criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*", "versionStartIncluding": "13.9", "versionEndExcluding": "14.10.19", "lastModified": "2025-01-09T16:06:46.027", "cpeLastModified": "2025-01-09T16:06:46.027", "created": "2025-01-09T16:06:46.027", "status": "Active", "matches": [{"cpeName": "cpe:2.3:a:xwiki:xwiki:13.9:*:*:*:*:*:*:*", "cpeNameId": "5381019F-EF70-4F5C-B73E-9853090A465B"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.9:-:*:*:*:*:*:*", "cpeNameId": "6FC792DD-43C1-4348-A69B-16040EE0D014"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.9:rc1:*:*:*:*:*:*", "cpeNameId": "5806FD30-A4F2-474B-9721-B51FA67D325B"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.10:*:*:*:*:*:*:*", "cpeNameId": "60BC88E4-42EE-4501-AE47-026D11DA53ED"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.10:-:*:*:*:*:*:*", "cpeNameId": "7915D205-A813-4945-BA31-479D59805A10"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.10.1:*:*:*:*:*:*:*", "cpeNameId": "68344075-1679-4551-AA46-4E10976D007D"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.10.2:*:*:*:*:*:*:*", "cpeNameId": "3F99A2CF-1F21-4F30-AEC6-4757D57E3B23"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.10.3:*:*:*:*:*:*:*", "cpeNameId": "0A60D729-42DB-4EE4-8946-E90F2EBF1289"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.10.4:*:*:*:*:*:*:*", "cpeNameId": "047152F4-9E85-48BF-91A7-E525237302E5"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.10.5:*:*:*:*:*:*:*", "cpeNameId": "41DB3074-7B14-40EB-8545-074C7D4FAE17"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.10.6:*:*:*:*:*:*:*", "cpeNameId": "776DA325-AD58-42DA-9CEE-F0CF6E928FC9"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.10.8:*:*:*:*:*:*:*", "cpeNameId": "B161E05A-B5C4-4CCD-ABE1-FC3BFD8E1DAF"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.10.10:*:*:*:*:*:*:*", "cpeNameId": "8246E4A1-3683-4C2E-B088-07A4EE15773A"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:13.10.11:*:*:*:*:*:*:*", "cpeNameId": "6F84CAF1-41B2-4078-A68A-497D0AA99991"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.0:*:*:*:*:*:*:*", "cpeNameId": "7824EA81-53C1-4674-B114-0411C8206FC9"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.0:-:*:*:*:*:*:*", "cpeNameId": "B9C5C207-D4FB-414D-BA4F-6467BCBFAEA3"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.0:rc1:*:*:*:*:*:*", "cpeNameId": "2023855C-D781-4F9B-9D7B-6AB6A986C892"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.1:-:*:*:*:*:*:*", "cpeNameId": "D4EA6BF4-EDD0-49DF-819F-4F04C9DB69D3"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.1:rc1:*:*:*:*:*:*", "cpeNameId": "938A5549-2358-4C1E-BBB6-D3A50AE8CC9C"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.2:-:*:*:*:*:*:*", "cpeNameId": "8DD27F7C-BC13-4545-8633-E3200B6DE350"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.2:rc1:*:*:*:*:*:*", "cpeNameId": "1FBA61F1-ED50-4398-838D-EC9DC059D55C"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.2.1:*:*:*:*:*:*:*", "cpeNameId": "85A4FE01-3BE7-4F78-9AB3-124C36D7420C"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.3:-:*:*:*:*:*:*", "cpeNameId": "F97B0B70-7D2D-40BC-BE3E-2294BF2EAA2F"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.3:rc1:*:*:*:*:*:*", "cpeNameId": "63AC2F95-3C47-4B89-9E7B-49FC8BA51829"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.3.1:*:*:*:*:*:*:*", "cpeNameId": "DC84B566-5CD9-4766-8733-ECD1440602C8"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.4:*:*:*:*:*:*:*", "cpeNameId": "C8DD6789-4E8D-4725-8CFB-5E6AD8A927AD"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.4:rc1:*:*:*:*:*:*", "cpeNameId": "A1C287AA-0A0F-44A9-A199-ADE2E5B8391B"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.4.3:*:*:*:*:*:*:*", "cpeNameId": "11795995-6F15-47BB-89C7-67683A34929E"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.4.4:*:*:*:*:*:*:*", "cpeNameId": "885A1911-DB26-4E84-BF2B-1DA574200D89"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.4.5:*:*:*:*:*:*:*", "cpeNameId": "A8078299-277B-4D24-9B10-D998ABD725F6"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.4.6:*:*:*:*:*:*:*", "cpeNameId": "7A0E717A-B952-4032-9D87-2DBF950D8A7B"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.4.7:*:*:*:*:*:*:*", "cpeNameId": "F745D23C-7AF2-4832-8145-5E0A75E3B441"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.4.8:*:*:*:*:*:*:*", "cpeNameId": "5D73E7B5-143C-447C-9908-75212E828796"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.5:*:*:*:*:*:*:*", "cpeNameId": "2B739769-CDFA-42D1-9265-44A1D5783FCB"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.5.0:*:*:*:*:*:*:*", "cpeNameId": "84EA4DCE-8DBF-452F-82BC-8ADE6621E10D"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.6:*:*:*:*:*:*:*", "cpeNameId": "32582E82-7DD3-49CF-92C4-CAAE81B772D1"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.6:rc1:*:*:*:*:*:*", "cpeNameId": "FC61BED5-3A72-4227-9839-3F25C0453EC8"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.7:rc1:*:*:*:*:*:*", "cpeNameId": "497FC3C9-F49B-4BAD-B2B3-B7778C736BA9"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.9:-:*:*:*:*:*:*", "cpeNameId": "41C08E94-C771-4B15-8C2B-EB28421EE380"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.9:rc1:*:*:*:*:*:*", "cpeNameId": "889B6E18-FB37-456D-A289-17221683FC3E"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10:*:*:*:*:*:*:*", "cpeNameId": "D72A14EF-A21A-4075-BBE5-46A386715FE6"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10:rc1:*:*:*:*:*:*", "cpeNameId": "A071E854-3AFE-4FED-8C49-CEF3B9A54400"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.1:*:*:*:*:*:*:*", "cpeNameId": "E0075C9A-8BAD-4D9D-A339-A8D5184C8115"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.2:*:*:*:*:*:*:*", "cpeNameId": "6093CBD3-B3B7-4525-9D1D-56EF15A9AA15"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.3:*:*:*:*:*:*:*", "cpeNameId": "E4477D13-EBFF-4E21-9E35-E5C5219D31CC"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.4:*:*:*:*:*:*:*", "cpeNameId": "F1850A72-3461-4C1F-AC98-D923E6BD93E7"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.5:*:*:*:*:*:*:*", "cpeNameId": "6E4501C7-F455-443F-ADCF-8E6562B8659F"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.6:*:*:*:*:*:*:*", "cpeNameId": "593AAACA-1FFA-45D9-9FD0-8CC10F024689"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.7:*:*:*:*:*:*:*", "cpeNameId": "0042CF0D-EB49-405C-A844-02EC5EACC887"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.8:*:*:*:*:*:*:*", "cpeNameId": "E90B879F-5593-4EA6-B38C-2DCA73E61D54"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.9:*:*:*:*:*:*:*", "cpeNameId": "29AEA4F5-476C-4CDA-803C-C9020692B637"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.10:*:*:*:*:*:*:*", "cpeNameId": "5DAFA70B-FDC2-4ACF-AD39-793EE0C2A371"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.11:*:*:*:*:*:*:*", "cpeNameId": "0BF31F07-CDC0-4BD8-AF2F-01EDB06D519A"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.12:*:*:*:*:*:*:*", "cpeNameId": "C9A0176B-0A6F-4712-A300-AA801CBC88D3"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.13:*:*:*:*:*:*:*", "cpeNameId": "5656040E-3E90-4DED-904A-0A9B5DB45EAE"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.14:*:*:*:*:*:*:*", "cpeNameId": "6A401EB7-B169-44F4-A51F-99644CB2E338"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.15:*:*:*:*:*:*:*", "cpeNameId": "23918E08-4CCE-4B32-9545-579EE4569103"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.16:*:*:*:*:*:*:*", "cpeNameId": "4FD0CE1A-4168-4A7E-A64C-EC0136778D87"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.17:*:*:*:*:*:*:*", "cpeNameId": "4AAE8694-F060-4C88-A785-72A6F99CAE05"}, {"cpeName": "cpe:2.3:a:xwiki:xwiki:14.10.18:*:*:*:*:*:*:*", "cpeNameId": "1EC53B79-4B2F-4731-9A8D-CBAC103D7308"}]}} \ No newline at end of file diff --git a/cpematch/CA/CAB28BF5-A7F3-4649-BC0F-648E8963038B.json b/cpematch/CA/CAB28BF5-A7F3-4649-BC0F-648E8963038B.json new file mode 100644 index 00000000000..56117449778 --- /dev/null +++ b/cpematch/CA/CAB28BF5-A7F3-4649-BC0F-648E8963038B.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "CAB28BF5-A7F3-4649-BC0F-648E8963038B", "criteria": "cpe:2.3:a:xwiki:xwiki:13.5:rc1:*:*:*:*:*:*", "lastModified": "2025-01-09T16:24:51.060", "cpeLastModified": "2025-01-09T16:24:51.060", "created": "2025-01-09T16:24:51.060", "status": "Active"}} \ No newline at end of file diff --git a/cpematch/D4/D450D8AD-8FA7-497C-8321-2692FEEEE237.json b/cpematch/D4/D450D8AD-8FA7-497C-8321-2692FEEEE237.json new file mode 100644 index 00000000000..88b42c0c679 --- /dev/null +++ b/cpematch/D4/D450D8AD-8FA7-497C-8321-2692FEEEE237.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "D450D8AD-8FA7-497C-8321-2692FEEEE237", "criteria": "cpe:2.3:a:cilium:cilium:*:*:*:*:*:*:*:*", "versionStartIncluding": "1.4.0", "versionEndExcluding": "1.13.13", "lastModified": "2025-01-09T16:45:03.440", "cpeLastModified": "2025-01-09T16:45:03.440", "created": "2025-01-09T16:45:03.440", "status": "Active", "matches": [{"cpeName": "cpe:2.3:a:cilium:cilium:1.4.0:-:*:*:*:*:*:*", "cpeNameId": "F38EB92D-661C-41C0-A162-10E5B1073CAD"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.4.0:rc1:*:*:*:*:*:*", "cpeNameId": "979DA8F2-CF89-42FF-8ADE-CF783E81B821"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.4.0:rc2:*:*:*:*:*:*", "cpeNameId": "CF74CD8C-B812-4409-B142-F7D54B837539"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.4.0:rc3:*:*:*:*:*:*", "cpeNameId": "3C37DE91-C311-49D3-B490-CCA13269CCE6"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.4.0:rc4:*:*:*:*:*:*", "cpeNameId": "94DFB412-8ABF-43D1-A408-BB590807CD5D"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.4.0:rc5:*:*:*:*:*:*", "cpeNameId": "F248B45F-6F1D-4081-AA4C-F98FE38A57D8"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.4.0:rc6:*:*:*:*:*:*", "cpeNameId": "EFB5AC92-7495-489C-B402-FFA65A7AE8C3"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.4.0:rc7:*:*:*:*:*:*", "cpeNameId": "93063890-0749-48E4-8DE7-EE91EE566D92"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.4.0:rc8:*:*:*:*:*:*", "cpeNameId": "92DC178C-827D-4D99-AE3F-2A6433803AE3"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.4.0:rc9:*:*:*:*:*:*", "cpeNameId": "EB169BD6-418C-4033-AE71-D6716B986927"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.4.1:*:*:*:*:*:*:*", "cpeNameId": "5444433E-D330-43E8-98C6-3DFC9E347A9C"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.4.2:*:*:*:*:*:*:*", "cpeNameId": "77CB47C8-A244-469D-B95A-781C2FB8E94C"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.4.3:*:*:*:*:*:*:*", "cpeNameId": "2B115C82-B247-4CEA-854E-2023992A8607"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.4.4:*:*:*:*:*:*:*", "cpeNameId": "A0347719-D101-42C0-A39C-A4630613BA96"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.4.5:*:*:*:*:*:*:*", "cpeNameId": "CB89D8EE-1DA9-4ECF-9765-24595C92B538"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.4.6:*:*:*:*:*:*:*", "cpeNameId": "FEC5F080-EF74-47DC-BA1E-99DCED03B5CA"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.4.7:*:*:*:*:*:*:*", "cpeNameId": "A9C064B0-7C5A-42FE-AD4D-1A47B0AB9719"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.4.8:*:*:*:*:*:*:*", "cpeNameId": "0143F0A4-2281-4FBA-89D0-5B292252BAE6"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.4.9:*:*:*:*:*:*:*", "cpeNameId": "5F0111C5-1BCB-489A-9EBE-4B7F51FB25FB"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.4.10:*:*:*:*:*:*:*", "cpeNameId": "38F092FA-0EAD-43A8-8098-0472DA289768"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.5.0:-:*:*:*:*:*:*", "cpeNameId": "177A306B-A894-4BFA-A9C2-045D5DCF30F9"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.5.0:rc1:*:*:*:*:*:*", "cpeNameId": "628C8367-D233-4EC5-B58D-ACBD085F11FE"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.5.0:rc2:*:*:*:*:*:*", "cpeNameId": "0F9A618A-F1CA-41BB-866F-7ED11526E2C3"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.5.0:rc3:*:*:*:*:*:*", "cpeNameId": "7DF1F327-B153-48EE-8DFA-6446B2254ACE"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.5.0:rc4:*:*:*:*:*:*", "cpeNameId": "8F992014-0AAE-45F6-A3C0-9129E43022FF"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.5.0:rc5:*:*:*:*:*:*", "cpeNameId": "20B967CC-1BCE-4568-AD92-FF04BFA879B1"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.5.0:rc6:*:*:*:*:*:*", "cpeNameId": "32949403-0D5E-4AFE-8729-EADE3FBF6C97"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.5.1:-:*:*:*:*:*:*", "cpeNameId": "535CDC96-53F1-4C06-80D8-7664F2EFD09D"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.5.1:rc1:*:*:*:*:*:*", "cpeNameId": "9CFA8EEF-B64B-4ACC-8AA7-AE17B8514F88"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.5.2:-:*:*:*:*:*:*", "cpeNameId": "D8E1ADA9-8D3A-4CD6-889B-E4097FC2742C"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.5.2:rc1:*:*:*:*:*:*", "cpeNameId": "DC3D3A02-89C3-423A-94E1-5F3AC3C2515A"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.5.2:rc2:*:*:*:*:*:*", "cpeNameId": "24A398AE-5200-4572-B81D-557B8D8BF980"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.5.3:*:*:*:*:*:*:*", "cpeNameId": "74C3A19C-5131-4F76-80D9-9C5D5A19E04E"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.5.4:*:*:*:*:*:*:*", "cpeNameId": "F5E0923D-D869-46FE-A445-02602232979A"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.5.5:-:*:*:*:*:*:*", "cpeNameId": "341E58FD-004A-4438-B63A-FE52BCCF65A7"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.5.5:rc1:*:*:*:*:*:*", "cpeNameId": "878428A3-1895-44DA-A6D8-9DF56DFEC550"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.5.6:*:*:*:*:*:*:*", "cpeNameId": "984B75D0-F7ED-4858-887E-50EF0DC20FA7"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.5.7:*:*:*:*:*:*:*", "cpeNameId": "9BF2C6FA-3F99-42D6-9A44-536196E652EE"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.5.8:*:*:*:*:*:*:*", "cpeNameId": "E4E51501-90F3-46A0-985F-1D621ECFE84D"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.5.9:*:*:*:*:*:*:*", "cpeNameId": "E4054CC5-4E50-49AF-A3BD-E04B25E9893C"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.5.10:*:*:*:*:*:*:*", "cpeNameId": "8F5D4E88-6ABB-445D-BF5B-CA876B4FE3D7"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.5.11:*:*:*:*:*:*:*", "cpeNameId": "40FB81D2-6085-4586-9DD7-160433958C35"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.5.12:*:*:*:*:*:*:*", "cpeNameId": "5E257625-5CCB-49E2-B1AD-0A12B6D8717E"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.5.13:*:*:*:*:*:*:*", "cpeNameId": "4CDB1B40-520D-47D3-9CB8-564D9950FB76"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.6.0:-:*:*:*:*:*:*", "cpeNameId": "1E6064C7-B12F-4E04-9B5C-AEFBBC56F6D9"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.6.0:rc1:*:*:*:*:*:*", "cpeNameId": "5F61D4BC-BFCD-483B-A2D4-03D6708E1CB7"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.6.0:rc2:*:*:*:*:*:*", "cpeNameId": "E84F6FBD-462F-4E39-AD1F-CC10DA3834B5"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.6.0:rc3:*:*:*:*:*:*", "cpeNameId": "70D4DB73-347B-4728-80B1-58FFE0E4D0D9"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.6.0:rc4:*:*:*:*:*:*", "cpeNameId": "E429CC7A-5C48-453E-BE56-C18D76A716D2"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.6.0:rc5:*:*:*:*:*:*", "cpeNameId": "47BF3305-2F32-4057-9B35-5F2BED077597"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.6.0:rc6:*:*:*:*:*:*", "cpeNameId": "AE187F07-6AD4-43C2-91EB-0826CBB0AF4D"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.6.0:rc7:*:*:*:*:*:*", "cpeNameId": "F916FE2F-542F-4098-9D66-E21B93A29D0C"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.6.1:*:*:*:*:*:*:*", "cpeNameId": "B0BDC417-5C32-4F1E-A1E8-E07B4072E564"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.6.2:*:*:*:*:*:*:*", "cpeNameId": "DCA75562-986F-42E8-BF36-6062C1100E9F"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.6.3:*:*:*:*:*:*:*", "cpeNameId": "0A82AE14-CBA5-478C-A18F-9314AD261944"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.6.4:*:*:*:*:*:*:*", "cpeNameId": "234CF9A8-7A9A-4C3C-BE73-15A96B9C105B"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.6.5:*:*:*:*:*:*:*", "cpeNameId": "114A770B-1C8C-45DA-8259-A8F79912B499"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.6.6:*:*:*:*:*:*:*", "cpeNameId": "98960C54-41DD-4599-BE8B-F724F4CC18D8"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.6.7:*:*:*:*:*:*:*", "cpeNameId": "59C4E5D2-E1D0-46F3-9B35-F44C2A43F49D"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.6.8:*:*:*:*:*:*:*", "cpeNameId": "372EF36B-3017-4F0E-90E5-167DE3E26D87"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.6.9:*:*:*:*:*:*:*", "cpeNameId": "2FC59439-A8E0-4543-B9EF-DA7F055C42B7"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.6.10:*:*:*:*:*:*:*", "cpeNameId": "E20A74DF-BB61-452A-B03C-5E904B03D9D4"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.6.11:*:*:*:*:*:*:*", "cpeNameId": "347982AF-F711-4881-AF1E-629EED07E842"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.6.12:*:*:*:*:*:*:*", "cpeNameId": "B4745007-54D6-4D72-B15E-FE00A263C0B1"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.7.0:-:*:*:*:*:*:*", "cpeNameId": "78717E83-E9A4-4D39-97B9-0391D5CFBA28"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.7.0:rc1:*:*:*:*:*:*", "cpeNameId": "E1902E27-B907-4E54-A772-CC71624A5E30"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.7.0:rc2:*:*:*:*:*:*", "cpeNameId": "4C7B3999-D3FE-40AB-88FE-43DC2632BB98"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.7.0:rc3:*:*:*:*:*:*", "cpeNameId": "F11CE772-5A6C-4602-86FA-3C45847E4510"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.7.0:rc4:*:*:*:*:*:*", "cpeNameId": "1123DC50-FD0A-4C7A-B8E0-C1AF45CC3D9E"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.7.1:*:*:*:*:*:*:*", "cpeNameId": "17705067-7B6C-4F7F-BC06-8CABC9D21161"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.7.2:*:*:*:*:*:*:*", "cpeNameId": "1F13B8DD-1D73-409D-9E50-FAE16DFF4D42"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.7.3:*:*:*:*:*:*:*", "cpeNameId": "9F11CC45-7517-4A45-8D90-2681460FB5F6"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.7.4:*:*:*:*:*:*:*", "cpeNameId": "DF0B008C-9C93-4DA4-BCB1-38F8A360C4A2"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.7.5:*:*:*:*:*:*:*", "cpeNameId": "0912944C-E126-4822-A773-491AE0E5E3F5"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.7.6:*:*:*:*:*:*:*", "cpeNameId": "EB67110C-33A5-46EE-8743-59A1FA992BD6"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.7.7:*:*:*:*:*:*:*", "cpeNameId": "7D608D26-2DBF-49DA-9A6E-569A634BF2CC"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.7.8:*:*:*:*:*:*:*", "cpeNameId": "68E0F412-8053-40CF-BBF6-20DF99C29530"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.7.9:*:*:*:*:*:*:*", "cpeNameId": "7939DC22-A662-4683-AB64-8EE3F31DAD32"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.7.10:*:*:*:*:*:*:*", "cpeNameId": "01F4DD65-5545-46FA-8476-2F56F63429DD"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.7.11:*:*:*:*:*:*:*", "cpeNameId": "B4B1C047-A444-4AE7-BAD5-86B561724F52"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.7.12:*:*:*:*:*:*:*", "cpeNameId": "D380EF40-2022-4B20-A938-1022EDEA4426"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.7.13:*:*:*:*:*:*:*", "cpeNameId": "74B36C14-9571-4FEF-A131-D59D2441FFF9"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.7.14:*:*:*:*:*:*:*", "cpeNameId": "966596D1-8D46-453B-8E95-71618A75456A"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.7.15:*:*:*:*:*:*:*", "cpeNameId": "5AFF089C-30A3-48F0-BBFF-A9A6DF46C078"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.7.16:*:*:*:*:*:*:*", "cpeNameId": "7CB97039-D0F1-4F6F-823A-F8E35FDE71D1"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.8.0:-:*:*:*:*:*:*", "cpeNameId": "8151EE94-3896-4684-A8DA-B5125235F101"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.8.0:rc1:*:*:*:*:*:*", "cpeNameId": "DF0FB748-03E0-42EC-BDEF-9041B70A0EDE"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.8.0:rc2:*:*:*:*:*:*", "cpeNameId": "23E1AEEF-06D9-4DC1-A249-D7E15C126A94"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.8.0:rc3:*:*:*:*:*:*", "cpeNameId": "A0E060C2-0D3D-49FB-93E6-6B4D40D59187"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.8.0:rc4:*:*:*:*:*:*", "cpeNameId": "CDDBAFFA-C0E5-4716-8087-475D5AB47E3B"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.8.1:*:*:*:*:*:*:*", "cpeNameId": "ED66FDFA-DE8F-4BE6-8F82-EA0EF0EF7318"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.8.2:*:*:*:*:*:*:*", "cpeNameId": "8FA5B4BA-4DA2-402E-A562-5920E3E05AF5"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.8.3:*:*:*:*:*:*:*", "cpeNameId": "B139455D-8F77-42D5-B970-8146CE85F639"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.8.4:*:*:*:*:*:*:*", "cpeNameId": "E665E318-3B72-4815-B47E-5941978A5873"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.8.5:*:*:*:*:*:*:*", "cpeNameId": "F05095F3-6978-4F1A-9CCF-698DDB5587C7"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.8.6:*:*:*:*:*:*:*", "cpeNameId": "64D2FFFA-47DF-4AAA-B95D-7D7D4105D6B8"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.8.7:*:*:*:*:*:*:*", "cpeNameId": "93DB2715-A9DC-4AEC-BF3A-14F0E7A5A417"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.8.8:*:*:*:*:*:*:*", "cpeNameId": "995FF286-E8B8-4691-9298-6B3733A61F4B"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.8.9:*:*:*:*:*:*:*", "cpeNameId": "F64A88E1-742D-44CE-BFF0-9D34E3E3DA6C"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.8.10:*:*:*:*:*:*:*", "cpeNameId": "BCFE881E-2C68-4538-93EB-812310B3F020"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.8.11:*:*:*:*:*:*:*", "cpeNameId": "B0102CE1-A43B-4EE2-807E-7324A40B0DB2"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.8.12:*:*:*:*:*:*:*", "cpeNameId": "21F62B0E-B9C0-4DF4-975B-C84F24C73047"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.8.13:*:*:*:*:*:*:*", "cpeNameId": "8FFA6F19-3A24-488F-B68D-35F6AB6287DC"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.9.0:-:*:*:*:*:*:*", "cpeNameId": "167D3CF5-AB7A-431D-B73B-93A03951D0E0"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.9.0:rc0:*:*:*:*:*:*", "cpeNameId": "800CE833-816F-4B61-B488-D2CB0100CB5B"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.9.0:rc1:*:*:*:*:*:*", "cpeNameId": "2DE3BC2E-CC70-421D-A6EC-E8F684911952"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.9.0:rc2:*:*:*:*:*:*", "cpeNameId": "7F4A0ADC-F18C-4F18-BD44-D27AE599E76C"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.9.0:rc3:*:*:*:*:*:*", "cpeNameId": "EF7FE176-89A7-416A-906B-5981E28EFFA1"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.9.1:*:*:*:*:*:*:*", "cpeNameId": "C6D26BC5-6C8A-4CA8-B8F0-F190DB4D255A"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.9.2:*:*:*:*:*:*:*", "cpeNameId": "3FC8AE8C-1A5D-4392-B373-A2174C9BB595"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.9.3:*:*:*:*:*:*:*", "cpeNameId": "8BAA8D0D-8C8F-4967-9C0E-36B47714A740"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.9.4:*:*:*:*:*:*:*", "cpeNameId": "4646973D-E0D9-4B35-989E-E2AA76A66F0E"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.9.5:*:*:*:*:*:*:*", "cpeNameId": "A31CE9FE-6A4B-4761-8E20-BC95CF075C36"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.9.6:*:*:*:*:*:*:*", "cpeNameId": "DC577CDD-1B98-4F75-8AD3-C3EE7DAA13B9"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.9.7:*:*:*:*:*:*:*", "cpeNameId": "CB4A0FD8-6FBC-471B-A27F-567E7538BB0E"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.9.8:*:*:*:*:*:*:*", "cpeNameId": "3A46E099-BF91-4590-A196-B984B0B95CCD"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.9.9:*:*:*:*:*:*:*", "cpeNameId": "59C42763-A8A9-47DE-ACBE-FA8E6FB18852"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.9.10:*:*:*:*:*:*:*", "cpeNameId": "86C930AA-D643-4493-91C9-3991B627732F"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.9.11:*:*:*:*:*:*:*", "cpeNameId": "90E06E9A-D233-431E-B76A-91A313AA675D"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.9.12:*:*:*:*:*:*:*", "cpeNameId": "36455D57-5578-4282-A6C5-A8126C91B845"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.9.13:*:*:*:*:*:*:*", "cpeNameId": "22414737-6FAD-4E85-BA8A-6044725CC165"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.9.14:*:*:*:*:*:*:*", "cpeNameId": "BBA0729A-F6AD-4335-893A-A0BD3D57F1C2"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.9.15:*:*:*:*:*:*:*", "cpeNameId": "29A4931C-F6E1-4527-8AF2-42869F4D1FE5"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.9.16:*:*:*:*:*:*:*", "cpeNameId": "D9873A75-779F-45A2-BB1C-A5FFAB43C210"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.10.0:-:*:*:*:*:*:*", "cpeNameId": "5FA1E98B-4894-4698-AEAA-B0CCCEA810FE"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.10.0:rc0:*:*:*:*:*:*", "cpeNameId": "59363B8E-9428-44F0-8042-C1E809EAFD14"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.10.0:rc1:*:*:*:*:*:*", "cpeNameId": "32B0DA5D-D2B3-4137-91F8-4086E4B1E40E"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.10.0:rc2:*:*:*:*:*:*", "cpeNameId": "3B327263-BAAB-4D36-A6A7-FA3129CB579B"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.10.1:*:*:*:*:*:*:*", "cpeNameId": "57B5D45C-93D3-4EBD-9075-0C846D76F099"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.10.2:*:*:*:*:*:*:*", "cpeNameId": "16F9E937-1127-4E2B-9B30-973E43BA86A6"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.10.3:*:*:*:*:*:*:*", "cpeNameId": "FFE55569-54D4-41D1-BBB9-25FBAEE5FF4D"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.10.4:*:*:*:*:*:*:*", "cpeNameId": "1A8C8C19-33D6-438C-8251-5C779F0EB227"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.10.5:*:*:*:*:*:*:*", "cpeNameId": "8C4AC469-4FFB-4621-97CF-E9EE0FCA2026"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.10.6:*:*:*:*:*:*:*", "cpeNameId": "3353252D-AAA6-4EB4-8BF7-67DE04D09514"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.10.7:*:*:*:*:*:*:*", "cpeNameId": "109623A4-02DA-4742-868C-BC41C7C5F781"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.10.8:*:*:*:*:*:*:*", "cpeNameId": "5312245C-93CD-4DC4-877A-97DB7949D863"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.10.9:*:*:*:*:*:*:*", "cpeNameId": "94F080AC-7AAA-41B5-B080-157B3CA25E4E"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.10.10:*:*:*:*:*:*:*", "cpeNameId": "CC6D6BE6-A3BA-4D25-B82D-A1A1BD60D09F"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.10.11:*:*:*:*:*:*:*", "cpeNameId": "693D632F-414B-4153-B83B-052BD90FF913"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.10.12:*:*:*:*:*:*:*", "cpeNameId": "05483B55-EA77-435E-90D5-BD145BF8F6C9"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.10.13:*:*:*:*:*:*:*", "cpeNameId": "538BAEF0-D32B-4D7A-B5CE-7D3023381CF7"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.10.14:*:*:*:*:*:*:*", "cpeNameId": "47A4AB8A-037C-4B42-938F-9C9D67ED3A3C"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.10.15:*:*:*:*:*:*:*", "cpeNameId": "971CEC60-65E8-4C9D-83EB-0AB1DF9F025A"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.10.16:*:*:*:*:*:*:*", "cpeNameId": "B5C9C33B-7169-4538-BA59-9F247BFFFA0C"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.10.17:*:*:*:*:*:*:*", "cpeNameId": "E8358458-1B73-4108-96BC-BF70AA4D529B"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.10.18:*:*:*:*:*:*:*", "cpeNameId": "B2481DFD-7C33-41E5-B970-F9A0E95D938D"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.10.19:*:*:*:*:*:*:*", "cpeNameId": "CBEE1D24-02A9-4595-940B-3A2B2257CCBE"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.10.20:*:*:*:*:*:*:*", "cpeNameId": "7A37C18C-C9B5-432D-85A6-2B06588A7DAC"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.11.0:-:*:*:*:*:*:*", "cpeNameId": "B06A571F-3D2D-4C32-B11F-B918F18A561E"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.11.0:rc0:*:*:*:*:*:*", "cpeNameId": "4A52F1A6-97CD-487C-9713-7FACEC979B79"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.11.0:rc1:*:*:*:*:*:*", "cpeNameId": "256A989F-7E7A-40CD-B778-7D8AD0CCC88B"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.11.0:rc2:*:*:*:*:*:*", "cpeNameId": "0CAA36AA-C38A-46A0-9ACA-F7A62F89064A"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.11.0:rc3:*:*:*:*:*:*", "cpeNameId": "F30E9987-1BA1-48EC-95A0-6B41C81229AC"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.11.1:*:*:*:*:*:*:*", "cpeNameId": "8374BEFD-F99B-4D39-84ED-EE8946E68545"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.11.2:*:*:*:*:*:*:*", "cpeNameId": "16C2FAA9-7C0D-44DB-88E5-470CAE1E547F"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.11.3:*:*:*:*:*:*:*", "cpeNameId": "C4561A14-3217-44A9-B7E0-998C7445CD07"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.11.4:*:*:*:*:*:*:*", "cpeNameId": "7313AEFD-B77A-48F6-891C-C7E6B37D6C52"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.11.5:*:*:*:*:*:*:*", "cpeNameId": "C16CCE67-6CB1-4D23-ACDC-63C5276E2E72"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.11.6:*:*:*:*:*:*:*", "cpeNameId": "6A1D6DAC-64DE-4F02-861F-309E4FBE69A7"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.11.7:*:*:*:*:*:*:*", "cpeNameId": "93250C98-B9E2-49A7-B7A4-227DBDA48321"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.11.8:*:*:*:*:*:*:*", "cpeNameId": "974A8061-F552-44D7-9373-D04F2FF9B010"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.11.9:*:*:*:*:*:*:*", "cpeNameId": "B39386DA-14B7-42F5-A744-C00988E6253C"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.11.10:*:*:*:*:*:*:*", "cpeNameId": "C689DA47-ABA3-41EA-BBC4-6CBDB8B42B3E"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.11.11:*:*:*:*:*:*:*", "cpeNameId": "AC66141A-53E3-4D08-A61C-E3C968AA3D4C"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.11.12:*:*:*:*:*:*:*", "cpeNameId": "C95F8BE9-915B-4B7F-8FB8-AFF3E936A9B9"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.11.13:*:*:*:*:*:*:*", "cpeNameId": "11E06E49-457C-474C-80ED-69081EA83682"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.11.14:*:*:*:*:*:*:*", "cpeNameId": "F09EA752-F034-4323-AEA6-309D3294A7E7"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.11.15:*:*:*:*:*:*:*", "cpeNameId": "3F3F7D7C-1903-4239-BD80-E0EB39BFAA07"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.11.16:*:*:*:*:*:*:*", "cpeNameId": "AF80BE27-4894-4487-8676-12F76F930C5A"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.11.17:*:*:*:*:*:*:*", "cpeNameId": "FA4DAC67-E6F7-45D5-AE17-9BCD22984747"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.11.18:*:*:*:*:*:*:*", "cpeNameId": "09D03938-A85D-4449-8928-FF10A094AA36"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.11.19:*:*:*:*:*:*:*", "cpeNameId": "0C764A63-4B77-4E1B-B279-267CA3B40773"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.11.20:*:*:*:*:*:*:*", "cpeNameId": "F0C4260A-B9DE-4D74-ACD7-7DF34F90E008"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.12.0:-:*:*:*:*:*:*", "cpeNameId": "60352319-B2CE-4A31-9752-0362B0BEB81B"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.12.0:rc0:*:*:*:*:*:*", "cpeNameId": "56AD6373-95B5-4DEF-8084-E70E9D4302A7"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.12.0:rc1:*:*:*:*:*:*", "cpeNameId": "A9336FD0-4BB5-4E89-A3A2-71A188826C16"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.12.0:rc2:*:*:*:*:*:*", "cpeNameId": "3577155C-E141-44F2-B549-C306CE19EA05"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.12.1:*:*:*:*:*:*:*", "cpeNameId": "789BEF34-488E-40D5-9AF1-EAA0098C7811"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.12.2:*:*:*:*:*:*:*", "cpeNameId": "76A6CA2C-7FFD-4353-B8FC-6970CC3F3E68"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.12.3:*:*:*:*:*:*:*", "cpeNameId": "B6178C40-0F20-43F2-B0A9-2DDB87C19930"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.12.4:*:*:*:*:*:*:*", "cpeNameId": "26DCDCBF-5973-4833-A28D-CF563FE9D30B"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.12.5:*:*:*:*:*:*:*", "cpeNameId": "A05558F7-2CB9-4151-B985-56AD06677F3D"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.12.6:*:*:*:*:*:*:*", "cpeNameId": "07235A45-FB35-4432-A629-73F5DDF220FE"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.12.7:*:*:*:*:*:*:*", "cpeNameId": "9AAE2195-A725-48F4-8DF6-6CF0C93DD180"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.12.8:*:*:*:*:*:*:*", "cpeNameId": "1C158B54-7085-4DCB-8B8C-251FBE1B3FA5"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.12.9:*:*:*:*:*:*:*", "cpeNameId": "8BBD2202-CBC1-4970-8D1A-D39C287047D1"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.12.10:*:*:*:*:*:*:*", "cpeNameId": "ED37714A-5FFE-4ADC-AD38-4833F9576B04"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.12.11:*:*:*:*:*:*:*", "cpeNameId": "67693677-8F20-47FC-8E17-B7AEA04C8DAD"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.12.12:*:*:*:*:*:*:*", "cpeNameId": "7F0C568F-21E9-4EF8-B09B-8F9C128D12E5"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.12.13:*:*:*:*:*:*:*", "cpeNameId": "03DD27FB-43A0-4D51-B142-C9EB145994F3"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.12.14:*:*:*:*:*:*:*", "cpeNameId": "DAF9A3DC-9B79-40F8-A7E7-96478A06FF09"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.13.0:-:*:*:*:*:*:*", "cpeNameId": "71A36DB6-14A0-45A2-805A-B2B91D696E24"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.13.0:rc0:*:*:*:*:*:*", "cpeNameId": "5CDA866A-8B49-44D7-B6A1-747BE8BA45EB"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.13.0:rc1:*:*:*:*:*:*", "cpeNameId": "BC7C4592-0C43-4DA7-8B36-9586F47A6E9A"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.13.0:rc2:*:*:*:*:*:*", "cpeNameId": "B5B05AC7-7316-4AA2-AC5F-39728C52B392"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.13.0:rc3:*:*:*:*:*:*", "cpeNameId": "4B84F3B4-93BA-48ED-8A08-8E261D3C17AC"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.13.0:rc4:*:*:*:*:*:*", "cpeNameId": "F1A78734-4A3D-4B6D-B4AD-6FF3B0421230"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.13.0:rc5:*:*:*:*:*:*", "cpeNameId": "1A78B0DF-7FD5-4C38-8576-005C16902B5D"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.13.1:*:*:*:*:*:*:*", "cpeNameId": "240A984A-19C9-4D81-83FD-C098B0BB691C"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.13.2:*:*:*:*:*:*:*", "cpeNameId": "EC359918-274D-4CE5-82FB-03B399A59972"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.13.3:*:*:*:*:*:*:*", "cpeNameId": "8781713A-8119-450B-96D2-F3BFCA98E9F6"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.13.4:*:*:*:*:*:*:*", "cpeNameId": "5FA9E506-4553-4BB4-B92C-3A5D89212D95"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.13.5:*:*:*:*:*:*:*", "cpeNameId": "B92FA971-A655-4C40-B86B-40146AED1217"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.13.6:*:*:*:*:*:*:*", "cpeNameId": "D0EEEF05-86D3-458E-8DA4-7ABF8FD5F272"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.13.7:*:*:*:*:*:*:*", "cpeNameId": "3FC12A58-313B-4535-9A4D-7E61ABC21DB6"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.13.8:*:*:*:*:*:*:*", "cpeNameId": "A0C1F2D5-A18B-4689-B720-1BA9282D2850"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.13.9:*:*:*:*:*:*:*", "cpeNameId": "99CD5F2E-070E-41F8-966E-E0D213EA32B0"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.13.10:*:*:*:*:*:*:*", "cpeNameId": "6710F089-7496-4018-9871-D675CDB286D3"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.13.11:*:*:*:*:*:*:*", "cpeNameId": "F2028F1C-1F45-4188-81D8-91DAADA09AC6"}, {"cpeName": "cpe:2.3:a:cilium:cilium:1.13.12:*:*:*:*:*:*:*", "cpeNameId": "1A6BABD8-A510-457B-A4A4-EAFA37CF38EF"}]}} \ No newline at end of file diff --git a/cpematch/DA/DA6AAFBC-48CC-4DB2-85AD-3DF3134FC440.json b/cpematch/DA/DA6AAFBC-48CC-4DB2-85AD-3DF3134FC440.json new file mode 100644 index 00000000000..a811d5ca835 --- /dev/null +++ b/cpematch/DA/DA6AAFBC-48CC-4DB2-85AD-3DF3134FC440.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "DA6AAFBC-48CC-4DB2-85AD-3DF3134FC440", "criteria": "cpe:2.3:o:qualcomm:auto_5g_modem-rf_firmware:-:*:*:*:*:*:*:*", "lastModified": "2025-01-09T16:10:57.697", "cpeLastModified": "2025-01-09T16:10:57.697", "created": "2025-01-09T16:10:57.697", "status": "Active"}} \ No newline at end of file diff --git a/cpematch/DC/DC1760BC-FDD5-4044-BC22-E0BFF9FFC14B.json b/cpematch/DC/DC1760BC-FDD5-4044-BC22-E0BFF9FFC14B.json new file mode 100644 index 00000000000..41bdebde0a3 --- /dev/null +++ b/cpematch/DC/DC1760BC-FDD5-4044-BC22-E0BFF9FFC14B.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "DC1760BC-FDD5-4044-BC22-E0BFF9FFC14B", "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.6", "versionEndExcluding": "5.15.174", "lastModified": "2025-01-09T16:17:59.330", "cpeLastModified": "2025-01-09T16:17:59.330", "created": "2025-01-09T16:17:59.330", "status": "Active", "matches": [{"cpeName": "cpe:2.3:o:linux:linux_kernel:4.6:*:*:*:*:*:*:*", "cpeNameId": "513E9C7E-9CD0-453D-8044-1DCF043ABFC5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.6.1:*:*:*:*:*:*:*", "cpeNameId": "4282AD9E-F4CF-406C-82C6-E9C9C374341F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.6.2:*:*:*:*:*:*:*", "cpeNameId": "79BFAA05-E0AE-4B27-ADD2-043A5F1765DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.6.3:*:*:*:*:*:*:*", "cpeNameId": "3E22E014-6635-4FF5-AA51-0DFED4F7E4CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.6.4:*:*:*:*:*:*:*", "cpeNameId": "8D6F4072-8DBE-4637-AEBD-4E9123A6C9FA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.6.5:*:*:*:*:*:*:*", "cpeNameId": "FCCB037F-6B5B-4B3D-AB98-DBD4A72D60B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.6.6:*:*:*:*:*:*:*", "cpeNameId": "8D7C846C-1336-4777-8B52-9F75E281AFA3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.6.7:*:*:*:*:*:*:*", "cpeNameId": "55DA9CF3-9708-4520-AAA8-49B56B5BE4EE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7:*:*:*:*:*:*:*", "cpeNameId": "496F7DCA-CD17-40FF-A146-993EACB85937"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7:-:*:*:*:*:*:*", "cpeNameId": "7071E45E-8875-403E-900D-B18B78B2CFEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7:rc1:*:*:*:*:*:*", "cpeNameId": "8C21D0B7-9E71-4213-9146-7A85711840A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7:rc2:*:*:*:*:*:*", "cpeNameId": "1FD38972-2F84-4D2B-9C4D-B2A9B6F87BD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7:rc3:*:*:*:*:*:*", "cpeNameId": "CED8F0FE-B0EC-4F8C-B1B3-9690A5B2C427"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7:rc4:*:*:*:*:*:*", "cpeNameId": "805AF26E-C23B-45A2-8D72-F90A1FA0EC45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7:rc5:*:*:*:*:*:*", "cpeNameId": "FD8D5C3C-1EB6-454A-9CE8-51593EFE60B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7:rc6:*:*:*:*:*:*", "cpeNameId": "BF98A71F-D556-470F-9ECA-BA0D03919E44"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7:rc7:*:*:*:*:*:*", "cpeNameId": "3EA4A517-42BA-47DE-9435-3B2EE041B824"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7.1:*:*:*:*:*:*:*", "cpeNameId": "CB86EA69-EE70-45B2-B01F-5C3056895ADA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7.2:*:*:*:*:*:*:*", "cpeNameId": "85FB5454-E1F2-46B8-9CC7-ED28B950CC79"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7.3:*:*:*:*:*:*:*", "cpeNameId": "700591B1-5F5E-406D-AFD2-C171814E1762"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7.4:*:*:*:*:*:*:*", "cpeNameId": "5BCFD5D4-7494-49AA-B48C-E7C0B8D1881E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7.5:*:*:*:*:*:*:*", "cpeNameId": "446BC346-E811-407B-A029-1E5B1D6AF131"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7.6:*:*:*:*:*:*:*", "cpeNameId": "27FBC7AE-CBC8-417E-87F2-1FCBA47FFED2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7.7:*:*:*:*:*:*:*", "cpeNameId": "A9D96B8D-35D8-4E1E-A12B-EBDC81FF5F3C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7.8:*:*:*:*:*:*:*", "cpeNameId": "9CB7C2A8-EF23-4612-94CE-F37623A35CE5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7.9:*:*:*:*:*:*:*", "cpeNameId": "C38910BF-3CEA-4EAD-B391-942E990DB44D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7.10:*:*:*:*:*:*:*", "cpeNameId": "CD211D99-AE1B-4259-9D88-978BF4BBE266"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8:*:*:*:*:*:*:*", "cpeNameId": "7FCAC593-0734-4D3F-AD38-55AA21A05DD0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8:-:*:*:*:*:*:*", "cpeNameId": "A4B6A9C4-8211-4E88-A2C7-C36BBBE48E24"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8:rc1:*:*:*:*:*:*", "cpeNameId": "AEC7ED2E-5B13-4144-9ED7-A60EDE512955"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8:rc2:*:*:*:*:*:*", "cpeNameId": "7463D464-9817-44F7-BCCA-16947B5F7348"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8:rc3:*:*:*:*:*:*", "cpeNameId": "75C6B48C-182A-42B6-8BA1-53057660DA89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8:rc4:*:*:*:*:*:*", "cpeNameId": "958A88C5-9246-464A-9E6E-4340B03A6C1A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8:rc5:*:*:*:*:*:*", "cpeNameId": "3412A731-F526-44FA-9E1C-42A77C9B1E29"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8:rc6:*:*:*:*:*:*", "cpeNameId": "293C40EC-887D-42A6-92E8-CDF12F0E0BAA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.1:*:*:*:*:*:*:*", "cpeNameId": "C08959E8-EC01-42E8-AA0C-9BD6621B5FE8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.2:*:*:*:*:*:*:*", "cpeNameId": "FCCE5C13-84F1-456D-8172-79A4B66D4563"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.3:*:*:*:*:*:*:*", "cpeNameId": "8DD556A5-950A-4386-B290-3BA23F8FAE74"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.4:*:*:*:*:*:*:*", "cpeNameId": "11C5676D-8CC7-4CD7-B0DA-E6266DD066AD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.5:*:*:*:*:*:*:*", "cpeNameId": "F2B231B1-804A-4ADF-A8A6-9A2DB05DDF48"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.6:*:*:*:*:*:*:*", "cpeNameId": "2DCDBE9F-80D3-4A9A-8ABD-89872C2BF47F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.7:*:*:*:*:*:*:*", "cpeNameId": "C673A048-7856-4547-8E56-BC3557D9FD38"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.8:*:*:*:*:*:*:*", "cpeNameId": "398EDB8C-C735-4B41-994E-C207F198D072"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.9:*:*:*:*:*:*:*", "cpeNameId": "8256347C-D1FF-4A19-BD31-F78F0085A475"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.10:*:*:*:*:*:*:*", "cpeNameId": "A63AAEE8-FEEB-4399-8FD5-F0A90A5C4363"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.11:*:*:*:*:*:*:*", "cpeNameId": "0F6E054C-2FB7-4F32-A653-87E436E30BFE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.12:*:*:*:*:*:*:*", "cpeNameId": "7CE8E210-4DFE-4E5D-A6D9-BD991AC6F8BF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.13:*:*:*:*:*:*:*", "cpeNameId": "744AC014-50ED-4FB4-B8AD-D5C7CF3C7CC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.14:*:*:*:*:*:*:*", "cpeNameId": "498DABA6-7087-4364-8C81-5346BE483975"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.15:*:*:*:*:*:*:*", "cpeNameId": "37255C42-4B93-475E-9935-1F0446011768"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.16:*:*:*:*:*:*:*", "cpeNameId": "A8695620-4D6E-44B4-9FE8-95C9960C240E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.17:*:*:*:*:*:*:*", "cpeNameId": "96D4758C-FE52-4DA8-87E1-577A3FCEF236"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:*:*:*:*:*:*:*", "cpeNameId": "72D7C54B-6ED2-4DCE-A67F-C71FB93A5823"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:-:*:*:*:*:*:*", "cpeNameId": "12D10173-3DCE-40E4-9B99-B6C7A7454106"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:rc1:*:*:*:*:*:*", "cpeNameId": "DBD96821-B70D-475C-A38B-8416AC3576D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:rc2:*:*:*:*:*:*", "cpeNameId": "221A17CE-03D4-4662-924E-23E6426BB693"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:rc3:*:*:*:*:*:*", "cpeNameId": "5B3F2BE9-697B-4E5D-93D6-2127CE19550C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:rc4:*:*:*:*:*:*", "cpeNameId": "AD35E83C-A016-47F3-8D62-9C4A0306FAD4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:rc5:*:*:*:*:*:*", "cpeNameId": "E166DE00-D241-44A0-B75B-F067310B6FEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:rc6:*:*:*:*:*:*", "cpeNameId": "65CAACB6-7E01-48F5-98DF-E1923A3F01C5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:rc7:*:*:*:*:*:*", "cpeNameId": "F12E246D-AC32-42AB-A20F-5B54C2FFC059"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:rc8:*:*:*:*:*:*", "cpeNameId": "9896B1C6-0127-4248-A9D1-ABB07588F87A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.0:*:*:*:*:*:*:*", "cpeNameId": "C477CC26-17BE-46DA-8B9D-218D8AA51AD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.1:*:*:*:*:*:*:*", "cpeNameId": "8AF8815B-4FEF-483D-9CF9-C8BDDD29308D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.2:*:*:*:*:*:*:*", "cpeNameId": "A36A1BD4-0C74-4284-99A4-A53FEE3C8D65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.3:*:*:*:*:*:*:*", "cpeNameId": "AF59D9D7-96F7-41F7-8125-50592CE96BFF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.4:*:*:*:*:*:*:*", "cpeNameId": "CDB03998-BA6F-4F00-83F7-B54515BA4725"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.5:*:*:*:*:*:*:*", "cpeNameId": "0F83014C-CE37-47EA-9906-94AA2FED7DD9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.6:*:*:*:*:*:*:*", "cpeNameId": "2DACA082-8E91-493D-890B-FF9A78EEBC9A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.7:*:*:*:*:*:*:*", "cpeNameId": "8823DC1A-2E25-4E13-9F8F-E347154A7F72"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.8:*:*:*:*:*:*:*", "cpeNameId": "60679951-3906-4497-8CBC-8891BEE953B6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.9:*:*:*:*:*:*:*", "cpeNameId": "76030A2F-567A-493B-BD6C-09DB84455253"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.10:*:*:*:*:*:*:*", "cpeNameId": "527F6E5F-FDE0-4BEF-AB6F-9EAC1F6F6978"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.11:*:*:*:*:*:*:*", "cpeNameId": "CE3D179E-83C1-4BAE-8CB1-DE413B7901D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.12:*:*:*:*:*:*:*", "cpeNameId": "BD502B1D-8E7D-4AD4-9011-E616315740C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.13:*:*:*:*:*:*:*", "cpeNameId": "4A96891C-E4D8-4BBD-8C3A-8BEC1EDD6DF7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.14:*:*:*:*:*:*:*", "cpeNameId": "049B9559-3317-43D0-BB9E-2008182328D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.15:*:*:*:*:*:*:*", "cpeNameId": "3BAD5668-2640-4602-9837-07D764990011"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.16:*:*:*:*:*:*:*", "cpeNameId": "B76E758C-F23C-4E81-8D89-6B3C331DF70A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.17:*:*:*:*:*:*:*", "cpeNameId": "558B0C0A-04D6-41D1-AED9-4D16159FAA64"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.18:*:*:*:*:*:*:*", "cpeNameId": "BC3F9201-BBD4-48C1-9254-14DDCC7A6B7E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.19:*:*:*:*:*:*:*", "cpeNameId": "E8A01AF1-8E23-40E5-A956-AF00A7A47BA0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.20:*:*:*:*:*:*:*", "cpeNameId": "2CAF46F1-2D12-41FC-ABF2-C6F56A9CE410"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.21:*:*:*:*:*:*:*", "cpeNameId": "7A2DC702-A782-4D15-9435-ACC0778F3FB3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.22:*:*:*:*:*:*:*", "cpeNameId": "D2916473-F575-4728-B2EC-60EE62AB8BF7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.23:*:*:*:*:*:*:*", "cpeNameId": "B6409273-5794-4B9E-BDD5-7FCFCF339511"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.24:*:*:*:*:*:*:*", "cpeNameId": "2893EFED-04F5-42B0-96B4-FB29EEFAA9EE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.25:*:*:*:*:*:*:*", "cpeNameId": "F1EC5B2F-8765-464D-A5A2-DEF282D3576A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.26:*:*:*:*:*:*:*", "cpeNameId": "CE231956-F740-4AA4-9750-A9F1E16C7429"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.27:*:*:*:*:*:*:*", "cpeNameId": "B08B4A4D-A673-49B9-9809-6C8EB2D8CCFA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.28:*:*:*:*:*:*:*", "cpeNameId": "25127A10-99C3-4B29-9037-752644FEDAA3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.29:*:*:*:*:*:*:*", "cpeNameId": "7C9B9FDE-13EC-442C-A753-05D753AF7F2F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.30:*:*:*:*:*:*:*", "cpeNameId": "60DFABB9-1C9B-4A43-8A5D-4B51C46D6CF2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.31:*:*:*:*:*:*:*", "cpeNameId": "55547C90-57BE-4B48-80BC-5248CF85A54D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.32:*:*:*:*:*:*:*", "cpeNameId": "4FEC2A07-6C9E-4B57-9F1D-A8C7A2531042"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.33:*:*:*:*:*:*:*", "cpeNameId": "3A3CC360-6DB0-4058-A637-BEA9F10F3ECC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.34:*:*:*:*:*:*:*", "cpeNameId": "74A4841B-22B2-45B0-A608-52579D2983E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.35:*:*:*:*:*:*:*", "cpeNameId": "F5D48DE7-BCE0-4195-B8E2-E3A8C9884647"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.36:*:*:*:*:*:*:*", "cpeNameId": "15A99A35-647E-4AFF-B6E2-0652FE1F9FFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.37:*:*:*:*:*:*:*", "cpeNameId": "51FDBF94-6126-4C97-9650-6902E77C1811"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.38:*:*:*:*:*:*:*", "cpeNameId": "9A7EA0F2-DFB9-4CF2-82D8-F5C569BA5CD7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.39:*:*:*:*:*:*:*", "cpeNameId": "6C245624-3821-4A71-8682-AB66074B82B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.40:*:*:*:*:*:*:*", "cpeNameId": "DD0E98E7-27A5-4BDD-8907-53DA5C31F7A0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.41:*:*:*:*:*:*:*", "cpeNameId": "C879D912-54D4-4C73-91B2-500D49230B7A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.42:*:*:*:*:*:*:*", "cpeNameId": "85E02B17-E410-42FE-A83B-B8B4E7EBB532"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.43:*:*:*:*:*:*:*", "cpeNameId": "56E7B421-D6F4-45BB-A4A7-37AA444554F7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.44:*:*:*:*:*:*:*", "cpeNameId": "146F13C7-D0C9-4829-99CB-36C12B673BF9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.45:*:*:*:*:*:*:*", "cpeNameId": "1BC5E0A8-84C0-44E1-9DFD-5C633FD66E42"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.46:*:*:*:*:*:*:*", "cpeNameId": "965C07B8-7491-41D5-BFFF-C2DC61675475"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.47:*:*:*:*:*:*:*", "cpeNameId": "6F99B518-6BC7-4B89-8C2F-2A61C8F1A66C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.48:*:*:*:*:*:*:*", "cpeNameId": "1654578E-2D00-498E-9EF1-D64BBBBA7070"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.49:*:*:*:*:*:*:*", "cpeNameId": "BC5CCADF-5DEA-4540-8D2F-478F3175DA62"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.50:*:*:*:*:*:*:*", "cpeNameId": "67B5EA2D-9D68-4247-8C79-6F92FD8D39F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.51:*:*:*:*:*:*:*", "cpeNameId": "62B20DEB-030A-4CED-93BC-3F6F4D5AD54B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.52:*:*:*:*:*:*:*", "cpeNameId": "66BDA9E0-B507-4116-9FFC-6DBFE79A3CD4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.53:*:*:*:*:*:*:*", "cpeNameId": "76AB10DC-B6FD-4E05-A1E6-09C04A8A1B13"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.54:*:*:*:*:*:*:*", "cpeNameId": "6461BBE3-2AAA-4975-A75F-F561D3C1B753"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.55:*:*:*:*:*:*:*", "cpeNameId": "957D4BA7-C0CC-482D-8844-03AEBFE9F966"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.56:*:*:*:*:*:*:*", "cpeNameId": "4B6981FD-9D76-418C-BC72-EC1900EA9C04"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.57:*:*:*:*:*:*:*", "cpeNameId": "22E939B7-D460-4BE9-9529-0E26B53304B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.58:*:*:*:*:*:*:*", "cpeNameId": "CC981857-5731-4095-92A2-D10F6F27F85E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.59:*:*:*:*:*:*:*", "cpeNameId": "EB3A0428-3B0E-4608-9D96-AC0687921B92"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.60:*:*:*:*:*:*:*", "cpeNameId": "F1134646-1E83-459B-9E11-B1893162D4B6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.61:*:*:*:*:*:*:*", "cpeNameId": "01F91BC8-9830-49E4-AFCA-5910983AFA96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.62:*:*:*:*:*:*:*", "cpeNameId": "C5611992-8FA6-489D-B4C7-9871472702C4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.63:*:*:*:*:*:*:*", "cpeNameId": "B7E52E14-5B55-4458-9BB8-5A1718BAD459"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.64:*:*:*:*:*:*:*", "cpeNameId": "8407449D-67A3-4594-9340-03C4A009828C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.65:*:*:*:*:*:*:*", "cpeNameId": "0B393B17-93FA-4A1F-AF33-86AFA723BC6C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.66:*:*:*:*:*:*:*", "cpeNameId": "3F002BC4-16F2-44FB-842E-7F1CDBA7D2D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.67:*:*:*:*:*:*:*", "cpeNameId": "AD88F263-F5B8-4027-A433-B33EB293F8C7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.68:*:*:*:*:*:*:*", "cpeNameId": "998A1D28-491B-49AF-BEBA-0B7C55016EDB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.69:*:*:*:*:*:*:*", "cpeNameId": "C00A621D-4F1D-4AD8-BE42-3E584F545757"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.70:*:*:*:*:*:*:*", "cpeNameId": "4A8C8214-FDDA-4A1B-9520-756DE05E1C8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.71:*:*:*:*:*:*:*", "cpeNameId": "69E6FBB1-D0B6-486C-B905-54D292ED0BBF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.72:*:*:*:*:*:*:*", "cpeNameId": "04D7688B-E9C8-4CA0-9564-06136BD00399"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.73:*:*:*:*:*:*:*", "cpeNameId": "A11B2E7E-F239-49F6-9B0A-EB897B935734"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.74:*:*:*:*:*:*:*", "cpeNameId": "09B990BA-BB96-40E6-936B-A42138DA410E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.75:*:*:*:*:*:*:*", "cpeNameId": "EE93F1AB-E1B2-4D42-8482-FC0D5232EDCF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.76:*:*:*:*:*:*:*", "cpeNameId": "E094CC04-C34E-45D2-B7BD-8344494F2AF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.77:*:*:*:*:*:*:*", "cpeNameId": "A7AD03A1-2D39-498C-B6FC-6288DFE6A0B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.78:*:*:*:*:*:*:*", "cpeNameId": "C7332F79-76CA-466E-974C-6D94B2028E83"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.79:*:*:*:*:*:*:*", "cpeNameId": "4C7E0132-E639-4C9E-ACD4-E68A1D16EE27"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.80:*:*:*:*:*:*:*", "cpeNameId": "0BA2A075-D652-4220-80D3-765F2E0F1248"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.81:*:*:*:*:*:*:*", "cpeNameId": "6D6C7CFE-7944-44FE-B8D0-13A87E781C59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.82:*:*:*:*:*:*:*", "cpeNameId": "BD198E06-E1B2-48AD-8236-1026D62FF668"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.83:*:*:*:*:*:*:*", "cpeNameId": "9E1B704D-FA55-4EE9-93AE-345D9CEC178C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.84:*:*:*:*:*:*:*", "cpeNameId": "2AD133E5-08E3-4456-9D3E-E2E42247222A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.85:*:*:*:*:*:*:*", "cpeNameId": "A038FF7C-6591-418B-89B7-AA36E91E4693"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.86:*:*:*:*:*:*:*", "cpeNameId": "17A55453-113E-4F83-9477-C3B94C21751D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.87:*:*:*:*:*:*:*", "cpeNameId": "64DA4194-F0DF-4AC6-A84F-00718C1D262B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.88:*:*:*:*:*:*:*", "cpeNameId": "19541D86-197B-4F32-9541-1ED6128DD8D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.89:*:*:*:*:*:*:*", "cpeNameId": "08118401-AEBB-4CE7-B76D-3017139D0153"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.90:*:*:*:*:*:*:*", "cpeNameId": "DEC38CAA-D49A-4D73-9E8B-92DD13268405"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.91:*:*:*:*:*:*:*", "cpeNameId": "B8923DAF-E99E-4721-B537-489F9195A78E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.92:*:*:*:*:*:*:*", "cpeNameId": "6979C8A1-9270-4687-9A67-0EDF32FB5003"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.93:*:*:*:*:*:*:*", "cpeNameId": "B30A094A-C263-431D-89B2-B54478A622BA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.94:*:*:*:*:*:*:*", "cpeNameId": "DC1C8AC1-972B-4950-AFAE-B2D68A94E1B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.95:*:*:*:*:*:*:*", "cpeNameId": "62FF165D-2752-4AB8-B3B9-CD8FBFABD3DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.96:*:*:*:*:*:*:*", "cpeNameId": "A0B93A29-FEE2-4EA3-87E8-DF6419F51030"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.97:*:*:*:*:*:*:*", "cpeNameId": "3C34F07E-8DBA-4D82-B8FE-1AFEEF9B2BF9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.98:*:*:*:*:*:*:*", "cpeNameId": "AAB29E6F-C210-4EA2-B2F8-5E1B2041B0B2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.99:*:*:*:*:*:*:*", "cpeNameId": "75652929-F44D-4DF1-8757-F7A8C10D9793"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.100:*:*:*:*:*:*:*", "cpeNameId": "C1AB8FB2-09C2-4A4F-B4EE-E581035E270E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.101:*:*:*:*:*:*:*", "cpeNameId": "0FCB52E4-4EA8-4555-B9A1-EEB1056DC5B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.102:*:*:*:*:*:*:*", "cpeNameId": "57C00F3F-2CEE-4A7F-947F-7A53CA00E52A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.103:*:*:*:*:*:*:*", "cpeNameId": "16CB7735-79B7-4335-8184-6D29A5C85840"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.104:*:*:*:*:*:*:*", "cpeNameId": "8ED9B3BD-8DDA-4465-BF33-9291986917AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.105:*:*:*:*:*:*:*", "cpeNameId": "3400C155-68D5-4DD8-807C-1EF4A4E1BB32"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.106:*:*:*:*:*:*:*", "cpeNameId": "A8B564E7-8A6F-466F-BC53-1B839D9FD3DE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.107:*:*:*:*:*:*:*", "cpeNameId": "F648ABD4-CD53-42CE-9C51-DFBD245FACB4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.108:*:*:*:*:*:*:*", "cpeNameId": "23D39FA8-42FB-43B7-92C7-D831548A0935"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.109:*:*:*:*:*:*:*", "cpeNameId": "5B96FEF9-EE49-4B1F-A218-B141E954CFD2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.110:*:*:*:*:*:*:*", "cpeNameId": "5A3CA9E6-CACE-4937-96F4-B8D45D43AAD2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.111:*:*:*:*:*:*:*", "cpeNameId": "B7084F8D-AD91-4EF1-9901-21AB7E8239CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.112:*:*:*:*:*:*:*", "cpeNameId": "3E544363-B63B-44C1-9F2E-597BE9EF2E65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.113:*:*:*:*:*:*:*", "cpeNameId": "B1C84F8A-2DA9-41BE-872B-B00A297AEA2D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.114:*:*:*:*:*:*:*", "cpeNameId": "6F69AA79-57C2-4B8E-9F8D-5AAFACAD0248"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.115:*:*:*:*:*:*:*", "cpeNameId": "FD6D4727-C95F-4515-8D4A-9D6FDC28C793"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.116:*:*:*:*:*:*:*", "cpeNameId": "01BC52F7-3028-480F-8E37-52A7715AC90A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.117:*:*:*:*:*:*:*", "cpeNameId": "60A7B794-E16E-477D-A4C1-ECA62111DC18"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.118:*:*:*:*:*:*:*", "cpeNameId": "F663FEC6-B040-4A0E-A396-83008CF0ABAB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.119:*:*:*:*:*:*:*", "cpeNameId": "BEFDB30B-BCC5-47F0-B733-2E581725D18A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.120:*:*:*:*:*:*:*", "cpeNameId": "4C86DF14-070B-4C3D-A141-31F7FCA61C34"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.121:*:*:*:*:*:*:*", "cpeNameId": "E3406F7B-D836-49DD-8EFE-AE315BBB19FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.122:*:*:*:*:*:*:*", "cpeNameId": "DB62435E-44D2-471D-BA63-8E6FAE8D278F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.123:*:*:*:*:*:*:*", "cpeNameId": "C28E5075-1E51-43C2-BC69-1E248F152A9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.124:*:*:*:*:*:*:*", "cpeNameId": "76B2228F-19B1-4B9B-9F0F-9DC7CE0DDEFB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.125:*:*:*:*:*:*:*", "cpeNameId": "0B3C0A1E-4727-4E70-8AB9-240A38FA2C5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.126:*:*:*:*:*:*:*", "cpeNameId": "78A85D5F-28F1-456B-A1F2-F73FCDCD8442"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.127:*:*:*:*:*:*:*", "cpeNameId": "07FFD4BD-5B60-41C7-818B-C3AB067ABCF8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.128:*:*:*:*:*:*:*", "cpeNameId": "B2882FB9-CA5D-4C93-BB74-931D3EC95036"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.129:*:*:*:*:*:*:*", "cpeNameId": "1CBF16B6-7148-41A0-8BDF-BAD70ECB2360"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.130:*:*:*:*:*:*:*", "cpeNameId": "F106F4F0-7318-4685-A521-D45D280E0BF8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.131:*:*:*:*:*:*:*", "cpeNameId": "81304DDD-B706-4473-9635-1659080883DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.132:*:*:*:*:*:*:*", "cpeNameId": "EB41A9BB-D88D-49F1-83CD-523699801BF2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.133:*:*:*:*:*:*:*", "cpeNameId": "F8E3204C-6023-4133-9A7F-43F9D2AB144D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.134:*:*:*:*:*:*:*", "cpeNameId": "2A36AD35-A964-4C7A-B1D8-0F78188EE2DE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.135:*:*:*:*:*:*:*", "cpeNameId": "8FAABE9A-8B07-4930-85A9-6616D502F568"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.136:*:*:*:*:*:*:*", "cpeNameId": "9D0664AA-A1FB-4ED3-913B-8390C5192A5A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.137:*:*:*:*:*:*:*", "cpeNameId": "668A5320-81CD-4C09-AE34-9EAAB732DBBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.138:*:*:*:*:*:*:*", "cpeNameId": "3FB2B6F3-F840-47ED-A6BD-2BCA441B6108"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.139:*:*:*:*:*:*:*", "cpeNameId": "9F422368-B0CB-4DD5-BC42-60E4BECD4404"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.140:*:*:*:*:*:*:*", "cpeNameId": "3D3E1A1F-0BED-4FE6-9E2F-745C782AFCB5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.141:*:*:*:*:*:*:*", "cpeNameId": "DACB210F-4E23-4FFE-B706-5889289531D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.142:*:*:*:*:*:*:*", "cpeNameId": "781F8D80-4176-4FC3-9B77-A1BB0C88AC65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.143:*:*:*:*:*:*:*", "cpeNameId": "1F4415C4-3002-4A32-A992-54DC73CAF533"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.144:*:*:*:*:*:*:*", "cpeNameId": "7089C196-FD3C-4675-9BE6-2666C406C5D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.145:*:*:*:*:*:*:*", "cpeNameId": "9590F0EF-8260-4B9F-B66C-3E184AC93E63"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.146:*:*:*:*:*:*:*", "cpeNameId": "4FA1CA12-EB95-48B5-98F3-953859E43ED5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.147:*:*:*:*:*:*:*", "cpeNameId": "ED73D0A6-55DA-4D5B-BA38-9BCD74613827"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.148:*:*:*:*:*:*:*", "cpeNameId": "BD154522-4E63-4FB9-ABC2-77F7850B502B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.149:*:*:*:*:*:*:*", "cpeNameId": "E765B3E4-E2B5-42A5-94AD-5E3D3283B7B2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.150:*:*:*:*:*:*:*", "cpeNameId": "AAC26F5B-06AE-49E2-8FE8-17D01ABD1BEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.151:*:*:*:*:*:*:*", "cpeNameId": "91B291A8-CD84-4201-93AD-4B7981CEBDBC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.152:*:*:*:*:*:*:*", "cpeNameId": "A13E73C3-8219-4909-B7FB-312605EFE682"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.153:*:*:*:*:*:*:*", "cpeNameId": "3439519B-F130-44DB-8EF6-C65A2EF5AF5C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.154:*:*:*:*:*:*:*", "cpeNameId": "B93C5FAB-C686-4B8C-B0D5-20C03F3847DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.155:*:*:*:*:*:*:*", "cpeNameId": "F241AC0B-B446-45F4-9A2E-B4B259F4F173"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.156:*:*:*:*:*:*:*", "cpeNameId": "93A18F08-8AD4-4FD2-9A02-E58939D514FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.157:*:*:*:*:*:*:*", "cpeNameId": "334BC1BD-BCDE-4017-930B-8E2E3685773A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.158:*:*:*:*:*:*:*", "cpeNameId": "27100D3E-E3D1-4917-959E-CF6C9CB4838A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.159:*:*:*:*:*:*:*", "cpeNameId": "E9B9F90B-EDBF-452D-9EED-5906465EC142"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.160:*:*:*:*:*:*:*", "cpeNameId": "4B9782F4-75EF-407A-A270-6B9F10B3AB61"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.161:*:*:*:*:*:*:*", "cpeNameId": "4E536BAB-E89A-4298-A620-65E2EA131D54"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.162:*:*:*:*:*:*:*", "cpeNameId": "0234E459-D46E-4FF6-97A0-78C8D0C1413F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.163:*:*:*:*:*:*:*", "cpeNameId": "5672A718-38DA-42BD-8D94-C44CB7EB5B0D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.164:*:*:*:*:*:*:*", "cpeNameId": "7F359B5A-FC0F-4AC9-B676-EE99B7ACF987"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.165:*:*:*:*:*:*:*", "cpeNameId": "C12A4D9B-491F-4FCD-8F98-ACE8680C3DB9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.166:*:*:*:*:*:*:*", "cpeNameId": "A616B27B-8D52-4876-B9DA-49AE47E47B14"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.167:*:*:*:*:*:*:*", "cpeNameId": "A9FB1FBC-3EAC-4068-95C6-A8449AA30236"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.168:*:*:*:*:*:*:*", "cpeNameId": "56F2978B-DD10-4874-9226-22B3EF53C34A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.169:*:*:*:*:*:*:*", "cpeNameId": "77DCE15B-B6AA-4BFA-9B0E-2A4AA9751AA5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.170:*:*:*:*:*:*:*", "cpeNameId": "5B59BFDD-BD40-46BB-BA2E-0AAD30C6906C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.171:*:*:*:*:*:*:*", "cpeNameId": "2BE79BFF-5683-4CA6-B2C9-6001FD77BC99"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.172:*:*:*:*:*:*:*", "cpeNameId": "50BE4FDF-F0EE-4CC4-837F-576E3E212A2F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.173:*:*:*:*:*:*:*", "cpeNameId": "96A6E180-7005-48FA-A98B-DC22F7815B81"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.174:*:*:*:*:*:*:*", "cpeNameId": "F6CD2092-770F-4F3E-9661-06699D965D76"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.175:*:*:*:*:*:*:*", "cpeNameId": "EBF1E1E4-AD08-4B18-9F12-B4EEE194638D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.176:*:*:*:*:*:*:*", "cpeNameId": "6A0486A1-F99F-4E4B-AC39-C12F5D674339"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.177:*:*:*:*:*:*:*", "cpeNameId": "DF9B41BC-B6C2-48AC-9AEE-67A846D344A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.178:*:*:*:*:*:*:*", "cpeNameId": "C2E8FEC6-59E1-4AF4-94EE-7A676B5A2C82"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.179:*:*:*:*:*:*:*", "cpeNameId": "60FF0BF4-4505-484E-8152-B3514FCF95F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.180:*:*:*:*:*:*:*", "cpeNameId": "5DAFDB50-AB4D-4F94-B465-07D40DA4AFE9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.181:*:*:*:*:*:*:*", "cpeNameId": "4CBFF0C0-9773-47CF-AD66-EE00279272C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.182:*:*:*:*:*:*:*", "cpeNameId": "BB407A40-747A-4CF3-8A14-8296DBB7BF38"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.183:*:*:*:*:*:*:*", "cpeNameId": "1386612C-94AB-4DD6-90F9-23D697BD76FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.184:*:*:*:*:*:*:*", "cpeNameId": "0476CD76-2D3E-45FA-88DB-83DA9330CD85"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.185:*:*:*:*:*:*:*", "cpeNameId": "5964859C-6BA3-4286-B050-83960EF7EF71"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.186:*:*:*:*:*:*:*", "cpeNameId": "CC9E8E7E-93FE-4DB7-AF1B-8F7E63CBA37F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.187:*:*:*:*:*:*:*", "cpeNameId": "223FEF84-695D-44FF-9C33-47F8CBFDD953"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.188:*:*:*:*:*:*:*", "cpeNameId": "0CE412FB-E60A-4DFB-8094-EFBE693FF4A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.189:*:*:*:*:*:*:*", "cpeNameId": "501D8AD1-97D7-49C1-B512-061538B8F73F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.190:*:*:*:*:*:*:*", "cpeNameId": "0A2332E6-CC09-486E-A662-9766D623BF34"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.191:*:*:*:*:*:*:*", "cpeNameId": "EDEFF704-F4A6-4282-9428-DEFEFEB4A93A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.192:*:*:*:*:*:*:*", "cpeNameId": "1181DE8F-7EE2-4EC3-8F84-8B313F65047A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.193:*:*:*:*:*:*:*", "cpeNameId": "78EF3A83-66F1-40F3-9C3C-25AFF40BE88C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.194:*:*:*:*:*:*:*", "cpeNameId": "8D611766-BB3A-4528-B1CE-74CB0EAE4467"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.195:*:*:*:*:*:*:*", "cpeNameId": "0C729423-E12A-4F19-9753-94CE465C6283"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.196:*:*:*:*:*:*:*", "cpeNameId": "8F11E143-CE43-4B63-BE73-0A33CD99110D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.197:*:*:*:*:*:*:*", "cpeNameId": "FEB027DD-E13F-4A38-876F-9AFB1E0BE409"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.198:*:*:*:*:*:*:*", "cpeNameId": "6737850B-DE08-4472-B2C7-F60DCDB95CBE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.199:*:*:*:*:*:*:*", "cpeNameId": "C6EA9B80-7284-47CF-954F-EEA349A002FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.200:*:*:*:*:*:*:*", "cpeNameId": "C33F1CE0-023E-4BD6-A32C-2AD5847A9797"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.201:*:*:*:*:*:*:*", "cpeNameId": "FE090B8A-1060-42D0-BB85-D17C7A299D65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.202:*:*:*:*:*:*:*", "cpeNameId": "7F50D385-2E96-471F-B48A-36C222DED1F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.203:*:*:*:*:*:*:*", "cpeNameId": "243CF5E0-1BA3-4C09-830B-F3E5CAE77985"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.204:*:*:*:*:*:*:*", "cpeNameId": "571B9EE4-5DD5-4B3C-842F-B230D4577C98"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.205:*:*:*:*:*:*:*", "cpeNameId": "55A5490D-D0D4-4F11-80E6-6CF300B18FF8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.206:*:*:*:*:*:*:*", "cpeNameId": "97286FA5-0BCE-42D1-A0D7-1B4AD3F78A31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.207:*:*:*:*:*:*:*", "cpeNameId": "C54631BB-ABC0-4711-A5EE-CCFA9870260F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.208:*:*:*:*:*:*:*", "cpeNameId": "0939F707-4609-42F2-B906-3FC03BBAC7A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.209:*:*:*:*:*:*:*", "cpeNameId": "257E4F1B-512E-4A55-9819-3A0A0EFC431F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.210:*:*:*:*:*:*:*", "cpeNameId": "6214CC75-234D-4219-9F50-28E5D54F6661"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.210-1:*:*:*:*:*:*:*", "cpeNameId": "11E87954-7E16-41C9-A673-08D5FD40B194"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.211:*:*:*:*:*:*:*", "cpeNameId": "F95B5FE1-6964-4158-9066-9B148AA7C8AD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.212:*:*:*:*:*:*:*", "cpeNameId": "E0268D70-A7DC-4B52-AE6F-C459A59F0CF9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.213:*:*:*:*:*:*:*", "cpeNameId": "51275AB0-D417-4CE6-8847-B338B340E913"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.214:*:*:*:*:*:*:*", "cpeNameId": "50D2F1EA-0B29-4FDB-8221-BD3C1A800B1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.215:*:*:*:*:*:*:*", "cpeNameId": "12A80615-D31E-44C9-A367-355599328039"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.216:*:*:*:*:*:*:*", "cpeNameId": "A38157E4-F68B-4E60-AF7E-FD7BF9F0E6A0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.217:*:*:*:*:*:*:*", "cpeNameId": "BC328F65-1554-4FF9-A440-C6A6DC08971F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.218:*:*:*:*:*:*:*", "cpeNameId": "E7E67420-ABB7-4AB3-8A93-EF6DEFFB08CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.219:*:*:*:*:*:*:*", "cpeNameId": "0176C290-5F23-4D25-90E0-CFC2FD39785E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.220:*:*:*:*:*:*:*", "cpeNameId": "D89672F3-3069-4FA7-876C-5486351A4210"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.221:*:*:*:*:*:*:*", "cpeNameId": "1C4FC865-E82F-4AAA-BDB2-48CBAF2CEDDB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.222:*:*:*:*:*:*:*", "cpeNameId": "E9641D38-4E53-4C16-9DCB-1ABEAB859051"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.223:*:*:*:*:*:*:*", "cpeNameId": "7D0DB446-81CF-48A4-8FDF-82DB13F9EEFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.224:*:*:*:*:*:*:*", "cpeNameId": "A36C68E0-7DAF-47AE-84CE-355D19D2A184"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.225:*:*:*:*:*:*:*", "cpeNameId": "1A4AF8D7-ABBC-406D-8A9B-6064D1C0FB3A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.226:*:*:*:*:*:*:*", "cpeNameId": "DB3D137C-BAFE-4A08-A5F6-CF9CE3ECF4BA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.227:*:*:*:*:*:*:*", "cpeNameId": "AE161CD5-8D27-4A12-B17B-D329F43349D6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.228:*:*:*:*:*:*:*", "cpeNameId": "0723CFAE-5DBC-4043-AF8F-0C597B0CEAB3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.229:*:*:*:*:*:*:*", "cpeNameId": "D47DB171-26CB-4971-9D2A-7E6B574DCB33"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.230:*:*:*:*:*:*:*", "cpeNameId": "5FFE79E1-68FA-45D6-81A7-DC9AEA1554EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.231:*:*:*:*:*:*:*", "cpeNameId": "2CF57430-4909-48C5-967D-3DB6853FAAFC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.232:*:*:*:*:*:*:*", "cpeNameId": "6BFB7AAB-A1B4-403E-A26B-F14B8FD509C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.233:*:*:*:*:*:*:*", "cpeNameId": "31E31C3B-F769-4B65-AC62-A281A99ECA2D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.234:*:*:*:*:*:*:*", "cpeNameId": "6CFE18B9-2BF3-4BDA-9A19-9A8F945F039F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.235:*:*:*:*:*:*:*", "cpeNameId": "3EF2F123-9B38-401A-81CD-DCDF786F1FBC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.236:*:*:*:*:*:*:*", "cpeNameId": "0B4E0DD4-C051-4F64-B333-B896B86813D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.237:*:*:*:*:*:*:*", "cpeNameId": "57C1E65F-0E87-4296-B131-25A82A0A9667"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.238:*:*:*:*:*:*:*", "cpeNameId": "2BD9177D-1F32-4B5A-A11F-F779CC665C49"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.239:*:*:*:*:*:*:*", "cpeNameId": "737F1344-63A8-42A5-BD48-891A8E17769A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.240:*:*:*:*:*:*:*", "cpeNameId": "E1BAD9D3-D0F2-42CC-93A3-F5B6A1CEC9D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.241:*:*:*:*:*:*:*", "cpeNameId": "CA99B95F-7BBC-40BE-AA68-6A10CE2C8D4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.242:*:*:*:*:*:*:*", "cpeNameId": "A93EB856-783D-4DF9-8387-0BD4C09F9AD0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.243:*:*:*:*:*:*:*", "cpeNameId": "48503212-F9A6-4AB5-8DE9-374622582C15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.244:*:*:*:*:*:*:*", "cpeNameId": "C8F1F3B2-9299-403A-8118-461511F3F50B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.245:*:*:*:*:*:*:*", "cpeNameId": "197B1275-A4E8-4582-ACE2-4C5C5C8C5474"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.246:*:*:*:*:*:*:*", "cpeNameId": "9B64D972-8C44-4B79-9E76-8ECDEBCEBC0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.247:*:*:*:*:*:*:*", "cpeNameId": "5754042A-B1DB-4AD4-B388-76DE9263DC67"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.248:*:*:*:*:*:*:*", "cpeNameId": "2E8BDAA4-D539-42BA-B41E-4EF7C8979B48"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.249:*:*:*:*:*:*:*", "cpeNameId": "03C647CD-10CD-446B-BE6E-3D76C120F364"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.250:*:*:*:*:*:*:*", "cpeNameId": "2F217035-1A6D-43B9-A24D-6F8990190B31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.251:*:*:*:*:*:*:*", "cpeNameId": "4B197B49-5F9B-4B96-B12A-2B471778F13C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.252:*:*:*:*:*:*:*", "cpeNameId": "2481C266-83AA-4815-8405-7C2734A77FB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.253:*:*:*:*:*:*:*", "cpeNameId": "93A07E06-FA31-4E3F-9DAB-CB3846386198"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.254:*:*:*:*:*:*:*", "cpeNameId": "A1AF307F-312C-4040-8F95-9ED0230288F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.255:*:*:*:*:*:*:*", "cpeNameId": "38C39A6F-9AE7-4CB6-B524-1E1F10665007"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.256:*:*:*:*:*:*:*", "cpeNameId": "97AFE000-934E-495E-90DA-C6B13B3C2585"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.257:*:*:*:*:*:*:*", "cpeNameId": "9A1B0076-9309-4165-84AB-3C627316F802"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.258:*:*:*:*:*:*:*", "cpeNameId": "02108CDE-7848-47AA-AC02-43FF6B596975"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.259:*:*:*:*:*:*:*", "cpeNameId": "1C0EC444-2A66-4716-AC4A-4660ECFC5619"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.260:*:*:*:*:*:*:*", "cpeNameId": "FEE507B5-A54C-4EBD-BD63-4CC37CE9C472"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.261:*:*:*:*:*:*:*", "cpeNameId": "D30AE27B-C292-40B5-9296-B58140B669F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.262:*:*:*:*:*:*:*", "cpeNameId": "381C2F4E-4F46-4C12-9112-0A0F60A2F50E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.263:*:*:*:*:*:*:*", "cpeNameId": "D3492ED4-57AE-495F-9627-20898D0BB155"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.264:*:*:*:*:*:*:*", "cpeNameId": "BC81C283-32BE-483A-8017-C90388AE2515"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.265:*:*:*:*:*:*:*", "cpeNameId": "47C4B68F-6562-41A2-B6BA-1E3C60FA2FA1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.266:*:*:*:*:*:*:*", "cpeNameId": "7DE0121E-5AD4-4D6C-8406-2FB7D997F256"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.267:*:*:*:*:*:*:*", "cpeNameId": "6A265E87-7736-450B-8A3C-93FC8AA776C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.268:*:*:*:*:*:*:*", "cpeNameId": "2640A395-FEBD-4AD6-9FC8-4D8D1A906F80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.269:*:*:*:*:*:*:*", "cpeNameId": "64CF3CC1-31A9-467A-847E-F03C704256C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.270:*:*:*:*:*:*:*", "cpeNameId": "6030D6B8-14B2-476D-9275-AF6F52DD4DD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.271:*:*:*:*:*:*:*", "cpeNameId": "BD41D072-F5AF-42E0-9922-B331CB051449"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.272:*:*:*:*:*:*:*", "cpeNameId": "E0212CDC-E613-4B2A-9B60-16D962136AFF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.273:*:*:*:*:*:*:*", "cpeNameId": "452DD917-1B22-4F9B-A9AA-5FD1F9F2C442"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.274:*:*:*:*:*:*:*", "cpeNameId": "6AD4B227-D8D4-42C9-B310-ADA3F37B72BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.275:*:*:*:*:*:*:*", "cpeNameId": "EFE5E55E-9BCB-44E1-BC58-3DF14B515429"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.276:*:*:*:*:*:*:*", "cpeNameId": "10D3145D-E10C-4590-833C-0AE554FF7897"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.277:*:*:*:*:*:*:*", "cpeNameId": "B01C199E-6C8B-4BFA-9DA9-7B1905680626"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.278:*:*:*:*:*:*:*", "cpeNameId": "762C856E-6757-4DFB-A512-B6F03DDC8929"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.279:*:*:*:*:*:*:*", "cpeNameId": "169A9512-5C6F-478E-B16E-82D181C58A97"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.280:*:*:*:*:*:*:*", "cpeNameId": "F8BC9746-521D-4801-AC1D-66A84A780A65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.281:*:*:*:*:*:*:*", "cpeNameId": "1B8D8A00-4E6C-4CD0-8BC5-6EB8BE73B529"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.282:*:*:*:*:*:*:*", "cpeNameId": "5B93AA93-ABD4-45F5-B571-4CAE3CEC6AF9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.283:*:*:*:*:*:*:*", "cpeNameId": "E46991B0-6A28-4411-AF4A-EAF75291B8A5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.284:*:*:*:*:*:*:*", "cpeNameId": "21984D32-DD5B-488B-83DB-77BD0A122405"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.285:*:*:*:*:*:*:*", "cpeNameId": "D0B6234C-571C-42EE-8FD1-334921F4F502"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.286:*:*:*:*:*:*:*", "cpeNameId": "C969671F-1264-4233-B73B-570A481B64CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.287:*:*:*:*:*:*:*", "cpeNameId": "2053D2FF-B750-4B7E-BDFA-2A0F276F15C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.288:*:*:*:*:*:*:*", "cpeNameId": "B221B69F-8204-49BA-8AF4-AFF146D46FB8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.289:*:*:*:*:*:*:*", "cpeNameId": "C8142E09-6E61-4652-A9DA-38072F891A96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.290:*:*:*:*:*:*:*", "cpeNameId": "A534AF2A-A909-45A6-B7E3-A4B2F782CC92"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.291:*:*:*:*:*:*:*", "cpeNameId": "53B57317-723A-4E6B-AAB3-71676106E4CC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.292:*:*:*:*:*:*:*", "cpeNameId": "15CCD6EA-C7F2-47C2-82F4-52F075759660"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.293:*:*:*:*:*:*:*", "cpeNameId": "F1E6DE51-B3AA-4790-A531-9AE7F458DEB1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.294:*:*:*:*:*:*:*", "cpeNameId": "DAEAC0AB-0B68-4970-987B-C7670A6BD22E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.295:*:*:*:*:*:*:*", "cpeNameId": "3187B482-8D58-434C-8E34-EF7AF68AB006"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.296:*:*:*:*:*:*:*", "cpeNameId": "FDE4B426-ED64-449F-9B09-0CD8EA2FFD26"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.297:*:*:*:*:*:*:*", "cpeNameId": "998E67F4-C650-4407-9C7C-339B164FCD92"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.298:*:*:*:*:*:*:*", "cpeNameId": "60CE826D-94F2-441E-A37E-85C4FCD86554"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.299:*:*:*:*:*:*:*", "cpeNameId": "3D327ABE-B8D3-4496-9A9C-62C030CC90D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.300:*:*:*:*:*:*:*", "cpeNameId": "51E9D896-6DD7-4163-81B4-3F44CAD9A2C2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.301:*:*:*:*:*:*:*", "cpeNameId": "D1D112AB-4F07-4CD9-94D4-185B7830316F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.302:*:*:*:*:*:*:*", "cpeNameId": "9BBA920A-1DC4-48A6-B0B6-E31D342537FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.303:*:*:*:*:*:*:*", "cpeNameId": "B039FA99-E67A-409B-A18E-E6BD888E7439"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.304:*:*:*:*:*:*:*", "cpeNameId": "55859E55-03E7-4B8A-BDF6-31710F02863F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.305:*:*:*:*:*:*:*", "cpeNameId": "5ECFC1EA-4DCB-4381-8066-52D9EF210ED7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.306:*:*:*:*:*:*:*", "cpeNameId": "F85A14FE-ADE4-44AB-9DB7-E2D9BE784326"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.307:*:*:*:*:*:*:*", "cpeNameId": "31BE7E06-85C8-422D-945A-0699DDCDD577"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.308:*:*:*:*:*:*:*", "cpeNameId": "394979DD-B2FE-4F43-A635-4BA1953944CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.309:*:*:*:*:*:*:*", "cpeNameId": "079C35C6-0C73-475F-B35D-BAA4318FAB25"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.310:*:*:*:*:*:*:*", "cpeNameId": "85C1B276-0232-4F9E-BCB1-271209082177"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.311:*:*:*:*:*:*:*", "cpeNameId": "5DE9B94E-2F63-48F3-9EE3-29F97357808B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.312:*:*:*:*:*:*:*", "cpeNameId": "472662F2-3E14-450F-A806-E44B1B6C57C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.313:*:*:*:*:*:*:*", "cpeNameId": "4151B004-BFC1-434B-8DD7-7D6857831591"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.314:*:*:*:*:*:*:*", "cpeNameId": "5EB1843D-66B2-4766-B25D-291A2DD4B43F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.315:*:*:*:*:*:*:*", "cpeNameId": "5AC67AE7-DE1E-4329-9E98-1266CDFDCD3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.316:*:*:*:*:*:*:*", "cpeNameId": "665EDCA8-FBE2-48C3-B2A2-E44620F9321A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.317:*:*:*:*:*:*:*", "cpeNameId": "53E4605F-2DAF-436F-9B66-5C9483E4B0F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.318:*:*:*:*:*:*:*", "cpeNameId": "19FF749F-D1B2-4608-A238-B6FD9202A31E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.319:*:*:*:*:*:*:*", "cpeNameId": "D160B5B1-B754-4FD1-ABBE-5CF8AC941935"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.320:*:*:*:*:*:*:*", "cpeNameId": "442FB5A9-9102-48F4-B63A-684FAFCEEF6C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.321:*:*:*:*:*:*:*", "cpeNameId": "34EB7DA8-8A3B-4710-B39F-268F72709105"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.322:*:*:*:*:*:*:*", "cpeNameId": "EC519279-B76A-42BE-B6CB-8C0418032372"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.323:*:*:*:*:*:*:*", "cpeNameId": "3F56BE42-4A5B-4EED-B538-EB93D1692BD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.324:*:*:*:*:*:*:*", "cpeNameId": "CD51D183-BC77-4CA5-B961-ED0F3C008967"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.325:*:*:*:*:*:*:*", "cpeNameId": "F160C172-25E9-49B4-A253-58D8E6AE0914"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.326:*:*:*:*:*:*:*", "cpeNameId": "7B3900FD-154B-4A5B-9A6B-5609E9113274"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.327:*:*:*:*:*:*:*", "cpeNameId": "EA753912-D612-4583-9A1A-3DAA2466D1D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.328:*:*:*:*:*:*:*", "cpeNameId": "8F78B7BB-07DA-4FD5-97CB-2A1C3B38ADA9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.329:*:*:*:*:*:*:*", "cpeNameId": "5D01F5BD-260A-45C9-A220-1B1F1ED05BAC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.330:*:*:*:*:*:*:*", "cpeNameId": "4757B741-0579-4F0D-93B6-4152C0ACEDE7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.331:*:*:*:*:*:*:*", "cpeNameId": "49CB08ED-A588-4C13-AF4E-B76BA560B121"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.332:*:*:*:*:*:*:*", "cpeNameId": "B235999E-D6AC-40F3-84C5-8CB6F78213C9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.333:*:*:*:*:*:*:*", "cpeNameId": "A1FD2FA3-E019-47DA-B601-7CF78944A798"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.334:*:*:*:*:*:*:*", "cpeNameId": "EB3381CD-67DB-4D53-BDEE-811E30F95A1A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.335:*:*:*:*:*:*:*", "cpeNameId": "4E77A679-0C67-4691-B514-917657B01A5A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.336:*:*:*:*:*:*:*", "cpeNameId": "16E4641A-47F6-442F-AE88-17E4B987E3CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.337:*:*:*:*:*:*:*", "cpeNameId": "641CDB5F-54CC-425A-B656-9A9B58A08FBF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10:*:*:*:*:*:*:*", "cpeNameId": "801F7D56-009B-4A66-A380-891D1C09EC0E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10:-:*:*:*:*:*:*", "cpeNameId": "737F8B22-35BD-4355-8726-CAB10284B0F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10:rc1:*:*:*:*:*:*", "cpeNameId": "378C4500-0CC7-4110-8E02-B8B89064CB59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10:rc2:*:*:*:*:*:*", "cpeNameId": "C3B39C83-E8E1-4DA7-8251-F2092C6B05D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10:rc3:*:*:*:*:*:*", "cpeNameId": "78D16190-2359-4F43-9816-2080B1827AC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10:rc4:*:*:*:*:*:*", "cpeNameId": "B8C99710-34D3-4AB2-B2D2-09F4B84AE4E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10:rc5:*:*:*:*:*:*", "cpeNameId": "4322E527-2823-41C7-85A2-7B41C74EAC58"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.1:*:*:*:*:*:*:*", "cpeNameId": "9C33CAE9-C906-493D-AE83-630F775358ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.2:*:*:*:*:*:*:*", "cpeNameId": "8F61A3BF-4522-4622-947D-00D359B55176"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.3:*:*:*:*:*:*:*", "cpeNameId": "1EB67AD1-84CA-4A13-838D-BCCA096F8A43"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.4:*:*:*:*:*:*:*", "cpeNameId": "F0EF9085-D82D-451F-B3AF-70E38633405F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.5:*:*:*:*:*:*:*", "cpeNameId": "13FE2FB3-6377-4579-8372-ED7D7601F139"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.6:*:*:*:*:*:*:*", "cpeNameId": "CAD06591-0516-4D81-B575-F6C582AFFDEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.7:*:*:*:*:*:*:*", "cpeNameId": "02EB240A-C24B-44BD-86EA-60D23F353699"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.8:*:*:*:*:*:*:*", "cpeNameId": "7F10C5D0-46D5-462D-8ADC-2E4E5916E34D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.9:*:*:*:*:*:*:*", "cpeNameId": "2FAAEF0C-02F6-4CB5-8452-2ADB5F96602C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.10:*:*:*:*:*:*:*", "cpeNameId": "597FA1BA-E530-477E-8B32-7A767ABD9779"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.11:*:*:*:*:*:*:*", "cpeNameId": "BB2F91B5-234B-4006-B083-4DCB240C7735"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.12:*:*:*:*:*:*:*", "cpeNameId": "86A9E5EB-A7B2-4551-96C3-D2F96B8807EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.13:*:*:*:*:*:*:*", "cpeNameId": "07E25F8D-B2C9-4E32-8DB7-B0B700EF87B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.14:*:*:*:*:*:*:*", "cpeNameId": "B72B8BC5-A491-423C-B3B3-49C3878062F4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.15:*:*:*:*:*:*:*", "cpeNameId": "92F730C1-4118-47C8-8077-34E9367D198C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.16:*:*:*:*:*:*:*", "cpeNameId": "340A6F80-AECA-45F2-A8C0-E75A51ADEB17"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.17:*:*:*:*:*:*:*", "cpeNameId": "5245DF5B-3563-44B6-B5AD-9E7AC85D8CE9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:*:*:*:*:*:*:*", "cpeNameId": "7DAEC1AA-D9DB-4969-8835-19DE5562750C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:-:*:*:*:*:*:*", "cpeNameId": "53233DB2-D8A4-4392-B5B9-43F109778BC0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:rc1:*:*:*:*:*:*", "cpeNameId": "F67207B1-581C-4560-A1BA-FBCC51A59367"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:rc2:*:*:*:*:*:*", "cpeNameId": "FBAE195B-6447-49D4-AAAA-D595A811677F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:rc3:*:*:*:*:*:*", "cpeNameId": "0491309A-660F-444C-89A9-FFE1FA1A9B79"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:rc4:*:*:*:*:*:*", "cpeNameId": "35274394-863C-4A7D-9EFB-B49A5900A33C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:rc5:*:*:*:*:*:*", "cpeNameId": "5779025A-A7C7-40BE-840B-EE69D3D1BE62"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:rc6:*:*:*:*:*:*", "cpeNameId": "0E052BC2-1D38-4E80-9D23-889E827E597C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:rc7:*:*:*:*:*:*", "cpeNameId": "DF4B5805-B18E-4733-9A8B-135508008D0A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.1:*:*:*:*:*:*:*", "cpeNameId": "0A040921-C942-4FE5-A49A-A55F24A8D54C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.2:*:*:*:*:*:*:*", "cpeNameId": "97AF733F-A86E-41A1-832C-CC20306F11FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.3:*:*:*:*:*:*:*", "cpeNameId": "5CC1CF35-345D-45F8-BF5C-6B9C6B9696B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.4:*:*:*:*:*:*:*", "cpeNameId": "137C1EF2-A31B-431E-8F29-546D88139D13"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.5:*:*:*:*:*:*:*", "cpeNameId": "BD008082-6870-4CE0-BC04-1001F619E011"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.6:*:*:*:*:*:*:*", "cpeNameId": "E4F8E539-321B-4263-BB4B-20AAF31088D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.7:*:*:*:*:*:*:*", "cpeNameId": "A93CF5C7-A951-446B-ADFD-4A099F87A003"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.8:*:*:*:*:*:*:*", "cpeNameId": "32373BAD-CD72-44AE-883B-2AAD48A81497"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.9:*:*:*:*:*:*:*", "cpeNameId": "D22968FC-60EE-4D07-B61E-8216515FDA3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.10:*:*:*:*:*:*:*", "cpeNameId": "278604F1-EE00-4BCD-8B4F-D52B1E83CC03"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.11:*:*:*:*:*:*:*", "cpeNameId": "C182B41E-1285-49CD-8537-F2B2BE11E5A6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.12:*:*:*:*:*:*:*", "cpeNameId": "AEDE877D-D8A5-4365-9354-355C5BDBF8D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12:*:*:*:*:*:*:*", "cpeNameId": "0975E1F0-0E5F-445B-BBAC-66294DC99443"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12:-:*:*:*:*:*:*", "cpeNameId": "DF7473CD-B405-4E90-9185-B9E682AB2EA8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12:rc1:*:*:*:*:*:*", "cpeNameId": "3704C17E-765C-494D-ABF4-6687AD9DCA2B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12:rc2:*:*:*:*:*:*", "cpeNameId": "576FB04F-8AE6-459C-B9B7-4B161AA533C9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12:rc3:*:*:*:*:*:*", "cpeNameId": "D1CC9AD0-BCFB-47FF-A991-F2D8D4241D7A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12:rc4:*:*:*:*:*:*", "cpeNameId": "5B131271-8353-4F4D-A802-6231F77D62F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12:rc5:*:*:*:*:*:*", "cpeNameId": "3871B8EE-EE4B-43DD-9B39-DAE15494AEF2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12:rc6:*:*:*:*:*:*", "cpeNameId": "2F22DBF5-138B-4E06-97A9-D48EE51DAD9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.1:*:*:*:*:*:*:*", "cpeNameId": "69B0A1AF-BDD2-4852-B63D-E4BF55573CAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.2:*:*:*:*:*:*:*", "cpeNameId": "654BD99C-D40D-4573-A72F-D135048F0BD6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.3:*:*:*:*:*:*:*", "cpeNameId": "2DFD73EB-B731-43EF-A6D9-0777823AA9ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.4:*:*:*:*:*:*:*", "cpeNameId": "50296B03-0A9B-497E-85CE-EDBABB8603B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.5:*:*:*:*:*:*:*", "cpeNameId": "184D3B86-723B-43AE-9B33-91CAD47275F7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.6:*:*:*:*:*:*:*", "cpeNameId": "2538F421-8C36-4DA8-8D4A-20811D6843BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.7:*:*:*:*:*:*:*", "cpeNameId": "E8D1E4A0-A0B2-4B0B-988F-984BF74D3B99"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.8:*:*:*:*:*:*:*", "cpeNameId": "43B25D3D-1D5D-4E14-A5CE-69FB57B0230D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.9:*:*:*:*:*:*:*", "cpeNameId": "BD4E83AA-561D-49FA-9703-CFF03AA235A3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.10:*:*:*:*:*:*:*", "cpeNameId": "109315CC-209F-40BF-A5E1-C307A1F780DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.11:*:*:*:*:*:*:*", "cpeNameId": "69494478-22B3-4371-B7C7-0558CDD786C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.12:*:*:*:*:*:*:*", "cpeNameId": "56632064-D578-4D87-9DF8-C06F096ABDFC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.13:*:*:*:*:*:*:*", "cpeNameId": "97C936CC-FC5C-4A0B-9F4A-BC253561E90D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.14:*:*:*:*:*:*:*", "cpeNameId": "0C13DFDE-0149-4EB6-9BA0-F62AC6FE5586"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13:*:*:*:*:*:*:*", "cpeNameId": "63D7AE43-6B91-47A7-9E3E-58B08ACEE5CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13:-:*:*:*:*:*:*", "cpeNameId": "94A3FF49-65AE-46A5-AF47-00094F5AF3E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13:rc1:*:*:*:*:*:*", "cpeNameId": "C5C9AA2D-4C67-496E-AE87-863FA0E9B8CE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13:rc2:*:*:*:*:*:*", "cpeNameId": "25E5D931-E147-4A6A-AD81-9AF12D4DCAB6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13:rc3:*:*:*:*:*:*", "cpeNameId": "853B280B-EC80-4D50-8494-0D3FBEF98F78"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13:rc4:*:*:*:*:*:*", "cpeNameId": "823B55ED-26FF-4111-A479-E477AAE70FF1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13:rc5:*:*:*:*:*:*", "cpeNameId": "8B7F3844-CA39-422C-8449-06CF8AD6672B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13:rc6:*:*:*:*:*:*", "cpeNameId": "9ECB08C7-B61F-415B-8091-4F5B47F8085F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.1:*:*:*:*:*:*:*", "cpeNameId": "226B0AC1-B943-40C0-8426-4BB9B25A2FBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.2:*:*:*:*:*:*:*", "cpeNameId": "101CC84F-1E9F-4945-AC58-F1A89AC868FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.3:*:*:*:*:*:*:*", "cpeNameId": "943EB2FE-E2B5-4056-8432-2E21A07AAE5A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.4:*:*:*:*:*:*:*", "cpeNameId": "30F2FA91-0299-4CF0-904F-CEB63D8421F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.5:*:*:*:*:*:*:*", "cpeNameId": "8A5862FC-697A-49B3-B018-683F56E40C33"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.6:*:*:*:*:*:*:*", "cpeNameId": "9907DA49-FBB8-4EA6-A3D3-D395343A6635"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.7:*:*:*:*:*:*:*", "cpeNameId": "2928EAC1-58D0-4D06-9080-D744192ED843"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.8:*:*:*:*:*:*:*", "cpeNameId": "69790995-A09C-4859-B6AF-6FD626D2F615"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.9:*:*:*:*:*:*:*", "cpeNameId": "AD833379-4556-4DFD-A670-98EE76636A5B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.10:*:*:*:*:*:*:*", "cpeNameId": "1D010FB8-D849-4388-8D10-74F4D6F59D3C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.11:*:*:*:*:*:*:*", "cpeNameId": "F659B20D-E773-4DEA-86E5-9914230B1A15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.12:*:*:*:*:*:*:*", "cpeNameId": "B779CDC3-8957-4B5C-8D66-00A277A1B3F4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.13:*:*:*:*:*:*:*", "cpeNameId": "EAC315D4-E0E0-41C8-A95B-AB5E895BFBBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.14:*:*:*:*:*:*:*", "cpeNameId": "1819E47A-069B-419A-8EF6-C9313A397178"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.15:*:*:*:*:*:*:*", "cpeNameId": "027145FE-2731-49DA-86A8-1D2FBC9FB086"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.16:*:*:*:*:*:*:*", "cpeNameId": "ECD3B257-E717-4928-B0C1-A784E553B3E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14:*:*:*:*:*:*:*", "cpeNameId": "A931E9A5-97C5-409C-A3BA-5FEC11A2C622"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.1:*:*:*:*:*:*:*", "cpeNameId": "C5A24D81-DC61-4E8E-A883-70A89D049530"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.2:*:*:*:*:*:*:*", "cpeNameId": "4E26113D-F6B7-453F-9387-E01F3FB22E21"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.3:*:*:*:*:*:*:*", "cpeNameId": "814EF758-607B-40CC-BE23-CE70074F76CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.4:*:*:*:*:*:*:*", "cpeNameId": "6720BFE9-C0EE-48BF-9DF5-EF2216114FA3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.5:*:*:*:*:*:*:*", "cpeNameId": "6AF9B2CB-A700-4D4B-99BD-68F8B1B60D27"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.6:*:*:*:*:*:*:*", "cpeNameId": "9FB8CFED-3C93-41CD-AA03-2B6383630B83"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.7:*:*:*:*:*:*:*", "cpeNameId": "2A024E18-8E2D-43F7-953C-15A11490F277"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.8:*:*:*:*:*:*:*", "cpeNameId": "B316EADE-3506-4B78-84D7-59222A7EA27C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.9:*:*:*:*:*:*:*", "cpeNameId": "22C19B12-730A-4C18-9414-277A199CDB44"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.10:*:*:*:*:*:*:*", "cpeNameId": "1C9ACEF0-E248-4B66-AF0C-F323FF758671"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.11:*:*:*:*:*:*:*", "cpeNameId": "CFE32D5E-B63B-4BBD-AF35-835F694D1946"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.12:*:*:*:*:*:*:*", "cpeNameId": "51A5C92D-0CAD-4718-8BD9-70AD3BF3ED1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.13:*:*:*:*:*:*:*", "cpeNameId": "70614E00-337E-4E52-9FD8-20E1C106B5DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.14:*:*:*:*:*:*:*", "cpeNameId": "6930B9C7-4CC9-4DCA-B201-2D9E690BFE80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.15:*:*:*:*:*:*:*", "cpeNameId": "9B2631F3-F6FE-4791-823F-695BE2F12D47"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.16:*:*:*:*:*:*:*", "cpeNameId": "092E3E03-A335-4443-8BED-47DDB83C5FA0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.17:*:*:*:*:*:*:*", "cpeNameId": "36D93C96-FC7E-4D4F-883E-3AF5A2FA3000"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.18:*:*:*:*:*:*:*", "cpeNameId": "7A290C14-ED57-4B9F-91FF-0FC4AAC9A1F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.19:*:*:*:*:*:*:*", "cpeNameId": "A8688970-830A-43D1-B07D-6013A971EC79"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.20:*:*:*:*:*:*:*", "cpeNameId": "17B788D0-A567-43B8-82A9-8FF9366015A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.21:*:*:*:*:*:*:*", "cpeNameId": "78A2B7F8-B9DE-4C98-A44D-EF1B61256567"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.22:*:*:*:*:*:*:*", "cpeNameId": "72C09BB8-DCC8-45E8-B7B5-993CFE154338"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.23:*:*:*:*:*:*:*", "cpeNameId": "D4585EAB-400F-4EDF-9DED-1F8CBD5B744F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.24:*:*:*:*:*:*:*", "cpeNameId": "FEFD7885-1EE8-416D-B7FE-8E11083ED450"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.25:*:*:*:*:*:*:*", "cpeNameId": "62184EBD-8376-48E6-BDA6-33DA7DA4DE55"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.26:*:*:*:*:*:*:*", "cpeNameId": "4E0A62E4-D6E6-472F-B7EB-0863D2CB2043"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.27:*:*:*:*:*:*:*", "cpeNameId": "B36914F3-9F0C-48F1-B721-8451FA606F40"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.28:*:*:*:*:*:*:*", "cpeNameId": "5406494D-C3A0-424C-A739-DF138E8457FA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.29:*:*:*:*:*:*:*", "cpeNameId": "2E069436-B02E-4F1D-BBFF-7C67DCBB1978"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.30:*:*:*:*:*:*:*", "cpeNameId": "0C8564AC-CE4D-4B8F-8588-CB6F8162FC34"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.31:*:*:*:*:*:*:*", "cpeNameId": "08176301-EEF5-439E-99BF-EB6055095F3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.32:*:*:*:*:*:*:*", "cpeNameId": "5050DE72-C59B-428C-B676-CD6A69950413"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.33:*:*:*:*:*:*:*", "cpeNameId": "6EF37D93-2185-4C48-932B-64AE54920BF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.34:*:*:*:*:*:*:*", "cpeNameId": "CD6EEA39-F27B-4E2F-ABF7-B979F9A60D16"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.35:*:*:*:*:*:*:*", "cpeNameId": "9601934D-422D-478C-932B-0B723ECF1AC8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.36:*:*:*:*:*:*:*", "cpeNameId": "117B9343-7A2A-4CF2-A3FC-5CF339397B49"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.37:*:*:*:*:*:*:*", "cpeNameId": "3DAF6A51-D407-4CAF-A800-E8C601AF7A88"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.38:*:*:*:*:*:*:*", "cpeNameId": "D818B0AA-263A-4AD4-8F30-D01F9F103771"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.39:*:*:*:*:*:*:*", "cpeNameId": "19410F95-E22A-4EA0-A64F-7334B338C559"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.40:*:*:*:*:*:*:*", "cpeNameId": "4C39B4AE-1893-4D41-A20B-E4DA4F05B12E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.41:*:*:*:*:*:*:*", "cpeNameId": "9E6243E5-7BAA-4061-BA98-AE3335BA90DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.42:*:*:*:*:*:*:*", "cpeNameId": "5289A6EE-1D01-4F96-806C-1843A14FDEF2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.43:*:*:*:*:*:*:*", "cpeNameId": "9ABCDB72-25A8-46CD-A422-35ADA558EF68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.44:*:*:*:*:*:*:*", "cpeNameId": "574EC3B6-21A3-47E9-9858-3CA9EF533E67"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.45:*:*:*:*:*:*:*", "cpeNameId": "38485FA4-4F72-4663-A066-8D01D3863321"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.46:*:*:*:*:*:*:*", "cpeNameId": "764D933F-58C1-48E3-9907-B0DDE1A4F8AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.47:*:*:*:*:*:*:*", "cpeNameId": "AE54A178-E51B-452A-9C64-DA3A3CC946AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.48:*:*:*:*:*:*:*", "cpeNameId": "B535E7F9-6273-497C-8D1E-27FC9FAECD72"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.49:*:*:*:*:*:*:*", "cpeNameId": "83203827-63F4-47AE-A1CA-217858D53769"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.50:*:*:*:*:*:*:*", "cpeNameId": "194931EE-DDB3-420C-9AF7-EC5AFD5D6E28"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.51:*:*:*:*:*:*:*", "cpeNameId": "6DBC9273-6F1D-497F-9664-184028BD6B4D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.52:*:*:*:*:*:*:*", "cpeNameId": "214855D8-7634-45D4-B464-65EDD37AF850"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.53:*:*:*:*:*:*:*", "cpeNameId": "67B2569B-44C2-4049-BDA4-2E773A4E29F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.54:*:*:*:*:*:*:*", "cpeNameId": "9EBDE6FE-5FF2-4F2D-B58A-25094E85BFB1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.55:*:*:*:*:*:*:*", "cpeNameId": "D0B5F04E-862B-490F-8305-60B811F4E6F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.56:*:*:*:*:*:*:*", "cpeNameId": "B668AD3F-F0E8-4A26-879B-046F18DD8A36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.57:*:*:*:*:*:*:*", "cpeNameId": "E16FC742-4DBD-4DB4-B969-9C064D464FE5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.58:*:*:*:*:*:*:*", "cpeNameId": "8B062B81-0F55-4FF6-B94C-C877DFA0E50B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.59:*:*:*:*:*:*:*", "cpeNameId": "3CEEC1DF-CF5C-4C9D-ADB4-671659A81424"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.60:*:*:*:*:*:*:*", "cpeNameId": "25D77D6D-411A-415B-9B4C-71C7DA916873"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.61:*:*:*:*:*:*:*", "cpeNameId": "65E712DB-951C-492B-A315-827459B80E5E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.62:*:*:*:*:*:*:*", "cpeNameId": "F11F0C93-C51B-4199-B8B7-D7B81A103E8C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.63:*:*:*:*:*:*:*", "cpeNameId": "35923443-2E09-4624-9DEE-9ACF12EAB448"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.64:*:*:*:*:*:*:*", "cpeNameId": "205E064B-A0B3-4DC9-A4F9-FA48BB6D7666"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.65:*:*:*:*:*:*:*", "cpeNameId": "B0E66BBD-FF9B-4FE2-955E-363B2426AAA4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.66:*:*:*:*:*:*:*", "cpeNameId": "65FADA8B-3BAE-4B74-805D-40121FF01EAF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.67:*:*:*:*:*:*:*", "cpeNameId": "8796300B-8BBD-4767-B13C-A04AA0BB6FEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.68:*:*:*:*:*:*:*", "cpeNameId": "EA1F0EFF-1D54-4D41-8791-38459690E25B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.69:*:*:*:*:*:*:*", "cpeNameId": "609603AF-3EA9-4959-BF95-65681DD73429"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.70:*:*:*:*:*:*:*", "cpeNameId": "626D150A-609E-46A3-9B99-2B5517D68FCF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.71:*:*:*:*:*:*:*", "cpeNameId": "54045011-3CF7-4D72-B47A-67352BD27C9B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.72:*:*:*:*:*:*:*", "cpeNameId": "A4A18A3C-C9E0-4640-A815-B4F19017E986"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.73:*:*:*:*:*:*:*", "cpeNameId": "101552E2-98D5-490C-8507-D8F3CD5E74CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.74:*:*:*:*:*:*:*", "cpeNameId": "306A3E6C-2907-416C-966D-810515DBCCCB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.75:*:*:*:*:*:*:*", "cpeNameId": "BAAF7099-2145-41D0-8529-A6065254637F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.76:*:*:*:*:*:*:*", "cpeNameId": "DDCDF175-DC63-49EC-A7AD-9BFEFE5527E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.77:*:*:*:*:*:*:*", "cpeNameId": "38B40852-28A0-490F-B4DC-3980A9C5B421"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.78:*:*:*:*:*:*:*", "cpeNameId": "6E17FF7C-84D2-4931-992C-A5E7ED78834F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.79:*:*:*:*:*:*:*", "cpeNameId": "BB0E9999-4D82-493C-98BB-FE9D9A569DED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.80:*:*:*:*:*:*:*", "cpeNameId": "4AC211FC-04A6-4405-9635-D73ECD955418"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.81:*:*:*:*:*:*:*", "cpeNameId": "92E16615-DDD7-4E66-8BF6-BAA740D2F0C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.82:*:*:*:*:*:*:*", "cpeNameId": "F7A93940-0210-4AD1-B8DD-329E01CF07C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.83:*:*:*:*:*:*:*", "cpeNameId": "31B6D10B-87F4-4EDC-B7B1-FD01674BF26E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.84:*:*:*:*:*:*:*", "cpeNameId": "4275466A-03C1-421C-A4B0-21B518067550"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.85:*:*:*:*:*:*:*", "cpeNameId": "CA858139-E95A-4FEE-B89B-63F8951AC6C5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.86:*:*:*:*:*:*:*", "cpeNameId": "E4F4C982-7F3B-45B2-84AB-3A0EA7B17608"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.87:*:*:*:*:*:*:*", "cpeNameId": "2343FBFC-440A-404C-BFBA-0C17D3A7A7DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.88:*:*:*:*:*:*:*", "cpeNameId": "D7E1A205-815C-4D28-8BA2-9BC9500AD4A7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.89:*:*:*:*:*:*:*", "cpeNameId": "39F2F19A-FB5E-4866-BAE2-356D068B45BA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.90:*:*:*:*:*:*:*", "cpeNameId": "50AD92DB-6E21-4AA8-9E00-052B90A9965E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.91:*:*:*:*:*:*:*", "cpeNameId": "F8DE7403-3DFA-4DEE-8780-A0DA10BF9528"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.92:*:*:*:*:*:*:*", "cpeNameId": "39EF80A8-F19C-4BE8-8D66-7C5CD424B4D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.93:*:*:*:*:*:*:*", "cpeNameId": "E5500E0F-C99A-4502-99E6-7981CA795BF2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.94:*:*:*:*:*:*:*", "cpeNameId": "74932CAC-8FBF-4367-9392-6D00F8FFFB99"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.95:*:*:*:*:*:*:*", "cpeNameId": "8101D71E-8866-4E44-879C-0C5B12D7EBE7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.96:*:*:*:*:*:*:*", "cpeNameId": "E3C79F48-C929-4535-A410-136A4CC98F26"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.97:*:*:*:*:*:*:*", "cpeNameId": "1BD7D338-728B-43EB-91A4-6827CD29192C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.98:*:*:*:*:*:*:*", "cpeNameId": "86B2C93A-A003-4AAA-AE7C-CD209F2063B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.99:*:*:*:*:*:*:*", "cpeNameId": "6A43476F-D00F-4E25-8FAC-647EEE0EDFF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.100:*:*:*:*:*:*:*", "cpeNameId": "4E019C3A-D2DB-457F-A70E-5E03CCA91476"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.101:*:*:*:*:*:*:*", "cpeNameId": "A73A2FC0-DC50-499F-A148-78FA51F8D760"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.102:*:*:*:*:*:*:*", "cpeNameId": "127E7A89-5961-457D-8BF7-4164707E025E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.103:*:*:*:*:*:*:*", "cpeNameId": "388373C0-5D21-45F9-BF7E-5E60B4E7318F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.104:*:*:*:*:*:*:*", "cpeNameId": "3B19EA98-6B97-4A3A-B3B0-DC182A51617F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.105:*:*:*:*:*:*:*", "cpeNameId": "EAF98B09-69E7-48C1-8B69-3AD3E29E5A2E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.106:*:*:*:*:*:*:*", "cpeNameId": "A2582828-CCCE-4D12-85D5-3A1F343C7E00"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.107:*:*:*:*:*:*:*", "cpeNameId": "AD5EA444-4A0C-4A51-A8BE-F15FE36EE0C5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.108:*:*:*:*:*:*:*", "cpeNameId": "F94B9FE0-697B-41B7-B791-B9A0C4D86168"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.109:*:*:*:*:*:*:*", "cpeNameId": "4F0FBDC5-4177-425F-ADF6-C57C3DCA5D4D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.110:*:*:*:*:*:*:*", "cpeNameId": "2D6859E3-FCB4-477E-845A-80388AC62521"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.111:*:*:*:*:*:*:*", "cpeNameId": "E63E0425-D6C3-4773-A69C-D9033B050A0E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.112:*:*:*:*:*:*:*", "cpeNameId": "B5B44EDD-66B1-47B4-BAAE-38DE4AECC0A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.113:*:*:*:*:*:*:*", "cpeNameId": "2F7F63C6-E1D8-40B9-A3BE-99A553814F5A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.114:*:*:*:*:*:*:*", "cpeNameId": "A3653829-0B32-4838-90F0-B2CCC32580DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.115:*:*:*:*:*:*:*", "cpeNameId": "758316DC-FEB4-4F05-994B-AE0A555D7AEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.116:*:*:*:*:*:*:*", "cpeNameId": "CEA596C8-E6AD-4C8C-BF8F-FEBF1BF73E80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.117:*:*:*:*:*:*:*", "cpeNameId": "D09DC33D-889B-4BA3-8311-057DCB5EB7D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.118:*:*:*:*:*:*:*", "cpeNameId": "446206CE-87D2-402D-8451-4F63D75B6CB6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.119:*:*:*:*:*:*:*", "cpeNameId": "CF788798-2DF1-4253-AA76-8B021DB84887"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.120:*:*:*:*:*:*:*", "cpeNameId": "7A8CE9D2-54CD-4BDA-AF50-12C170DC6E2E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.121:*:*:*:*:*:*:*", "cpeNameId": "08EAEBAF-0EC2-48A1-9B20-586269492003"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.122:*:*:*:*:*:*:*", "cpeNameId": "7E12FC79-A932-4613-A0E6-6E78D0916FC4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.123:*:*:*:*:*:*:*", "cpeNameId": "CEC4835E-515C-49EA-93A4-45ED21306EC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.124:*:*:*:*:*:*:*", "cpeNameId": "B8B08C25-A0CC-4BCB-BCC8-DF667EE56E09"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.125:*:*:*:*:*:*:*", "cpeNameId": "9FE63906-4FDE-46B8-A606-E814C0F6F44B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.126:*:*:*:*:*:*:*", "cpeNameId": "18D0E785-E281-4C1B-AAAB-1941B6652595"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.127:*:*:*:*:*:*:*", "cpeNameId": "F885AC80-EECE-4DD5-8FFB-6F71501CF7A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.128:*:*:*:*:*:*:*", "cpeNameId": "E98D93BF-9F5C-4817-B9A4-1EC01D911361"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.129:*:*:*:*:*:*:*", "cpeNameId": "0381E0F9-379F-4991-8218-0D49695A485C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.130:*:*:*:*:*:*:*", "cpeNameId": "70367F10-ACD6-4508-ACB5-DAC961B2DAD6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.131:*:*:*:*:*:*:*", "cpeNameId": "98C623C6-03CD-485B-BF39-D31296742AEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.132:*:*:*:*:*:*:*", "cpeNameId": "1E482272-30CF-4AC1-8D89-2594468F7D4B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.133:*:*:*:*:*:*:*", "cpeNameId": "111B8E60-2201-4175-8DF6-9254703F20FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.134:*:*:*:*:*:*:*", "cpeNameId": "E359DA12-908D-4DCE-863E-3FF8641CC7C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.135:*:*:*:*:*:*:*", "cpeNameId": "27A8264E-B347-4F33-8DB6-D654A8DF7008"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.136:*:*:*:*:*:*:*", "cpeNameId": "DFC17EF5-FF88-4BBE-AD7A-B6EF53741144"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.137:*:*:*:*:*:*:*", "cpeNameId": "DE9E6429-1CD7-4FA0-A2BB-9F73CFFA4AE6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.138:*:*:*:*:*:*:*", "cpeNameId": "3E2F69CE-601A-4558-820F-4D2101BC6DAA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.139:*:*:*:*:*:*:*", "cpeNameId": "AED13A18-393D-4413-80E6-5C8C1912C64C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.140:*:*:*:*:*:*:*", "cpeNameId": "DCCD3A03-0FA0-497E-938A-D4877C862C7D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.141:*:*:*:*:*:*:*", "cpeNameId": "A984AB3D-A744-45E7-B863-AFCE9F3BCA8D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.142:*:*:*:*:*:*:*", "cpeNameId": "8BA42A60-B968-4658-A593-5D6D1CDC2DD7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.143:*:*:*:*:*:*:*", "cpeNameId": "F1883261-CF7A-4133-BA12-E5A3648FFCD2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.144:*:*:*:*:*:*:*", "cpeNameId": "2ECB0A40-9134-477D-A33D-D1A21FD1D853"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.145:*:*:*:*:*:*:*", "cpeNameId": "37AD964D-982C-4491-9DD8-9BBEFB703649"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.146:*:*:*:*:*:*:*", "cpeNameId": "60D01110-32CE-4174-8305-9CC98A7954A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.147:*:*:*:*:*:*:*", "cpeNameId": "3C59A1B8-E591-4781-87FE-6652A4B865BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.148:*:*:*:*:*:*:*", "cpeNameId": "E3589E83-AB61-4638-83A5-4FCCDCF12939"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.149:*:*:*:*:*:*:*", "cpeNameId": "43561658-86C5-4F33-9BA9-959238156461"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.150:*:*:*:*:*:*:*", "cpeNameId": "65A8F7B6-A62D-4F12-BE5C-81E2C46F2C39"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.151:*:*:*:*:*:*:*", "cpeNameId": "359D1CB2-7092-4050-8BDE-EA9B90C2A4A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.152:*:*:*:*:*:*:*", "cpeNameId": "DCBA08B5-D75B-4EA4-8EB2-976C5EE5208C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.153:*:*:*:*:*:*:*", "cpeNameId": "AEF73713-2A2E-4202-9FAF-35F9007DC67F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.154:*:*:*:*:*:*:*", "cpeNameId": "F56CAAD2-0A98-4C49-948C-A58C81AF2136"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.155:*:*:*:*:*:*:*", "cpeNameId": "7293A6A3-0953-4BC3-8754-E3521CDDC181"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.156:*:*:*:*:*:*:*", "cpeNameId": "040458A8-9C8A-4F54-8667-DF55833A9D9B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.157:*:*:*:*:*:*:*", "cpeNameId": "47EEEBD8-F966-4731-84CE-95B543D1E665"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.158:*:*:*:*:*:*:*", "cpeNameId": "D8DD8154-1F2C-4E1F-8425-674EA9F33061"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.159:*:*:*:*:*:*:*", "cpeNameId": "23573A67-0200-408D-A6D3-92BB482B239E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.160:*:*:*:*:*:*:*", "cpeNameId": "DB501200-6B09-4237-92DA-8410374E41AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.161:*:*:*:*:*:*:*", "cpeNameId": "1654CFEE-4797-444C-BF7B-36E36EEFB3FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.162:*:*:*:*:*:*:*", "cpeNameId": "F7A73AFA-30D2-4C43-9A25-E516BB6077BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.163:*:*:*:*:*:*:*", "cpeNameId": "152842F1-FD0B-41B7-8361-62DC24194B9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.164:*:*:*:*:*:*:*", "cpeNameId": "1FB6E4A7-E49F-4CB2-B797-CDA9A3EE41F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.165:*:*:*:*:*:*:*", "cpeNameId": "86C98595-98AD-4914-BA7E-7D2EEEBDEEEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.166:*:*:*:*:*:*:*", "cpeNameId": "3A749A85-B1AF-45E0-952F-F07A3315F2B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.167:*:*:*:*:*:*:*", "cpeNameId": "F739A8BA-2722-4D43-8EE3-F0940D5C9962"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.168:*:*:*:*:*:*:*", "cpeNameId": "BA729078-2FD8-494D-80A0-A21A9C8A780C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.169:*:*:*:*:*:*:*", "cpeNameId": "B09E3BA3-FAE1-417D-802E-9FF6A63314CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.170:*:*:*:*:*:*:*", "cpeNameId": "A6354C45-5002-4677-94F6-2585EA37B4A0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.171:*:*:*:*:*:*:*", "cpeNameId": "E3DC59EC-5BDD-4E67-979E-ACF532D0AA0F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.172:*:*:*:*:*:*:*", "cpeNameId": "2915DD1D-0036-4591-921F-4ED4D6E543BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.173:*:*:*:*:*:*:*", "cpeNameId": "6AAAB0B0-C78E-4876-9C2D-5CF3FC83C87B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.174:*:*:*:*:*:*:*", "cpeNameId": "7F586C21-5084-4F3B-A5E2-20ABD2E73301"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.175:*:*:*:*:*:*:*", "cpeNameId": "31C57C02-B17B-45AC-BD33-BA14F2D2F960"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.176:*:*:*:*:*:*:*", "cpeNameId": "495DC903-2104-4E7A-ABDD-044701BEC0AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.177:*:*:*:*:*:*:*", "cpeNameId": "54ECE57B-46D2-4B43-88BA-72DFCC784626"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.178:*:*:*:*:*:*:*", "cpeNameId": "DF1994DB-64D8-449F-AB63-959905FDBED5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.179:*:*:*:*:*:*:*", "cpeNameId": "E998A6CB-5B6B-4698-93F8-60ADA5915CED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.180:*:*:*:*:*:*:*", "cpeNameId": "5780A3A7-D6D2-4597-8E20-64CAEBB9BEC5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.181:*:*:*:*:*:*:*", "cpeNameId": "943B03F2-38B3-48CF-AB60-B0CDCD3232D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.182:*:*:*:*:*:*:*", "cpeNameId": "DE1702E0-9C72-4E22-AD85-B4FF3F08BF12"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.183:*:*:*:*:*:*:*", "cpeNameId": "B448350B-6E82-4C55-BF6C-3416AA6DD09D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.184:*:*:*:*:*:*:*", "cpeNameId": "93D45017-75AC-4F34-B44B-BD725073C783"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.185:*:*:*:*:*:*:*", "cpeNameId": "17EE5023-DA86-42AA-80B8-0E03A8786DBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.186:*:*:*:*:*:*:*", "cpeNameId": "5083CC39-913E-47F4-8D17-DA2A4B3BDB38"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.187:*:*:*:*:*:*:*", "cpeNameId": "A9B26E5E-5D06-4AEE-B95C-BCCCF71E3C2A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.188:*:*:*:*:*:*:*", "cpeNameId": "F61DC571-CA27-43B5-B92E-FF49B2FA5128"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.189:*:*:*:*:*:*:*", "cpeNameId": "39A82CEC-EA57-4F55-AE22-EA9FF7F22411"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.190:*:*:*:*:*:*:*", "cpeNameId": "5C08BEA0-0968-4A2C-90A7-FBBC18870CB4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.191:*:*:*:*:*:*:*", "cpeNameId": "27C0FEC1-829C-410C-B37C-44CBE22D2714"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.192:*:*:*:*:*:*:*", "cpeNameId": "AAE8B6F5-BBF2-4EE5-BFF8-D3E64F6C7544"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.193:*:*:*:*:*:*:*", "cpeNameId": "B75C3C61-1456-4A7E-8175-FEBFECBD8887"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.194:*:*:*:*:*:*:*", "cpeNameId": "64CFCF85-0DB0-4BC3-9BAF-7752E969C6FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.195:*:*:*:*:*:*:*", "cpeNameId": "07D6C56C-CBC4-4E2B-BF3C-298D326A2515"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.196:*:*:*:*:*:*:*", "cpeNameId": "617F7A9C-A4AF-46E1-9B60-654F691A1ACA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.197:*:*:*:*:*:*:*", "cpeNameId": "D1BB57B0-9ED1-49CA-BAF9-9F32E751C423"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.198:*:*:*:*:*:*:*", "cpeNameId": "DFF76FFC-A6CE-4BCA-8BDA-A708D8CA524F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.199:*:*:*:*:*:*:*", "cpeNameId": "8D62E5E5-B08E-4B46-AFA9-9C11A8F2088C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.200:*:*:*:*:*:*:*", "cpeNameId": "4C6DC033-8105-45EB-8B7C-8AD380243F77"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.201:*:*:*:*:*:*:*", "cpeNameId": "02618C38-B7E6-468C-A240-77183CD793ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.202:*:*:*:*:*:*:*", "cpeNameId": "B133CCC3-3525-44C9-9BA6-07731081AF3B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.203:*:*:*:*:*:*:*", "cpeNameId": "2040E6FD-3C1D-4922-8A3E-D93B2024A64F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.204:*:*:*:*:*:*:*", "cpeNameId": "FC48B609-0A74-4ADF-BE7A-8E5A929FF9B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.205:*:*:*:*:*:*:*", "cpeNameId": "2D66C248-5CA3-46AF-819D-8EDC819E5DEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.206:*:*:*:*:*:*:*", "cpeNameId": "0EC2FE2D-3784-41D9-AD97-154F8E9D485A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.207:*:*:*:*:*:*:*", "cpeNameId": "890C3442-53E3-4F78-A62B-2A3DF161993D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.208:*:*:*:*:*:*:*", "cpeNameId": "3CFC3FF9-ABA7-4471-B42B-31B08DB57404"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.209:*:*:*:*:*:*:*", "cpeNameId": "62582930-FD26-41A5-A063-51CCE542611E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.210:*:*:*:*:*:*:*", "cpeNameId": "F0B251D3-1C8A-4EE4-BC8C-798633A46547"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.211:*:*:*:*:*:*:*", "cpeNameId": "6D317823-F155-4FD8-B745-D6A2CA0DCF4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.212:*:*:*:*:*:*:*", "cpeNameId": "93A1BCA4-151B-4C62-9321-C36060232635"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.213:*:*:*:*:*:*:*", "cpeNameId": "2A1F44F0-ED1D-4627-AFDD-52246F44FCA8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.214:*:*:*:*:*:*:*", "cpeNameId": "630134DA-8836-4D64-A8DB-C952FD0879B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.215:*:*:*:*:*:*:*", "cpeNameId": "F647FD73-A1BD-4519-96EF-BC5962B49049"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.216:*:*:*:*:*:*:*", "cpeNameId": "84F052BA-7078-4E5C-AF40-2E298CEBAA0D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.217:*:*:*:*:*:*:*", "cpeNameId": "8586BB5B-5356-497E-8039-D4718A8D233E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.218:*:*:*:*:*:*:*", "cpeNameId": "A7103A90-E7B5-46AC-B508-F3888B37524D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.219:*:*:*:*:*:*:*", "cpeNameId": "AAEF1C1C-6618-417A-A3EE-8BB6EB63F1C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.220:*:*:*:*:*:*:*", "cpeNameId": "00A3991D-98AC-4422-9B19-3B2515EF7B06"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.221:*:*:*:*:*:*:*", "cpeNameId": "CC8EF11A-F131-442A-B0F4-0810D38EB89E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.222:*:*:*:*:*:*:*", "cpeNameId": "E9CDB672-F2E0-42B9-8F20-B3BCAF324A36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.223:*:*:*:*:*:*:*", "cpeNameId": "1AC50DA1-BA05-43A5-A50F-8EF350DD96D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.224:*:*:*:*:*:*:*", "cpeNameId": "42E73115-25A7-4EDF-9402-81BA0AC8B470"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.225:*:*:*:*:*:*:*", "cpeNameId": "85B8548F-576C-442E-A2EA-30CFF43407AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.226:*:*:*:*:*:*:*", "cpeNameId": "3794F34E-4B0D-487C-890D-884AA41EF6D7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.227:*:*:*:*:*:*:*", "cpeNameId": "29337989-0DC4-4B35-BA5F-E157DAAD1557"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.228:*:*:*:*:*:*:*", "cpeNameId": "7F43F714-4550-416B-B228-EEF6FC8B1716"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.229:*:*:*:*:*:*:*", "cpeNameId": "9AC44F08-C276-4E15-811B-8CC5010672D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.230:*:*:*:*:*:*:*", "cpeNameId": "8EEDFC00-6778-4242-87AA-1BF8B788A7AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.231:*:*:*:*:*:*:*", "cpeNameId": "4F7C7BF1-9231-4FA0-A31F-A8A21DF8388E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.232:*:*:*:*:*:*:*", "cpeNameId": "B76B39F5-A59B-4C38-9381-5BCB6A78AC30"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.233:*:*:*:*:*:*:*", "cpeNameId": "97DA7801-C4EB-49B8-BCB6-B53FB848E2A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.234:*:*:*:*:*:*:*", "cpeNameId": "B249D0C2-FF7F-48DC-AF81-4B69D6844B27"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.235:*:*:*:*:*:*:*", "cpeNameId": "6B01EB29-4E04-41BD-BC2A-10619B7D39E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.236:*:*:*:*:*:*:*", "cpeNameId": "C81712BA-4FF9-4DD1-AD12-BABC49E8A004"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.237:*:*:*:*:*:*:*", "cpeNameId": "2EA256E4-3D89-4EEB-91B7-FFF529E84CAA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.238:*:*:*:*:*:*:*", "cpeNameId": "A0E92899-D97F-498F-8124-94BF18838682"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.239:*:*:*:*:*:*:*", "cpeNameId": "E4088748-A84D-4D3C-A8F9-479DB4DFEAAF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.240:*:*:*:*:*:*:*", "cpeNameId": "EBEBA8E4-803E-4EF0-A3EA-295960568227"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.241:*:*:*:*:*:*:*", "cpeNameId": "07C3F8E4-4820-447B-8D85-5297B73BD561"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.242:*:*:*:*:*:*:*", "cpeNameId": "EE853DB7-F2DA-4461-926E-E8586C8B9769"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.243:*:*:*:*:*:*:*", "cpeNameId": "EFB0DC56-2543-4A76-B959-03F1D12AFF46"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.244:*:*:*:*:*:*:*", "cpeNameId": "F491B8F2-2AEC-4382-9095-6C6C933316B2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.245:*:*:*:*:*:*:*", "cpeNameId": "EA198FA8-3EC5-458B-8210-D4176F4D2991"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.246:*:*:*:*:*:*:*", "cpeNameId": "45949E40-A94B-4C31-8110-9EB5F16CFA74"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.247:*:*:*:*:*:*:*", "cpeNameId": "D6CA348F-100D-4CB7-884C-05BCD92C93AD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.248:*:*:*:*:*:*:*", "cpeNameId": "774EFE10-D2D0-4C23-ACFC-AD61E9765BA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.249:*:*:*:*:*:*:*", "cpeNameId": "1B531DDE-03EC-4C95-B0DD-C316CE378AD8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.250:*:*:*:*:*:*:*", "cpeNameId": "7105F9F5-3435-481E-B46A-BE6F3AA78446"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.251:*:*:*:*:*:*:*", "cpeNameId": "CCB75783-8321-4164-9877-0AF392D531FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.252:*:*:*:*:*:*:*", "cpeNameId": "14D27D39-5785-461D-A4F7-46F07A67342D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.253:*:*:*:*:*:*:*", "cpeNameId": "3F9F5FE6-B76D-4F70-9F2D-0C647C026561"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.254:*:*:*:*:*:*:*", "cpeNameId": "0C15C6BC-2A46-4556-B847-17B7CA0F4DE3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.255:*:*:*:*:*:*:*", "cpeNameId": "F4FA95EA-4D16-4C6E-86D9-1D0E95E8AD42"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.256:*:*:*:*:*:*:*", "cpeNameId": "41A5A246-0D51-4C1E-A781-DA73D49C53B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.257:*:*:*:*:*:*:*", "cpeNameId": "339FB596-B009-493F-8DA9-19A69E175ED5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.258:*:*:*:*:*:*:*", "cpeNameId": "CCF5717D-F04D-4048-94EA-C4E7A4C45F95"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.259:*:*:*:*:*:*:*", "cpeNameId": "2A03EFB0-FD68-478A-B718-5D411878D8BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.260:*:*:*:*:*:*:*", "cpeNameId": "DA6AC544-7494-4683-83E9-D59AF89B5401"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.261:*:*:*:*:*:*:*", "cpeNameId": "5C4BFBA7-A9B0-425B-AE4F-0C6ED6E21759"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.262:*:*:*:*:*:*:*", "cpeNameId": "345ED523-FD6D-489D-ADBE-FC738A8816C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.263:*:*:*:*:*:*:*", "cpeNameId": "99653F61-52E2-4A51-80F3-C48F7059918B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.264:*:*:*:*:*:*:*", "cpeNameId": "424A4C5C-FB0F-4FCD-8D64-4EF4B44C04DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.265:*:*:*:*:*:*:*", "cpeNameId": "8C58D077-E378-4DA8-8AEA-9B41A26CCF78"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.266:*:*:*:*:*:*:*", "cpeNameId": "FF1979DA-6280-4D83-87A2-76F9B51A484B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.267:*:*:*:*:*:*:*", "cpeNameId": "9316876F-BD99-4370-B45A-622A21A1C234"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.268:*:*:*:*:*:*:*", "cpeNameId": "7364C13D-4E86-45D4-93CE-F8A77D11245E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.269:*:*:*:*:*:*:*", "cpeNameId": "A91EF74E-716D-4D53-B818-CE1FFA90561B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.270:*:*:*:*:*:*:*", "cpeNameId": "9F8B9A50-D4BF-455B-ACAE-9773F80690D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.271:*:*:*:*:*:*:*", "cpeNameId": "14B3F541-9955-4712-A8B1-4394A3D11DAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.272:*:*:*:*:*:*:*", "cpeNameId": "994323DF-37C1-48B8-BF6D-CF726E6ADED2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.273:*:*:*:*:*:*:*", "cpeNameId": "5794FF97-3D47-47A1-9934-DF5587AD915B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.274:*:*:*:*:*:*:*", "cpeNameId": "C853072E-5EC8-483D-A2CA-4AD2297E51FF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.275:*:*:*:*:*:*:*", "cpeNameId": "98009745-52F2-4846-B454-E90321008CFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.276:*:*:*:*:*:*:*", "cpeNameId": "9A192DE3-8954-4CE7-A200-FBCAE1BFF0D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.277:*:*:*:*:*:*:*", "cpeNameId": "651E5F82-D722-4636-B41C-17ECB9F614AD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.278:*:*:*:*:*:*:*", "cpeNameId": "8A8873EE-B55C-4EFF-8885-329450882E8B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.279:*:*:*:*:*:*:*", "cpeNameId": "CEC23D4D-DCBC-4269-904F-EB1829C48B4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.280:*:*:*:*:*:*:*", "cpeNameId": "6670595A-51D0-4860-A97D-CEF230135DCF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.281:*:*:*:*:*:*:*", "cpeNameId": "C6198A8B-6286-4E96-8629-D7C35E60DB89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.282:*:*:*:*:*:*:*", "cpeNameId": "E3D67109-1796-404D-8308-A39BF1338C3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.283:*:*:*:*:*:*:*", "cpeNameId": "D630C6EC-A2AB-480D-AA68-544966BFD6AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.284:*:*:*:*:*:*:*", "cpeNameId": "6BD57B4C-7ECD-41B1-9631-C1BFBBD6B049"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.285:*:*:*:*:*:*:*", "cpeNameId": "C8FCDB6A-75F8-4B62-A698-D9943A805CBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.286:*:*:*:*:*:*:*", "cpeNameId": "BA369E82-203F-4291-9419-56F1E4A53D15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.287:*:*:*:*:*:*:*", "cpeNameId": "A544C41E-F4FC-4293-A3D6-B5F91E5EF1A7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.288:*:*:*:*:*:*:*", "cpeNameId": "A0BDF59E-7C92-443B-B035-B250F80E4DC9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.289:*:*:*:*:*:*:*", "cpeNameId": "73D2125C-A474-417B-B135-1903D427F538"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.290:*:*:*:*:*:*:*", "cpeNameId": "477BA94B-EB37-4234-BA72-469682042745"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.291:*:*:*:*:*:*:*", "cpeNameId": "F1E29F38-68F3-4CEE-8AD5-828E7C63ED7A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.292:*:*:*:*:*:*:*", "cpeNameId": "6829F830-B295-4BEA-9037-EAE6C6D83D45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.293:*:*:*:*:*:*:*", "cpeNameId": "22CF6A05-5745-4A7F-8559-702E9C3C8830"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.294:*:*:*:*:*:*:*", "cpeNameId": "A36397CA-8253-443A-BEB3-EB7F21F084D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.295:*:*:*:*:*:*:*", "cpeNameId": "9597112C-DEE5-4DE7-A87B-A8CA716B2212"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.296:*:*:*:*:*:*:*", "cpeNameId": "98F92400-37C0-40CA-A0A7-AE36BA845F6B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.297:*:*:*:*:*:*:*", "cpeNameId": "48BF44DC-C00D-4964-B152-341BACB0F556"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.298:*:*:*:*:*:*:*", "cpeNameId": "0E913D3C-18EF-4895-98ED-42C69A1C76B2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.299:*:*:*:*:*:*:*", "cpeNameId": "B8D13EF3-4ECA-4429-8BE2-175CA0247B11"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.300:*:*:*:*:*:*:*", "cpeNameId": "4D091AD8-D0D7-4EBA-814C-88E1BA8374F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.301:*:*:*:*:*:*:*", "cpeNameId": "B1830564-E39A-448F-950A-1B20281BB3B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.302:*:*:*:*:*:*:*", "cpeNameId": "8EA0AAA8-D9AB-47A4-84B1-733B8A5685BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.303:*:*:*:*:*:*:*", "cpeNameId": "8271E5F1-FC03-47FC-9102-A0491D04E4A6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.304:*:*:*:*:*:*:*", "cpeNameId": "8A6B6167-7ED8-4001-BBE1-60520A1507D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.305:*:*:*:*:*:*:*", "cpeNameId": "D314E91D-4DB8-4F05-A3E9-D0AD324F2B40"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.306:*:*:*:*:*:*:*", "cpeNameId": "5DE889B3-0BAD-4FA8-9450-7ADAEA53BCB6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.307:*:*:*:*:*:*:*", "cpeNameId": "0A1ACC8A-123F-4239-8F9D-9DBB85D19A60"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.308:*:*:*:*:*:*:*", "cpeNameId": "2C104BF2-78BD-46F5-A42B-8A7737F08831"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.309:*:*:*:*:*:*:*", "cpeNameId": "3AB452D7-1B5C-4AEC-BA48-88EAE679521A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.310:*:*:*:*:*:*:*", "cpeNameId": "A2B6D891-8756-47AC-BB50-74EED68F5348"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.311:*:*:*:*:*:*:*", "cpeNameId": "CD98624C-BF2D-4AD5-8DC6-23C0376ADEDE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.312:*:*:*:*:*:*:*", "cpeNameId": "A353C4E5-BCD5-404E-BA32-E44D42939E26"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.313:*:*:*:*:*:*:*", "cpeNameId": "EA493CF9-9392-46DA-B897-F85D4EF3B00E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.314:*:*:*:*:*:*:*", "cpeNameId": "50DDF9BB-6311-4505-AA6A-6240E950DD68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.315:*:*:*:*:*:*:*", "cpeNameId": "6929ED83-8C13-41A6-9C4A-CA1F36116442"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.316:*:*:*:*:*:*:*", "cpeNameId": "41B4751B-1E9E-493B-AE0D-BF29E6317911"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.317:*:*:*:*:*:*:*", "cpeNameId": "8DAAD8CA-4620-48BE-95E9-9623F7AACD63"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.318:*:*:*:*:*:*:*", "cpeNameId": "2C0D3085-6703-41F9-81D9-28EA3A593F9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.319:*:*:*:*:*:*:*", "cpeNameId": "A439957C-0CFF-4BDF-A644-00A2602DF673"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.320:*:*:*:*:*:*:*", "cpeNameId": "3EDC01DA-28BA-4672-A0BE-8B3346F51F19"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.321:*:*:*:*:*:*:*", "cpeNameId": "77BA70B4-3A94-4325-BDC1-22564AF064F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.322:*:*:*:*:*:*:*", "cpeNameId": "0743F164-F7F4-485E-AFB7-35D7DC7455E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.323:*:*:*:*:*:*:*", "cpeNameId": "5FDB4BD5-157B-43B7-BA06-8C5FF941542F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.324:*:*:*:*:*:*:*", "cpeNameId": "DE4432A7-318F-4B7B-8CEB-9FA31468CC36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.325:*:*:*:*:*:*:*", "cpeNameId": "80F87AA1-DAEE-4931-ADF7-4183B893D8F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.326:*:*:*:*:*:*:*", "cpeNameId": "5C25C636-C95F-4E94-AC85-5E684E14069F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.327:*:*:*:*:*:*:*", "cpeNameId": "ED6E0851-1828-44F8-BF12-233B8E28DBC8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.328:*:*:*:*:*:*:*", "cpeNameId": "976DF29A-943C-4C28-A071-DA2911DEDECE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.329:*:*:*:*:*:*:*", "cpeNameId": "3EE5D34F-9BBA-4FBA-9157-A4A9FA953C68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.330:*:*:*:*:*:*:*", "cpeNameId": "27711BD8-D761-4F4F-8330-FB1150982CCD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.331:*:*:*:*:*:*:*", "cpeNameId": "CBD4F61B-627B-4ACC-B743-57C302AB29F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.332:*:*:*:*:*:*:*", "cpeNameId": "E5247303-B19B-42F3-B1F1-DED50AB8E3CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.333:*:*:*:*:*:*:*", "cpeNameId": "F7C8E776-3213-4F39-9637-25902C283906"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.334:*:*:*:*:*:*:*", "cpeNameId": "D9008EE6-5CED-451D-8E36-07626739C582"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.335:*:*:*:*:*:*:*", "cpeNameId": "3F094A53-6652-4404-AE4C-3CCA8BE6BAC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.336:*:*:*:*:*:*:*", "cpeNameId": "8540A828-6A7F-499A-9F47-861E278F7001"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:*:*:*:*:*:*:*", "cpeNameId": "D44D12DF-CC78-4ADD-AA64-D1FF33FCFC11"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:-:*:*:*:*:*:*", "cpeNameId": "82324BC8-B6FA-4FD7-B301-3CAA806DF77D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:rc1:*:*:*:*:*:*", "cpeNameId": "710D7761-A5EC-4338-BBC6-1EA829347DD9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:rc2:*:*:*:*:*:*", "cpeNameId": "A9B4765F-04DB-41A9-9BDC-D9EBC8A916CE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:rc3:*:*:*:*:*:*", "cpeNameId": "6D023E11-92E4-4DC4-A704-A653569DEF7E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:rc4:*:*:*:*:*:*", "cpeNameId": "BE180D29-2D25-4945-85F5-4FF1B61A755F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:rc5:*:*:*:*:*:*", "cpeNameId": "B550A739-A864-4C04-8B4F-DB875CCE5876"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:rc6:*:*:*:*:*:*", "cpeNameId": "EE7802F2-4421-4A8F-A5E7-10ABA30BB95D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:rc7:*:*:*:*:*:*", "cpeNameId": "913B33F6-C76A-415E-978B-DFE69DD12443"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.1:*:*:*:*:*:*:*", "cpeNameId": "885FF46B-AF78-41E0-9992-134FC5483062"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.2:*:*:*:*:*:*:*", "cpeNameId": "417EF125-85BE-4436-8270-385A03FBF5DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.3:*:*:*:*:*:*:*", "cpeNameId": "A60F0159-BE82-4549-A156-D0C420BCD669"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.4:*:*:*:*:*:*:*", "cpeNameId": "205719B0-36E0-490F-A726-DBF0A18C7B6D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.5:*:*:*:*:*:*:*", "cpeNameId": "F6FC9B68-7A46-413B-B2F2-B96FC679293B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.6:*:*:*:*:*:*:*", "cpeNameId": "860DB2BE-F0BD-4E93-ACAF-73AB5A4287EC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.7:*:*:*:*:*:*:*", "cpeNameId": "72F15093-84F6-4F64-AD90-9C0B8534002F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.8:*:*:*:*:*:*:*", "cpeNameId": "1241D778-09B7-41CF-A7F0-3F33365EAEEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.9:*:*:*:*:*:*:*", "cpeNameId": "85AF8455-0705-4C7B-A8D7-C827098D3CBC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.10:*:*:*:*:*:*:*", "cpeNameId": "59B6BDD9-9094-469D-B556-347EAFFAC84A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.11:*:*:*:*:*:*:*", "cpeNameId": "195BB390-1666-4C78-8E5E-E8BB8F7CD6C7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.12:*:*:*:*:*:*:*", "cpeNameId": "4611F4AE-C544-40B2-BAB0-4D75918253B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.13:*:*:*:*:*:*:*", "cpeNameId": "174828D2-1D1F-4A0F-9D4A-3D6CEEB670A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.14:*:*:*:*:*:*:*", "cpeNameId": "4A9AF5EF-2143-422E-9406-12394AE6F056"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.15:*:*:*:*:*:*:*", "cpeNameId": "0ED2B63D-794A-436E-98B2-8BB1746F8E37"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.16:*:*:*:*:*:*:*", "cpeNameId": "A3EE611D-A161-44D4-B8BC-3D77C35AC1DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.17:*:*:*:*:*:*:*", "cpeNameId": "77C22DEA-C18D-4F57-A5B2-D9432480F6F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.18:*:*:*:*:*:*:*", "cpeNameId": "98BC40B2-34EE-44D0-AD07-D41DA8D98FEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:*:*:*:*:*:*:*", "cpeNameId": "CE47DAE6-002F-46BE-8496-FC478C0B0928"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:-:*:*:*:*:*:*", "cpeNameId": "96F106B5-E746-4DE6-BCEB-07F1F572960D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:rc:*:*:*:*:*:*", "cpeNameId": "C0F0B475-896B-4239-8475-5B90B74BE05E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:rc1:*:*:*:*:*:*", "cpeNameId": "206EC973-ED2E-49E1-A4AC-54F7D30DD628"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:rc2:*:*:*:*:*:*", "cpeNameId": "AAD4C356-7CE1-4A45-96FE-6D75643AB293"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:rc3:*:*:*:*:*:*", "cpeNameId": "4BFA1B60-7E55-4547-8B4B-AFC1256015D6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:rc4:*:*:*:*:*:*", "cpeNameId": "78E3876E-D2C3-49BA-BE26-2066849638AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:rc5:*:*:*:*:*:*", "cpeNameId": "B9536FB8-C7B1-4C28-82CD-8D8150E7BCCB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:rc6:*:*:*:*:*:*", "cpeNameId": "BEC1B244-1D7B-47BC-A1BB-6F95945EA2C7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:rc7:*:*:*:*:*:*", "cpeNameId": "1D3A9DBB-AF78-4A75-A55E-C851D1277498"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.1:*:*:*:*:*:*:*", "cpeNameId": "C1BE1F09-D07F-4AE4-9764-73721620F745"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.2:*:*:*:*:*:*:*", "cpeNameId": "563DD6A5-BEDD-437A-BAD5-981FD66FAA1A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.3:*:*:*:*:*:*:*", "cpeNameId": "6DC9ED49-7975-48B1-B630-06680709899F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.4:*:*:*:*:*:*:*", "cpeNameId": "39F925A0-630B-4CBF-9BFC-C40C0E81BFA8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.5:*:*:*:*:*:*:*", "cpeNameId": "A0E5D15C-E27F-4B55-9668-078BA5CCD7AA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.6:*:*:*:*:*:*:*", "cpeNameId": "6DE6DECA-3142-43DA-B930-A48EAFF9CED3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.7:*:*:*:*:*:*:*", "cpeNameId": "0438E224-2F8A-4089-BF5E-D7763A431E39"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.8:*:*:*:*:*:*:*", "cpeNameId": "0814DBD3-2193-40B5-8CE1-5C992D4C59C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.9:*:*:*:*:*:*:*", "cpeNameId": "C75890A0-5944-4BB6-B44B-83FDDA55308A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.10:*:*:*:*:*:*:*", "cpeNameId": "50932CE7-4BA6-4944-839E-800831391197"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.11:*:*:*:*:*:*:*", "cpeNameId": "21B4D5C0-665E-4B96-8A71-F84E2731725A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.12:*:*:*:*:*:*:*", "cpeNameId": "26861D80-6855-42B4-A2C5-5A5314C63454"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.13:*:*:*:*:*:*:*", "cpeNameId": "161AE6FB-AF4F-4A02-A235-9BA4D3A8BFE7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.14:*:*:*:*:*:*:*", "cpeNameId": "04DDF552-0DBA-4D2D-97A9-05F348E45E2D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.15:*:*:*:*:*:*:*", "cpeNameId": "8D8D509C-F3B3-4D99-AE7B-85ACE6CDCE9A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.16:*:*:*:*:*:*:*", "cpeNameId": "F62EAE49-6093-4A2A-AEDC-DB4D450BCDCF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.17:*:*:*:*:*:*:*", "cpeNameId": "D4A046F1-9970-4BC2-A4F8-E58871919793"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.18:*:*:*:*:*:*:*", "cpeNameId": "9A7D44E8-1ABB-4FCA-900F-63CF5B432394"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:*:*:*:*:*:*:*", "cpeNameId": "3F9A62D1-EC46-4586-BF5B-075E503B34AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:-:*:*:*:*:*:*", "cpeNameId": "1355298F-E180-4ACE-BE37-E4671C6D87FA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:rc1:*:*:*:*:*:*", "cpeNameId": "869F2A88-8ECA-4277-8EF8-04722B6397F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:rc2:*:*:*:*:*:*", "cpeNameId": "E213D2C7-56A5-4CDB-9FFA-D562EBE66B32"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:rc3:*:*:*:*:*:*", "cpeNameId": "23DCE750-11FB-46DF-B936-8AEAE54EDCF1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:rc4:*:*:*:*:*:*", "cpeNameId": "95518E21-4F70-4E7F-8A5E-41A71733B838"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:rc5:*:*:*:*:*:*", "cpeNameId": "86A613D5-2EDD-46C6-BD54-6EE7E0BD677F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:rc6:*:*:*:*:*:*", "cpeNameId": "7ACCD69E-0ADE-4675-919A-6ADCADB4E243"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:rc7:*:*:*:*:*:*", "cpeNameId": "0CDA0188-9155-4355-B8E0-EC98BCA4D106"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.1:*:*:*:*:*:*:*", "cpeNameId": "8AFFDBAA-464C-4017-8E0B-80E70560BD9C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.2:*:*:*:*:*:*:*", "cpeNameId": "A00BC577-2BDB-4CB9-A918-5EFA87297409"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.3:*:*:*:*:*:*:*", "cpeNameId": "D03EB1B1-6645-4442-9A5B-084C2C086199"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.4:*:*:*:*:*:*:*", "cpeNameId": "4321A1DC-4069-4924-ADAF-060727BD410C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.5:*:*:*:*:*:*:*", "cpeNameId": "6E0A1034-4FFA-4B8B-BA2F-DDDF74911FD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.6:*:*:*:*:*:*:*", "cpeNameId": "0DA7186B-D3B7-4E95-B66E-8FF81C72BC75"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.7:*:*:*:*:*:*:*", "cpeNameId": "2F936CBB-766A-4DFB-A60A-72F1A37577EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.8:*:*:*:*:*:*:*", "cpeNameId": "CB3F392D-0A8A-4D3E-8E62-9E7FD830F988"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.9:*:*:*:*:*:*:*", "cpeNameId": "D1A962D5-849E-4799-B4E2-58BF062A8E35"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.10:*:*:*:*:*:*:*", "cpeNameId": "358D2C77-1EDB-44D7-914F-C1B93B184AE2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.11:*:*:*:*:*:*:*", "cpeNameId": "1B36CCD2-6734-4F62-887B-0B29DEAB8948"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.12:*:*:*:*:*:*:*", "cpeNameId": "939C2382-3F25-4D16-B047-662EF7362D14"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.13:*:*:*:*:*:*:*", "cpeNameId": "4787E970-6703-4A4A-8A25-2A6DF37E9115"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.14:*:*:*:*:*:*:*", "cpeNameId": "D9DE2C08-37BB-4B4E-9CC9-257FB5D0CC55"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.15:*:*:*:*:*:*:*", "cpeNameId": "56CA0D63-01A8-4C7D-9285-0FE01EE5A4CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.16:*:*:*:*:*:*:*", "cpeNameId": "0EB823BC-6F14-4123-AFE3-5BD35C06053B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.17:*:*:*:*:*:*:*", "cpeNameId": "8DB0A362-21DC-463F-8741-7983D7091926"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.18:*:*:*:*:*:*:*", "cpeNameId": "D52B62A2-3084-4DC4-A603-BCAC0CE52FEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.19:*:*:*:*:*:*:*", "cpeNameId": "A5AE9508-CB21-4232-B63E-532C504349B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:*:*:*:*:*:*:*", "cpeNameId": "817415B8-9A60-4887-9222-0D9F02CFB071"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:-:*:*:*:*:*:*", "cpeNameId": "8835D366-AAEA-40BE-A53D-C0C034420403"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:rc1:*:*:*:*:*:*", "cpeNameId": "2213E83B-F249-4DA4-A296-9AE97B5995D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:rc2:*:*:*:*:*:*", "cpeNameId": "48BFC151-DD12-4AA8-860C-CC88EC732BFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:rc3:*:*:*:*:*:*", "cpeNameId": "9FA2195C-1574-4F87-9EBF-C6C98F88BAFF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:rc4:*:*:*:*:*:*", "cpeNameId": "67BF2AB1-0C74-4B1F-8E1C-B1D82E89DDB4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:rc5:*:*:*:*:*:*", "cpeNameId": "AE91D0F4-8012-4BAC-A0C6-BB99AD9D2E46"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:rc6:*:*:*:*:*:*", "cpeNameId": "1766D430-184A-4072-B189-A1497C75D6BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:rc7:*:*:*:*:*:*", "cpeNameId": "CAA30654-34CD-4B4F-B233-29B87ED2FBB8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:rc8:*:*:*:*:*:*", "cpeNameId": "00096540-8FA8-46CA-BB68-93B1C5272D2D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.0:*:*:*:*:*:*:*", "cpeNameId": "A009147C-ACF6-4854-AAE6-3A23AE21C4CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.0-193.el8:*:*:*:*:*:*:*", "cpeNameId": "FCA98709-2F68-4E1B-9430-7D7166871698"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.1:*:*:*:*:*:*:*", "cpeNameId": "13793707-6FDB-4423-A8E6-2ADC8BD61C3A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.2:*:*:*:*:*:*:*", "cpeNameId": "EAB280BE-E42E-47BD-BC9B-9EE32D6C2A40"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.3:*:*:*:*:*:*:*", "cpeNameId": "587AE0EF-5106-4CEA-9358-2D066510D151"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.4:*:*:*:*:*:*:*", "cpeNameId": "A3318DEA-3BE2-4302-BC9B-A034934F9D1D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.5:*:*:*:*:*:*:*", "cpeNameId": "6DFCE771-61CC-4086-9ABA-D355FF8F3148"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.6:*:*:*:*:*:*:*", "cpeNameId": "445E159B-AA55-48BD-93C7-2B930AD4EB83"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.7:*:*:*:*:*:*:*", "cpeNameId": "B27A8950-AB89-4120-80DA-B349652A523D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.8:*:*:*:*:*:*:*", "cpeNameId": "8E631816-CFC2-4D77-AE17-D796C455F715"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.9:*:*:*:*:*:*:*", "cpeNameId": "8FD85D0C-385D-488A-A090-32B066B8C2EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.10:*:*:*:*:*:*:*", "cpeNameId": "FEEDBD99-9EB3-41AF-815C-571AF46B5D85"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.11:*:*:*:*:*:*:*", "cpeNameId": "7E7CBF51-E6C8-46E1-8DD3-CFBAB87EA47B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.12:*:*:*:*:*:*:*", "cpeNameId": "F965D923-D9D7-4EF1-B1FB-07EA2FEEBE31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.13:*:*:*:*:*:*:*", "cpeNameId": "E5834B3F-3734-4FEB-9440-7AE8BE96EBB5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.14:*:*:*:*:*:*:*", "cpeNameId": "09696490-5ABF-48D2-823F-C1822003B392"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.15:*:*:*:*:*:*:*", "cpeNameId": "E6911EAC-4DB4-41E9-9401-B4226373EE5A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.16:*:*:*:*:*:*:*", "cpeNameId": "AC125B64-72FD-4946-B3A7-663299025809"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.17:*:*:*:*:*:*:*", "cpeNameId": "EF3569D5-2C62-4458-974E-918A784BD62A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.18:*:*:*:*:*:*:*", "cpeNameId": "1FA907F8-0BCB-4507-8714-DC1D5781D42D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.19:*:*:*:*:*:*:*", "cpeNameId": "942860D3-A3FF-4932-A6FB-9459A59644BE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.20:*:*:*:*:*:*:*", "cpeNameId": "EC116A00-67FF-4F9B-9B3B-EFB39878E41F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:*:*:*:*:*:*:*", "cpeNameId": "A3163086-ED2B-4462-9265-6F1DCEAB4D54"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:-:*:*:*:*:*:*", "cpeNameId": "057CC752-CE29-466B-827D-3930C41F1C3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:rc1:*:*:*:*:*:*", "cpeNameId": "AFC357CC-56A5-4555-959A-34F88351D81B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:rc2:*:*:*:*:*:*", "cpeNameId": "ED61D354-4BB9-4D66-87FB-86662D7B6B12"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:rc3:*:*:*:*:*:*", "cpeNameId": "A84469B4-B1DD-4DED-AC99-EA9C2CA93CF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:rc4:*:*:*:*:*:*", "cpeNameId": "EE659E91-B594-49B5-BC25-C4BAB3BE192E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:rc5:*:*:*:*:*:*", "cpeNameId": "2B7349C1-F08A-44E5-8FB8-3F2804E5A07F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:rc6:*:*:*:*:*:*", "cpeNameId": "EB37BD16-E204-41BE-ADE4-01B875CBE896"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:rc7:*:*:*:*:*:*", "cpeNameId": "745C3308-0D37-4503-B9FD-1C7A675E7C3A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:rc8:*:*:*:*:*:*", "cpeNameId": "C09DBABE-8232-4196-8C42-2D4509AD02FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.1:*:*:*:*:*:*:*", "cpeNameId": "CBFE536A-5936-4037-A140-B381A09E0313"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.2:*:*:*:*:*:*:*", "cpeNameId": "E7375DDA-E673-4CB3-9A7A-751E0A34FC42"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.3:*:*:*:*:*:*:*", "cpeNameId": "99F55D5C-293A-4F8A-8C8C-D324BECF805D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.4:*:*:*:*:*:*:*", "cpeNameId": "C61FC074-FB83-48ED-8299-CF0565B28BF0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.5:*:*:*:*:*:*:*", "cpeNameId": "813A19FD-6C0F-442D-BD13-D924AAB177A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.6:*:*:*:*:*:*:*", "cpeNameId": "5387070B-08B1-4B14-ABD0-845D0DD8F84B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.7:*:*:*:*:*:*:*", "cpeNameId": "E39CE6E9-2A15-486F-881E-000CEB221CFC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.8:*:*:*:*:*:*:*", "cpeNameId": "3951D003-9ACB-4530-AD87-BA6495862F19"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.9:*:*:*:*:*:*:*", "cpeNameId": "16722D4A-04DC-40F0-B6BE-19B503E6F896"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.10:*:*:*:*:*:*:*", "cpeNameId": "1F88CB52-D7B5-4946-A367-45DE35034F51"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.11:*:*:*:*:*:*:*", "cpeNameId": "77B502BA-B846-4C9C-A8CE-3EF988CECC92"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.12:*:*:*:*:*:*:*", "cpeNameId": "23451725-61D8-4924-88FD-F296F0BB0BDD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.13:*:*:*:*:*:*:*", "cpeNameId": "2647DBE8-332D-4420-A7FE-971F97D450E5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.14:*:*:*:*:*:*:*", "cpeNameId": "EC80AF58-D2F3-439F-8A3D-0333C832805C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.15:*:*:*:*:*:*:*", "cpeNameId": "5FF48FD7-42B6-446C-9142-C46F87307A23"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.16:*:*:*:*:*:*:*", "cpeNameId": "27DD882E-6137-45D8-95CA-46E0A0E9D546"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.17:*:*:*:*:*:*:*", "cpeNameId": "3D79ECA3-B493-4422-B61B-F9D8725540BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.18:*:*:*:*:*:*:*", "cpeNameId": "D815E2B8-DD92-47E3-A1C3-E9B7859ED848"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.19:*:*:*:*:*:*:*", "cpeNameId": "3ED97E59-18F8-4970-8DCF-108DB66C0B64"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.20:*:*:*:*:*:*:*", "cpeNameId": "F5B56565-8277-4435-81A3-14A07CD1CFB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.21:*:*:*:*:*:*:*", "cpeNameId": "08DEF207-BE10-4D38-B198-E0E81A7D8DD8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.22:*:*:*:*:*:*:*", "cpeNameId": "6406E989-2DA9-4473-8A19-F34C0AA0A101"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.23:*:*:*:*:*:*:*", "cpeNameId": "BAB4A7B7-201A-49DD-8CEA-C8276A386DB5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.24:*:*:*:*:*:*:*", "cpeNameId": "C1807F8B-4224-4C20-A7E6-A1A37CFE804C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.25:*:*:*:*:*:*:*", "cpeNameId": "BC055247-93EC-4557-97C5-3F2476EE0F15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.26:*:*:*:*:*:*:*", "cpeNameId": "7D6369DC-902C-4BC1-A26D-C5C913143EB6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.26.1:*:*:*:*:*:*:*", "cpeNameId": "8C01371D-728D-41FF-8EDB-479FFEB181A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.27:*:*:*:*:*:*:*", "cpeNameId": "A32084B7-D6A4-4F74-B282-DDB6DEF0C5AA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.28:*:*:*:*:*:*:*", "cpeNameId": "E0A0C51F-ED33-48CF-927D-0CA8970B6D1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.29:*:*:*:*:*:*:*", "cpeNameId": "21FF2212-87CD-409F-8FA3-A36D8AA94607"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.30:*:*:*:*:*:*:*", "cpeNameId": "429E0577-DB63-4580-8B2F-9F00743EB4B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.31:*:*:*:*:*:*:*", "cpeNameId": "3371D4B5-E4D9-483E-AA24-B99A03C20991"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.32:*:*:*:*:*:*:*", "cpeNameId": "316A0495-6409-4E82-A2FF-2A3158DF6020"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.33:*:*:*:*:*:*:*", "cpeNameId": "2ADFFFEE-80CB-4EF8-8893-D1D2CDBF2687"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.34:*:*:*:*:*:*:*", "cpeNameId": "D3C47B41-3976-412A-877C-08C558B67F17"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.35:*:*:*:*:*:*:*", "cpeNameId": "C12B86A6-026B-4109-9E3B-5A334A73871F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.36:*:*:*:*:*:*:*", "cpeNameId": "855C5C5D-CC69-4629-9D55-4E25F1346965"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.37:*:*:*:*:*:*:*", "cpeNameId": "35B14A6C-CDA5-4E1F-B6C6-4E8305D32DFB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.38:*:*:*:*:*:*:*", "cpeNameId": "9CB2A48B-F8FC-47BE-9DF4-2B95585425F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.39:*:*:*:*:*:*:*", "cpeNameId": "E6A1D1E0-0373-4295-897D-C7E699C018E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.40:*:*:*:*:*:*:*", "cpeNameId": "970D15E0-EE86-4AAB-9840-3CD713AEF03B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.41:*:*:*:*:*:*:*", "cpeNameId": "0B47B7E6-5110-44D8-BDEA-4080A6A28FCF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.42:*:*:*:*:*:*:*", "cpeNameId": "2FF8D63B-85F6-43EC-B69F-231ECF7D0312"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.43:*:*:*:*:*:*:*", "cpeNameId": "935B8487-6BDD-4FFF-9F7E-00A86BB69CDD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.44:*:*:*:*:*:*:*", "cpeNameId": "48F99607-CA4F-4629-A68D-4349153DF423"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.45:*:*:*:*:*:*:*", "cpeNameId": "1CFB073B-B310-49DC-893B-B46DE6336F4E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.46:*:*:*:*:*:*:*", "cpeNameId": "8F2CA065-9492-44F8-9C69-B151B71803CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.47:*:*:*:*:*:*:*", "cpeNameId": "65D05643-4760-4FC5-97A3-BC5CCCA46CE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.48:*:*:*:*:*:*:*", "cpeNameId": "805F2CFA-C623-43A6-BA75-8A677011B7C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.49:*:*:*:*:*:*:*", "cpeNameId": "E9B45E20-6F1C-4909-95E4-17956AB05513"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.50:*:*:*:*:*:*:*", "cpeNameId": "02565DD0-1F69-44F5-9710-F4559686BCB5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.51:*:*:*:*:*:*:*", "cpeNameId": "4A2A0E35-E26F-470C-8293-E71B0D280E37"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.52:*:*:*:*:*:*:*", "cpeNameId": "E4259B27-55AA-4906-A88E-2F156833874F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.53:*:*:*:*:*:*:*", "cpeNameId": "2399AB59-0AAB-45C3-9359-778E0CEF66FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.54:*:*:*:*:*:*:*", "cpeNameId": "46C3AEDA-6F26-4416-BF76-1FEBBD354F3F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.55:*:*:*:*:*:*:*", "cpeNameId": "10F1A367-B071-4F9A-A2CB-0C7FF216A216"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.56:*:*:*:*:*:*:*", "cpeNameId": "DF3D3A29-EB49-483C-9737-67E18806F753"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.57:*:*:*:*:*:*:*", "cpeNameId": "D79FAF76-5403-4082-95B6-702810120DAA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.58:*:*:*:*:*:*:*", "cpeNameId": "93DF7061-A282-4290-9D97-63ACC7575826"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.59:*:*:*:*:*:*:*", "cpeNameId": "88CB7AC8-7CAA-4947-8578-AB8B5A9C7D8C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.60:*:*:*:*:*:*:*", "cpeNameId": "8B9A9641-54E1-40FE-AD41-551002220084"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.61:*:*:*:*:*:*:*", "cpeNameId": "04A60F34-73F7-49AB-AB09-1083721DE784"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.62:*:*:*:*:*:*:*", "cpeNameId": "D4A637B9-0057-4393-A19F-69879DA1CA8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.63:*:*:*:*:*:*:*", "cpeNameId": "AF1FE2CD-7236-4965-952B-6F172159373C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.64:*:*:*:*:*:*:*", "cpeNameId": "7D1F715A-1A92-4ECE-85BB-0CC907BEDD91"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.65:*:*:*:*:*:*:*", "cpeNameId": "4116C6D8-AF20-48AF-8ADA-0506911A3459"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.66:*:*:*:*:*:*:*", "cpeNameId": "4388B248-80C6-4086-B1E6-4CEE1BF7602F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.67:*:*:*:*:*:*:*", "cpeNameId": "50EF8BC5-16C3-4AD8-A2D1-1A2608CD7374"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.68:*:*:*:*:*:*:*", "cpeNameId": "5D10408F-E5C0-40B2-A497-3E71FB6DD431"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.69:*:*:*:*:*:*:*", "cpeNameId": "10504EA1-D9B1-44C8-A9EC-B8D32AAFCF5B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.70:*:*:*:*:*:*:*", "cpeNameId": "AA9003D3-8912-4A70-8B69-3F2F345FFD89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.71:*:*:*:*:*:*:*", "cpeNameId": "233CCC29-E4BB-4DAD-9F45-CEC77425C279"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.72:*:*:*:*:*:*:*", "cpeNameId": "B3336506-E63D-491E-B756-15C59D0B0EAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.73:*:*:*:*:*:*:*", "cpeNameId": "57449032-831C-45A0-9FE9-E630FB005BEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.74:*:*:*:*:*:*:*", "cpeNameId": "27086504-19AA-48F8-AAC3-FE71072F4AC6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.75:*:*:*:*:*:*:*", "cpeNameId": "858F7980-5197-42DE-B55C-CA706999F200"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.76:*:*:*:*:*:*:*", "cpeNameId": "31423569-8FBC-411E-9F95-9820746128BE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.77:*:*:*:*:*:*:*", "cpeNameId": "D3EB9447-CCF7-4803-ABBB-15477850C76B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.78:*:*:*:*:*:*:*", "cpeNameId": "68BD1635-2CE6-464F-B32D-D0AE25DEB9E5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.79:*:*:*:*:*:*:*", "cpeNameId": "8FFF3C74-22E6-4418-AD93-AA773E549428"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.80:*:*:*:*:*:*:*", "cpeNameId": "721DC148-9BCB-4B12-88AA-0BAF3A380C77"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.81:*:*:*:*:*:*:*", "cpeNameId": "9D3ED37A-08C8-4430-BB0A-EFA6D1AF1D5C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.82:*:*:*:*:*:*:*", "cpeNameId": "00536E1F-7C8D-4DDC-8629-ABE2B4EDA61B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.83:*:*:*:*:*:*:*", "cpeNameId": "6877CB77-34C0-4B45-BED7-7966B69D89F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.84:*:*:*:*:*:*:*", "cpeNameId": "614F4D67-484D-488A-8DB5-9FF8F939927B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.85:*:*:*:*:*:*:*", "cpeNameId": "C3D19825-51CE-43E1-904C-1344DB3775A9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.86:*:*:*:*:*:*:*", "cpeNameId": "2C509040-DF4B-4BD3-8428-4BB9ED4D3BEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.87:*:*:*:*:*:*:*", "cpeNameId": "4455DE42-A354-4EF5-A49A-345954CD65EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.88:*:*:*:*:*:*:*", "cpeNameId": "0F57DC5F-F143-44EE-9037-3BBF9BF3A1E7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.89:*:*:*:*:*:*:*", "cpeNameId": "D4475A2E-E667-4618-A347-10EC5EA6657D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.90:*:*:*:*:*:*:*", "cpeNameId": "2C94A5E1-6EC8-4F69-8C81-18BA6B3E22CC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.91:*:*:*:*:*:*:*", "cpeNameId": "31EE797A-51CC-46B2-B768-1FA25A37706D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.92:*:*:*:*:*:*:*", "cpeNameId": "4748A9ED-7812-4451-81CD-B75547B3C532"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.93:*:*:*:*:*:*:*", "cpeNameId": "119FC260-DEC1-4E63-AF81-2F3360E78EB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.94:*:*:*:*:*:*:*", "cpeNameId": "25A22D4C-1973-4287-B791-87F903F64B97"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.95:*:*:*:*:*:*:*", "cpeNameId": "ACD2D3C9-BA85-4EEE-9A65-FE83E3495315"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.96:*:*:*:*:*:*:*", "cpeNameId": "3B169D06-CA15-4A4A-980A-A056E6C81881"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.97:*:*:*:*:*:*:*", "cpeNameId": "A18ABB80-25F6-4328-B68F-A3B4B23763E4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.98:*:*:*:*:*:*:*", "cpeNameId": "F8BEC111-87BF-4B6C-BBF6-62EE9A763119"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.99:*:*:*:*:*:*:*", "cpeNameId": "2CE59324-24EA-46B0-939D-BA1815313EA7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.100:*:*:*:*:*:*:*", "cpeNameId": "86C29F08-DF43-426C-9E23-1E3416463DBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.101:*:*:*:*:*:*:*", "cpeNameId": "81DE128C-6A1B-4676-A99B-58B77482593A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.102:*:*:*:*:*:*:*", "cpeNameId": "FDA36DFA-EE0A-4DEE-B7C2-A2AF9F84E0CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.103:*:*:*:*:*:*:*", "cpeNameId": "FE71C8C4-8159-49DC-87F0-4A98BEA448C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.104:*:*:*:*:*:*:*", "cpeNameId": "35D6D06A-7705-4EA0-9209-55B7ED61E83A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.105:*:*:*:*:*:*:*", "cpeNameId": "B2DA3294-00F2-4509-A8B2-0F53D69F2B36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.106:*:*:*:*:*:*:*", "cpeNameId": "D337E554-D6A9-4CFC-9985-F670B7654434"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.107:*:*:*:*:*:*:*", "cpeNameId": "FE52DA4B-3ACB-4510-AA7A-9CCFE25E5B87"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.108:*:*:*:*:*:*:*", "cpeNameId": "82BED585-BBDF-41AE-B925-D4CA36F697BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.109:*:*:*:*:*:*:*", "cpeNameId": "C1526792-F597-4674-B998-9A4FF075956E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.110:*:*:*:*:*:*:*", "cpeNameId": "B48E2837-F8E0-42BA-A7D2-B9EA5A770E1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.111:*:*:*:*:*:*:*", "cpeNameId": "B52E1607-47C2-4AD5-95D0-F35A901E5D3F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.112:*:*:*:*:*:*:*", "cpeNameId": "0CDD6E73-775F-49CF-A3D6-E9054EB43D36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.113:*:*:*:*:*:*:*", "cpeNameId": "8A144377-4D4C-48F7-80AB-A8B50F86D132"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.114:*:*:*:*:*:*:*", "cpeNameId": "4B6DF9A7-218F-435C-A5AB-61A5575D9DBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.115:*:*:*:*:*:*:*", "cpeNameId": "8D64C2A7-DF73-481A-8A55-790CD5DABBC0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.116:*:*:*:*:*:*:*", "cpeNameId": "36E4D70D-9E0D-44AC-9CE9-168111BE078D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.117:*:*:*:*:*:*:*", "cpeNameId": "BFF2F68A-DA2E-4118-A4CB-E7FA7C719C97"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.118:*:*:*:*:*:*:*", "cpeNameId": "B8DEB967-1BA5-43BA-B659-5AC369F5527B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.118-2:*:*:*:*:*:*:*", "cpeNameId": "8BDE7B9C-7D49-4FB9-9095-89B0FD601AC4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.119:*:*:*:*:*:*:*", "cpeNameId": "1EBD0B5F-457A-4365-B3B0-45E4C0B21B93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.120:*:*:*:*:*:*:*", "cpeNameId": "0C712977-921D-4FD3-BCBB-6F4A86AA7594"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.121:*:*:*:*:*:*:*", "cpeNameId": "0D8947E0-FBE1-424F-BA96-F5A83CF87A3E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.122:*:*:*:*:*:*:*", "cpeNameId": "A79D9A4E-58CD-4825-9EC3-0B0499C90BF3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.123:*:*:*:*:*:*:*", "cpeNameId": "A61315CE-EC4F-4734-8B07-9670C7DAF959"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.124:*:*:*:*:*:*:*", "cpeNameId": "8B2AB2CC-ED8F-40C0-A027-7A93B70D0ABF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.125:*:*:*:*:*:*:*", "cpeNameId": "DF0EBF12-4078-42F7-A92B-5D54056AE5EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.126:*:*:*:*:*:*:*", "cpeNameId": "A2A07202-24D9-4929-93CE-AD808F353C60"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.127:*:*:*:*:*:*:*", "cpeNameId": "1AB674F5-1B69-4DE7-AF61-50787A69A5D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.128:*:*:*:*:*:*:*", "cpeNameId": "3D2F68B8-736E-4899-9B1B-ED6E8DE6CF3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.129:*:*:*:*:*:*:*", "cpeNameId": "76CD5FC7-448D-4F20-864B-3567B07D1B56"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.130:*:*:*:*:*:*:*", "cpeNameId": "C61BEEDC-1AA7-4453-9C1F-1B61D1EA024F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.131:*:*:*:*:*:*:*", "cpeNameId": "418276D9-F035-4B0B-BCCB-D5FB488D5B31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.132:*:*:*:*:*:*:*", "cpeNameId": "C5D35F68-0A1C-44A4-952A-DDDF21BC09EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.133:*:*:*:*:*:*:*", "cpeNameId": "1F548D92-C48B-4886-A2B3-6E74E8E0F55B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.134:*:*:*:*:*:*:*", "cpeNameId": "F20B9429-FA58-466C-9DFA-9E806AF804B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.135:*:*:*:*:*:*:*", "cpeNameId": "36A1C0D1-63B5-4817-8BA5-C60D3D6B6B38"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.136:*:*:*:*:*:*:*", "cpeNameId": "33C1E0F9-16D2-4829-A3BE-88C14FF70938"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.137:*:*:*:*:*:*:*", "cpeNameId": "C7C55512-FBE6-47D5-8A7A-BBD5577D17E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.138:*:*:*:*:*:*:*", "cpeNameId": "769005B9-5005-411C-B4EE-CF0C62490EF8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.139:*:*:*:*:*:*:*", "cpeNameId": "06D197F7-661E-4C49-B099-4545C422C7A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.140:*:*:*:*:*:*:*", "cpeNameId": "776A104E-F94D-406D-BF76-9B11C3365D7A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.141:*:*:*:*:*:*:*", "cpeNameId": "5035E747-DEF4-4DA3-83CF-5BD2A6A9A54A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.142:*:*:*:*:*:*:*", "cpeNameId": "D4080EBB-DEB7-4E16-BE55-BEFAFB7E93E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.143:*:*:*:*:*:*:*", "cpeNameId": "853BB9C3-4467-4FD8-9A46-E2009C5F4357"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.144:*:*:*:*:*:*:*", "cpeNameId": "2AEB23BA-8389-4940-B626-9E7DAF29822D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.145:*:*:*:*:*:*:*", "cpeNameId": "84991F4A-4107-48A6-8D6E-D85F2EF55EBF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.146:*:*:*:*:*:*:*", "cpeNameId": "7A9370E6-CF76-4989-9368-76B2E434A857"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.147:*:*:*:*:*:*:*", "cpeNameId": "DEE46645-5E8C-4F37-BCD0-322E77397F59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.148:*:*:*:*:*:*:*", "cpeNameId": "2093C809-0485-44CC-B0ED-5C2B7DBFEA99"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.149:*:*:*:*:*:*:*", "cpeNameId": "98DAC7B2-8F21-49EF-B53B-23B8A22A8975"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.150:*:*:*:*:*:*:*", "cpeNameId": "E28A93DC-B824-4692-A0F3-B5CAB77B3A48"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.151:*:*:*:*:*:*:*", "cpeNameId": "365D8293-E1BC-4F24-A5FF-B7E12943EE70"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.152:*:*:*:*:*:*:*", "cpeNameId": "FFEFA6D6-3D07-4911-A0D8-3C7A27A95143"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.153:*:*:*:*:*:*:*", "cpeNameId": "051C7A5C-25A0-408C-AFFA-19DB17B0DFE2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.154:*:*:*:*:*:*:*", "cpeNameId": "34798860-1C32-431D-8095-4D25E900D047"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.155:*:*:*:*:*:*:*", "cpeNameId": "BCB220C7-6880-4054-B512-91A8A5F683CE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.156:*:*:*:*:*:*:*", "cpeNameId": "3DDC9F23-49BA-42AE-9251-D0DE0DEF8DD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.157:*:*:*:*:*:*:*", "cpeNameId": "B65EAD3A-8DA1-40A2-B14F-C3D61E19D592"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.158:*:*:*:*:*:*:*", "cpeNameId": "D8A0F47B-9F15-4DC9-9134-C2410BF8E55E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.159:*:*:*:*:*:*:*", "cpeNameId": "FD07FFAC-9B06-43E9-A1AE-F085B99D2A65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.160:*:*:*:*:*:*:*", "cpeNameId": "B6133234-102E-4B8C-A0F0-E9E1538BD098"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.161:*:*:*:*:*:*:*", "cpeNameId": "E03ADD0A-1D87-4772-BE21-A5ED5FC96BE8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.162:*:*:*:*:*:*:*", "cpeNameId": "39EDA362-7B7A-4D97-B8FB-B7B9696B05E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.163:*:*:*:*:*:*:*", "cpeNameId": "6D54CD36-C5A1-437B-85B6-B59A45D1E007"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.164:*:*:*:*:*:*:*", "cpeNameId": "00F1FD43-244A-4CC2-B16C-BC98C99FBB27"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.165:*:*:*:*:*:*:*", "cpeNameId": "D34CA2D9-09FB-473B-9C0F-0C392B3132F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.166:*:*:*:*:*:*:*", "cpeNameId": "4AE874DA-0375-4E7E-84DC-BCAB385B5C30"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.167:*:*:*:*:*:*:*", "cpeNameId": "DD93F0EB-9B9D-4F5B-BDE0-F0F251381EB2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.168:*:*:*:*:*:*:*", "cpeNameId": "D28DA286-D5D2-40D2-82CA-FC8C79CC5F23"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.169:*:*:*:*:*:*:*", "cpeNameId": "8A84A955-ECC0-4B19-B09D-5BB422561099"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.170:*:*:*:*:*:*:*", "cpeNameId": "79343991-197E-4074-A17D-DA9A050EED4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.171:*:*:*:*:*:*:*", "cpeNameId": "BD8EBDB7-7226-4A65-8E8E-74D5A3F671B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.172:*:*:*:*:*:*:*", "cpeNameId": "0CA2E704-2400-4391-9D42-637DC8C25BED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.173:*:*:*:*:*:*:*", "cpeNameId": "8A6A2923-E6F6-4B77-9F0E-BA6FD58DE8D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.174:*:*:*:*:*:*:*", "cpeNameId": "18805724-EB20-4960-8D96-D7D17DDBDE30"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.175:*:*:*:*:*:*:*", "cpeNameId": "5BD11FEB-E163-4734-823A-A784C4C6FE9A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.176:*:*:*:*:*:*:*", "cpeNameId": "960EB99C-0D42-4892-9989-4473683490E4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.177:*:*:*:*:*:*:*", "cpeNameId": "5A04EB31-D67D-4DF0-81D6-D2EB42FCDCD2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.178:*:*:*:*:*:*:*", "cpeNameId": "B2F1908E-4EA9-490A-A154-8B4621189CAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.179:*:*:*:*:*:*:*", "cpeNameId": "66E97557-5D46-4DEB-B1DE-C668E5B8B3FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.180:*:*:*:*:*:*:*", "cpeNameId": "9979A105-8BA0-4AE2-BDFB-7D79DE2FBBFB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.181:*:*:*:*:*:*:*", "cpeNameId": "90E6E2D5-7A6D-4E95-9A52-FF7B9A8A2441"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.182:*:*:*:*:*:*:*", "cpeNameId": "69A2955B-EC3D-41AF-978F-CBFBC556F92D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.183:*:*:*:*:*:*:*", "cpeNameId": "D3F33DDF-A839-49B6-B3B8-EEACA952A9E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.184:*:*:*:*:*:*:*", "cpeNameId": "19F1F05C-A087-44E8-983E-2EB143DC1D8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.185:*:*:*:*:*:*:*", "cpeNameId": "F145BE0F-E7F0-442E-BDA7-C63C7E168E2B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.186:*:*:*:*:*:*:*", "cpeNameId": "B4D0C3FD-6476-413B-BF42-8C2641E289AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.187:*:*:*:*:*:*:*", "cpeNameId": "8D0F70F4-570E-4C9E-B51B-42BB544A72EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.188:*:*:*:*:*:*:*", "cpeNameId": "780D6AF4-4E15-4413-832E-0F50248A4B0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.189:*:*:*:*:*:*:*", "cpeNameId": "20F1C4AC-ECCF-4001-8CEA-457D8E6BDE3E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.190:*:*:*:*:*:*:*", "cpeNameId": "2CCC5886-AA10-470F-B2E9-B38438848CD2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.191:*:*:*:*:*:*:*", "cpeNameId": "0E0DFF46-8703-4A82-B4CB-DD923D09ACA8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.192:*:*:*:*:*:*:*", "cpeNameId": "3456DA2C-41BD-4021-B3F4-C0C7EFBA35B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.193:*:*:*:*:*:*:*", "cpeNameId": "44D8482E-577B-4B3E-A84D-A1FA11CE744D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.194:*:*:*:*:*:*:*", "cpeNameId": "278C5BBE-D4E2-43AC-B338-0B4C819B16FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.195:*:*:*:*:*:*:*", "cpeNameId": "30A50973-7C58-419D-8FED-111FD1615CD3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.196:*:*:*:*:*:*:*", "cpeNameId": "68839FE1-F3CD-49BF-902D-28A47A024FC8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.197:*:*:*:*:*:*:*", "cpeNameId": "8C685C52-5BE6-4D58-BBE3-AE69FF1B758C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.198:*:*:*:*:*:*:*", "cpeNameId": "2F461C57-E447-4647-BFFC-C44767B5CDEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.199:*:*:*:*:*:*:*", "cpeNameId": "65EF0724-0838-446F-85BC-A51CDD060978"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.200:*:*:*:*:*:*:*", "cpeNameId": "16752BB9-187D-48B0-8E87-D676FF91C631"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.201:*:*:*:*:*:*:*", "cpeNameId": "2BDCFC6A-E39A-4AD7-ABFA-5F15BDB22286"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.202:*:*:*:*:*:*:*", "cpeNameId": "CD1E47CB-CE3F-4154-8131-133CE38302D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.203:*:*:*:*:*:*:*", "cpeNameId": "73D48406-40CE-4D07-B08C-6C6ED58D13A3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.204:*:*:*:*:*:*:*", "cpeNameId": "6231157D-84BB-46D9-B0CF-AAF2FD31D3C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.205:*:*:*:*:*:*:*", "cpeNameId": "253E528A-1462-4B93-9978-C23C7DD14FF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.206:*:*:*:*:*:*:*", "cpeNameId": "2233D818-CCDB-4166-901F-29D032F730AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.207:*:*:*:*:*:*:*", "cpeNameId": "25D133DF-5D1B-46EA-9019-C81A1623C74D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.208:*:*:*:*:*:*:*", "cpeNameId": "1172736D-6A80-4AD1-B861-43797791A6F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.209:*:*:*:*:*:*:*", "cpeNameId": "FD71CF2C-F734-4E31-AAB7-41AC133EBFDA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.210:*:*:*:*:*:*:*", "cpeNameId": "2BA3CAE2-A53E-4516-9E32-DCF40D28A710"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.211:*:*:*:*:*:*:*", "cpeNameId": "50B9C1D0-7B42-43CC-9103-A96EA1B8D3B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.212:*:*:*:*:*:*:*", "cpeNameId": "D12B8C79-B286-47EA-86E0-4C415154600F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.213:*:*:*:*:*:*:*", "cpeNameId": "C90B250E-D388-459F-91FF-19CF7A6292AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.214:*:*:*:*:*:*:*", "cpeNameId": "EE578B4A-6420-46EA-8C33-994379131EB6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.215:*:*:*:*:*:*:*", "cpeNameId": "5581DCBE-D268-477A-AA1F-B4204F1CE309"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.216:*:*:*:*:*:*:*", "cpeNameId": "4633CDC1-D620-43BD-A59B-1CCE17C70740"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.217:*:*:*:*:*:*:*", "cpeNameId": "62DDB6C3-A7A1-466E-A101-6FE1AA552C94"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.218:*:*:*:*:*:*:*", "cpeNameId": "F6798282-7FF8-43E0-8B9D-1A9BDB0E3E48"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.219:*:*:*:*:*:*:*", "cpeNameId": "57D287C6-0EF3-4B47-A893-F3712CC12478"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.220:*:*:*:*:*:*:*", "cpeNameId": "A0B09A4E-2318-48CE-810F-84F2E721D722"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.221:*:*:*:*:*:*:*", "cpeNameId": "0F3D6297-A92E-479B-91F3-4162BFDC9184"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.222:*:*:*:*:*:*:*", "cpeNameId": "14FFED1D-629A-428E-A473-8327DB224D64"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.223:*:*:*:*:*:*:*", "cpeNameId": "9625BCC9-FBBE-42C7-82C2-F7D75F866E53"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.224:*:*:*:*:*:*:*", "cpeNameId": "D5BC9FF8-1337-4A3B-A66C-CC31C701B22C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.225:*:*:*:*:*:*:*", "cpeNameId": "2ED5BE75-F496-47BA-B521-36F6844FFE01"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.226:*:*:*:*:*:*:*", "cpeNameId": "02E6B2D5-DA63-4574-90D7-15F7EAA70DA1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.227:*:*:*:*:*:*:*", "cpeNameId": "EB84BCF0-8987-46AC-9E6F-D9E17DEFD1D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.228:*:*:*:*:*:*:*", "cpeNameId": "7ACE67A9-9EAD-4AB0-A99D-F37993392E37"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.229:*:*:*:*:*:*:*", "cpeNameId": "ED71AA15-673C-416E-9CAF-3440D41A1E22"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.230:*:*:*:*:*:*:*", "cpeNameId": "CB9E000D-CEAE-488E-B9F7-756EF13ECBE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.231:*:*:*:*:*:*:*", "cpeNameId": "F79CB637-6B2C-46DC-BD81-8B0583AAC33C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.232:*:*:*:*:*:*:*", "cpeNameId": "6CDDD19B-7E18-4A0E-AC09-B86E9401F516"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.233:*:*:*:*:*:*:*", "cpeNameId": "3EF64EBF-557B-4AB2-B2E5-0D03035197DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.234:*:*:*:*:*:*:*", "cpeNameId": "9E2D001E-2282-4A78-AB00-B37189C8CD59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.235:*:*:*:*:*:*:*", "cpeNameId": "31A795CF-5B8E-4B6C-94DC-3B37A8423823"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.236:*:*:*:*:*:*:*", "cpeNameId": "813866EF-11A3-41D9-9735-ECFEFCDBA1AD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.237:*:*:*:*:*:*:*", "cpeNameId": "C0F81506-A565-4F17-BEC9-1B54FAD059CC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.238:*:*:*:*:*:*:*", "cpeNameId": "1509FEA6-FA47-46C8-A117-8913CCFDB5AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.239:*:*:*:*:*:*:*", "cpeNameId": "C05A4F03-15E3-4C08-8958-6A057F7911B8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.240:*:*:*:*:*:*:*", "cpeNameId": "4EAF2417-3F1E-446A-AD33-77B21AE04E06"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.241:*:*:*:*:*:*:*", "cpeNameId": "8FFB9F0D-3B6F-494F-89AC-EAC4438C0B1C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.242:*:*:*:*:*:*:*", "cpeNameId": "A27EEF03-9001-4C7D-B063-C1FE8FC05EE0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.243:*:*:*:*:*:*:*", "cpeNameId": "529CAB2E-5F5C-4699-BC48-E93341EE6B67"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.244:*:*:*:*:*:*:*", "cpeNameId": "9FF0D590-EAB2-4B36-BBE2-008A4E800722"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.245:*:*:*:*:*:*:*", "cpeNameId": "590BFECB-A2B4-4C3F-9017-6D565899E1F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.246:*:*:*:*:*:*:*", "cpeNameId": "CB0BB20C-811F-4B9B-B827-3A42CA5539D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.247:*:*:*:*:*:*:*", "cpeNameId": "B532E91C-FEBE-4C29-B9C7-E899AF134D48"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.248:*:*:*:*:*:*:*", "cpeNameId": "8222442A-C4EC-45CD-9A4C-76E562756CBE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.249:*:*:*:*:*:*:*", "cpeNameId": "444D84A8-CE8F-4BE2-A463-B4E693104BA6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.250:*:*:*:*:*:*:*", "cpeNameId": "7243A073-0900-4470-98B8-FE5839442E3F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.251:*:*:*:*:*:*:*", "cpeNameId": "B4EAB6D9-28E2-45CD-BE10-5EF905373AF3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.252:*:*:*:*:*:*:*", "cpeNameId": "CF09CCB5-9276-41A3-8330-8037A633B793"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.253:*:*:*:*:*:*:*", "cpeNameId": "9BB592D7-81CC-4DE7-9256-FAE66467FFD7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.254:*:*:*:*:*:*:*", "cpeNameId": "C78BD176-2DFC-4BAE-95C1-3A495252A65A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.255:*:*:*:*:*:*:*", "cpeNameId": "2AF01112-197B-43DE-9BF8-940F1114DC73"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.256:*:*:*:*:*:*:*", "cpeNameId": "220C4EBF-9B86-4AB1-AD37-100994B4606D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.257:*:*:*:*:*:*:*", "cpeNameId": "34F7CCEF-8221-4005-A144-93D314E39C81"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.258:*:*:*:*:*:*:*", "cpeNameId": "19A0EB8D-1846-4C52-BEEA-F6CC1691C50C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.259:*:*:*:*:*:*:*", "cpeNameId": "B6F4132F-B9B0-4168-98D7-23FCCBDD4034"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.260:*:*:*:*:*:*:*", "cpeNameId": "E7F6FAE1-DF95-48E5-94D9-C505AF592766"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.261:*:*:*:*:*:*:*", "cpeNameId": "3BCD7AF9-57AB-41EC-99D4-59DD6DCA3703"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.262:*:*:*:*:*:*:*", "cpeNameId": "64A647E0-3291-4C17-9D9A-2BC6DDF24E90"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.263:*:*:*:*:*:*:*", "cpeNameId": "1BCAE71C-8745-49B7-BE6F-5CB2A8D517AF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.264:*:*:*:*:*:*:*", "cpeNameId": "7C4D53E7-3844-4706-815D-BD08282AF4B8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.265:*:*:*:*:*:*:*", "cpeNameId": "F18EF476-4996-436A-B878-1F7704C4BA6B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.266:*:*:*:*:*:*:*", "cpeNameId": "6318BBB0-A46C-48AE-9E42-7F578BCE43DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.267:*:*:*:*:*:*:*", "cpeNameId": "70B14EE0-CF5D-4C62-9890-766155C47DAE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.268:*:*:*:*:*:*:*", "cpeNameId": "ABF8E5BF-203F-406C-9375-6A59B113BBD9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.269:*:*:*:*:*:*:*", "cpeNameId": "B09A3D45-168E-4202-99BC-79DFB2B525C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.270:*:*:*:*:*:*:*", "cpeNameId": "145FF0A9-3D06-4565-8889-49C01832E864"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.271:*:*:*:*:*:*:*", "cpeNameId": "5433BF7F-2B40-4A88-BD8A-74EBE7EAE74C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.272:*:*:*:*:*:*:*", "cpeNameId": "28BF7326-B002-4098-96DB-D8FADE599CA5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.273:*:*:*:*:*:*:*", "cpeNameId": "94E36506-E573-4DEA-888B-744D1C8405D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.274:*:*:*:*:*:*:*", "cpeNameId": "2A72354A-578E-4F14-93EB-43F27D1576A9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.275:*:*:*:*:*:*:*", "cpeNameId": "426D0CBB-8FB3-41BC-A8A9-A736E70DAC53"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.276:*:*:*:*:*:*:*", "cpeNameId": "25BF6B74-B708-44E5-9B77-A5D761C23F46"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.277:*:*:*:*:*:*:*", "cpeNameId": "DAAAE94E-0CB1-45F6-B0C3-F635B18E632E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.278:*:*:*:*:*:*:*", "cpeNameId": "7B05EE50-A29E-4B6E-A5EE-9BCAA71189B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.279:*:*:*:*:*:*:*", "cpeNameId": "499DEB1C-5D4D-4BE5-8C11-6FD0625F2C36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.280:*:*:*:*:*:*:*", "cpeNameId": "82BC603A-39C9-4AF9-825C-D60073FD89E9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.281:*:*:*:*:*:*:*", "cpeNameId": "AA26E4CE-A2EC-4364-B383-EE0D9C01E0FF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.282:*:*:*:*:*:*:*", "cpeNameId": "A71BD6DD-9C99-4280-9CE6-2317277093B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.283:*:*:*:*:*:*:*", "cpeNameId": "96B8EF49-D308-498E-9453-CCDEDFD6F1CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.284:*:*:*:*:*:*:*", "cpeNameId": "635FD61D-F2A4-4489-AD75-12D1139945DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.285:*:*:*:*:*:*:*", "cpeNameId": "8211CA20-56DB-414D-A7EB-61321EA0634F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.286:*:*:*:*:*:*:*", "cpeNameId": "186F5E6F-D0A3-4136-9F39-956426280FC1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.287:*:*:*:*:*:*:*", "cpeNameId": "236744C4-C218-40C5-8C9E-9072697D85E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.288:*:*:*:*:*:*:*", "cpeNameId": "971D0042-FFBE-4691-ABAD-B3165231CA50"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.289:*:*:*:*:*:*:*", "cpeNameId": "6FAF8454-2869-4D87-979E-9A4D4DD049B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.290:*:*:*:*:*:*:*", "cpeNameId": "5EEE72A7-AE8B-416E-86F4-C879A022DD84"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.291:*:*:*:*:*:*:*", "cpeNameId": "178F9E75-B366-4C4F-9935-07403284159E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.292:*:*:*:*:*:*:*", "cpeNameId": "BFB882D2-DC9B-4211-9265-594F1FEE3D8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.293:*:*:*:*:*:*:*", "cpeNameId": "F181ED04-D2A3-4E9C-B80D-F57C0617297B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.294:*:*:*:*:*:*:*", "cpeNameId": "8AFA87B0-C839-4A7F-961B-ABE5CA349819"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.295:*:*:*:*:*:*:*", "cpeNameId": "9BFFCA5D-A751-449A-B8AB-2D26A90AFBE3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.296:*:*:*:*:*:*:*", "cpeNameId": "7247CC3C-3671-4C0D-AD87-559BEDAAEBC5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.297:*:*:*:*:*:*:*", "cpeNameId": "498B3288-2A00-4DB0-8426-A5FD866506EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.298:*:*:*:*:*:*:*", "cpeNameId": "D6251071-E7F2-4748-9DF7-27FCA27BD552"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.299:*:*:*:*:*:*:*", "cpeNameId": "03440F15-FEB8-42BC-BD63-6E954F0750DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.300:*:*:*:*:*:*:*", "cpeNameId": "E4568623-9282-496E-AA3F-E3E790BDFC1F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.301:*:*:*:*:*:*:*", "cpeNameId": "7CB5DA04-B4B0-4349-85B2-1342A953EED9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.302:*:*:*:*:*:*:*", "cpeNameId": "A3F297C6-A6AB-4C5F-9821-76E8E3411796"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.303:*:*:*:*:*:*:*", "cpeNameId": "8B892759-81F1-45AE-A7F5-2D0641A039E4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.304:*:*:*:*:*:*:*", "cpeNameId": "0936A133-FA0A-44C7-AE7F-5C4C1B16DDD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.305:*:*:*:*:*:*:*", "cpeNameId": "FC874434-AC4D-41A1-8B43-757808B2C957"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.306:*:*:*:*:*:*:*", "cpeNameId": "49CE5CB3-4BA8-41AF-B5EB-9C17E66E0423"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.307:*:*:*:*:*:*:*", "cpeNameId": "A8607B67-F6D3-4684-ADDC-CBACCC6DA92C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.308:*:*:*:*:*:*:*", "cpeNameId": "A4130D9C-E192-4437-A85F-6D04F21F2922"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.309:*:*:*:*:*:*:*", "cpeNameId": "B5E4DA49-77F3-4693-90B0-FC8C2C38F402"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.310:*:*:*:*:*:*:*", "cpeNameId": "2E6D4833-8E6A-45E4-A620-2BE985362CF2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.311:*:*:*:*:*:*:*", "cpeNameId": "79DA4B1F-6BE0-40B0-8496-6499C590D8F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.312:*:*:*:*:*:*:*", "cpeNameId": "0268D7D3-1545-4DC8-A418-AA77BC04C9E7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.313:*:*:*:*:*:*:*", "cpeNameId": "3B30BB14-4B29-4EC6-A810-DC776B5C6E34"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.314:*:*:*:*:*:*:*", "cpeNameId": "369CEBAF-43F1-4E56-B6B9-C0057CF18CB9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.315:*:*:*:*:*:*:*", "cpeNameId": "D1C8EC15-FFB1-440F-9EEA-2F306393A1EE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.316:*:*:*:*:*:*:*", "cpeNameId": "7D65AEC1-209F-4CE2-A5FA-4D3FB56FD265"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.317:*:*:*:*:*:*:*", "cpeNameId": "E9C2D84D-3412-4889-868B-AEA2AD1982C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.318:*:*:*:*:*:*:*", "cpeNameId": "BFC397A0-62B9-4BCF-8907-501A3CDF1CD6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.319:*:*:*:*:*:*:*", "cpeNameId": "ACE5B4F6-6FB3-41D2-AA6D-E2586039CC21"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.320:*:*:*:*:*:*:*", "cpeNameId": "3FDC48E9-0721-483D-A020-FEF09F03EA18"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.321:*:*:*:*:*:*:*", "cpeNameId": "8D6E7C06-CA6C-4909-90F2-2FC40A514CF9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.322:*:*:*:*:*:*:*", "cpeNameId": "D7FA71FA-20D6-4321-80E4-B25B40B76038"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.323:*:*:*:*:*:*:*", "cpeNameId": "B72EE284-1EC1-4237-813A-3E67D1F179F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.324:*:*:*:*:*:*:*", "cpeNameId": "43FA688C-7739-40FD-976B-5FACDDE03C7F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.325:*:*:*:*:*:*:*", "cpeNameId": "1EC6A2D9-C8EB-4DAE-8A58-A9B47A8DA4B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20:*:*:*:*:*:*:*", "cpeNameId": "8C67D194-B1D7-4051-AA33-92C51027DFD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20:-:*:*:*:*:*:*", "cpeNameId": "FD6751D9-F3BF-44A1-96E9-14200EFB10F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20:rc1:*:*:*:*:*:*", "cpeNameId": "2E165BBB-7ACE-4705-A561-4148FDEA5546"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20:rc2:*:*:*:*:*:*", "cpeNameId": "F1D314A9-1DF2-4F05-A2AC-A4E19C87344D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20:rc3:*:*:*:*:*:*", "cpeNameId": "62C17388-85F5-4B5C-8B00-C7E8FD35347D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20:rc4:*:*:*:*:*:*", "cpeNameId": "6CC936D0-B763-4020-BC02-D86893FAEDA5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20:rc5:*:*:*:*:*:*", "cpeNameId": "5502C362-1E75-45CF-A175-41ADAD728EC1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.1:*:*:*:*:*:*:*", "cpeNameId": "30D0FBCC-5241-4766-BF83-F895B210AEFF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.2:*:*:*:*:*:*:*", "cpeNameId": "19FD564F-6544-473E-AE92-E9F3A34A3915"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.3:*:*:*:*:*:*:*", "cpeNameId": "440CABC7-91B1-45F6-A7D0-7D651E83E4C4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.4:*:*:*:*:*:*:*", "cpeNameId": "687316F0-7676-4930-B35C-65F5785ACDB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.5:*:*:*:*:*:*:*", "cpeNameId": "08A1755A-6A9C-46E0-AF0D-114FBF5AD672"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.6:*:*:*:*:*:*:*", "cpeNameId": "E20224EA-90C0-488A-A112-50B24770FB18"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.7:*:*:*:*:*:*:*", "cpeNameId": "C7DC8B10-AA07-4A31-B69D-1F80B66B87A5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.8:*:*:*:*:*:*:*", "cpeNameId": "8308368B-FBD0-47FF-BBB5-31B3F2137230"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.9:*:*:*:*:*:*:*", "cpeNameId": "C6D9451D-8272-441F-BE73-D603AD128A54"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.10:*:*:*:*:*:*:*", "cpeNameId": "1A7CEC42-FD0B-42FC-8535-425F343C800B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.11:*:*:*:*:*:*:*", "cpeNameId": "24C953F7-E916-4832-8B61-7E38B4DC8D3E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.12:*:*:*:*:*:*:*", "cpeNameId": "5C414ABD-B2DB-462C-8158-C8BBD94F140B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.13:*:*:*:*:*:*:*", "cpeNameId": "585B3F97-9003-4712-BA9E-79321E91B741"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.14:*:*:*:*:*:*:*", "cpeNameId": "53CB87AA-41C1-46DC-9856-CA45D75B0014"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.15:*:*:*:*:*:*:*", "cpeNameId": "A15CF5B3-5D88-4D8E-AD1F-7713BEB5C30F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.16:*:*:*:*:*:*:*", "cpeNameId": "C046C34D-86F8-4C72-9ADC-FA20CEE3F445"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.17:*:*:*:*:*:*:*", "cpeNameId": "4F253460-0D25-4B15-BEFB-2C9D38696714"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:*:*:*:*:*:*:*", "cpeNameId": "F1A9DC6E-F2B2-49B8-967F-B40F23FAFB7E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:-:*:*:*:*:*:*", "cpeNameId": "68861FE5-8011-45EC-81E6-CAD841D55D3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:rc1:*:*:*:*:*:*", "cpeNameId": "C4BD32F7-499E-4227-AF6D-59072E60F157"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:rc2:*:*:*:*:*:*", "cpeNameId": "DD1A0E3E-284D-4F8D-BF08-4AE49A833CC9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:rc3:*:*:*:*:*:*", "cpeNameId": "2445098F-589D-4D79-8677-4B95F63C151A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:rc4:*:*:*:*:*:*", "cpeNameId": "2D923219-DCF7-4DC8-AE44-20988AA062A0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:rc5:*:*:*:*:*:*", "cpeNameId": "02886709-FD0A-4947-8146-A318E301776F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:rc6:*:*:*:*:*:*", "cpeNameId": "03288CF7-0A3E-48CB-BBA7-F9EE8ABBC436"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:rc7:*:*:*:*:*:*", "cpeNameId": "7FDFAB88-77F1-48D7-ADBF-0E44ECE86EBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.1:*:*:*:*:*:*:*", "cpeNameId": "D72D410B-8C2E-4851-99A3-F77FBECB7192"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.2:*:*:*:*:*:*:*", "cpeNameId": "985EBB6A-4987-4667-B8DE-311EBD874180"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.3:*:*:*:*:*:*:*", "cpeNameId": "DC64E4B7-3DB1-4E70-8BCC-CDECB8D31362"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.4:*:*:*:*:*:*:*", "cpeNameId": "B277C12A-C8A3-4E99-B157-821EF02AAD43"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.5:*:*:*:*:*:*:*", "cpeNameId": "D7759414-6475-4870-B8D1-EC7CC9251787"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.6:*:*:*:*:*:*:*", "cpeNameId": "4FD20397-5105-42E9-A718-85812EC83A0C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.7:*:*:*:*:*:*:*", "cpeNameId": "3E7A5DCA-0363-44FE-B21B-17BD8D97542B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.8:*:*:*:*:*:*:*", "cpeNameId": "FD8EA77C-B293-4769-962F-F04BF5671CE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.9:*:*:*:*:*:*:*", "cpeNameId": "50FF6FD7-302E-4015-82D5-647A4C6330EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.10:*:*:*:*:*:*:*", "cpeNameId": "AF3FD6C7-DA7B-4070-92DE-6B670AD96588"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.11:*:*:*:*:*:*:*", "cpeNameId": "BDB9CFFC-3980-48D5-94A2-7B8BB9141797"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.12:*:*:*:*:*:*:*", "cpeNameId": "479AF2D1-C2BD-4C9A-A595-737A34153CA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.13:*:*:*:*:*:*:*", "cpeNameId": "567ACE3B-A900-44C1-8E1A-CED4090B1BE8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.14:*:*:*:*:*:*:*", "cpeNameId": "F3477A97-8034-4BB5-9E2D-1401A7346F7A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.15:*:*:*:*:*:*:*", "cpeNameId": "06CFCE19-7968-4803-BB10-B0FC75D8CD98"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.16:*:*:*:*:*:*:*", "cpeNameId": "75E407ED-7B92-420D-81F5-62766D1CB144"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.17:*:*:*:*:*:*:*", "cpeNameId": "F5B8EAB8-B0FA-4766-9008-A04B31F2A44B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.18:*:*:*:*:*:*:*", "cpeNameId": "E04C3C10-48FE-466C-A251-7862AF2EAE03"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.19:*:*:*:*:*:*:*", "cpeNameId": "2F0ADCFD-FCE8-4617-BEB1-7FA793BC11E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.20:*:*:*:*:*:*:*", "cpeNameId": "BDDC588A-C797-45AC-A0BB-DAD27E22B169"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.21:*:*:*:*:*:*:*", "cpeNameId": "ADFBAC21-4341-4D67-BA2C-832D6C60DAE0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:*:*:*:*:*:*:*", "cpeNameId": "54A3A8C8-F682-431C-B4CD-1F0A788869DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:-:*:*:*:*:*:*", "cpeNameId": "67CBC5E4-B5FE-477E-A138-EDED2966BE18"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:rc1:*:*:*:*:*:*", "cpeNameId": "F39A244D-E0F0-4DCC-AD7F-E15708AB2EC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:rc2:*:*:*:*:*:*", "cpeNameId": "77CA693C-812E-4A6E-A089-665FDADA5C0A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:rc3:*:*:*:*:*:*", "cpeNameId": "DFDA10B2-0129-4B2C-A521-15357B8A1915"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:rc4:*:*:*:*:*:*", "cpeNameId": "757115D8-A302-4C43-8E3D-147732BC8D76"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:rc5:*:*:*:*:*:*", "cpeNameId": "D945FFB9-09EC-432E-8ADC-8DD7BF1425D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:rc6:*:*:*:*:*:*", "cpeNameId": "D49F9C63-A58E-4B0D-BEF2-747DC11400DE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:rc7:*:*:*:*:*:*", "cpeNameId": "41B60E1E-725B-49BB-BAD2-49F4782B541B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.1:*:*:*:*:*:*:*", "cpeNameId": "9208299B-C868-470C-AB8C-3A30CC019E6E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.2:*:*:*:*:*:*:*", "cpeNameId": "2D16B549-05AC-4BA5-82C1-4427346FCCF4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.3:*:*:*:*:*:*:*", "cpeNameId": "5431B6CE-299C-491D-92AD-1A8D9072719B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.4:*:*:*:*:*:*:*", "cpeNameId": "F26D0108-392B-453D-9A12-FCF4079344BE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.5:*:*:*:*:*:*:*", "cpeNameId": "F897824B-28D1-4016-9917-A2A1797B62D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.6:*:*:*:*:*:*:*", "cpeNameId": "C9CA624B-39C9-4830-B160-05E7FCF09D31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.7:*:*:*:*:*:*:*", "cpeNameId": "994E581F-695C-4184-8A34-1E9FE8B84F93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.8:*:*:*:*:*:*:*", "cpeNameId": "D33D7A54-7ACE-438C-9ECC-1E06D0C93588"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.9:*:*:*:*:*:*:*", "cpeNameId": "48DFF9BD-88B8-48DB-950E-281038152F6F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.10:*:*:*:*:*:*:*", "cpeNameId": "12542ACC-E1CB-47D7-AFC8-0B24BB2F7DA4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.11:*:*:*:*:*:*:*", "cpeNameId": "CDDEA9C3-FB0A-4C54-AF83-BBE40DFE29A3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.12:*:*:*:*:*:*:*", "cpeNameId": "E4ACF724-E5E7-4B3E-9457-E52CF676CBB5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.13:*:*:*:*:*:*:*", "cpeNameId": "DB88B940-85D4-4644-8772-90F42B7DC544"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.14:*:*:*:*:*:*:*", "cpeNameId": "F60C9252-9886-478D-9343-2232B706DA06"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.15:*:*:*:*:*:*:*", "cpeNameId": "6868170C-EE5E-4A7F-A201-B854E66C0240"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.16:*:*:*:*:*:*:*", "cpeNameId": "42B36DEC-CDB3-4CA4-9DB4-24F1A6FD275E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.17:*:*:*:*:*:*:*", "cpeNameId": "878CFEA9-CB28-4BFA-8360-D439385AD5BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.18:*:*:*:*:*:*:*", "cpeNameId": "64D36E7C-F03D-4C82-A5FA-2884D5544CAC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.19:*:*:*:*:*:*:*", "cpeNameId": "30EEE361-F28F-4B03-ADEE-CF34BB6BE917"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.20:*:*:*:*:*:*:*", "cpeNameId": "C4D5E875-B03B-40D6-88EA-0F26A8C86E29"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.21:*:*:*:*:*:*:*", "cpeNameId": "E5EE3A38-80F6-4427-ADDD-DE8598A449C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2:*:*:*:*:*:*:*", "cpeNameId": "708DF5F1-3FC2-4692-8628-23A2BCD56CDC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2:-:*:*:*:*:*:*", "cpeNameId": "4A9A1D62-6315-4B91-BEC9-AF9EF6F6FDAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2:rc1:*:*:*:*:*:*", "cpeNameId": "84163FF3-5555-41C3-B321-35C2D89A6854"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2:rc2:*:*:*:*:*:*", "cpeNameId": "F7A55C0A-44F2-4CD3-8A0F-9CFECF21F0D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2:rc3:*:*:*:*:*:*", "cpeNameId": "A5798A8D-D141-4085-B19B-9D32403E837C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2:rc4:*:*:*:*:*:*", "cpeNameId": "6AD74851-D9E8-4C2D-9E0E-176FF60A600D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.1:*:*:*:*:*:*:*", "cpeNameId": "7E156392-773D-4495-A4CE-F5D843C5FEBF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.2:*:*:*:*:*:*:*", "cpeNameId": "A11D4292-91CC-4F12-AF01-769D20986BC1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.3:*:*:*:*:*:*:*", "cpeNameId": "DF31FE84-23CC-48CD-BACC-C2F5879023E9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.4:*:*:*:*:*:*:*", "cpeNameId": "CDF894F7-EB7A-4A0E-AC8F-F87B6AFE4311"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.5:*:*:*:*:*:*:*", "cpeNameId": "992ABD6A-693C-4DB3-B023-B37D66796BD0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.6:*:*:*:*:*:*:*", "cpeNameId": "D8674307-6283-4A09-BF4E-3FACDF808289"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.7:*:*:*:*:*:*:*", "cpeNameId": "12B6C6F1-32F2-4C0F-82EA-492CBC7185D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.8:*:*:*:*:*:*:*", "cpeNameId": "0541FF1A-3588-4B1B-971D-7EBAEBD703EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.9:*:*:*:*:*:*:*", "cpeNameId": "E3FD35AB-B680-4EED-BCAB-106AAC3E9E46"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.10:*:*:*:*:*:*:*", "cpeNameId": "0A60430B-1D1E-43B4-BEEA-190D558DD6E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.11:*:*:*:*:*:*:*", "cpeNameId": "E35007C9-A8F4-4E0B-B996-627F9F3CA3A9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.12:*:*:*:*:*:*:*", "cpeNameId": "EF4B624E-6F70-4C9B-A9DE-2C711C45053A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.13:*:*:*:*:*:*:*", "cpeNameId": "48762B71-2980-485A-843C-0566FDA8F7AD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.14:*:*:*:*:*:*:*", "cpeNameId": "25A6C343-6D24-43CB-966C-DD6A57DB8AD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.15:*:*:*:*:*:*:*", "cpeNameId": "A6E25845-65F8-4B58-8B1F-645850B981D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.16:*:*:*:*:*:*:*", "cpeNameId": "FD154B36-EEE2-45F4-B035-738854DB8463"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.17:*:*:*:*:*:*:*", "cpeNameId": "BD8F511F-9901-411A-A340-71B7A714411E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.18:*:*:*:*:*:*:*", "cpeNameId": "747B8381-BCB7-48A7-99E3-3660A9FBF3F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.19:*:*:*:*:*:*:*", "cpeNameId": "035E9DE8-63BA-4EC7-8425-1EE27BA8CE55"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.20:*:*:*:*:*:*:*", "cpeNameId": "1E4CDC34-80B7-4F05-BB90-6C2714A0FA8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.21:*:*:*:*:*:*:*", "cpeNameId": "68BFF46E-9B1A-4A4C-B03C-587844610AFB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3:*:*:*:*:*:*:*", "cpeNameId": "21F5CD7B-AC95-4D78-9757-99093ED2094B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3:-:*:*:*:*:*:*", "cpeNameId": "961A0592-0690-4383-AA0C-FF52F896EA74"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3:rc1:*:*:*:*:*:*", "cpeNameId": "C67AB208-B2AD-4B21-BB6B-C839E0874C9B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.1:*:*:*:*:*:*:*", "cpeNameId": "81E3B88A-DC72-457D-BCCE-F773A198FFFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.2:*:*:*:*:*:*:*", "cpeNameId": "E64FB740-133B-4AAA-A2DC-2198C0F58D1B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.3:*:*:*:*:*:*:*", "cpeNameId": "D5F4E9B2-BB7B-425C-80D9-06AFBED0D808"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.4:*:*:*:*:*:*:*", "cpeNameId": "49D5583E-E8A9-4897-A2C6-AE3481D580DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.5:*:*:*:*:*:*:*", "cpeNameId": "25187C15-1C36-41FB-A90F-2385F6A9C349"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.6:*:*:*:*:*:*:*", "cpeNameId": "8409B0CA-6F72-4643-8146-ABEF90EE2DB3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.7:*:*:*:*:*:*:*", "cpeNameId": "17F798CD-1EC1-40BC-B535-9A41768D5BA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.8:*:*:*:*:*:*:*", "cpeNameId": "9025DD8F-91D2-404E-969C-2BEF62B5FF8F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.9:*:*:*:*:*:*:*", "cpeNameId": "E66D9744-32E2-4BF8-84B0-8E0A85F62F53"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.10:*:*:*:*:*:*:*", "cpeNameId": "EA942BE3-366A-463B-8C3C-A4C36C894385"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.11:*:*:*:*:*:*:*", "cpeNameId": "69C576AC-72FD-4696-9426-3E2D8F97B7AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.12:*:*:*:*:*:*:*", "cpeNameId": "F20292FB-DDAA-4331-8CCC-E0339B6E309F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.13:*:*:*:*:*:*:*", "cpeNameId": "CF1EC873-6878-4EF3-B478-3A435984B295"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.14:*:*:*:*:*:*:*", "cpeNameId": "76ECB189-F757-45C4-AB63-BC7499A4E9D6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.15:*:*:*:*:*:*:*", "cpeNameId": "37721982-4E3D-40B1-AC6A-DBDA2DD9E489"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.16:*:*:*:*:*:*:*", "cpeNameId": "06812A7C-411D-4A39-9158-D4B8B43A8D7B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.17:*:*:*:*:*:*:*", "cpeNameId": "E8C9CCC6-3D5B-43E5-BE69-3BF8A3DFDE96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.18:*:*:*:*:*:*:*", "cpeNameId": "37BCD5D2-D0A2-44E6-8375-F98117F02B9B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:*:*:*:*:*:*:*", "cpeNameId": "30F8A912-AEBA-4E8E-A946-D5FF48283C90"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:-:*:*:*:*:*:*", "cpeNameId": "38597FA2-E6FA-4060-A67D-C2441E02BC11"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:rc1:*:*:*:*:*:*", "cpeNameId": "0381F214-3BC5-4D07-A22F-18E0C97C33D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:rc2:*:*:*:*:*:*", "cpeNameId": "7058D69E-78BC-4917-A2ED-2D9A20503F8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:rc3:*:*:*:*:*:*", "cpeNameId": "A581FE35-F56F-44A9-B6AD-3900F6C4E830"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:rc4:*:*:*:*:*:*", "cpeNameId": "09E1C6F8-674B-4766-9267-69F9D2584B2B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:rc5:*:*:*:*:*:*", "cpeNameId": "D8331CE4-CE6E-45D2-9267-688218C5FA66"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:rc6:*:*:*:*:*:*", "cpeNameId": "E25FA831-4D9A-43A0-8520-18B2B425CC89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:rc7:*:*:*:*:*:*", "cpeNameId": "B36308F6-FE14-40AE-836F-ADE4A02943B1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.0:rc1:*:*:*:*:*:*", "cpeNameId": "1AD9C3F6-3A0B-4AA0-8B15-3E5F14BF88CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.0:rc2:*:*:*:*:*:*", "cpeNameId": "02FEACE2-E424-4F2E-938B-464CBB64228B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.0:rc6:*:*:*:*:*:*", "cpeNameId": "9E511445-4E4D-44ED-A39F-BF79061A44B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.1:*:*:*:*:*:*:*", "cpeNameId": "1C281E83-7893-4458-9E7C-BC2E857281DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.2:*:*:*:*:*:*:*", "cpeNameId": "A3D762F0-7229-48BE-A593-90AF341A2B12"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.3:*:*:*:*:*:*:*", "cpeNameId": "FB304A30-43E2-4CB7-BDF6-D02968DE2769"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.4:*:*:*:*:*:*:*", "cpeNameId": "283FA41E-5A43-4BFF-B51A-D1FB18F8DE7D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.5:*:*:*:*:*:*:*", "cpeNameId": "02511C03-2EB5-4DDD-B4D5-F46566461307"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.6:*:*:*:*:*:*:*", "cpeNameId": "EE95F16F-BFE6-4880-80BE-0F30ED1E944A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.7:*:*:*:*:*:*:*", "cpeNameId": "FAEE1F59-C796-4E59-B6FB-5D16B39695BA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.8:*:*:*:*:*:*:*", "cpeNameId": "3D6FE7E7-6008-4B70-9614-B6F2C599131E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.9:*:*:*:*:*:*:*", "cpeNameId": "99B2EAA8-667C-487F-B0BF-3710995B951E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.10:*:*:*:*:*:*:*", "cpeNameId": "6FDA9090-C62C-4030-BB12-A0112FDCBF5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.11:*:*:*:*:*:*:*", "cpeNameId": "91DB3188-8E8C-4940-82C3-530F1FCF342A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.12:*:*:*:*:*:*:*", "cpeNameId": "4227319D-32DC-46E1-BB7E-9457C1F4F2C2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.13:*:*:*:*:*:*:*", "cpeNameId": "9E0E22BD-ED8B-4F4F-A0F1-402B94D84DD3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.14:*:*:*:*:*:*:*", "cpeNameId": "501029E0-B4D2-4145-8B1D-D1101340CBF1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.15:*:*:*:*:*:*:*", "cpeNameId": "7C3BE561-3C2B-4784-ACAE-960E3788F8A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.16:*:*:*:*:*:*:*", "cpeNameId": "01AC5F1D-CFD1-4B99-B90D-3A7F9E7C4F83"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.17:*:*:*:*:*:*:*", "cpeNameId": "3DAB053F-F9CF-47D5-BE1B-7C31F90B290F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.18:*:*:*:*:*:*:*", "cpeNameId": "73C26194-FDEA-45E7-80A8-65515A3AAF8F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.19:*:*:*:*:*:*:*", "cpeNameId": "7FC45267-94B3-49F5-B69F-5AE3AB28E1A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.20:*:*:*:*:*:*:*", "cpeNameId": "5ACE9C2C-D667-4936-BB37-72D8117CCBEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.21:*:*:*:*:*:*:*", "cpeNameId": "4CE3E880-139D-4507-BCFE-1624D74B0C80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.22:*:*:*:*:*:*:*", "cpeNameId": "DAC48916-1563-4077-A414-ADB689B1FDBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.23:*:*:*:*:*:*:*", "cpeNameId": "F322D1AA-8286-430D-B02A-5BDDB8C1122A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.24:*:*:*:*:*:*:*", "cpeNameId": "63EA159A-C722-4C17-A32E-20026026B727"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.25:*:*:*:*:*:*:*", "cpeNameId": "DF965E16-45D2-4E37-A24E-D362554D1F8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.26:*:*:*:*:*:*:*", "cpeNameId": "1066FD9A-2313-40A4-A0B2-9C0263C26982"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.27:*:*:*:*:*:*:*", "cpeNameId": "6EC9BCEC-2231-455C-B28D-0DF13CB13479"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.28:*:*:*:*:*:*:*", "cpeNameId": "64D65D7E-E68D-49A1-AA45-CEFE1DBC20D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.29:*:*:*:*:*:*:*", "cpeNameId": "1ADDA3E8-2C58-47CD-A70D-DA04F3A431F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.30:*:*:*:*:*:*:*", "cpeNameId": "EF04CFE2-5DF9-4DE0-8E8F-FB4786456345"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.31:*:*:*:*:*:*:*", "cpeNameId": "8000B946-CAAE-4883-9745-A61904A0247A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.32:*:*:*:*:*:*:*", "cpeNameId": "770B138D-EB04-4F3A-8FA6-3637A3683AEF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.33:*:*:*:*:*:*:*", "cpeNameId": "0B322150-1C25-4F57-844C-BF85420500E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.34:*:*:*:*:*:*:*", "cpeNameId": "DD3EDA18-4BBD-4AD7-9661-5D47B62F591E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.35:*:*:*:*:*:*:*", "cpeNameId": "9C73DBB9-FC61-4E93-B2B0-955791097636"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.36:*:*:*:*:*:*:*", "cpeNameId": "0289901E-E986-443D-A30B-ED22F06A7638"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.37:*:*:*:*:*:*:*", "cpeNameId": "4F5E4958-95CD-4C22-BD8B-3794C74CCD47"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.38:*:*:*:*:*:*:*", "cpeNameId": "EB2A8683-5741-4161-8109-B7788AD97247"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.39:*:*:*:*:*:*:*", "cpeNameId": "8EF7B26D-4943-4DCC-9D59-0AADBEDDAED8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.40:*:*:*:*:*:*:*", "cpeNameId": "E32CC068-8B1A-45C4-8AB0-278C5A74B61C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.41:*:*:*:*:*:*:*", "cpeNameId": "6916813D-E2BF-4D74-BE79-EACD1ED1AFAC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.42:*:*:*:*:*:*:*", "cpeNameId": "9CA95178-D4D4-44FD-AC62-CA6CC68A8D65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.43:*:*:*:*:*:*:*", "cpeNameId": "F95E6F47-0F75-41A3-B478-1F34A602D7EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.44:*:*:*:*:*:*:*", "cpeNameId": "09B818EE-5D8B-4728-8FBA-4C46A9233AEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.45:*:*:*:*:*:*:*", "cpeNameId": "C340CD96-6163-499E-960C-F8C77A190CA7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.46:*:*:*:*:*:*:*", "cpeNameId": "D56E537C-FBC5-4C9C-ACEB-0265AB8DA1BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.47:*:*:*:*:*:*:*", "cpeNameId": "4F62EACD-F957-4121-A129-5514BED8A209"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.48:*:*:*:*:*:*:*", "cpeNameId": "8A9A30F9-762F-496F-B154-FAA7F5B35201"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.49:*:*:*:*:*:*:*", "cpeNameId": "588B838C-6578-4616-850F-59E58692EB1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.50:*:*:*:*:*:*:*", "cpeNameId": "88925256-EBA9-4999-B534-02A3F1514E8B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.51:*:*:*:*:*:*:*", "cpeNameId": "CB3ED166-B1C8-458D-8D95-8D03C00A669E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.52:*:*:*:*:*:*:*", "cpeNameId": "5C242B7B-208A-43C7-BA04-79E1F6E1C5FF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.53:*:*:*:*:*:*:*", "cpeNameId": "D9F0FC36-D6FA-408D-8921-009B98466D10"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.54:*:*:*:*:*:*:*", "cpeNameId": "496B7A05-51DC-43DC-890F-86578ED35874"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.55:*:*:*:*:*:*:*", "cpeNameId": "D015DA7D-CDFF-4FC4-924C-541E663FCC4E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.56:*:*:*:*:*:*:*", "cpeNameId": "B853157A-8731-436A-979A-BA2871A3CF9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.57:*:*:*:*:*:*:*", "cpeNameId": "FF8B97BB-61A3-4CAB-BE7B-A6EA63D575F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.58:*:*:*:*:*:*:*", "cpeNameId": "58F8F42F-DE39-4963-BBCD-2AF4B13B8152"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.59:*:*:*:*:*:*:*", "cpeNameId": "D20CCD61-4FC1-4E23-A134-0B93A8099C3C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.60:*:*:*:*:*:*:*", "cpeNameId": "C66ED101-4E13-4838-901E-A73F76499BBD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.61:*:*:*:*:*:*:*", "cpeNameId": "F4125335-934B-4535-9983-3E2BA61E96F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.62:*:*:*:*:*:*:*", "cpeNameId": "A583E905-8A22-42B5-9D96-B51FFD0614FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.63:*:*:*:*:*:*:*", "cpeNameId": "6D54EE82-FEC8-449B-B648-C736D4E26388"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.64:*:*:*:*:*:*:*", "cpeNameId": "AD9F8955-6D21-4FE1-B814-B7B5B6E51C1D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.65:*:*:*:*:*:*:*", "cpeNameId": "AA1F4832-E754-48FF-90A7-C83B71865F79"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.66:*:*:*:*:*:*:*", "cpeNameId": "7FA63DB7-AF4D-4ADA-AA62-E7E780629C01"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.67:*:*:*:*:*:*:*", "cpeNameId": "68125684-9408-4FF0-9691-78CE2C43472D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.68:*:*:*:*:*:*:*", "cpeNameId": "887CCD5A-CC1E-4F61-9A22-33CD3DB9590E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.69:*:*:*:*:*:*:*", "cpeNameId": "79E482C6-C081-4307-920F-E0C4DA650C4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.70:*:*:*:*:*:*:*", "cpeNameId": "BDBD2808-2754-4C34-81D4-C944911306CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.71:*:*:*:*:*:*:*", "cpeNameId": "33A308BB-8E22-4AD8-BDA8-3711554B706D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.72:*:*:*:*:*:*:*", "cpeNameId": "DD3870C8-2652-4D75-AAE0-3CEF3CF665D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.73:*:*:*:*:*:*:*", "cpeNameId": "44142F88-98AA-4496-B640-6FA14C77CEC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.74:*:*:*:*:*:*:*", "cpeNameId": "AF5903C8-5637-45BD-9A92-AEAFA81D93BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.75:*:*:*:*:*:*:*", "cpeNameId": "DACFFC27-6EB1-4433-B9F3-E58F2C6FB2B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.76:*:*:*:*:*:*:*", "cpeNameId": "55971333-67C2-40F0-AA0C-3382C5622911"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.77:*:*:*:*:*:*:*", "cpeNameId": "3BEED01C-4CCB-4958-8E29-DCC951578EF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.78:*:*:*:*:*:*:*", "cpeNameId": "4F171F41-EFAC-4188-B720-4C6840AF4261"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.79:*:*:*:*:*:*:*", "cpeNameId": "284FEF7C-A0D0-4494-8F98-9129D6A58041"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.80:*:*:*:*:*:*:*", "cpeNameId": "DD648053-6D4E-41CB-9113-66151119FDA0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.81:*:*:*:*:*:*:*", "cpeNameId": "82E37ED2-64A7-4300-BF90-20AF181B6F97"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.82:*:*:*:*:*:*:*", "cpeNameId": "AF69E066-55C4-4A86-B15F-BA9549CEB5AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.83:*:*:*:*:*:*:*", "cpeNameId": "D1721424-8F46-4939-A665-4621D22D7279"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.84:*:*:*:*:*:*:*", "cpeNameId": "E27F0C29-711F-4838-8481-F932273C9034"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.85:*:*:*:*:*:*:*", "cpeNameId": "087A9FF9-13D3-4192-A81A-FD3D742FAAEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.86:*:*:*:*:*:*:*", "cpeNameId": "24FE8157-16DC-4670-81B5-B35131D0D3E3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.87:*:*:*:*:*:*:*", "cpeNameId": "FEA33B3F-6CB7-4138-A92A-AD3C8258FC74"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.88:*:*:*:*:*:*:*", "cpeNameId": "6D4674AC-D1BA-41F6-B9B7-E276352BEDA6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.89:*:*:*:*:*:*:*", "cpeNameId": "D416D23A-A4AE-4C6A-926A-202ED3167667"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.90:*:*:*:*:*:*:*", "cpeNameId": "5CE1A537-5A52-474B-AAF0-E0A7D2952B45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.91:*:*:*:*:*:*:*", "cpeNameId": "F5999482-9471-4351-B0B3-0DB7907B9CED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.92:*:*:*:*:*:*:*", "cpeNameId": "C97C06E4-2C93-436C-ABA6-15AA6599A35A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.93:*:*:*:*:*:*:*", "cpeNameId": "1031888B-A914-4DC7-A6E9-392CCC45A76E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.94:*:*:*:*:*:*:*", "cpeNameId": "404206E9-E734-42FC-900E-BD6E0A8A4461"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.95:*:*:*:*:*:*:*", "cpeNameId": "511842CB-909F-4861-8D7C-28B54497BF86"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.96:*:*:*:*:*:*:*", "cpeNameId": "A9657041-BEE6-4EE8-94AD-4447DDE7D048"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.97:*:*:*:*:*:*:*", "cpeNameId": "0A9E3B65-5FB8-4A6A-A2D8-CA2453AF07EC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.98:*:*:*:*:*:*:*", "cpeNameId": "22048CDC-DCAC-4609-95F0-929AEE830465"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.99:*:*:*:*:*:*:*", "cpeNameId": "627DBE54-010D-4F1C-9001-CC5E02BF3050"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.100:*:*:*:*:*:*:*", "cpeNameId": "938FECE2-6792-451E-8311-7E3E38A036FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.101:*:*:*:*:*:*:*", "cpeNameId": "5432BFDA-778D-4E2E-A1D3-CBED78826AD4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.102:*:*:*:*:*:*:*", "cpeNameId": "3AA63EBE-68D6-44E3-BAF2-581B3E42DA43"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.103:*:*:*:*:*:*:*", "cpeNameId": "82A4E722-C3C7-437B-97C7-010E4E7FB1F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.104:*:*:*:*:*:*:*", "cpeNameId": "FEF2BA89-9777-4690-A1E0-5A9539F19063"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.105:*:*:*:*:*:*:*", "cpeNameId": "0FEBCB84-25C5-4B8F-84AD-2840655A9CB7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.106:*:*:*:*:*:*:*", "cpeNameId": "CA4865C8-CD0B-4624-B878-C160F5793EBF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.107:*:*:*:*:*:*:*", "cpeNameId": "8CD6838F-3F26-49B5-9826-3481D09DD0FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.108:*:*:*:*:*:*:*", "cpeNameId": "F925DF95-F46A-41A4-A0D4-FF783FAAF1AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.109:*:*:*:*:*:*:*", "cpeNameId": "2CEDA5AF-C713-4643-B009-513BA2E3C74D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.110:*:*:*:*:*:*:*", "cpeNameId": "A53BF0C3-2C50-4301-8616-02277328F4BF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.111:*:*:*:*:*:*:*", "cpeNameId": "CC8637E1-FDE1-40A6-BE9A-64596A91042E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.112:*:*:*:*:*:*:*", "cpeNameId": "A29F5C22-296D-438A-A22F-7F59BD3C77A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.113:*:*:*:*:*:*:*", "cpeNameId": "42237EE2-4AF1-49D8-8C47-53936F3F6D15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.114:*:*:*:*:*:*:*", "cpeNameId": "DF5875E7-C829-41E7-B637-7C7FD45469B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.115:*:*:*:*:*:*:*", "cpeNameId": "9EEEB133-6D86-45B8-8F2E-4CD7E1677D4D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.116:*:*:*:*:*:*:*", "cpeNameId": "EFB125EB-E097-459C-BB6C-8CA683495E49"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.117:*:*:*:*:*:*:*", "cpeNameId": "8AB69237-A001-4D78-B1DC-05E19113CAEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.118:*:*:*:*:*:*:*", "cpeNameId": "F529F470-E283-4E30-A94D-9155B2F4D0E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.119:*:*:*:*:*:*:*", "cpeNameId": "E393B29E-8B63-4003-9C92-11923EDDF4FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.120:*:*:*:*:*:*:*", "cpeNameId": "9142B8C8-A1A2-4597-9736-08F85EA6DF0A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.121:*:*:*:*:*:*:*", "cpeNameId": "6ED37745-F2C8-4CAB-B848-E3F1D5B92D5A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.122:*:*:*:*:*:*:*", "cpeNameId": "73345EA5-BC19-481D-9E8D-BC43F1B2A009"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.123:*:*:*:*:*:*:*", "cpeNameId": "D1B464F3-C13B-4562-9A1D-9A52A83F8CE4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.124:*:*:*:*:*:*:*", "cpeNameId": "E7237F6D-DA3F-4755-97C0-72C41F937096"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.125:*:*:*:*:*:*:*", "cpeNameId": "EF179B39-F479-4FF0-9853-5C41F4138C80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.126:*:*:*:*:*:*:*", "cpeNameId": "D623E6BE-F45C-4E2D-83EB-883633218B57"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.127:*:*:*:*:*:*:*", "cpeNameId": "7634F69F-587C-4861-B1E1-2F144582DD36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.128:*:*:*:*:*:*:*", "cpeNameId": "23B07FF3-3EC0-487F-B76D-C86CBF6426EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.129:*:*:*:*:*:*:*", "cpeNameId": "E3AB773D-5743-4A09-AB6F-139D852B344E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.130:*:*:*:*:*:*:*", "cpeNameId": "1C0588B6-8690-46A5-AE2E-73E7BF0CACDB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.131:*:*:*:*:*:*:*", "cpeNameId": "AF351F54-8187-410D-86F1-B3F82AD2ED55"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.132:*:*:*:*:*:*:*", "cpeNameId": "067199B5-CFA0-4568-BA4D-6288A392D99C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.133:*:*:*:*:*:*:*", "cpeNameId": "CF1D7CCF-56EB-4D68-AED7-D187649BA593"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.134:*:*:*:*:*:*:*", "cpeNameId": "5446FBC8-EDD6-449D-B4FC-7C9C2679FDE4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.135:*:*:*:*:*:*:*", "cpeNameId": "3B8D2DC6-E618-4E03-ABF0-0BD7B4B8EB69"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.136:*:*:*:*:*:*:*", "cpeNameId": "94473DCF-880F-4134-9004-72FB278A583E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.137:*:*:*:*:*:*:*", "cpeNameId": "F3AE7B24-62E3-4995-B088-1484F2073EEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.138:*:*:*:*:*:*:*", "cpeNameId": "17D753C7-C945-4B66-AA44-7CA3F4512771"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.139:*:*:*:*:*:*:*", "cpeNameId": "60F84A69-CC41-4E35-BED3-8967F672C006"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.140:*:*:*:*:*:*:*", "cpeNameId": "704BA190-B269-4E2E-B176-2E609688075D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.141:*:*:*:*:*:*:*", "cpeNameId": "FEF922EA-398E-42BB-A3D4-617330FE8BA5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.142:*:*:*:*:*:*:*", "cpeNameId": "E13D9FC4-EA1C-4834-A8DD-9F8B32080526"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.143:*:*:*:*:*:*:*", "cpeNameId": "2749EF98-5412-46F6-8D49-0EDD6A58E528"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.144:*:*:*:*:*:*:*", "cpeNameId": "1CBA264D-9620-40D3-A6E9-BDD0378FBBE4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.145:*:*:*:*:*:*:*", "cpeNameId": "9753CAB1-3E31-4FB0-8901-B66F68248C4B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.146:*:*:*:*:*:*:*", "cpeNameId": "D6BBAA0A-DC53-4541-A7C9-02B7CC882C6F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.147:*:*:*:*:*:*:*", "cpeNameId": "75DD6B1D-A210-439C-BB15-5A9857869B4C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.148:*:*:*:*:*:*:*", "cpeNameId": "83C33FEE-E6EE-42A4-B71C-36B017ADA254"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.149:*:*:*:*:*:*:*", "cpeNameId": "7594839C-A015-437B-843D-443C74240AFC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.150:*:*:*:*:*:*:*", "cpeNameId": "85681E7B-7D21-4391-88BB-F24FCC85B69E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.151:*:*:*:*:*:*:*", "cpeNameId": "CAD0E871-57D4-4E39-B8BE-B48B56E383AD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.152:*:*:*:*:*:*:*", "cpeNameId": "8B9FBF3A-7807-4307-AA5A-AFB027788A0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.153:*:*:*:*:*:*:*", "cpeNameId": "45B35B38-1583-4FDE-A76C-F489FC1661B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.154:*:*:*:*:*:*:*", "cpeNameId": "B5CBD335-2006-441B-B668-D4C4E5361E92"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.155:*:*:*:*:*:*:*", "cpeNameId": "1BB865B8-A4BD-46DC-8C13-31A508A1C470"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.156:*:*:*:*:*:*:*", "cpeNameId": "020363CE-5C5B-427C-A15C-F5C1C1975467"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.157:*:*:*:*:*:*:*", "cpeNameId": "941EBBFB-C6F1-48D5-9B2B-CA5C89D87AAE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.158:*:*:*:*:*:*:*", "cpeNameId": "C6F4FAFB-B2D4-4C6A-A2FD-279349D1B6B8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.159:*:*:*:*:*:*:*", "cpeNameId": "D6E8DC84-DA54-45C7-A50D-CB982342FBA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.160:*:*:*:*:*:*:*", "cpeNameId": "B06561F9-9A69-45F5-8E38-E4ACD6603562"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.161:*:*:*:*:*:*:*", "cpeNameId": "387585D8-ED6F-4F42-B695-CBEE28059C70"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.162:*:*:*:*:*:*:*", "cpeNameId": "D3B66B2E-4E69-4FA5-8B87-289E005FDE04"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.163:*:*:*:*:*:*:*", "cpeNameId": "5EE4932A-8EC9-4F83-B39E-43949583A002"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.164:*:*:*:*:*:*:*", "cpeNameId": "23613ABA-9AF6-4994-BEA5-72EADE59E05D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.165:*:*:*:*:*:*:*", "cpeNameId": "274A8333-1FF8-4D90-9F8F-6ED87E4D38C2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.166:*:*:*:*:*:*:*", "cpeNameId": "D2E5BB0E-741E-4F29-A740-36E5944DA22E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.167:*:*:*:*:*:*:*", "cpeNameId": "A0D34177-A31C-4A31-95EC-FC51AAFDCCA4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.168:*:*:*:*:*:*:*", "cpeNameId": "91D62EB4-F2E8-490E-B95E-8795D3419321"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.169:*:*:*:*:*:*:*", "cpeNameId": "D07F44B5-8B12-4624-806B-3926EE9DFEC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.170:*:*:*:*:*:*:*", "cpeNameId": "F96D2A95-B029-4CF9-B156-05CF4447C703"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.171:*:*:*:*:*:*:*", "cpeNameId": "8ECD8767-3374-4B80-A15B-F5238068915B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.172:*:*:*:*:*:*:*", "cpeNameId": "360CFD8E-8542-4074-A12A-DBA9971EA65B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.173:*:*:*:*:*:*:*", "cpeNameId": "E8C8A6D8-B27B-4F5B-8E51-61E11B3F215F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.174:*:*:*:*:*:*:*", "cpeNameId": "15A35FE0-6FEE-41DC-8BF0-6915C879C270"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.175:*:*:*:*:*:*:*", "cpeNameId": "37C5FB0A-CA6D-4613-8A8B-A18D0FDA6F64"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.176:*:*:*:*:*:*:*", "cpeNameId": "FFE0EDBC-A325-48BA-ACB3-9F8D08670377"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.177:*:*:*:*:*:*:*", "cpeNameId": "E5195C74-6E40-48DB-B840-6064E935C3EE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.178:*:*:*:*:*:*:*", "cpeNameId": "12D64B6B-F676-44EF-9DC6-C177E27260EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.179:*:*:*:*:*:*:*", "cpeNameId": "A05ECB81-2B19-4D35-8D1F-4434137A84DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.180:*:*:*:*:*:*:*", "cpeNameId": "9C361490-6959-42D0-BCC4-83D577D132F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.181:*:*:*:*:*:*:*", "cpeNameId": "D0326F99-0B11-462B-8D94-064C0A3241B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.182:*:*:*:*:*:*:*", "cpeNameId": "D15195DE-63BF-4173-905B-E7D6FA91CA75"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.183:*:*:*:*:*:*:*", "cpeNameId": "68713BB8-A777-453A-A8DF-73D9D7BF2E85"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.184:*:*:*:*:*:*:*", "cpeNameId": "4CAD090F-0814-485B-8E21-4D47722887FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.185:*:*:*:*:*:*:*", "cpeNameId": "9959172B-D94C-4CB9-BF46-DD313AA048F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.186:*:*:*:*:*:*:*", "cpeNameId": "24962B43-D41C-4D08-B761-2DC8B7CA6266"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.187:*:*:*:*:*:*:*", "cpeNameId": "38C0DBA3-BE34-4386-9A2E-157382F3225A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.188:*:*:*:*:*:*:*", "cpeNameId": "7ACF7B19-A720-4BA7-BED3-568CC376C778"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.189:*:*:*:*:*:*:*", "cpeNameId": "B7B05048-9CFF-419B-86B0-EE2F56B47B83"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.190:*:*:*:*:*:*:*", "cpeNameId": "BAE9F693-4B6C-4E3E-A9A0-511AE8544242"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.191:*:*:*:*:*:*:*", "cpeNameId": "9D62345B-E1AE-4963-B5CF-35F5162E8801"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.192:*:*:*:*:*:*:*", "cpeNameId": "B355E118-131B-406B-B4BA-152ECC8A3BBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.193:*:*:*:*:*:*:*", "cpeNameId": "F03D2948-9154-4DBA-BACE-7C345323033A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.194:*:*:*:*:*:*:*", "cpeNameId": "FBCB3E35-2179-4C11-AB45-FF4ED4FDF319"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.195:*:*:*:*:*:*:*", "cpeNameId": "C3EE187D-F47C-4715-9DB8-E907435E01EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.196:*:*:*:*:*:*:*", "cpeNameId": "0C0A8C7F-62FD-4514-AA66-564CAADC6E45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.197:*:*:*:*:*:*:*", "cpeNameId": "B3CE9D05-5F55-4B0E-B305-0A3B005018DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.198:*:*:*:*:*:*:*", "cpeNameId": "2317D623-D839-407E-A14E-F5F852B84FEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.199:*:*:*:*:*:*:*", "cpeNameId": "EB66E33F-BA65-49D7-B9EA-4A98B64ACC4E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.200:*:*:*:*:*:*:*", "cpeNameId": "011BFD26-2596-4913-9424-0AECA7030C16"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.201:*:*:*:*:*:*:*", "cpeNameId": "D4ACDED5-7B2F-49A2-A926-D916CFDB0C63"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.202:*:*:*:*:*:*:*", "cpeNameId": "B7F9F37A-7A22-49AD-A0B1-F71767104083"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.203:*:*:*:*:*:*:*", "cpeNameId": "2AD7A4A5-2505-4B4D-8783-F0A51E6A046A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.204:*:*:*:*:*:*:*", "cpeNameId": "95FA5A9A-3EEF-40F7-A80B-F714544B33EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.205:*:*:*:*:*:*:*", "cpeNameId": "2E6CB57E-4C3F-42E5-B9FB-AB8280BE7A6F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.206:*:*:*:*:*:*:*", "cpeNameId": "7676F080-CF07-4DA1-AF8D-9EF7B716A3E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.207:*:*:*:*:*:*:*", "cpeNameId": "825F2314-2B15-4F76-B6CD-5C9DADC5BE95"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.208:*:*:*:*:*:*:*", "cpeNameId": "7B6DA918-9935-4683-A67B-08144DD82180"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.209:*:*:*:*:*:*:*", "cpeNameId": "95865082-502B-4EAF-BB46-FF14CB436ACA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.210:*:*:*:*:*:*:*", "cpeNameId": "E291ACF9-9E86-4E1E-BCB5-E208F959C0B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.211:*:*:*:*:*:*:*", "cpeNameId": "0A1A262D-D3CD-49B4-84ED-3064C2FED37A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.212:*:*:*:*:*:*:*", "cpeNameId": "57B76811-C4C0-4A91-A8EF-F37450F7F017"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.213:*:*:*:*:*:*:*", "cpeNameId": "205B4275-EF2F-4D30-9EC3-8E0571547292"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.214:*:*:*:*:*:*:*", "cpeNameId": "F5586B8B-CDBF-434C-A994-8D07A0DDB39C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.215:*:*:*:*:*:*:*", "cpeNameId": "D37B51B4-57EC-4373-9428-3C3D4A29208F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.216:*:*:*:*:*:*:*", "cpeNameId": "398941C0-8C2C-41F5-A1C9-9585DAC725E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.217:*:*:*:*:*:*:*", "cpeNameId": "7B403008-68BC-4E2D-9684-EA7D660D620C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.218:*:*:*:*:*:*:*", "cpeNameId": "FEE28F9A-4B9B-44F3-96E9-B98FB0AC8528"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.219:*:*:*:*:*:*:*", "cpeNameId": "2AF545DD-D84F-46B2-AA73-55A6B4659260"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.220:*:*:*:*:*:*:*", "cpeNameId": "A062E707-3089-4A1F-A78C-D2B8FF520A2B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.221:*:*:*:*:*:*:*", "cpeNameId": "CE524691-6654-439A-ACAC-6B617AF5AF1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.222:*:*:*:*:*:*:*", "cpeNameId": "7ACB644E-9AED-4BE0-AA14-66A4391EC095"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.223:*:*:*:*:*:*:*", "cpeNameId": "FF39B72D-B1B2-4DC2-B709-C6693BC9A5E7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.224:*:*:*:*:*:*:*", "cpeNameId": "517DC3B4-3906-44AE-8AA5-EF2587DBDC72"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.225:*:*:*:*:*:*:*", "cpeNameId": "BF5626A2-7798-4612-B4A5-BA04E42E0BED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.226:*:*:*:*:*:*:*", "cpeNameId": "F43E60E1-E9FB-44BC-BC12-DE00249731EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.227:*:*:*:*:*:*:*", "cpeNameId": "640CDE67-2025-448F-AA11-6B110B29D2A5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.228:*:*:*:*:*:*:*", "cpeNameId": "D2FA83FC-CF87-4E06-B474-4EEF45D68215"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.229:*:*:*:*:*:*:*", "cpeNameId": "66BF34B9-77D9-4194-A0B7-B4475B335F2E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.230:*:*:*:*:*:*:*", "cpeNameId": "299E37F1-CADB-4659-916C-6212694A18E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.231:*:*:*:*:*:*:*", "cpeNameId": "6485B4A3-B4A4-4051-BF33-D2CE21DA64EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.232:*:*:*:*:*:*:*", "cpeNameId": "B4F3A62A-C3EE-48BD-B70D-61471639DC9C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.233:*:*:*:*:*:*:*", "cpeNameId": "69E1C22D-523B-4340-A48B-2DB4BEB9248F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.234:*:*:*:*:*:*:*", "cpeNameId": "9F851704-26CF-4676-8855-D74AF799B382"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.235:*:*:*:*:*:*:*", "cpeNameId": "7C708908-5963-46DC-B508-3A5F7499055C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.236:*:*:*:*:*:*:*", "cpeNameId": "6C87ADCB-B88B-4DFA-992F-26B4947C3458"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.237:*:*:*:*:*:*:*", "cpeNameId": "6BB385D9-D9D8-470E-89CE-902222E39ADC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.238:*:*:*:*:*:*:*", "cpeNameId": "B4DAD459-71A8-44A5-861A-1BAF66749233"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.239:*:*:*:*:*:*:*", "cpeNameId": "1897BE2D-B7E6-4886-8CAC-C6AE563CBEE5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.240:*:*:*:*:*:*:*", "cpeNameId": "CE8BA9F0-78BC-4495-801A-2D41AC5B3187"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.241:*:*:*:*:*:*:*", "cpeNameId": "A5EC3DC7-E2C0-431A-A2EC-B6C3828C4BCA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.242:*:*:*:*:*:*:*", "cpeNameId": "E7DD7787-5F9A-4EB3-80D5-122199BE1430"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.243:*:*:*:*:*:*:*", "cpeNameId": "CEA6083C-45E3-459C-A5E7-04CABE3258FF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.244:*:*:*:*:*:*:*", "cpeNameId": "A046118E-2030-4FA1-AB54-FA3166B389EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.245:*:*:*:*:*:*:*", "cpeNameId": "798F9326-D8B4-47C7-A887-279D9837B680"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.246:*:*:*:*:*:*:*", "cpeNameId": "95624FFF-60D2-4964-9EBB-A6AFA64F213D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.247:*:*:*:*:*:*:*", "cpeNameId": "29DEE5F4-3ADD-4E88-9187-7135A238F9C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.248:*:*:*:*:*:*:*", "cpeNameId": "8E8D2C97-D48F-4BD9-BED5-88EE4813F6E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.249:*:*:*:*:*:*:*", "cpeNameId": "5A1E1612-3E81-4021-9A85-34B86AFBC77C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.250:*:*:*:*:*:*:*", "cpeNameId": "EA54F6F0-C64D-41B4-A582-92D43FDD3CB2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.251:*:*:*:*:*:*:*", "cpeNameId": "1B17D69F-3CC2-4B00-B2D5-A4434E4C2402"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.252:*:*:*:*:*:*:*", "cpeNameId": "AAC99975-FBC6-439C-B9E6-011CABDAE8F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.253:*:*:*:*:*:*:*", "cpeNameId": "5375B4A1-C18E-453D-9179-672CB459B0D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.254:*:*:*:*:*:*:*", "cpeNameId": "730B192E-0CAB-41AE-8EE8-57F381628032"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.255:*:*:*:*:*:*:*", "cpeNameId": "59A6D935-0EBF-4499-A8F9-5BB002FF5417"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.256:*:*:*:*:*:*:*", "cpeNameId": "60604FAE-6D70-4DF3-9A88-CC3F6A614F58"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.257:*:*:*:*:*:*:*", "cpeNameId": "28E9A455-1593-4AF5-9451-B313D622E813"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.258:*:*:*:*:*:*:*", "cpeNameId": "B5718D89-967C-42C8-AA82-C97D345B3B10"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.259:*:*:*:*:*:*:*", "cpeNameId": "87BB858F-8D92-452F-B51C-12ACE0798353"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.260:*:*:*:*:*:*:*", "cpeNameId": "AE07B665-D693-4561-A9B4-9932CD77333B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.261:*:*:*:*:*:*:*", "cpeNameId": "EF86313B-7F46-43B8-8338-AE692B75A0A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.262:*:*:*:*:*:*:*", "cpeNameId": "E1B563A5-0659-4D95-89A0-8FCC2A436214"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.263:*:*:*:*:*:*:*", "cpeNameId": "8D53F67C-F067-4BF8-AE22-78A1176571BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.264:*:*:*:*:*:*:*", "cpeNameId": "7111A17A-1784-4740-B976-38B722A838CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.265:*:*:*:*:*:*:*", "cpeNameId": "2D41AA24-795C-4C26-8A5A-D07B59EBD394"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.266:*:*:*:*:*:*:*", "cpeNameId": "A97784BF-DCF7-40A8-87DA-0CB401BEC707"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.267:*:*:*:*:*:*:*", "cpeNameId": "073D9BD8-4FBC-4DF6-8017-37FB83733D26"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.268:*:*:*:*:*:*:*", "cpeNameId": "91DAF395-305E-4836-A12C-1E2377F31FA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.269:*:*:*:*:*:*:*", "cpeNameId": "5FCE10E6-EC75-4696-82C2-8958D55E379A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.270:*:*:*:*:*:*:*", "cpeNameId": "431FAE79-4814-471C-ADD1-50E98CA62255"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.271:*:*:*:*:*:*:*", "cpeNameId": "90DCF88A-E713-42F3-9D1E-2CCCAA5074ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.272:*:*:*:*:*:*:*", "cpeNameId": "6B454F24-35C3-4974-86AC-E42EC930E187"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.273:*:*:*:*:*:*:*", "cpeNameId": "02AE5EE4-8747-4828-AC90-7DC0689482DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.274:*:*:*:*:*:*:*", "cpeNameId": "F006D7E9-C3E7-43D0-BFF9-1905CC924F0E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.275:*:*:*:*:*:*:*", "cpeNameId": "81C1BF7F-E953-42D0-965C-B5F736085500"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.276:*:*:*:*:*:*:*", "cpeNameId": "CFCF98F3-408F-4FB9-B097-3CE467D5C047"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.277:*:*:*:*:*:*:*", "cpeNameId": "8B64B495-66D8-4EE8-9391-2078D025F252"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.278:*:*:*:*:*:*:*", "cpeNameId": "25928F5C-D970-404D-B6CB-E3DFCD7EC853"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.279:*:*:*:*:*:*:*", "cpeNameId": "478BD5C9-EF9A-4FBB-9BCF-DF23EA8F3492"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.280:*:*:*:*:*:*:*", "cpeNameId": "9513977F-A95A-4F0F-AADE-B21201231052"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.281:*:*:*:*:*:*:*", "cpeNameId": "14DBE587-6D62-4B91-BC57-0C84D152E7EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.282:*:*:*:*:*:*:*", "cpeNameId": "6057E10C-DE66-4645-A2B5-44203C31F784"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.283:*:*:*:*:*:*:*", "cpeNameId": "951347D3-550A-41E6-B000-E2D716A96A20"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.284:*:*:*:*:*:*:*", "cpeNameId": "5979A8F6-3B9D-4C0C-8C75-9FA49E82A345"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.285:*:*:*:*:*:*:*", "cpeNameId": "F1278C94-D023-48BF-A6D6-36D0DF76CFF3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.286:*:*:*:*:*:*:*", "cpeNameId": "7E65B46E-A161-4126-9E85-B9F5B4C0005D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.297:*:*:*:*:*:*:*", "cpeNameId": "6DBCD7AC-F52A-4397-A3B8-8AFF7EF460FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5:*:*:*:*:*:*:*", "cpeNameId": "49DBB1C3-9AEF-4EC4-B62D-7D36F14EDFD9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5:-:*:*:*:*:*:*", "cpeNameId": "1F518EBF-1562-4E27-97CD-A3D668C77A8C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5:rc1:*:*:*:*:*:*", "cpeNameId": "5F85EA91-CF9D-413C-B2F0-C0DC16BF7928"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5:rc2:*:*:*:*:*:*", "cpeNameId": "B9A5A534-B718-4FFF-A889-D8A6EF731364"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5:rc3:*:*:*:*:*:*", "cpeNameId": "66795BCD-62BE-4EB7-B4C3-518EFDE1141E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5:rc4:*:*:*:*:*:*", "cpeNameId": "721CD8C6-1746-4BCA-B717-602990CE7D91"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5:rc5:*:*:*:*:*:*", "cpeNameId": "D4DCAF09-9CDF-4447-9167-4E76E661FBFA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5:rc6:*:*:*:*:*:*", "cpeNameId": "A393E2BB-4C21-483A-BD5E-5A4D6C03F2C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.0:*:*:*:*:*:*:*", "cpeNameId": "A2498E9A-09C4-421D-8C35-B607F76CA6D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.1:*:*:*:*:*:*:*", "cpeNameId": "F5C09E99-2653-42DE-8190-FF0FB4C94259"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.2:*:*:*:*:*:*:*", "cpeNameId": "0ED9D07A-5B08-4143-A891-7918475D27BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.3:*:*:*:*:*:*:*", "cpeNameId": "F033B4EC-A735-4E10-95EE-2AC9D67081EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.4:*:*:*:*:*:*:*", "cpeNameId": "9503CF12-7383-44DB-A50D-059A08956EC1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.5:*:*:*:*:*:*:*", "cpeNameId": "12D41A14-FC96-4874-B278-E57CFFCCC35F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.6:*:*:*:*:*:*:*", "cpeNameId": "733139E7-4729-4263-9BE9-4602D18C0307"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.7:*:*:*:*:*:*:*", "cpeNameId": "99D531E7-1606-42D1-AC48-03A258311B52"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.8:*:*:*:*:*:*:*", "cpeNameId": "DD45ED79-46BC-4D9E-BF13-2BCE447AB6AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.9:*:*:*:*:*:*:*", "cpeNameId": "EB76FD18-B13F-4423-B1AE-4D87EDCA59A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.10:*:*:*:*:*:*:*", "cpeNameId": "2D1E5A60-CACD-4B64-9771-8F27ECADF991"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.11:*:*:*:*:*:*:*", "cpeNameId": "D09F9D38-9B1B-40F3-89E6-C467A9247974"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.12:*:*:*:*:*:*:*", "cpeNameId": "0AFA53D6-C904-4260-A566-048D0DF14FE4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.13:*:*:*:*:*:*:*", "cpeNameId": "E3DD3225-582E-4CF7-9DEC-D58918ED5701"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.14:*:*:*:*:*:*:*", "cpeNameId": "6AA45C4C-C46A-4205-BE20-43DE712696D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.15:*:*:*:*:*:*:*", "cpeNameId": "01C8594F-1A7A-40E5-B6C3-F75CCFD1B7C9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.16:*:*:*:*:*:*:*", "cpeNameId": "32BF3DF9-BAC9-43EE-BA2B-BC53A137F299"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.17:*:*:*:*:*:*:*", "cpeNameId": "A6E18AD7-4B98-4E98-9C64-DF1A80536DCF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.18:*:*:*:*:*:*:*", "cpeNameId": "0E98522F-394C-4301-A85B-5E482CD4F4C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.19:*:*:*:*:*:*:*", "cpeNameId": "2A985199-F75F-4599-A95E-0AF97592DF71"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6:*:*:*:*:*:*:*", "cpeNameId": "D0B85891-4974-4AB3-834C-EC49CAAC82B8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6:-:*:*:*:*:*:*", "cpeNameId": "5174E1A3-A838-45BA-B4FA-AADFDF875FFC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6:rc1:*:*:*:*:*:*", "cpeNameId": "01524D2C-7501-4EC9-A0C3-A8F8B7D28FCF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6:rc2:*:*:*:*:*:*", "cpeNameId": "C6C932B1-DC39-43AD-A810-6F6BE4DC628C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6:rc3:*:*:*:*:*:*", "cpeNameId": "5AC13E72-7329-411C-8E43-AE91350E1984"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6:rc4:*:*:*:*:*:*", "cpeNameId": "E13CE8E0-4117-4CD6-B6DB-E9D85428FF27"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6:rc5:*:*:*:*:*:*", "cpeNameId": "F6F494A6-4576-4C86-AB89-78ABB06F8591"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.1:*:*:*:*:*:*:*", "cpeNameId": "7316EA10-E698-4056-9A73-CAEF10EF0D72"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.2:*:*:*:*:*:*:*", "cpeNameId": "F38E533D-F9F5-4B99-A2DF-23EE93C6716E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.3:*:*:*:*:*:*:*", "cpeNameId": "57E0290A-7943-4D3C-91E1-57110F6D698F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.4:*:*:*:*:*:*:*", "cpeNameId": "ABCD688B-6347-40A3-B19B-8D06DFA5A811"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.5:*:*:*:*:*:*:*", "cpeNameId": "05E67E62-01D6-4CAA-9BD2-5434427AD908"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.6:*:*:*:*:*:*:*", "cpeNameId": "AA5B4529-484F-4DB2-9ECF-181DDC0B2B86"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.7:*:*:*:*:*:*:*", "cpeNameId": "B2939052-3458-4C45-9A39-A1A835D29A02"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.7-1:*:*:*:*:*:*:*", "cpeNameId": "CDA63823-0948-48CE-9C3E-772A3FAF8386"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.8:*:*:*:*:*:*:*", "cpeNameId": "EC18E58B-1BFA-4C37-A35D-C17EBD6EE988"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.9:*:*:*:*:*:*:*", "cpeNameId": "BAD41340-BC92-4275-AAE6-6CD24B17CBA0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.10:*:*:*:*:*:*:*", "cpeNameId": "45C947BE-C438-4231-A0C2-28DA89A6C6B8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.11:*:*:*:*:*:*:*", "cpeNameId": "D285AD12-A45A-4F70-B4E2-29D2BDCABD83"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.12:*:*:*:*:*:*:*", "cpeNameId": "49E0F195-1D05-48F7-8E36-EACE60F54D21"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.13:*:*:*:*:*:*:*", "cpeNameId": "EAFD2DCB-733B-4E34-A1E5-9EC194692E96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.14:*:*:*:*:*:*:*", "cpeNameId": "228F9C86-B2C4-49E8-8171-FAE5C314C21A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.15:*:*:*:*:*:*:*", "cpeNameId": "4BF5012C-B142-489D-9B66-3FDFE7BB0686"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.16:*:*:*:*:*:*:*", "cpeNameId": "E46B8C4B-152A-4072-8544-3EF2CC90BC5C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.17:*:*:*:*:*:*:*", "cpeNameId": "16831F51-025C-481A-BB1B-F5A74E68D195"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.18:*:*:*:*:*:*:*", "cpeNameId": "6AFCEAAB-98C1-4E23-92CC-41C3103CED87"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.19:*:*:*:*:*:*:*", "cpeNameId": "D95E3BC5-BF59-4243-ADAA-4A70FEAB0042"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7:*:*:*:*:*:*:*", "cpeNameId": "D513E95A-293B-43E6-BB81-E30994D64488"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7:-:*:*:*:*:*:*", "cpeNameId": "EB1BB502-B09E-49F0-A7D2-A270EB7B6702"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7:rc1:*:*:*:*:*:*", "cpeNameId": "DAED72C2-F722-4E03-94CF-5CFC54AB3375"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7:rc2:*:*:*:*:*:*", "cpeNameId": "95928159-FAD7-4535-98AC-9BB8DE1BA8C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7:rc3:*:*:*:*:*:*", "cpeNameId": "BA4208E6-4ECB-4CC4-872B-9CCE02BCAE88"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7:rc4:*:*:*:*:*:*", "cpeNameId": "2203FB54-7292-4E7D-8AC5-AFF97AA62CB9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7:rc5:*:*:*:*:*:*", "cpeNameId": "F1565C19-81C0-4A57-840B-9A43914D232C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7:rc6:*:*:*:*:*:*", "cpeNameId": "F482AFCB-1119-4612-A3B3-6DCEA83454DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7:rc7:*:*:*:*:*:*", "cpeNameId": "0D9F6240-7FAF-46FE-93B6-5FDAF8026BB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.0:*:*:*:*:*:*:*", "cpeNameId": "7B2127FA-A707-4697-AD6B-CD155779E65D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.1:*:*:*:*:*:*:*", "cpeNameId": "1C140291-35F7-4777-9E23-B7CFD8361171"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.2:*:*:*:*:*:*:*", "cpeNameId": "B6DB2ACF-7055-4752-A880-931ECB34B58D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.3:*:*:*:*:*:*:*", "cpeNameId": "FFB09BE7-096E-4492-99AA-DB5504F4658B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.4:*:*:*:*:*:*:*", "cpeNameId": "1F1130BB-5BB2-48B5-849B-D111B75333D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.5:*:*:*:*:*:*:*", "cpeNameId": "A7DB133D-DDE7-4AE2-82AE-498E752AEA34"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.6:*:*:*:*:*:*:*", "cpeNameId": "92E0341D-5A2D-4CEA-A178-F8F3653CAA73"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.7:*:*:*:*:*:*:*", "cpeNameId": "63B4BA4D-2ED3-4979-AFB4-2317C7E3A1F4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.8:*:*:*:*:*:*:*", "cpeNameId": "1978F055-6B35-4431-A0FF-932F67E3E3AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.9:*:*:*:*:*:*:*", "cpeNameId": "F21A00EF-24CC-4632-90E7-67057A458DD9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.10:*:*:*:*:*:*:*", "cpeNameId": "D7F5F840-3660-45B8-A3C7-CB2AC7B95F6E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.11:*:*:*:*:*:*:*", "cpeNameId": "8E9708FA-F771-4BCB-AEC0-11556349160A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.12:*:*:*:*:*:*:*", "cpeNameId": "2A7711FD-E383-4D01-943D-9BAC425548D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.13:*:*:*:*:*:*:*", "cpeNameId": "6FB98443-3298-46FF-9819-3656A0E0A48D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.14:*:*:*:*:*:*:*", "cpeNameId": "05C7E01F-6097-4979-9807-A0ADE319D01F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.15:*:*:*:*:*:*:*", "cpeNameId": "8979AEB4-CADB-43E8-B3CE-C95CFEBF23EE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.16:*:*:*:*:*:*:*", "cpeNameId": "3DAB3E83-7F34-46E3-B14C-37C895CBE274"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.17:*:*:*:*:*:*:*", "cpeNameId": "8B4BF440-12E0-416D-8CAF-C07D04F07C2A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.18:*:*:*:*:*:*:*", "cpeNameId": "0D1B13B2-39EF-4E53-87CE-763DBA03DA05"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.19:*:*:*:*:*:*:*", "cpeNameId": "8CFCB3C4-4D44-4C18-BFCC-AD5FE0C06B4B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8:*:*:*:*:*:*:*", "cpeNameId": "07476EA3-FFDE-4B8C-912C-23138078B5EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8:-:*:*:*:*:*:*", "cpeNameId": "5178891D-6B7B-4263-879E-E69653C4D719"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8:rc1:*:*:*:*:*:*", "cpeNameId": "4BBEF5DE-A47A-4676-B324-008ABEC06865"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8:rc2:*:*:*:*:*:*", "cpeNameId": "3238D662-CCC8-4AB2-8157-A26CCE26D2D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8:rc3:*:*:*:*:*:*", "cpeNameId": "782D5463-6D0E-4C21-B4BA-5E91F105D4F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8:rc4:*:*:*:*:*:*", "cpeNameId": "C35E4C5D-1E1D-466F-A67C-2FC1F25CB430"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8:rc5:*:*:*:*:*:*", "cpeNameId": "83AAD5D5-4B05-4B36-9CE2-8200C3C961C5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8:rc6:*:*:*:*:*:*", "cpeNameId": "0E7ED941-6C90-4C40-8DB3-5E1B1B277E72"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.0:-:*:*:*:*:*:*", "cpeNameId": "5CF73E72-A891-4A42-9B0F-C7C9A5B8C8A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.0:rc1:*:*:*:*:*:*", "cpeNameId": "3A738E69-098D-4FCF-B7BD-4029B795DA7B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.0:rc2:*:*:*:*:*:*", "cpeNameId": "65ED0818-2628-4C3E-9153-7964EBEBE623"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.0:rc3:*:*:*:*:*:*", "cpeNameId": "B10D552F-439F-41F8-A37B-92C049C8DDFA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.0:rc4:*:*:*:*:*:*", "cpeNameId": "0C80D4FE-591B-4062-B4E0-034C8E6824DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.0:rc5:*:*:*:*:*:*", "cpeNameId": "A1FD0D8B-97CB-488B-B7CF-52C0CD54F200"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.0:rc6:*:*:*:*:*:*", "cpeNameId": "83533D12-466A-4B04-BC3A-1F3C5D8750B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.1:*:*:*:*:*:*:*", "cpeNameId": "C5B329AA-50C3-4D56-B10E-85876E2D6AFF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.2:*:*:*:*:*:*:*", "cpeNameId": "DA50D3B5-AE38-4686-B2AC-0C85E4CD89FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.3:*:*:*:*:*:*:*", "cpeNameId": "E54D1F8D-F883-4051-BF12-057D3F0FB128"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.4:*:*:*:*:*:*:*", "cpeNameId": "2A27C723-EFF7-416C-AFF2-D51C97DDE1DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.5:*:*:*:*:*:*:*", "cpeNameId": "4E4A5F0F-AE99-43F4-8003-657F1AC0AA93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.6:*:*:*:*:*:*:*", "cpeNameId": "57FFF781-B984-4F38-837E-255B22971C5F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.7:*:*:*:*:*:*:*", "cpeNameId": "ABBD5CFC-8A56-41FF-98BF-3F3DAF0F3841"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.8:*:*:*:*:*:*:*", "cpeNameId": "5DBF7892-0D9B-4153-9AAA-F72B0283A4A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.9:*:*:*:*:*:*:*", "cpeNameId": "6353E571-9A60-4036-B95E-2C814AAF7752"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.10:*:*:*:*:*:*:*", "cpeNameId": "EA57F68D-826E-43DB-A61A-DBE3B1C191C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.11:*:*:*:*:*:*:*", "cpeNameId": "80319CAF-347D-468D-B8FC-FD9C043FC4DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.12:*:*:*:*:*:*:*", "cpeNameId": "A5CE9EA4-85BD-43F3-8F6B-A09C25FD9167"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.13:*:*:*:*:*:*:*", "cpeNameId": "F91ADB87-9531-4398-BB0B-C063A074973B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.14:*:*:*:*:*:*:*", "cpeNameId": "7F82A887-A988-475B-9478-8CFCF7C3A704"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.15:*:*:*:*:*:*:*", "cpeNameId": "987E4679-4B40-4434-B0D7-3DEDAAB2F6BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.16:*:*:*:*:*:*:*", "cpeNameId": "9C363333-E73E-4B58-8D4C-37BD1D0B51C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.17:*:*:*:*:*:*:*", "cpeNameId": "27BE33C0-428F-4A80-A80B-BC74C075B66C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.18:*:*:*:*:*:*:*", "cpeNameId": "9EE86950-40B6-4663-8A3A-7E1D03696B0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9:*:*:*:*:*:*:*", "cpeNameId": "121E9A60-F4D2-433C-98BF-0AFA0E4A266F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.0:-:*:*:*:*:*:*", "cpeNameId": "469494B6-32FD-4685-BE2F-A210B6063294"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc1:*:*:*:*:*:*", "cpeNameId": "7F13BEF4-27D5-40F6-9765-358FD93E1792"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc2:*:*:*:*:*:*", "cpeNameId": "5ACD024B-F179-4BD5-BAAE-51108956284E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc3:*:*:*:*:*:*", "cpeNameId": "EB2E632F-62CB-44FF-8C0C-E0D47D05E493"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc4:*:*:*:*:*:*", "cpeNameId": "F87B3257-4230-45BA-9667-307E0A4904CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc5:*:*:*:*:*:*", "cpeNameId": "2CCEF2FF-6123-42D5-B8BB-D8E248F8843C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc6:*:*:*:*:*:*", "cpeNameId": "C025B18C-40C5-4D4E-83AC-6BFEA8EE6936"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.1:*:*:*:*:*:*:*", "cpeNameId": "44A6C28C-2EBF-4D99-AE8C-887010615909"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.2:*:*:*:*:*:*:*", "cpeNameId": "31CF2F4F-4453-4907-AA98-E8137382086D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.3:*:*:*:*:*:*:*", "cpeNameId": "F63DD037-0FDF-4CEC-8117-A3982CD33949"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.4:*:*:*:*:*:*:*", "cpeNameId": "5BEC457A-2479-43CE-98B2-71459DE758CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.5:*:*:*:*:*:*:*", "cpeNameId": "09C574BD-509E-420D-A4F1-3BD1C32E39C9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.6:*:*:*:*:*:*:*", "cpeNameId": "456FDC00-52BA-493A-B35B-CBB030B87FFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.7:*:*:*:*:*:*:*", "cpeNameId": "0C7FD0C5-7C16-45A5-AA4F-92609FC022D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.8:*:*:*:*:*:*:*", "cpeNameId": "C5131E57-D5F0-40F5-9D16-7C22AA4F9767"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.9:*:*:*:*:*:*:*", "cpeNameId": "D3CEA5D0-4D9E-4C39-87F9-BC90F5B770B8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.10:*:*:*:*:*:*:*", "cpeNameId": "76C03A6F-AF3B-4F19-95D9-F4150871865A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.11:*:*:*:*:*:*:*", "cpeNameId": "69578C8A-5886-441D-B835-5D0EDD95D146"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.12:*:*:*:*:*:*:*", "cpeNameId": "59581E9A-A564-46D2-B63E-4A838F09E213"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.13:*:*:*:*:*:*:*", "cpeNameId": "31137D81-EDA5-431E-BBA0-F1BA9752D0CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.14:*:*:*:*:*:*:*", "cpeNameId": "4D283523-B6B5-4CA3-A445-5FDA69F42FB9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.15:*:*:*:*:*:*:*", "cpeNameId": "0415500F-6FA8-4B11-BC14-0F8334371749"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.16:*:*:*:*:*:*:*", "cpeNameId": "086B2B23-E533-4D2E-9E90-0EC4BD2646EE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10:-:*:*:*:*:*:*", "cpeNameId": "2E1F1B79-2711-4459-B972-D3C83C48D2D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10:rc1:*:*:*:*:*:*", "cpeNameId": "4255DBFB-D157-45ED-BA6C-1BACB64A1623"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10:rc2:*:*:*:*:*:*", "cpeNameId": "C7BA0F25-7DD0-427A-A8FF-D5CCD17EA554"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10:rc4:*:*:*:*:*:*", "cpeNameId": "0962C2F4-E79A-4C61-8380-55EAAAD4AE1B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.0:-:*:*:*:*:*:*", "cpeNameId": "6B1D1EAB-0195-4F05-88FF-F862563F89FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.0:rc1:*:*:*:*:*:*", "cpeNameId": "EBBE0FA3-6C50-4C78-83C3-9BE6F9A064E3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.0:rc2:*:*:*:*:*:*", "cpeNameId": "E59C1055-110F-4E68-BB9C-8E3C564F72F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.0:rc3:*:*:*:*:*:*", "cpeNameId": "955307F1-B773-46C3-983A-DEA36FDEBCBD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.0:rc4:*:*:*:*:*:*", "cpeNameId": "4AC5F069-6642-4E36-ACF3-EE93FCEAC751"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.0:rc5:*:*:*:*:*:*", "cpeNameId": "EF537B63-6913-49CD-8CEB-A9B744FE8E4E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.1:*:*:*:*:*:*:*", "cpeNameId": "919C724B-829B-4250-B6F3-66C503930681"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.2:*:*:*:*:*:*:*", "cpeNameId": "7B9D0BBB-79E9-4CA5-81CF-2F8783866A20"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.3:*:*:*:*:*:*:*", "cpeNameId": "6F0C6AC0-1A96-4202-B3A4-42216BDC476C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.4:*:*:*:*:*:*:*", "cpeNameId": "59CCCD55-2025-4BD2-BB41-7FBF6B449783"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.5:*:*:*:*:*:*:*", "cpeNameId": "6BD60207-E9A0-4688-A2D3-3A68CAC97BFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.6:*:*:*:*:*:*:*", "cpeNameId": "54839987-2658-4873-BB81-585C8849EE8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.7:*:*:*:*:*:*:*", "cpeNameId": "FB32ECFD-B8DB-4422-83B4-7F26B1DCC763"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.8:*:*:*:*:*:*:*", "cpeNameId": "0FCF254D-C922-4F67-B85C-7247077BBF63"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.9:*:*:*:*:*:*:*", "cpeNameId": "2313CF18-EB32-4DB8-9B68-B24F46689725"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.10:*:*:*:*:*:*:*", "cpeNameId": "77C0418A-B48F-4E70-B71F-5030B901EC8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.11:*:*:*:*:*:*:*", "cpeNameId": "32769B56-4C74-41FE-A7D3-5D87006BE1B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.12:*:*:*:*:*:*:*", "cpeNameId": "C5244E7D-A816-42FD-80A2-22A1EBD41FA8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.13:*:*:*:*:*:*:*", "cpeNameId": "0E80BF7E-93CE-4658-854B-7EFB6AC17CEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.14:*:*:*:*:*:*:*", "cpeNameId": "BCB6377E-BAD8-4063-8DB2-A16392D24089"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.15:*:*:*:*:*:*:*", "cpeNameId": "09DAF5C5-3ADF-4BFB-B681-DEFAD2874241"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.16:*:*:*:*:*:*:*", "cpeNameId": "878924C9-1FEA-49D2-BB99-6AE2A8812570"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.17:*:*:*:*:*:*:*", "cpeNameId": "13722F1D-D730-4F7C-AB84-1267068EF08C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.18:*:*:*:*:*:*:*", "cpeNameId": "2A86DC03-D4AC-4EAE-88FE-54D103F5A3D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.19:*:*:*:*:*:*:*", "cpeNameId": "B833D784-AF50-4A28-88B3-B00A2ABA00D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.20:*:*:*:*:*:*:*", "cpeNameId": "EC92790E-8CEB-4EE7-9655-BE16A14BCAC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.21:*:*:*:*:*:*:*", "cpeNameId": "A0D9BB71-2049-4DEA-B438-0EE2AA9A09ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.22:*:*:*:*:*:*:*", "cpeNameId": "4F726530-1114-4DF2-956E-81715A37EE2A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.23:*:*:*:*:*:*:*", "cpeNameId": "6A9B3C74-81DE-4FDA-A058-89DD6494DD5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.24:*:*:*:*:*:*:*", "cpeNameId": "B98E61C1-1F45-4150-B477-FBFF4FAC3ED3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.25:*:*:*:*:*:*:*", "cpeNameId": "AEDF3A34-9D1B-4E78-9BC8-BFC839CBA294"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.26:*:*:*:*:*:*:*", "cpeNameId": "0B823FEF-0461-49A6-A380-1FCA2F2765FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.27:*:*:*:*:*:*:*", "cpeNameId": "494E65F5-4C04-45D6-830F-4EE9103EBB79"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.28:*:*:*:*:*:*:*", "cpeNameId": "83414679-66B4-40C0-B061-FF9FE1B23F95"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.29:*:*:*:*:*:*:*", "cpeNameId": "2EDD7AD5-8E29-4C05-B2B9-690CE6523AE8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.30:*:*:*:*:*:*:*", "cpeNameId": "F4A2F70D-4AEF-4F79-8BD3-2AAA3BED01E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.31:*:*:*:*:*:*:*", "cpeNameId": "6D4C13F5-4DC9-4498-B598-0C72F44C408F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.32:*:*:*:*:*:*:*", "cpeNameId": "0CC82644-C0F1-4FE3-BE00-1AA49A715186"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.33:*:*:*:*:*:*:*", "cpeNameId": "1CE00059-6557-4873-88DC-0D8989EA8352"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.34:*:*:*:*:*:*:*", "cpeNameId": "D681DBE9-23F8-4AB1-A4C6-73075E8753B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.35:*:*:*:*:*:*:*", "cpeNameId": "DA0FCEE1-0A6E-488B-A168-9885CE8A892B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.36:*:*:*:*:*:*:*", "cpeNameId": "8EC26158-07A8-4F5B-AED4-B1B247C7804F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.37:*:*:*:*:*:*:*", "cpeNameId": "AE2694A8-5857-4C19-81BE-E371A011643C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.38:*:*:*:*:*:*:*", "cpeNameId": "ABEB722B-6903-4915-B85C-1D2A05674826"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.39:*:*:*:*:*:*:*", "cpeNameId": "6AD9EBB8-8E60-4501-A44E-057A3BEEDA17"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.40:*:*:*:*:*:*:*", "cpeNameId": "F0D558A0-55C0-460B-BE39-F06AF16FAC31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.41:*:*:*:*:*:*:*", "cpeNameId": "275C969B-FC08-441F-BDBC-F24EC5810A99"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.42:*:*:*:*:*:*:*", "cpeNameId": "731A0F3B-A32B-4345-BE91-ABA294048D2A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.43:*:*:*:*:*:*:*", "cpeNameId": "3FE2BC04-D69F-4239-B3D8-17898AE1EC6E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.44:*:*:*:*:*:*:*", "cpeNameId": "575245F7-0BE3-4A47-A20F-0D1ECF247B3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.45:*:*:*:*:*:*:*", "cpeNameId": "4BC74ACC-355D-41FE-9D78-D50DD08425F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.46:*:*:*:*:*:*:*", "cpeNameId": "E63871AE-A0FC-41E1-B4AE-99FEA83DE6EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.47:*:*:*:*:*:*:*", "cpeNameId": "2D465F1B-9417-4099-9468-09D21B58EFE0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.48:*:*:*:*:*:*:*", "cpeNameId": "78FC9A7F-B877-4B4B-93C7-C5BAEB84BEF1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.49:*:*:*:*:*:*:*", "cpeNameId": "2343BB66-E088-4CAA-9458-F62F5624D1BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.50:*:*:*:*:*:*:*", "cpeNameId": "BED11231-C3C0-4B9A-A667-E96A5EB42728"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.51:*:*:*:*:*:*:*", "cpeNameId": "4BA151A6-3479-4D73-92A0-25D7D74DD76C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.52:*:*:*:*:*:*:*", "cpeNameId": "4CFCF22F-C2C8-46CA-A8C2-A6DB5AAD3670"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.53:*:*:*:*:*:*:*", "cpeNameId": "6326FFB7-116E-4FB8-B2C1-909CC3B6C3C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.54:*:*:*:*:*:*:*", "cpeNameId": "A7FDB1DD-DC8A-4424-A81A-37F8A0B2F1D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.55:*:*:*:*:*:*:*", "cpeNameId": "A9A96456-8676-4108-B958-7A0E3493F315"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.56:*:*:*:*:*:*:*", "cpeNameId": "7444E85B-6F15-4980-8721-5B0A708042E3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.57:*:*:*:*:*:*:*", "cpeNameId": "2D88C78E-CA4C-40A2-BF04-E487DE3D79C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.58:*:*:*:*:*:*:*", "cpeNameId": "D8167B04-7EDF-4F1B-B967-EFCDC6FB0D63"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.59:*:*:*:*:*:*:*", "cpeNameId": "66E8BCA7-8C84-42E6-A891-0840BE07CE79"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.60:*:*:*:*:*:*:*", "cpeNameId": "3FE27316-DB42-42B3-95E5-EBF8CB7498C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.61:*:*:*:*:*:*:*", "cpeNameId": "47AD2C14-A08F-4D75-960F-1D5C72EB1979"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.62:*:*:*:*:*:*:*", "cpeNameId": "E93FBE71-458B-4F4A-BA1E-153759B14744"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.63:*:*:*:*:*:*:*", "cpeNameId": "7FD84D94-2BA9-4552-9807-F06A66D760BA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.64:*:*:*:*:*:*:*", "cpeNameId": "9424301F-3046-46B4-863C-E887D542C94B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.65:*:*:*:*:*:*:*", "cpeNameId": "70F56D3D-6046-4B8E-961A-C9835F0B9090"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.66:*:*:*:*:*:*:*", "cpeNameId": "C4C18611-ABA7-482D-82FD-8CE9E3CBDB33"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.67:*:*:*:*:*:*:*", "cpeNameId": "0B905626-8718-42FB-9908-7573102CB541"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.68:*:*:*:*:*:*:*", "cpeNameId": "365DA1ED-E1C9-4A4C-9A38-54FDA5832296"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.69:*:*:*:*:*:*:*", "cpeNameId": "27BBA256-9FD8-4A99-A301-31761D2CB794"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.70:*:*:*:*:*:*:*", "cpeNameId": "3B7F8DF6-7523-4D9B-B7B7-10E77A9D132C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.71:*:*:*:*:*:*:*", "cpeNameId": "580454E1-93EE-4311-852E-4B749F7905DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.72:*:*:*:*:*:*:*", "cpeNameId": "1307A5B0-2E1A-48AD-A718-46BF09EA2F52"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.73:*:*:*:*:*:*:*", "cpeNameId": "33F6E183-DDDE-4425-86CB-91EFEA45EB7C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.74:*:*:*:*:*:*:*", "cpeNameId": "861EB0F3-ECA9-4F1B-8842-DB4EFB6A00A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.75:*:*:*:*:*:*:*", "cpeNameId": "2D8BE345-69E8-49AC-A829-8FE9A71E0570"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.76:*:*:*:*:*:*:*", "cpeNameId": "71972DCE-D514-471A-8C19-6F1266FBB229"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.77:*:*:*:*:*:*:*", "cpeNameId": "F8C0EEE1-9B24-411B-ADC9-740859F33B48"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.78:*:*:*:*:*:*:*", "cpeNameId": "A8B37EA6-CA2C-46D6-A181-278E5C31F0DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.79:*:*:*:*:*:*:*", "cpeNameId": "F27C5E99-159C-490C-AF32-50BE9563EB52"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.80:*:*:*:*:*:*:*", "cpeNameId": "17813E0B-D346-4177-8F05-9533B4C60865"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.81:*:*:*:*:*:*:*", "cpeNameId": "8D01EFE4-8A1B-4CCF-95E7-AC5A1539D62E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.82:*:*:*:*:*:*:*", "cpeNameId": "1F0FC27E-9086-4213-9CFE-FD6F1B9A4AF1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.83:*:*:*:*:*:*:*", "cpeNameId": "481F6A95-F56E-4D6D-854C-6F04ECBD66B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.84:*:*:*:*:*:*:*", "cpeNameId": "46CC33A3-5940-4D55-8E84-E73C3BD823F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.85:*:*:*:*:*:*:*", "cpeNameId": "2D2A56E7-26AC-4B25-B518-580C7B57B9AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.86:*:*:*:*:*:*:*", "cpeNameId": "74D61A28-F673-4952-8B5C-02F3C13CB122"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.87:*:*:*:*:*:*:*", "cpeNameId": "339A37D8-F764-445B-8DB3-84A8FAECE0E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.88:*:*:*:*:*:*:*", "cpeNameId": "D97DAA30-8EFA-4A17-BCF4-1DA94DEA4EDB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.89:*:*:*:*:*:*:*", "cpeNameId": "E27E4623-1A1D-4DFD-82DA-A2C5CC7F7697"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.90:*:*:*:*:*:*:*", "cpeNameId": "E504954E-D296-441C-873E-BB0A99B128A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.91:*:*:*:*:*:*:*", "cpeNameId": "972594C2-DBE3-4358-974A-4F4669143532"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.92:*:*:*:*:*:*:*", "cpeNameId": "844FF0AF-746F-460B-AF09-70F04AEFCF31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.93:*:*:*:*:*:*:*", "cpeNameId": "0759AD27-6E8F-4FB0-86A0-581270987FC8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.94:*:*:*:*:*:*:*", "cpeNameId": "4762F42E-1EB4-43B9-B4C6-FED6BD72F8F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.95:*:*:*:*:*:*:*", "cpeNameId": "3AB26935-F86A-4944-AB5E-2030498A5150"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.96:*:*:*:*:*:*:*", "cpeNameId": "1F32FA33-C031-4CB3-9FE9-5B8F2AB4F0DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.97:*:*:*:*:*:*:*", "cpeNameId": "EA2A46B2-E9A8-4939-B34C-305DADC1E706"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.98:*:*:*:*:*:*:*", "cpeNameId": "6F40D4DA-5127-4F65-B450-DACBFF729694"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.99:*:*:*:*:*:*:*", "cpeNameId": "4ACCE8A9-B038-41D4-853D-6FFCC67C6B64"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.100:*:*:*:*:*:*:*", "cpeNameId": "7BC07033-922F-4E00-9A7F-A9799C0665BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.101:*:*:*:*:*:*:*", "cpeNameId": "63A5156F-CEE7-4BF7-8421-892C0A117BFF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.102:*:*:*:*:*:*:*", "cpeNameId": "FE32C7D9-7BCC-4896-9D3A-954D3A175242"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.103:*:*:*:*:*:*:*", "cpeNameId": "0E21CE22-A7B8-4F83-BEE7-6672AE3A2C44"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.104:*:*:*:*:*:*:*", "cpeNameId": "A4E75A55-DB3C-43F3-AA43-A04380CB435A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.105:*:*:*:*:*:*:*", "cpeNameId": "217BD320-E966-48FB-A3DA-EAC81FBA3D02"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.106:*:*:*:*:*:*:*", "cpeNameId": "A13D5A45-1F78-4F9D-8932-09FB4963FE2B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.107:*:*:*:*:*:*:*", "cpeNameId": "94B537FB-3FC1-4A2A-90C5-A41C4E757EAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.108:*:*:*:*:*:*:*", "cpeNameId": "A36CC6BB-339C-4928-B79B-7047AD126CAE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.109:*:*:*:*:*:*:*", "cpeNameId": "787AABB6-F55D-41A7-99FA-AE59AD411920"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.110:*:*:*:*:*:*:*", "cpeNameId": "E8453C19-A25E-42BC-AC28-3967873C0502"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.111:*:*:*:*:*:*:*", "cpeNameId": "F25CCCEB-3631-4B9B-852D-A76ED56BA4DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.112:*:*:*:*:*:*:*", "cpeNameId": "5A726FC3-8B4B-4E63-9865-6A5C6BC9451D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.113:*:*:*:*:*:*:*", "cpeNameId": "CD45E388-608F-4BE6-8152-527548FE08DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.114:*:*:*:*:*:*:*", "cpeNameId": "A7BDF880-128D-4D74-8D98-E41C861040C5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.115:*:*:*:*:*:*:*", "cpeNameId": "6692FB97-9395-401A-B1CB-AD484F90B89A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.116:*:*:*:*:*:*:*", "cpeNameId": "9A64BA88-6D08-409E-BFE1-24CFA920C75A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.117:*:*:*:*:*:*:*", "cpeNameId": "2D582BFD-C229-4552-B828-115F83D73F89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.118:*:*:*:*:*:*:*", "cpeNameId": "CA086871-EB47-4699-8451-993791AA05DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.119:*:*:*:*:*:*:*", "cpeNameId": "483BEBC5-E6D4-4ED8-A5E5-DB2DD73986DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.120:*:*:*:*:*:*:*", "cpeNameId": "68EF2A7B-021A-4153-BDB1-A68499185EFB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.121:*:*:*:*:*:*:*", "cpeNameId": "C55B56E4-06A2-43C2-BE53-5681C0687D73"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.122:*:*:*:*:*:*:*", "cpeNameId": "CB7B49F3-DDD7-4A9E-BF7D-89BCA4437C52"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.123:*:*:*:*:*:*:*", "cpeNameId": "4A20AD3E-FA89-4524-8D02-B2728615111C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.124:*:*:*:*:*:*:*", "cpeNameId": "C30938C7-DF69-4F4C-ADF6-BF47C209872E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.125:*:*:*:*:*:*:*", "cpeNameId": "D091A040-31A4-4643-BD08-9D25F02BDDED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.126:*:*:*:*:*:*:*", "cpeNameId": "FF6CD639-C348-4BAA-8C59-8FE73D9966DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.127:*:*:*:*:*:*:*", "cpeNameId": "3F24CE79-3D3D-421A-AC44-E68C17FC5D92"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.128:*:*:*:*:*:*:*", "cpeNameId": "F9E550EF-FFA3-4194-9071-7922680C7E6E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.129:*:*:*:*:*:*:*", "cpeNameId": "987DB34E-E170-4E7E-B08A-CD32A73E9156"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.130:*:*:*:*:*:*:*", "cpeNameId": "A7E67D9A-9FA7-43ED-B536-312C5C01CD6E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.131:*:*:*:*:*:*:*", "cpeNameId": "D9C69A17-571F-45C1-9120-1BE31A33A948"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.132:*:*:*:*:*:*:*", "cpeNameId": "166EDBC5-3C18-4042-8C19-F339F25162FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.133:*:*:*:*:*:*:*", "cpeNameId": "CBA08C9F-0426-4B96-A6E8-7253C152FFBC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.134:*:*:*:*:*:*:*", "cpeNameId": "182AECF8-FAC1-4E1B-BE84-ABB34E11A3F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.135:*:*:*:*:*:*:*", "cpeNameId": "A7249039-E52A-4756-A93F-06A3284AEDEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.136:*:*:*:*:*:*:*", "cpeNameId": "84C67C6F-FA0B-41EE-9D20-11A0BC255F63"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.137:*:*:*:*:*:*:*", "cpeNameId": "00A8D67B-9DFD-4BBE-9A8D-976B22573BC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.138:*:*:*:*:*:*:*", "cpeNameId": "94A225AF-5670-4866-967D-29ECA4887457"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.139:*:*:*:*:*:*:*", "cpeNameId": "579F476A-FED8-4232-ADF1-3889FDC4C86C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.140:*:*:*:*:*:*:*", "cpeNameId": "84F54287-F019-47C9-9CB7-7B6B6CCBA9E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.141:*:*:*:*:*:*:*", "cpeNameId": "3E72C4BF-107C-4C73-AD2D-13564B590074"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.142:*:*:*:*:*:*:*", "cpeNameId": "FC309597-3B6C-4DB1-920B-97C1428824C2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.143:*:*:*:*:*:*:*", "cpeNameId": "0F20169C-AA6F-433A-AB4B-2FB83AFE4CBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.144:*:*:*:*:*:*:*", "cpeNameId": "02E301AD-B083-4D5E-81D5-7C1990FAA3B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.145:*:*:*:*:*:*:*", "cpeNameId": "BAA0E2C0-1BF2-4F95-BBDA-D294FFC56C90"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.146:*:*:*:*:*:*:*", "cpeNameId": "333D6187-DE99-4496-951B-79FC37281B50"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.147:*:*:*:*:*:*:*", "cpeNameId": "5B8EA31C-9846-414C-B164-133B7C72AFAC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.148:*:*:*:*:*:*:*", "cpeNameId": "48B13BAF-B20A-4DEA-9516-565B3030BD3F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.149:*:*:*:*:*:*:*", "cpeNameId": "2BDBBF02-8793-439B-B2B7-F1398DDC5165"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.150:*:*:*:*:*:*:*", "cpeNameId": "845A54DE-9847-4628-81AE-9202E104E5A7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.151:*:*:*:*:*:*:*", "cpeNameId": "429BF264-A007-4AFC-9AC8-17CA5BE8091F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.152:*:*:*:*:*:*:*", "cpeNameId": "A21895BD-17BD-4347-BB11-AC22832B5545"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.153:*:*:*:*:*:*:*", "cpeNameId": "C72F8FFE-0954-4360-ABC2-97FDC0DB5D45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.154:*:*:*:*:*:*:*", "cpeNameId": "76BE03E9-E28F-44A8-9B89-9700CF4E3689"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.155:*:*:*:*:*:*:*", "cpeNameId": "C28104D3-94AE-44FA-9395-B7B19859B677"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.156:*:*:*:*:*:*:*", "cpeNameId": "27FB0DEA-7659-4394-8E83-0EC289A5CAA4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.157:*:*:*:*:*:*:*", "cpeNameId": "D9820BF1-0B1A-432F-889F-F152AAA957DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.158:*:*:*:*:*:*:*", "cpeNameId": "C0BDDEFA-7B1D-4108-BCC9-FFA63A3DDC7E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.159:*:*:*:*:*:*:*", "cpeNameId": "8A23C014-F216-43C3-9D3C-5CEED86EE41D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.160:*:*:*:*:*:*:*", "cpeNameId": "1978465D-F79C-40EB-A6EF-50EFF77BB974"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.161:*:*:*:*:*:*:*", "cpeNameId": "29914586-1720-4AE1-A204-01432051782B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.162:*:*:*:*:*:*:*", "cpeNameId": "FBE6A9B7-94E5-456F-B336-59EE1C9C62E5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.163:*:*:*:*:*:*:*", "cpeNameId": "31DF5109-302D-4C99-BF27-7752453D8B5E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.164:*:*:*:*:*:*:*", "cpeNameId": "3262D873-56B3-449E-A70A-17DA2F4D9382"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.165:*:*:*:*:*:*:*", "cpeNameId": "21C9EF71-018C-41DE-ADCD-FF6A38C77E4C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.166:*:*:*:*:*:*:*", "cpeNameId": "46897616-FAB1-4E27-8F2B-7B59CF5B96D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.167:*:*:*:*:*:*:*", "cpeNameId": "2547AA22-645F-4613-A353-93431C5784F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.168:*:*:*:*:*:*:*", "cpeNameId": "FF6BB8B3-8746-4110-9FFC-C8FA51F8CD8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.169:*:*:*:*:*:*:*", "cpeNameId": "76B2AC55-7FE1-4EB6-B66F-AA2DA71D67CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.170:*:*:*:*:*:*:*", "cpeNameId": "E8A369DE-6CF8-43BF-ACC2-34CCEAAEADEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.171:*:*:*:*:*:*:*", "cpeNameId": "192DCF0D-9152-475F-828E-817AD9C86E8B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.172:*:*:*:*:*:*:*", "cpeNameId": "DF8383A9-7BF3-473B-9EE1-38C0FB296913"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.173:*:*:*:*:*:*:*", "cpeNameId": "7AB9EEF7-D575-4CB3-B57E-173AE0807897"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.174:*:*:*:*:*:*:*", "cpeNameId": "2658DE93-2BC0-4AC0-86D9-0487D4571A3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.175:*:*:*:*:*:*:*", "cpeNameId": "9C9415F0-7A65-436A-AAD8-31F99B9D7389"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.176:*:*:*:*:*:*:*", "cpeNameId": "1D0378DF-6D92-4307-904F-C66E45A7951E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.177:*:*:*:*:*:*:*", "cpeNameId": "EAE9A661-784D-4767-AF9B-7FBFA7D82738"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.178:*:*:*:*:*:*:*", "cpeNameId": "C17A6F7B-CD4A-49F4-A75B-B67338DDDDD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.179:*:*:*:*:*:*:*", "cpeNameId": "E79DFC9A-C359-4DD6-990B-2174E5B0024A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.180:*:*:*:*:*:*:*", "cpeNameId": "0A2AFA9A-832F-4C6C-BF9A-7C5A1C0E4FCA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.181:*:*:*:*:*:*:*", "cpeNameId": "4ED76815-B1FF-4FF7-B33D-4CC39C1A3948"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.182:*:*:*:*:*:*:*", "cpeNameId": "094B86B6-B8A4-408E-93F5-7514E0889F80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.183:*:*:*:*:*:*:*", "cpeNameId": "0ECF42BB-D201-4ED6-BA24-8B3A388564DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.184:*:*:*:*:*:*:*", "cpeNameId": "588AC0CC-AEA3-4230-8820-D46E13AFED1A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.185:*:*:*:*:*:*:*", "cpeNameId": "1B6E85FD-9863-43D4-830D-C46AC7CF8EA5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.186:*:*:*:*:*:*:*", "cpeNameId": "E1320383-8026-48C2-AA55-3D6DD4C91761"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.187:*:*:*:*:*:*:*", "cpeNameId": "78BC22D4-F955-4AC6-A00F-AD4832C1F2FA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.188:*:*:*:*:*:*:*", "cpeNameId": "E562975C-CD47-45F9-815A-F1549043871A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.189:*:*:*:*:*:*:*", "cpeNameId": "9F7D5828-8590-4C04-9BA2-03D8A9265783"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.190:*:*:*:*:*:*:*", "cpeNameId": "052F6967-B479-47A5-B705-66ADF5BAE5B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.191:*:*:*:*:*:*:*", "cpeNameId": "E6E1C494-101F-4F6C-B9F9-453EF9EC7D30"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.192:*:*:*:*:*:*:*", "cpeNameId": "A1A79F09-A517-41C9-81E2-0D1B960AC8E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.193:*:*:*:*:*:*:*", "cpeNameId": "329B75BA-C9CB-4193-A56B-4C175431194D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.194:*:*:*:*:*:*:*", "cpeNameId": "B3CC767E-10C4-4966-8921-50BB6E99E682"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.195:*:*:*:*:*:*:*", "cpeNameId": "BDAF83E0-E596-47CA-9FD5-E310643531AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.196:*:*:*:*:*:*:*", "cpeNameId": "B52AB3E0-7C8A-4E9B-9AB7-970D110AD689"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.197:*:*:*:*:*:*:*", "cpeNameId": "A98AABF5-2C66-4202-8CC8-7BD6A5BD206C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.198:*:*:*:*:*:*:*", "cpeNameId": "D2FB7CC8-3184-4B7B-8F15-206D478B957B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.199:*:*:*:*:*:*:*", "cpeNameId": "F17EC735-6954-48DE-9B79-129B113894DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.200:*:*:*:*:*:*:*", "cpeNameId": "215BF96E-9953-4137-9343-E664467C544B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.201:*:*:*:*:*:*:*", "cpeNameId": "4F5AA1AE-A206-4735-811F-D278CE94F425"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.202:*:*:*:*:*:*:*", "cpeNameId": "21709E5C-334E-4C9A-93FC-D33A6A234EBE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.203:*:*:*:*:*:*:*", "cpeNameId": "90B8792D-F589-4658-8105-D62452F51118"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.204:*:*:*:*:*:*:*", "cpeNameId": "783138D6-77F2-42BD-B712-64D5E3069478"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.205:*:*:*:*:*:*:*", "cpeNameId": "FDFF6DBF-A75C-45BA-A6EB-7EE625C06625"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.206:*:*:*:*:*:*:*", "cpeNameId": "3AFE0482-4EE2-4916-B1D9-6164C7CE9424"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.207:*:*:*:*:*:*:*", "cpeNameId": "B70FE32B-60B4-491B-BE0C-1709EFA5893C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.208:*:*:*:*:*:*:*", "cpeNameId": "0B61E6D6-2C0A-41BF-A847-2A0989F51690"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.209:*:*:*:*:*:*:*", "cpeNameId": "FAD83EB2-0BC4-4AD0-B7D0-84D486786E11"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.210:*:*:*:*:*:*:*", "cpeNameId": "4F085545-FA13-4D9D-ACC8-F268C0942C68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.211:*:*:*:*:*:*:*", "cpeNameId": "1110C146-0596-4E9A-9D9A-759EEE029BE7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.212:*:*:*:*:*:*:*", "cpeNameId": "C4725039-FE74-42A4-8F28-71890581F507"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.213:*:*:*:*:*:*:*", "cpeNameId": "01623D91-F403-4331-8911-FC3D9F207EEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.214:*:*:*:*:*:*:*", "cpeNameId": "6E428F60-24AE-403A-918B-A89C96B757C7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.215:*:*:*:*:*:*:*", "cpeNameId": "3800AEF1-ED61-41F4-9D70-EA3E0B77361D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.216:*:*:*:*:*:*:*", "cpeNameId": "0E9E733E-B81F-4112-AD2F-CE938439024B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.217:*:*:*:*:*:*:*", "cpeNameId": "48B7E2F6-5130-443C-8771-BE9DCDFBDD10"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.218:*:*:*:*:*:*:*", "cpeNameId": "3B485A54-4F57-4E7C-B620-A82938273FA7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.219:*:*:*:*:*:*:*", "cpeNameId": "C7F27EB7-A65A-45A2-A904-9F60507D342A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.220:*:*:*:*:*:*:*", "cpeNameId": "447A4E02-26AC-4CA2-B76D-B3508CF9B860"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.221:*:*:*:*:*:*:*", "cpeNameId": "436B2D40-F48C-4162-99D2-30D16807E3B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.222:*:*:*:*:*:*:*", "cpeNameId": "6BF3B63B-B671-44C8-8CBC-9FD21CA0E820"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.223:*:*:*:*:*:*:*", "cpeNameId": "121ACF12-28C3-4E2A-88C5-D5EF13920A90"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.224:*:*:*:*:*:*:*", "cpeNameId": "A67E472A-DC6E-4691-B5F1-225DE7946514"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.225:*:*:*:*:*:*:*", "cpeNameId": "CD10FD8D-0844-48A8-986D-33CA0DB5B3AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.226:*:*:*:*:*:*:*", "cpeNameId": "A11586F3-BA48-43B1-B808-2FD2280550F7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.227:*:*:*:*:*:*:*", "cpeNameId": "D3DD83A4-36EB-4F6B-86DB-524C91470807"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.229:*:*:*:*:*:*:*", "cpeNameId": "B816AFF0-A9B1-4F57-93E1-BB2D2A273A68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.230:*:*:*:*:*:*:*", "cpeNameId": "A940CCEF-1858-4FB9-BEC7-C2CD5A8DA5C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.244:*:*:*:*:*:*:*", "cpeNameId": "CA513596-6180-494F-A47C-4DC449B53BB7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:*:*:*:*:*:*:*", "cpeNameId": "63BC1E47-0228-41F4-989F-B4714260762B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:-:*:*:*:*:*:*", "cpeNameId": "BEEBF8B2-4493-470F-90B7-A9A57717C54C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:rc1:*:*:*:*:*:*", "cpeNameId": "AC145652-F483-4B19-B8C4-624F28E03010"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:rc2:*:*:*:*:*:*", "cpeNameId": "B9AE2C09-C300-4B2D-A5A7-E5D4CE11A0F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:rc3:*:*:*:*:*:*", "cpeNameId": "24855508-8DA6-4CA8-9B38-21B1C4505824"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:rc4:*:*:*:*:*:*", "cpeNameId": "B5E9A0D7-9681-4F6C-BBE8-30403B1C6F83"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:rc5:*:*:*:*:*:*", "cpeNameId": "95BCDE4B-2F7F-4F21-A2F1-A30E9C6370D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:rc6:*:*:*:*:*:*", "cpeNameId": "F455B799-C4F3-4B7A-8B65-0383984C3717"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:rc7:*:*:*:*:*:*", "cpeNameId": "1F290906-F5FA-45DF-922F-62ECC063EA76"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.1:*:*:*:*:*:*:*", "cpeNameId": "34D4AA87-9172-4704-BEA7-9DDEB516DB84"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.2:*:*:*:*:*:*:*", "cpeNameId": "8BF52BA5-E253-4CDD-A135-1531A86D543E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.3:*:*:*:*:*:*:*", "cpeNameId": "145EB557-D73C-47BB-87A6-B7029FA35A40"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.4:*:*:*:*:*:*:*", "cpeNameId": "7EEB122E-2E7E-4662-8AF2-B5F702EA3A6A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.5:*:*:*:*:*:*:*", "cpeNameId": "A3738040-9287-4A85-AE74-8E90D460C227"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.6:*:*:*:*:*:*:*", "cpeNameId": "C1C5E2C0-BA06-4A09-8063-F0CA9FC0ABFE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.7:*:*:*:*:*:*:*", "cpeNameId": "F2C4DB30-0C29-4A72-ACAD-AC339F102D29"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.8:*:*:*:*:*:*:*", "cpeNameId": "B8F6A213-C6B1-442B-BB9F-2B987BDEA023"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.9:*:*:*:*:*:*:*", "cpeNameId": "54EA37D0-6527-4F8B-A416-2ADF4F749CF8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.10:*:*:*:*:*:*:*", "cpeNameId": "620126E3-8499-4B1E-A182-2E3AF06B336B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.11:*:*:*:*:*:*:*", "cpeNameId": "193D233C-D3F2-4B20-AFFF-7B602948094F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.12:*:*:*:*:*:*:*", "cpeNameId": "90F5A23D-3E38-40C2-B5F8-8F4D6C1FA3E7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.13:*:*:*:*:*:*:*", "cpeNameId": "2B0BFF44-FCAF-4E26-BEB4-6F302ECCC398"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.14:*:*:*:*:*:*:*", "cpeNameId": "6F1AF9D1-837E-4681-A1B5-DBE553BB65DE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.15:*:*:*:*:*:*:*", "cpeNameId": "B9251847-EA27-4EBA-B9F3-1162156DBDFA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.16:*:*:*:*:*:*:*", "cpeNameId": "16A3579F-40D9-4FB0-B7D3-54FC47821FE8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.17:*:*:*:*:*:*:*", "cpeNameId": "BDFD9B25-4336-4D39-8C82-48867CB816ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.18:*:*:*:*:*:*:*", "cpeNameId": "82BF44C5-7264-4478-B8FC-06100D67440C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.19:*:*:*:*:*:*:*", "cpeNameId": "B4AE9BDA-08FC-43E5-B69A-12D179D1F0F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.20:*:*:*:*:*:*:*", "cpeNameId": "9FA3583C-D6CB-4E2D-8807-AD4BE72A8400"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.21:*:*:*:*:*:*:*", "cpeNameId": "4C39A0D8-85D6-4087-A5C7-E31B4763C30E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.22:*:*:*:*:*:*:*", "cpeNameId": "3734E58B-67DE-4CFE-8A0A-E198902F5EF3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12:-:*:*:*:*:*:*", "cpeNameId": "909AE298-650A-40FC-89B6-3C9B84F18D0D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12:rc1:*:*:*:*:*:*", "cpeNameId": "2DF254E6-DCA2-415F-A9CF-A8F8214C70C9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12:rc2:*:*:*:*:*:*", "cpeNameId": "28EA1789-0AA1-4DDF-8A3B-186FAE60250E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12:rc3:*:*:*:*:*:*", "cpeNameId": "18273D65-2C56-44F3-86BB-210E8183A30E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12:rc4:*:*:*:*:*:*", "cpeNameId": "1C698D86-842A-4A52-AC8A-0ACE001B6150"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12:rc5:*:*:*:*:*:*", "cpeNameId": "5DA86DC0-64A9-4E9C-A37C-A4EFB1764A84"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12:rc6:*:*:*:*:*:*", "cpeNameId": "DD2A90B7-FAAF-49E4-A5FE-F6E9ADF6A147"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12:rc7:*:*:*:*:*:*", "cpeNameId": "A990F6D8-E66C-4AD6-9606-71E2B8FB4CFE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.1:*:*:*:*:*:*:*", "cpeNameId": "7497D744-2E4C-45AD-9B58-D9ECD626175B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.2:*:*:*:*:*:*:*", "cpeNameId": "10641D0D-05A7-4B3D-82FB-FFE591B7DBD7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.3:*:*:*:*:*:*:*", "cpeNameId": "5AD0A9F1-5AD4-4ABB-A833-99BA7D351577"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.4:*:*:*:*:*:*:*", "cpeNameId": "4665239B-D45C-4558-9F54-695E98369E8C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.5:*:*:*:*:*:*:*", "cpeNameId": "8E690484-7C22-4011-9B03-9983E23095F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.6:*:*:*:*:*:*:*", "cpeNameId": "F9520114-68E1-4BB9-B088-7C1A27ACE515"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.7:*:*:*:*:*:*:*", "cpeNameId": "AD1AB54E-70EA-4B7E-B7D9-87F45E7F87A9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.8:*:*:*:*:*:*:*", "cpeNameId": "8C5ABC42-12D2-499A-B6CC-C9B1E15AEA71"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.9:*:*:*:*:*:*:*", "cpeNameId": "46196B73-964E-4ABC-B0E5-48B5F5CB7BFF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.10:*:*:*:*:*:*:*", "cpeNameId": "36A6AB9B-68B3-4234-A8E6-74EC108A160C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.11:*:*:*:*:*:*:*", "cpeNameId": "A12D7920-D1CA-44DC-A290-E26C4FE41EEF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.12:*:*:*:*:*:*:*", "cpeNameId": "9794C38E-32C0-4EB8-B4FE-D02D6E4ECFEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.13:*:*:*:*:*:*:*", "cpeNameId": "B5621156-BE25-4483-A3D0-4DD273245B57"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.14:*:*:*:*:*:*:*", "cpeNameId": "D1BB4FE7-AF71-4FEF-BD81-A88B9E860487"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.15:*:*:*:*:*:*:*", "cpeNameId": "9B349C0E-D91F-485E-A777-06055A4DF1D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.16:*:*:*:*:*:*:*", "cpeNameId": "0101B6BB-6E04-4238-A384-245C8C831FE0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.17:*:*:*:*:*:*:*", "cpeNameId": "B70E75C0-1784-4F2D-9890-72635AD1ABC8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.18:*:*:*:*:*:*:*", "cpeNameId": "FC1C2672-396B-452C-97B1-6C7F0583CB21"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.19:*:*:*:*:*:*:*", "cpeNameId": "6CE0FEDB-F644-4A9C-A88A-8F9D69B58BBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.25:*:*:*:*:*:*:*", "cpeNameId": "E9B47122-76AA-45F9-9BA9-9AA7D47E1819"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13:-:*:*:*:*:*:*", "cpeNameId": "760A4977-F4EC-4445-8EED-8F3540557E96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", "cpeNameId": "789E9076-49A9-4149-A146-FFAB80FD6312"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", "cpeNameId": "510FD2D9-571A-4924-B0B5-266204ABEF00"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", "cpeNameId": "B7FC9139-392C-42D9-B092-06ADE363B7C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", "cpeNameId": "78FDEB4A-AC37-4CEB-90F2-69700A1DFCB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*", "cpeNameId": "2B4C5B22-5D8E-46CA-A9A7-D488F2847060"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13:rc6:*:*:*:*:*:*", "cpeNameId": "55D4CFE3-C4CD-4A45-A04A-BFDA91D27503"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13:rc7:*:*:*:*:*:*", "cpeNameId": "DD429168-8AFF-457A-A8A7-8723FDC00949"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.0-52:*:*:*:*:*:*:*", "cpeNameId": "292646CC-C335-4347-87AE-6E1555659B40"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.1:*:*:*:*:*:*:*", "cpeNameId": "30F1E081-ED8A-457C-8465-D9C070DF0721"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.2:*:*:*:*:*:*:*", "cpeNameId": "17573538-60C1-4BBE-8321-EDE2F7F0E1A3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.3:*:*:*:*:*:*:*", "cpeNameId": "E0E67EF3-1AC9-4F29-B215-A82FF3493F6D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.4:*:*:*:*:*:*:*", "cpeNameId": "C6A71459-E60F-4B6A-B838-AE055D002725"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.5:*:*:*:*:*:*:*", "cpeNameId": "2F2A9933-4925-48E1-A572-276C4704E76F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.6:*:*:*:*:*:*:*", "cpeNameId": "9B5FC7E8-F482-43BD-B50D-7371AB3D4692"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.7:*:*:*:*:*:*:*", "cpeNameId": "94B23D33-6B16-475B-BF18-12A4FD5BE981"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.8:*:*:*:*:*:*:*", "cpeNameId": "71FC3F52-9D0F-4FA1-BEC8-7E662B3F0865"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.9:*:*:*:*:*:*:*", "cpeNameId": "5F17B3D4-BEAA-4606-B54B-419BE8532261"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.10:*:*:*:*:*:*:*", "cpeNameId": "73EC9A1A-02F6-4D0A-993F-5F2F9277F242"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.11:*:*:*:*:*:*:*", "cpeNameId": "45FFC97B-0FB5-4F9F-8660-FDCF0FBD5166"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.12:*:*:*:*:*:*:*", "cpeNameId": "2C6FC6E4-806F-4C8F-BC99-E279D18A47F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.13:*:*:*:*:*:*:*", "cpeNameId": "EBA292BE-DC50-49A1-8C5B-284C05E30E80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.14:*:*:*:*:*:*:*", "cpeNameId": "950E8486-A34F-4B8C-B6B9-213FB5D2B553"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.15:*:*:*:*:*:*:*", "cpeNameId": "DD0ACE31-23BC-46AE-8C24-DDE99C1677FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.16:*:*:*:*:*:*:*", "cpeNameId": "7D6ABA87-CFF7-4467-B1EB-26F1B2C8CD86"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.17:*:*:*:*:*:*:*", "cpeNameId": "B6F4951C-AB24-43F3-8361-34CD2C0DA81E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.18:*:*:*:*:*:*:*", "cpeNameId": "C7B2B5A1-F367-42EA-BB1B-F03C29AE7228"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.19:*:*:*:*:*:*:*", "cpeNameId": "39AC74B5-3F06-44E2-8F03-3C3F552C6111"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14:-:*:*:*:*:*:*", "cpeNameId": "290B9F79-3C87-4725-9517-AF89CC5F87D6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14:rc1:*:*:*:*:*:*", "cpeNameId": "A83E7C0B-A2D1-46BB-A787-DF9B68EA842A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14:rc2:*:*:*:*:*:*", "cpeNameId": "3FC14149-AA1E-48B5-8F75-5B5DD861A257"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14:rc3:*:*:*:*:*:*", "cpeNameId": "FA98B0B7-3C8F-4AC4-96E2-C1ED5869C608"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14:rc4:*:*:*:*:*:*", "cpeNameId": "21FB0B0F-DD53-4505-A841-D56D4C98ADDA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14:rc5:*:*:*:*:*:*", "cpeNameId": "4DDE3D5C-B126-49B9-8255-B97A9F55DC75"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14:rc6:*:*:*:*:*:*", "cpeNameId": "AC770C18-100E-4D5A-8E7C-548B363374D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.1:*:*:*:*:*:*:*", "cpeNameId": "6ED5E726-F7B4-446F-8B58-8756B5D09D3A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.2:*:*:*:*:*:*:*", "cpeNameId": "EEEEDE36-29F0-45B2-A5AD-AC615F9ECBFE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.3:*:*:*:*:*:*:*", "cpeNameId": "820DBC02-C9B5-4003-84F4-6C88EE2C3161"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.4:*:*:*:*:*:*:*", "cpeNameId": "75EEBB8F-B653-4BE3-8748-7973BB51D982"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.5:*:*:*:*:*:*:*", "cpeNameId": "EB2BAAA7-D118-4EE4-8974-B5E91B2DD088"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.6:*:*:*:*:*:*:*", "cpeNameId": "A90AEBB1-634D-4E4C-9EB4-5A378DA9921E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.7:*:*:*:*:*:*:*", "cpeNameId": "713408CD-13C2-4E22-A7CF-1CFA01082262"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.8:*:*:*:*:*:*:*", "cpeNameId": "AF7173EC-5AA6-4152-ADE2-77F860F5DCBD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.9:*:*:*:*:*:*:*", "cpeNameId": "5C3FF227-DDB0-4ACE-9170-4BE4CDA39239"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.10:*:*:*:*:*:*:*", "cpeNameId": "B9A635C8-CD0F-4897-A6E6-11F42F597CF7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.11:*:*:*:*:*:*:*", "cpeNameId": "D302868E-99BB-4C0C-9EC5-22E0F2F7B58A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.12:*:*:*:*:*:*:*", "cpeNameId": "227CCDD9-0DA9-4E19-A3A0-98182C78A04D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.13:*:*:*:*:*:*:*", "cpeNameId": "BA9F4788-9EAB-4974-B38D-F49FA29FCAB7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.14:*:*:*:*:*:*:*", "cpeNameId": "30A4EDD4-FFDC-46D1-9525-65CE02584D95"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.15:*:*:*:*:*:*:*", "cpeNameId": "253EE3A7-BB19-4AC4-B7F6-9B50D49FE43B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.16:*:*:*:*:*:*:*", "cpeNameId": "CFD0FB79-CC87-491D-8B44-C835289F1FF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.17:*:*:*:*:*:*:*", "cpeNameId": "6D7A8649-F82D-4F46-8B54-B4A42730DC62"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.18:*:*:*:*:*:*:*", "cpeNameId": "F5056E34-3AA2-4E1D-9445-D36A5E9AC2AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.19:*:*:*:*:*:*:*", "cpeNameId": "173C2A8A-1254-4EA0-8FE0-266FB47C42E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.20:*:*:*:*:*:*:*", "cpeNameId": "91634B25-518C-487C-90FC-C295D8AEF303"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.21:*:*:*:*:*:*:*", "cpeNameId": "1188704C-1DAC-4A1B-876D-B462547A9A1D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15:-:*:*:*:*:*:*", "cpeNameId": "599716EA-4916-4E30-8C24-4C6384D09138"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*", "cpeNameId": "CC920260-1BAF-4237-9263-2BCB29AE387F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*", "cpeNameId": "E052153B-5861-4C61-8207-1ED350609920"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:*", "cpeNameId": "6DBE44D0-670B-4B11-93BC-5CE160AE79A0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15:rc4:*:*:*:*:*:*", "cpeNameId": "D2702E38-FC04-4035-9742-46E5C2C32FF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15:rc5:*:*:*:*:*:*", "cpeNameId": "A638E326-4ACA-4CBB-8541-3860AEC16C9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15:rc6:*:*:*:*:*:*", "cpeNameId": "3E354D0D-99D1-4D2E-A42D-66946B7130B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15:rc7:*:*:*:*:*:*", "cpeNameId": "3FA3424A-B73B-4456-B871-280BBF7DE793"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.0:*:*:*:*:*:*:*", "cpeNameId": "3B152660-5C53-45F1-82AE-702237DAC922"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.0-58:*:*:*:*:*:*:*", "cpeNameId": "06ABD7CB-C7BF-4F85-ABD4-36F90A9114F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.1:*:*:*:*:*:*:*", "cpeNameId": "C92526FC-5702-4551-95C4-5D185E57703A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.2:*:*:*:*:*:*:*", "cpeNameId": "A70688C6-4AA2-4110-BC86-CA9E324DF3EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.3:*:*:*:*:*:*:*", "cpeNameId": "64CD2A28-6AE0-4894-8B00-F5232E3C34A9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.3:-:*:*:*:*:*:*", "cpeNameId": "FE18FBEA-C217-402C-8731-7C387B4B3D7F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.4:*:*:*:*:*:*:*", "cpeNameId": "969BD4C0-B372-451B-9376-0CA5FB3C286F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.5:*:*:*:*:*:*:*", "cpeNameId": "7309FA34-EDC1-41D1-BB4E-09F09900678F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.6:*:*:*:*:*:*:*", "cpeNameId": "DA042DB6-921A-4071-A171-7D0C2BBBC8F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.7:*:*:*:*:*:*:*", "cpeNameId": "0E69D848-C6AF-45F1-B581-3435108E1E1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.8:*:*:*:*:*:*:*", "cpeNameId": "73679DB9-DB66-4D04-9362-9F7FDE3ED7DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.9:*:*:*:*:*:*:*", "cpeNameId": "A914D016-CDDA-4F8C-8D11-AD68CA078395"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.10:*:*:*:*:*:*:*", "cpeNameId": "B8732B41-FD4D-4BB5-B500-664C2BA3129F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.11:*:*:*:*:*:*:*", "cpeNameId": "A58F2B5E-D805-40E6-B2EC-38AB78F48EBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.12:*:*:*:*:*:*:*", "cpeNameId": "C570EA74-0498-4116-8B63-2E08DB9EAF91"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.13:*:*:*:*:*:*:*", "cpeNameId": "D43ECFE8-45FA-41D1-94B9-F6A3601D99C4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.14:*:*:*:*:*:*:*", "cpeNameId": "9B285A1E-C507-4EDB-A79D-7F3A707A00D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.15:*:*:*:*:*:*:*", "cpeNameId": "479523C1-5DFC-4ADF-88A9-60D25E740ECD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.16:*:*:*:*:*:*:*", "cpeNameId": "283D07E0-7CF7-428B-B5E7-F9F389F42621"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.17:*:*:*:*:*:*:*", "cpeNameId": "28209832-3CD5-4EB8-BFF7-94C00921B21A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.18:*:*:*:*:*:*:*", "cpeNameId": "C402A420-3087-4169-B118-B9576726F29A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.19:*:*:*:*:*:*:*", "cpeNameId": "71FF4C04-4676-4339-904C-E431CA842C9A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.20:*:*:*:*:*:*:*", "cpeNameId": "D3AC6061-A8AD-4B32-9631-AAD5AE8AE846"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.21:*:*:*:*:*:*:*", "cpeNameId": "01512FC7-2E77-4185-84AD-233C3850F0C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.22:*:*:*:*:*:*:*", "cpeNameId": "13950585-5CDE-450C-8569-0F629C7EDB2E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.23:*:*:*:*:*:*:*", "cpeNameId": "84D3D456-7CBD-4BB2-940D-07D97BA08C58"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.24:*:*:*:*:*:*:*", "cpeNameId": "4B07A2D0-5A94-41AD-8478-EB93089837BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.25:*:*:*:*:*:*:*", "cpeNameId": "4B57878E-85D9-4630-81F9-971E521E1D04"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.26:*:*:*:*:*:*:*", "cpeNameId": "10C93845-0531-404A-B632-86FC15D22E78"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.27:*:*:*:*:*:*:*", "cpeNameId": "6B435B64-AB1B-4029-B6A5-01DD5C19206F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.28:*:*:*:*:*:*:*", "cpeNameId": "101F745E-07DD-436D-9573-77D88FEE7DA8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.29:*:*:*:*:*:*:*", "cpeNameId": "2126A535-152D-4C7D-BEEC-5E05EFF76DBF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.30:*:*:*:*:*:*:*", "cpeNameId": "3D5050EC-725E-41E0-A0BB-89C5CC71ACC5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.31:*:*:*:*:*:*:*", "cpeNameId": "CADD5BFF-62AF-44DA-8433-F0221493495C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.32:*:*:*:*:*:*:*", "cpeNameId": "D41546A8-EBED-4F57-BD4A-9E1B2A5C17CC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.33:*:*:*:*:*:*:*", "cpeNameId": "2AD16C2A-38AA-4931-922E-B883B7574C58"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.34:*:*:*:*:*:*:*", "cpeNameId": "99C916A9-866D-4905-9878-8DD27F5E980D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.35:*:*:*:*:*:*:*", "cpeNameId": "5F3D2240-53BA-4C7D-8199-FE7F31339D4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.36:*:*:*:*:*:*:*", "cpeNameId": "FF57011F-9545-414B-B253-52F38B78B77A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.37:*:*:*:*:*:*:*", "cpeNameId": "606225EC-ECF3-4F47-91A8-7F9D17842D62"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.38:*:*:*:*:*:*:*", "cpeNameId": "4DB0EF0E-5BF0-47C3-A2F9-B3522AFF7190"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.39:*:*:*:*:*:*:*", "cpeNameId": "A08CEA1B-91C1-4711-BD80-0F7ADDE94BA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.40:*:*:*:*:*:*:*", "cpeNameId": "89D88D81-DD0E-43FD-B671-78B808D88647"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.41:*:*:*:*:*:*:*", "cpeNameId": "DD7E6E45-BF7C-46DF-958C-735232ECCBED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.42:*:*:*:*:*:*:*", "cpeNameId": "B2520F43-B7D8-4373-8869-07DCFD59FF11"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.43:*:*:*:*:*:*:*", "cpeNameId": "F16FC01A-7763-44B0-B502-4FC46DA358AF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.44:*:*:*:*:*:*:*", "cpeNameId": "030D2A9C-692A-4DB1-9D63-44DBCC0C68F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.45:*:*:*:*:*:*:*", "cpeNameId": "94C51A53-591C-4ED3-BBD6-7549EE1F8068"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.46:*:*:*:*:*:*:*", "cpeNameId": "ACC8D217-A7B0-4C18-9B70-FA0E5262BFB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.47:*:*:*:*:*:*:*", "cpeNameId": "191C3ACC-27A6-438E-9334-742147EFFBFE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.48:*:*:*:*:*:*:*", "cpeNameId": "8B81D3ED-5819-4470-BE97-D8DEA91AFBB3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.49:*:*:*:*:*:*:*", "cpeNameId": "BAF8556B-BB65-4F53-8EB5-059A294DCD67"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.50:*:*:*:*:*:*:*", "cpeNameId": "D99EABCA-D9E3-44D7-AF96-2D5F1474CD15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.51:*:*:*:*:*:*:*", "cpeNameId": "89386483-66E5-4C04-B476-C08F5BD6D0D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.52:*:*:*:*:*:*:*", "cpeNameId": "076DEA19-48DB-476C-8CFA-06ACE89F67EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.53:*:*:*:*:*:*:*", "cpeNameId": "E3AAC0BA-7638-428F-9D89-08A94750E9EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.54:*:*:*:*:*:*:*", "cpeNameId": "56A56B25-D086-4413-8692-A5882F02760F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.55:*:*:*:*:*:*:*", "cpeNameId": "4BF52F71-274C-4E09-9D64-84AAC8D6F67E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.56:*:*:*:*:*:*:*", "cpeNameId": "2D041A4C-8395-4B72-B6B7-06ECBA8E8693"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.57:*:*:*:*:*:*:*", "cpeNameId": "6B5C0E6D-8C22-41CE-8CF7-5A85861A47D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.58:*:*:*:*:*:*:*", "cpeNameId": "FCE4E1B8-7046-4626-A6D1-53B7095B20A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.59:*:*:*:*:*:*:*", "cpeNameId": "729B700C-BDB9-4DFB-A795-98DFBE32EEC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.60:*:*:*:*:*:*:*", "cpeNameId": "1D98E598-4BF4-43D6-904C-9290DDF06272"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.61:*:*:*:*:*:*:*", "cpeNameId": "6CCCAF65-435F-482C-BA22-7DDC145109F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.62:*:*:*:*:*:*:*", "cpeNameId": "B90909CA-2810-4537-A85A-4CBA4A6AF37C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.63:*:*:*:*:*:*:*", "cpeNameId": "6F0C3B38-C13C-4A80-9EBD-65AC9FCC8F9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.64:*:*:*:*:*:*:*", "cpeNameId": "F91D8B0C-B2AC-43A8-8D6C-536E4C07BDA3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.65:*:*:*:*:*:*:*", "cpeNameId": "4C75DDA0-056C-4560-B8F6-FD3A28965C0F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.66:*:*:*:*:*:*:*", "cpeNameId": "479D10C6-D8AE-4C6C-95D8-D4935062ACDA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.67:*:*:*:*:*:*:*", "cpeNameId": "ADBEA5B5-A3FF-4667-A57F-EAA8FBC5F51A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.68:*:*:*:*:*:*:*", "cpeNameId": "E5298249-E4F2-40FD-9A02-0FFE62A97655"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.69:*:*:*:*:*:*:*", "cpeNameId": "AF74FFF5-EACB-41FA-9DDE-6E9F7C2D49E9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.70:*:*:*:*:*:*:*", "cpeNameId": "626D6B66-055F-40EF-87D0-BCA1ACB41632"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.71:*:*:*:*:*:*:*", "cpeNameId": "13BB2C1F-A7E8-4FEA-802A-FCB5DB17689E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.72:*:*:*:*:*:*:*", "cpeNameId": "687ACBBC-002B-4A57-B0C5-495C006BF83A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.73:*:*:*:*:*:*:*", "cpeNameId": "2FFC61CE-E920-4907-9237-ADCB03CF57F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.74:*:*:*:*:*:*:*", "cpeNameId": "21586670-7837-44DE-98F5-E8664ECB39F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.75:*:*:*:*:*:*:*", "cpeNameId": "257AECB1-0BFD-4F2F-9E1D-8B99451293E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.76:*:*:*:*:*:*:*", "cpeNameId": "4C6C2994-8803-478D-98AD-268D0B994FD2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.77:*:*:*:*:*:*:*", "cpeNameId": "67B26A96-5B92-41D5-A933-110235C90FC2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.78:*:*:*:*:*:*:*", "cpeNameId": "93765A6E-5FF1-428E-B6DD-08E9761E4BC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.79:*:*:*:*:*:*:*", "cpeNameId": "1E46E1F7-EC81-48DB-8D87-615670C42211"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.80:*:*:*:*:*:*:*", "cpeNameId": "403BE072-9172-420B-A0DF-A011387FC467"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.81:*:*:*:*:*:*:*", "cpeNameId": "76501F14-5447-4316-96C1-406CBB85ACEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.82:*:*:*:*:*:*:*", "cpeNameId": "EC139CB2-1B4C-41BA-B74E-6E21D4C75A65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.83:*:*:*:*:*:*:*", "cpeNameId": "B82C5952-6221-4637-A4F9-27F26C848140"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.84:*:*:*:*:*:*:*", "cpeNameId": "6D9BBF85-E068-4434-9F1D-FC5E2BCCCE15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.85:*:*:*:*:*:*:*", "cpeNameId": "4DFB6EEB-3B7C-4BBE-9C57-22212F5CF117"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.86:*:*:*:*:*:*:*", "cpeNameId": "54FA7373-2A0F-441F-B2DE-D0026C9E6E2A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.87:*:*:*:*:*:*:*", "cpeNameId": "D2002224-68A5-4CEB-84E8-C68A68A70477"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.88:*:*:*:*:*:*:*", "cpeNameId": "240ADDF1-F9B5-4E8A-BB28-8D25FD6EAFAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.89:*:*:*:*:*:*:*", "cpeNameId": "E8949735-535C-4365-9E77-3F5AFA127F45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.90:*:*:*:*:*:*:*", "cpeNameId": "27480E5A-75A6-4924-AE94-56C368919E20"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.91:*:*:*:*:*:*:*", "cpeNameId": "F1444DEC-505C-4B47-89E1-558CA1FE252D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.92:*:*:*:*:*:*:*", "cpeNameId": "366E992F-2DEB-4B73-8D13-0AAA6CDAB1AA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.93:*:*:*:*:*:*:*", "cpeNameId": "8B194E4D-C302-4781-A3EB-287B9338BB49"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.94:*:*:*:*:*:*:*", "cpeNameId": "8C4F3FDB-C7D3-4FAF-ADC9-F9C48692180C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.95:*:*:*:*:*:*:*", "cpeNameId": "78DB19FE-CDF2-4493-934F-F78BAC1E3525"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.96:*:*:*:*:*:*:*", "cpeNameId": "BD7068CF-1BF4-4836-A365-A1CAA95D8492"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.97:*:*:*:*:*:*:*", "cpeNameId": "8D4F726D-1B15-4756-B043-23B295E50326"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.98:*:*:*:*:*:*:*", "cpeNameId": "26CC4C2E-D776-4C60-9E36-FCAC66C0CA93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.99:*:*:*:*:*:*:*", "cpeNameId": "FB96FD42-EA7B-4EA4-BE27-FB6AE67A19D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.100:*:*:*:*:*:*:*", "cpeNameId": "8D34EF8C-BCA7-4EC8-9C69-559A59897E86"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.101:*:*:*:*:*:*:*", "cpeNameId": "6675EF7C-AACC-4247-A01C-896C9A44CFB9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.102:*:*:*:*:*:*:*", "cpeNameId": "2FEF936B-B116-4F46-8301-200550628240"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.103:*:*:*:*:*:*:*", "cpeNameId": "DE221176-159A-4357-8F12-AC71670703B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.104:*:*:*:*:*:*:*", "cpeNameId": "C1896DF2-E302-460B-9502-CF7063E5DF9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.105:*:*:*:*:*:*:*", "cpeNameId": "9E101463-342E-4486-823F-3BC4BD391306"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.106:*:*:*:*:*:*:*", "cpeNameId": "CA88855E-C837-4947-93E0-B9D7F9B827E7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.107:*:*:*:*:*:*:*", "cpeNameId": "B13F0C93-E3E4-4641-9EAB-3EA2990A1C89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.108:*:*:*:*:*:*:*", "cpeNameId": "130C0395-CE35-4126-A645-AADC5CD80532"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.109:*:*:*:*:*:*:*", "cpeNameId": "45D1D3CB-FD9D-42FB-A1D3-534BC36E80EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.110:*:*:*:*:*:*:*", "cpeNameId": "A931A0BD-98A1-47EB-9A75-0E8789CD2174"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.111:*:*:*:*:*:*:*", "cpeNameId": "CED0554E-DE06-438B-BD20-D55AB97E2137"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.112:*:*:*:*:*:*:*", "cpeNameId": "01469DE3-F508-4F50-B7EF-CFFAF6B0244A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.113:*:*:*:*:*:*:*", "cpeNameId": "EE8A8B31-F5BC-463C-8C3F-F99C8605D124"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.114:*:*:*:*:*:*:*", "cpeNameId": "7555AB4A-AA90-4F9E-AC9A-522F0EBB84B6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.115:*:*:*:*:*:*:*", "cpeNameId": "37780F52-A144-418A-8605-87E836109FA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.116:*:*:*:*:*:*:*", "cpeNameId": "67C9CBE9-0CF6-4DC1-96C9-8B8D0C572C76"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.117:*:*:*:*:*:*:*", "cpeNameId": "ADB012DE-27D7-4796-A07A-55897A9208B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.118:*:*:*:*:*:*:*", "cpeNameId": "6CAF3A99-3538-4B78-AB6F-1FD5BC1D3731"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.119:*:*:*:*:*:*:*", "cpeNameId": "F62E2EC5-1929-49E3-8920-4EFC89470EF3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.120:*:*:*:*:*:*:*", "cpeNameId": "1ACD20AE-5810-4832-9596-E0F2B77F6DED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.121:*:*:*:*:*:*:*", "cpeNameId": "0840D171-E172-4AEB-9A04-748165172F57"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.122:*:*:*:*:*:*:*", "cpeNameId": "108F7161-9C83-4AF5-81CE-7210DBE16A3B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.123:*:*:*:*:*:*:*", "cpeNameId": "AFC5B1D0-7550-4CA6-B9D8-7362589804BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.124:*:*:*:*:*:*:*", "cpeNameId": "607A4975-DD27-45FB-8492-B2D610C8CE49"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.125:*:*:*:*:*:*:*", "cpeNameId": "7CFAB9E2-3565-4DBE-A4A3-F420E0E6F1B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.126:*:*:*:*:*:*:*", "cpeNameId": "934C84D4-9205-4231-918D-52F8653AD03A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.127:*:*:*:*:*:*:*", "cpeNameId": "94F04153-424F-4287-9D87-86D843B8EC6B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.128:*:*:*:*:*:*:*", "cpeNameId": "3A0743EE-08EE-4033-974B-534685606B8D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.129:*:*:*:*:*:*:*", "cpeNameId": "1851B737-51D3-44EC-BAD0-C326CB4B258A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.130:*:*:*:*:*:*:*", "cpeNameId": "5E3B9172-8C12-4171-BE40-947651A6C1D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.131:*:*:*:*:*:*:*", "cpeNameId": "68CDD386-3C55-4849-BFDD-71A5DF5ECF00"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.132:*:*:*:*:*:*:*", "cpeNameId": "3F25FB70-CBCF-4363-947B-8D0749D054A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.133:*:*:*:*:*:*:*", "cpeNameId": "183855CE-2982-4596-954A-C8AD340BB217"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.134:*:*:*:*:*:*:*", "cpeNameId": "2C960D3A-EB30-4662-92DE-2F4DCA1B61DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.135:*:*:*:*:*:*:*", "cpeNameId": "795D4E07-5632-4B2F-889E-52121C56C87A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.136:*:*:*:*:*:*:*", "cpeNameId": "39F63867-B3B8-4B11-8568-793FE9BF0657"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.137:*:*:*:*:*:*:*", "cpeNameId": "86AFC96E-5CC1-4C7C-8D07-20BF5FD72F51"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.138:*:*:*:*:*:*:*", "cpeNameId": "6D98B672-ABF1-4E6A-85CA-C98156AD289F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.139:*:*:*:*:*:*:*", "cpeNameId": "60BDBDA5-D58A-4E1E-87FB-110840F829F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.140:*:*:*:*:*:*:*", "cpeNameId": "44DCAB0F-015F-4450-9454-1B281A41F7FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.141:*:*:*:*:*:*:*", "cpeNameId": "3C8C0EA5-6615-4404-9C0E-507EA505E607"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.142:*:*:*:*:*:*:*", "cpeNameId": "AACA090B-6D25-4504-8EEF-02C1DA914B55"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.143:*:*:*:*:*:*:*", "cpeNameId": "04411AB1-68B2-43CF-8AAF-023A00274276"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.144:*:*:*:*:*:*:*", "cpeNameId": "D1A15124-7544-4990-8884-8EC08CBDB231"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.145:*:*:*:*:*:*:*", "cpeNameId": "DBDB8123-C794-42AF-B554-13E794244440"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.146:*:*:*:*:*:*:*", "cpeNameId": "CD3243D1-4C4E-424A-BCFE-7FAF5782049D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.147:*:*:*:*:*:*:*", "cpeNameId": "D14C7C5E-C636-4B9B-941A-1B5D3FE4AF3B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.148:*:*:*:*:*:*:*", "cpeNameId": "43B668A9-8ADC-487B-8857-F8CC74D99990"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.149:*:*:*:*:*:*:*", "cpeNameId": "8C6DF61D-1354-424F-88D4-C76B0044C4BA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.150:*:*:*:*:*:*:*", "cpeNameId": "405263B7-A847-493D-BAC8-67CDC081E8A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.151:*:*:*:*:*:*:*", "cpeNameId": "AFB5460A-5F15-4E58-A1D9-438F22B08C61"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.152:*:*:*:*:*:*:*", "cpeNameId": "6FD5D09F-908B-4EA6-ADDA-D5D4867282C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.153:*:*:*:*:*:*:*", "cpeNameId": "35BC07C8-138B-48CB-94C8-F4F2DE1CEA73"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.154:*:*:*:*:*:*:*", "cpeNameId": "104BA652-53EA-4BE7-AEF6-1E69DF5BAB94"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.155:*:*:*:*:*:*:*", "cpeNameId": "82D13E0C-C092-4C55-8F8E-A8EC9F7C5B28"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.156:*:*:*:*:*:*:*", "cpeNameId": "0208D826-E36F-43ED-94E2-47B3786BDA8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.157:*:*:*:*:*:*:*", "cpeNameId": "29BE7FF8-0D66-4613-9FF9-1491805EF6E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.158:*:*:*:*:*:*:*", "cpeNameId": "F0BD86B6-9DA2-4CB5-925F-AED18EA69B7A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.159:*:*:*:*:*:*:*", "cpeNameId": "1967C928-055E-41A6-9452-11327EFD81F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.160:*:*:*:*:*:*:*", "cpeNameId": "39762989-4F30-40E8-9958-8100639F003F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.161:*:*:*:*:*:*:*", "cpeNameId": "93EFCF93-5625-453D-B8C8-D532F2F6B2EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.162:*:*:*:*:*:*:*", "cpeNameId": "AD93992B-560A-4880-AB8E-2B12E1ED9CE6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.163:*:*:*:*:*:*:*", "cpeNameId": "9F1AF162-C909-4161-9860-93F52BA93C11"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.164:*:*:*:*:*:*:*", "cpeNameId": "E82128C3-95AC-4517-8595-90030EB8B1B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.165:*:*:*:*:*:*:*", "cpeNameId": "DD75A3C4-3B2C-47C3-8249-25430F6326F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.166:*:*:*:*:*:*:*", "cpeNameId": "C4AE610D-F204-40F4-9F0E-A12F96513628"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.167:*:*:*:*:*:*:*", "cpeNameId": "AD2CD499-D496-457D-B206-76DD055935D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.168:*:*:*:*:*:*:*", "cpeNameId": "D17DDC10-C0C2-4595-99AA-7D081F156E28"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.170:*:*:*:*:*:*:*", "cpeNameId": "68B1E403-BB7E-46D6-93FB-39CCDEC9F903"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.171:*:*:*:*:*:*:*", "cpeNameId": "20D00418-523B-451C-A87C-A7494767A55C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.172:*:*:*:*:*:*:*", "cpeNameId": "BF5B290A-52DC-4153-9821-1E04DA80704B"}]}} \ No newline at end of file diff --git a/cpematch/E7/E7E1C0E1-31B7-44B1-8D7C-EEBDD5CD88DD.json b/cpematch/E7/E7E1C0E1-31B7-44B1-8D7C-EEBDD5CD88DD.json new file mode 100644 index 00000000000..6dadea4879e --- /dev/null +++ b/cpematch/E7/E7E1C0E1-31B7-44B1-8D7C-EEBDD5CD88DD.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "E7E1C0E1-31B7-44B1-8D7C-EEBDD5CD88DD", "criteria": "cpe:2.3:a:cohesive:vns3:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.6.1", "versionEndExcluding": "6.2.8", "lastModified": "2025-01-09T16:11:30.153", "cpeLastModified": "2025-01-09T16:11:30.153", "created": "2025-01-09T16:11:30.153", "status": "Active", "matches": [{"cpeName": "cpe:2.3:a:cohesive:vns3:4.6.1:*:*:*:*:*:*:*", "cpeNameId": "358BB3B1-8166-4C9E-BC55-B6C8836DAB01"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:4.8.2:*:*:*:*:*:*:*", "cpeNameId": "096BE225-0955-428C-BB9E-6768A2D6E05F"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:4.8.3:*:*:*:*:*:*:*", "cpeNameId": "8FB360E0-3D8A-495C-9FE2-EFE858092785"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:4.8.4:*:*:*:*:*:*:*", "cpeNameId": "3CEA8CAB-855E-4C13-BBE0-87BB238332A1"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:4.9.1:*:*:*:*:*:*:*", "cpeNameId": "3E52CCCE-EC4B-4B1F-9EED-683B8EE4B31C"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:4.9.2:*:*:*:*:*:*:*", "cpeNameId": "05FD841A-B3A2-4AD6-A839-843A06569CF9"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:4.11.1:*:*:*:*:*:*:*", "cpeNameId": "07B6F6A4-6884-492C-BE4F-FAC2EC2D61CF"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:4.11.2:*:*:*:*:*:*:*", "cpeNameId": "B2CB1A92-3DEC-4608-943E-826220D10D07"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:4.11.3:*:*:*:*:*:*:*", "cpeNameId": "60466671-9906-4081-9AAB-655314B7B2D1"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:4.11.4:*:*:*:*:*:*:*", "cpeNameId": "01876784-5A72-4096-8571-9470DD79B788"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:5.0.0:*:*:*:*:*:*:*", "cpeNameId": "99BE33DA-50E2-4AFD-A9AA-30BA97087D82"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:5.0.1:*:*:*:*:*:*:*", "cpeNameId": "AA81F44E-E1BC-4437-82B3-CD21C7ADCFA5"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:5.0.2:*:*:*:*:*:*:*", "cpeNameId": "FF827E73-D70F-4165-81C0-AE372748ABB6"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:5.0.3:*:*:*:*:*:*:*", "cpeNameId": "9FEAB154-8580-4E1B-ABD2-70145750DBBA"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:5.0.4:*:*:*:*:*:*:*", "cpeNameId": "B6E6AA2B-C888-404C-9A9C-A57F24385DC9"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:5.0.6:*:*:*:*:*:*:*", "cpeNameId": "83BAF84D-ABAB-4741-9B69-DC163D519E68"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:5.0.7:*:*:*:*:*:*:*", "cpeNameId": "C5BB471B-4FA3-4C5A-BF64-DE4694F93508"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:5.0.8:*:*:*:*:*:*:*", "cpeNameId": "5CC4E172-B521-498B-B539-417010D4B612"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:5.1.1:*:*:*:*:*:*:*", "cpeNameId": "7BA6167F-167B-4595-9347-EB5FFFAEA037"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:5.1.2:*:*:*:*:*:*:*", "cpeNameId": "0AF507AC-2AA9-49EF-9CAB-17D23A301DCA"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:5.1.3:*:*:*:*:*:*:*", "cpeNameId": "67C7D4A8-EB1A-4B1A-A038-0576DD65BFD0"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:5.1.4:*:*:*:*:*:*:*", "cpeNameId": "ADD0104B-3A59-4A2F-AEB5-B54AC280B4DE"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:5.1.5:*:*:*:*:*:*:*", "cpeNameId": "DFCAF88C-6688-4467-B7B1-C54452468D3C"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:5.1.6:*:*:*:*:*:*:*", "cpeNameId": "409E003C-9D7A-4D5A-8201-2B87623488AB"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:5.1.7:*:*:*:*:*:*:*", "cpeNameId": "7FF01CF0-EFE7-4B2B-A033-BAAC2D598B97"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:5.1.8:*:*:*:*:*:*:*", "cpeNameId": "08856182-B2F7-4FD8-B46E-01C39BD75103"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:5.2.1:*:*:*:*:*:*:*", "cpeNameId": "7A4D6F64-8A86-46F3-9E09-ECDB23FDD0FD"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:5.2.2:*:*:*:*:*:*:*", "cpeNameId": "61C3EE64-DFD9-4AE0-A113-83232C7F9753"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:5.2.3:*:*:*:*:*:*:*", "cpeNameId": "7894B719-1840-4642-9E1C-B44C954F8D39"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:5.2.4:*:*:*:*:*:*:*", "cpeNameId": "EF2C8957-B7D0-40CC-91BF-F641DA5A8D0E"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:5.2.5:*:*:*:*:*:*:*", "cpeNameId": "CEBED3E9-F05C-4845-A641-8BF52D959F0E"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:5.2.6:*:*:*:*:*:*:*", "cpeNameId": "EF5F9E57-F4BC-4918-8143-D8DFEAC11061"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:5.2.7:*:*:*:*:*:*:*", "cpeNameId": "35634293-655F-4306-BD8E-90F29C8689B4"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:5.2.8:*:*:*:*:*:*:*", "cpeNameId": "316741B0-B141-46EC-A635-A9F45B5C438E"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:5.2.9:*:*:*:*:*:*:*", "cpeNameId": "F4A3FC47-FCC3-46D1-A577-C97F24F1B078"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:5.2.10:*:*:*:*:*:*:*", "cpeNameId": "045F2EDC-237E-4EC4-B24D-17C5285EC6C3"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:5.2.11:*:*:*:*:*:*:*", "cpeNameId": "5FBA2892-B6DF-43FA-8E0E-0D743697F52D"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:6.0.0:-:*:*:*:*:*:*", "cpeNameId": "D9A5F424-1861-4544-952F-498CC32D74A3"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:6.0.0:beta1:*:*:*:*:*:*", "cpeNameId": "7DAE354D-4A01-435D-9BB4-89B41D1DB5D3"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:6.0.0:beta2:*:*:*:*:*:*", "cpeNameId": "6603516D-2E70-498F-87DF-6BA26304EDC0"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:6.0.0:beta3:*:*:*:*:*:*", "cpeNameId": "CC46EEAA-1E46-413A-8B5F-1DE98FF554EE"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:6.0.0:beta4:*:*:*:*:*:*", "cpeNameId": "466C18CD-DFFD-4C7F-87F7-7524A4A5C840"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:6.0.0:beta5:*:*:*:*:*:*", "cpeNameId": "2EC84C90-246B-4B4D-A0D0-171743D6B13E"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:6.0.0:beta6:*:*:*:*:*:*", "cpeNameId": "A84DE79D-1EE2-4BAB-B214-8248090ED645"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:6.0.0:preview_release:*:*:*:*:*:*", "cpeNameId": "92EEF4B6-81DD-4315-B3D0-DE6C80DB8183"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:6.0.1:*:*:*:*:*:*:*", "cpeNameId": "302931C7-3A51-440B-A469-90D298BFE757"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:6.0.2:*:*:*:*:*:*:*", "cpeNameId": "01CAA627-7C4B-4BC1-98C8-BCD7B023FC81"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:6.0.3:*:*:*:*:*:*:*", "cpeNameId": "15B8B2B7-FCAA-4802-B004-A227D55BF559"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:6.0.4:*:*:*:*:*:*:*", "cpeNameId": "AC7F26E4-D61A-4ED0-BF43-2312C77B090C"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:6.0.5:*:*:*:*:*:*:*", "cpeNameId": "D242DD71-0DD7-4F38-87BE-FB828E3C33C6"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:6.0.6:*:*:*:*:*:*:*", "cpeNameId": "520A61DB-57AD-41EE-AC24-129BE9854148"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:6.0.7:*:*:*:*:*:*:*", "cpeNameId": "6550E3F9-189F-425A-AA66-E6A8DADCE748"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:6.0.8:*:*:*:*:*:*:*", "cpeNameId": "B142F46F-DFEF-48DC-89EC-98709269C9BF"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:6.0.9:*:*:*:*:*:*:*", "cpeNameId": "DF9B5082-DEF8-4D4F-A4F0-F6DA196045CC"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:6.0.10:*:*:*:*:*:*:*", "cpeNameId": "F9446E8C-C222-48DC-8F0B-AC8366E66FA7"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:6.0.11:*:*:*:*:*:*:*", "cpeNameId": "C48F9C2A-510E-42B8-97AF-4B33DAD56AC4"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:6.0.12:*:*:*:*:*:*:*", "cpeNameId": "EA888B1E-7D28-441D-8360-318C1D4B4B48"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:6.0.13:*:*:*:*:*:*:*", "cpeNameId": "A4B1FBDD-64EC-4EDB-92E9-9F28DC644E56"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:6.0.14:*:*:*:*:*:*:*", "cpeNameId": "7A649FDF-35DA-4BB9-A76E-42C99C2C9016"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:6.0.15:*:*:*:*:*:*:*", "cpeNameId": "A186AD0C-0EF0-4984-8CF6-D3AC93E31392"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:6.0.17:*:*:*:*:*:*:*", "cpeNameId": "A728C821-9109-45E3-852E-E062B260A51C"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:6.0.18:*:*:*:*:*:*:*", "cpeNameId": "8DC76C44-1D63-4400-85F4-329BC359D95B"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:6.0.19:*:*:*:*:*:*:*", "cpeNameId": "0E40BB40-D5D6-49C0-991B-ED4B12FADDA5"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:6.1.1:*:*:*:*:*:*:*", "cpeNameId": "07A88508-3CEC-4830-A8A0-53894F22B059"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:6.1.2:*:*:*:*:*:*:*", "cpeNameId": "EEDC1C47-4AF4-4D77-A1D8-21B1422E0D57"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:6.1.3:*:*:*:*:*:*:*", "cpeNameId": "88232CD6-F70B-44D9-8DF9-FC860AD35349"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:6.1.4:*:*:*:*:*:*:*", "cpeNameId": "9C79DB8E-C013-4EB2-B10F-CBEA03900C02"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:6.1.5:*:*:*:*:*:*:*", "cpeNameId": "5E90AA7F-F586-4D45-AB8D-C086719429EB"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:6.1.6:*:*:*:*:*:*:*", "cpeNameId": "B8D0E5FC-0B12-44C7-BBDD-C7D55F137199"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:6.1.8:*:*:*:*:*:*:*", "cpeNameId": "823AF083-58EE-4B19-A45F-E2E1070DACA2"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:6.1.9:*:*:*:*:*:*:*", "cpeNameId": "22B5B0EB-8DCE-4B99-B53D-190070DA57ED"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:6.2.3:*:*:*:*:*:*:*", "cpeNameId": "47B736AF-7A04-48C7-9B35-C7D56FE695E0"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:6.2.4:*:*:*:*:*:*:*", "cpeNameId": "407FF127-453B-49CC-B95B-12063E5F5D23"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:6.2.5:*:*:*:*:*:*:*", "cpeNameId": "C04EF515-01D9-43C6-8C94-2E9A1359DCE7"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:6.2.6:*:*:*:*:*:*:*", "cpeNameId": "714F59A0-9B10-4D9E-8B6F-2963E0E743C1"}, {"cpeName": "cpe:2.3:a:cohesive:vns3:6.2.7:*:*:*:*:*:*:*", "cpeNameId": "E1731B41-7CDE-47CB-8B97-3B7BAC716A4C"}]}} \ No newline at end of file diff --git a/cpematch/E8/E8020715-FB14-459D-9D51-9A47297525D4.json b/cpematch/E8/E8020715-FB14-459D-9D51-9A47297525D4.json new file mode 100644 index 00000000000..def7ddf25fd --- /dev/null +++ b/cpematch/E8/E8020715-FB14-459D-9D51-9A47297525D4.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "E8020715-FB14-459D-9D51-9A47297525D4", "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.12.4", "lastModified": "2025-01-09T16:24:51.653", "cpeLastModified": "2025-01-09T16:24:51.653", "created": "2025-01-09T16:24:51.653", "status": "Active", "matches": [{"cpeName": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpeNameId": "0BA1AF04-98FA-4EBA-893B-700905C43151"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:arm32:*", "cpeNameId": "0EE3D2E5-A1B7-4DD3-9B6A-9CD7014FF769"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:x64:*", "cpeNameId": "DCBFE1ED-9B0D-4F9C-ABCF-0AFDFA24DFAF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:1.2.0:*:*:*:*:*:*:*", "cpeNameId": "B32F7327-3C28-46AF-A760-A97F8342EDDF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:1.3.0:*:*:*:*:*:*:*", "cpeNameId": "075A041A-12FA-4654-B47B-734E22DDA6EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0:*:*:*:*:*:*:*", "cpeNameId": "7D0752A5-4B86-4687-A0AD-426F0B482760"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.0:*:*:*:*:*:*:*", "cpeNameId": "1E8D4989-C88F-470C-995B-76266C3DCB41"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.1:*:*:*:*:*:*:*", "cpeNameId": "A47C7AE5-F9C5-4B97-9080-FA269969C7ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.2:*:*:*:*:*:*:*", "cpeNameId": "2D148A09-B342-44C5-83F2-82ACDB0D9D36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.3:*:*:*:*:*:*:*", "cpeNameId": "0DCEFF75-A4E4-465E-9129-449700F6D612"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.4:*:*:*:*:*:*:*", "cpeNameId": "DFB11C62-D1C9-46A9-BD73-EE49541EF221"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.5:*:*:*:*:*:*:*", "cpeNameId": "0718E25A-12B8-43A1-B194-51090D8C7BE2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.6:*:*:*:*:*:*:*", "cpeNameId": "BFE10CC5-D80F-45F0-BCBD-03D91A0BB813"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.7:*:*:*:*:*:*:*", "cpeNameId": "E97F701B-7C26-45E9-94BD-A4935B97C08C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.8:*:*:*:*:*:*:*", "cpeNameId": "4EBB4222-0272-4F04-BEDE-59BDD594D4BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.9:*:*:*:*:*:*:*", "cpeNameId": "C9BA0645-3011-4C47-B702-6F92D27D45F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.9.9:*:*:*:*:*:*:*", "cpeNameId": "88AAD11E-2E95-408D-8533-6469ECADAAE5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.10:*:*:*:*:*:*:*", "cpeNameId": "386F4D94-B4C9-4090-A7FC-2CB0D36C0144"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.11:*:*:*:*:*:*:*", "cpeNameId": "5623879D-00B9-4265-8DD3-13F81E0645EE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.12:*:*:*:*:*:*:*", "cpeNameId": "D0F0D9F5-86DD-4CEF-A3AF-FCF632039512"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.13:*:*:*:*:*:*:*", "cpeNameId": "65C670DA-5AA8-43C6-BCF8-17427620F5D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.14:*:*:*:*:*:*:*", "cpeNameId": "01E2C7E8-40E1-42AA-87FA-2C2FD1F3965D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.15:*:*:*:*:*:*:*", "cpeNameId": "EE508826-01D3-45CA-B3B3-F324DCF63DA8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.16:*:*:*:*:*:*:*", "cpeNameId": "16624148-BCB7-4F74-BCF2-061816DACD5A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.17:*:*:*:*:*:*:*", "cpeNameId": "0FB8086D-0000-4D37-B251-CB9B35391732"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.18:*:*:*:*:*:*:*", "cpeNameId": "48CC244C-257B-42CA-858B-07EDDAEF684A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.19:*:*:*:*:*:*:*", "cpeNameId": "CA1E8EFC-F60A-4D20-8D45-52DC2E0DF7D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.20:*:*:*:*:*:*:*", "cpeNameId": "1F8C9F53-0087-4BAF-BA7E-4661E53EAD5F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.21:*:*:*:*:*:*:*", "cpeNameId": "47FE9605-6EB9-4CAA-9B0D-DDA1DB8DFB54"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.22:*:*:*:*:*:*:*", "cpeNameId": "6020DCE2-C641-46A5-98AF-1497EA3169D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.23:*:*:*:*:*:*:*", "cpeNameId": "AD8F7AC5-D687-40A4-8627-648EC213B739"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.24:*:*:*:*:*:*:*", "cpeNameId": "EF695863-F81E-4F32-9DB6-DA1100C6B483"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.25:*:*:*:*:*:*:*", "cpeNameId": "142CB40B-5526-4203-8134-703A36E7F632"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.26:*:*:*:*:*:*:*", "cpeNameId": "CBA0B441-1138-46E1-AE5C-87E32BD0436E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.27:*:*:*:*:*:*:*", "cpeNameId": "89EE4C84-747B-4183-80DF-B935F6F83FC8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.28:*:*:*:*:*:*:*", "cpeNameId": "63EA86AA-8541-4DF1-9BCA-87DE5878E150"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.29:*:*:*:*:*:*:*", "cpeNameId": "E37BA6E6-2743-4421-A874-87A3EC73BA45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.30:*:*:*:*:*:*:*", "cpeNameId": "A034B8CD-0E4F-4C45-B7E0-2592B85F4A99"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.31:*:*:*:*:*:*:*", "cpeNameId": "923D8336-E526-47E0-97D2-23DAF7546EB2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.32:*:*:*:*:*:*:*", "cpeNameId": "7BAA1656-DF02-497B-AAD1-DC406F6AE937"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.33:*:*:*:*:*:*:*", "cpeNameId": "7786B307-402C-4D73-84DE-8421F1C47FB1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.34:*:*:*:*:*:*:*", "cpeNameId": "8BA9CCF6-B8C9-47C3-8D62-81D0A796E896"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.35:*:*:*:*:*:*:*", "cpeNameId": "E891A639-0028-4188-A7C8-78AA49134BEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.36:*:*:*:*:*:*:*", "cpeNameId": "3CF54451-724A-4E7D-90B8-A430DB7EEBA9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.37:*:*:*:*:*:*:*", "cpeNameId": "7C3B4A2E-CBF4-463E-B1B2-8AE9F1583967"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.38:*:*:*:*:*:*:*", "cpeNameId": "151D2CE6-5AA2-47F6-BE4E-027FC0445AAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.0.39:*:*:*:*:*:*:*", "cpeNameId": "50855B79-B40B-4B9D-873C-EDF74D761634"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1:*:*:*:*:*:*:*", "cpeNameId": "DA5BA2A3-8137-49FD-8AD0-263174449A5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.0:*:*:*:*:*:*:*", "cpeNameId": "F4869021-EB2D-4597-9633-0C22F003063E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.1:*:*:*:*:*:*:*", "cpeNameId": "7A9C6B6F-5BCE-4DE6-9AEF-2A12A0EC39A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.2:*:*:*:*:*:*:*", "cpeNameId": "D8F24AA6-A4D0-4A76-9445-12AD00760FA5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.3:*:*:*:*:*:*:*", "cpeNameId": "C03BD68F-8DA6-4F4A-B5C2-6E4DBE062FF3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.4:*:*:*:*:*:*:*", "cpeNameId": "8183004F-62BF-430A-9DEC-E0807CD6185C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.5:*:*:*:*:*:*:*", "cpeNameId": "7D3547D6-4D24-46F3-8E6A-67C9E420ECD4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.6:*:*:*:*:*:*:*", "cpeNameId": "F4A8FD3D-F3C4-4FA1-8B0E-CC20E46A2D62"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.7:*:*:*:*:*:*:*", "cpeNameId": "862EC88F-9853-4A33-B17E-D8094CD31B56"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.8:*:*:*:*:*:*:*", "cpeNameId": "CD07C89A-9F4A-49E6-AB27-5F34B2D552AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.9:*:*:*:*:*:*:*", "cpeNameId": "DB9504AB-15ED-4062-9E60-FBBFCF1888D6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.10:*:*:*:*:*:*:*", "cpeNameId": "134D3BA3-2035-4F17-9566-D97B862CD9AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.11:*:*:*:*:*:*:*", "cpeNameId": "735F0903-F295-4B97-9947-557D3BE093F7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.12:*:*:*:*:*:*:*", "cpeNameId": "53201AAD-91C7-40CE-8E9B-ACE0D106E2A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.13:*:*:*:*:*:*:*", "cpeNameId": "9FA60CC4-E232-44BC-9B73-4D5DE031E9F7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.14:*:*:*:*:*:*:*", "cpeNameId": "7E824070-C18C-4908-B8BB-A00D0E5050CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.15:*:*:*:*:*:*:*", "cpeNameId": "96296B03-44CD-49B2-9683-6C2540C7D540"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.16:*:*:*:*:*:*:*", "cpeNameId": "0A45BEEA-FDD5-4214-A5E8-42A1B1E7362B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.17:*:*:*:*:*:*:*", "cpeNameId": "4FD3A061-B2CB-4794-8DFE-682617523474"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.18:*:*:*:*:*:*:*", "cpeNameId": "1D57DEB5-39D9-468B-AE0C-5B24B7E92811"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.19:*:*:*:*:*:*:*", "cpeNameId": "F57186BA-A3B2-4D96-AD1F-89014F339AEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.20:*:*:*:*:*:*:*", "cpeNameId": "E6493953-8B33-420B-AD52-DDD054D520A5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.21:*:*:*:*:*:*:*", "cpeNameId": "232A415E-5E6C-4D6E-B615-A7F985E05A98"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.22:*:*:*:*:*:*:*", "cpeNameId": "29689FC9-6BEC-4049-B0CF-850E0A3BFB23"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.23:*:*:*:*:*:*:*", "cpeNameId": "5D5E4A1A-C7A8-4C65-BDBA-F72806D163D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.24:*:*:*:*:*:*:*", "cpeNameId": "AD1B1508-8CB3-45DB-A85F-14BE2503FDBD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.25:*:*:*:*:*:*:*", "cpeNameId": "6678E6E5-46CB-4C1A-8092-1F5469AA6A41"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.26:*:*:*:*:*:*:*", "cpeNameId": "341B7403-FBD8-459E-950E-669683E3EA8F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.27:*:*:*:*:*:*:*", "cpeNameId": "D4DD4F90-598B-403D-B05F-10D212E88A76"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.28:*:*:*:*:*:*:*", "cpeNameId": "27FBBB4E-2CB5-41C2-8EBC-A7F4FB0220A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.29:*:*:*:*:*:*:*", "cpeNameId": "DB69395F-E5B5-4002-AA42-994905575ACD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.30:*:*:*:*:*:*:*", "cpeNameId": "695D96ED-7797-4E45-A038-854075B03949"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.31:*:*:*:*:*:*:*", "cpeNameId": "019345EE-5FE7-46DB-87AC-41ACAB0688B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.32:*:*:*:*:*:*:*", "cpeNameId": "42126205-9153-4DED-8736-2199AAFAFB9E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.33:*:*:*:*:*:*:*", "cpeNameId": "603095C9-4BAA-44E6-B7E2-BCE82FE73CE6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.34:*:*:*:*:*:*:*", "cpeNameId": "A802DB87-82C2-48A9-BE8D-4E1956F07F66"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.35:*:*:*:*:*:*:*", "cpeNameId": "9E00571C-02D6-4854-A3F1-9A93FD690491"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.36:*:*:*:*:*:*:*", "cpeNameId": "529CEF81-EDBE-45DA-BB39-10125CF3F345"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.37:*:*:*:*:*:*:*", "cpeNameId": "E4FEB542-8C07-45BE-9841-D222842BDC83"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.38:*:*:*:*:*:*:*", "cpeNameId": "6E54EE56-DB63-4F7F-9D3C-1197B3471A5B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.39:*:*:*:*:*:*:*", "cpeNameId": "75A07C05-F3F1-4548-9B92-1344A6DB2D63"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.40:*:*:*:*:*:*:*", "cpeNameId": "B1259C2A-174E-4D45-87DF-4C798DED7DD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.41:*:*:*:*:*:*:*", "cpeNameId": "6852A88D-858D-4F40-86B2-4CE1EE7B9572"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.42:*:*:*:*:*:*:*", "cpeNameId": "111D7D94-27E6-4C86-9B03-419FD7C240D6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.43:*:*:*:*:*:*:*", "cpeNameId": "C7D57BFE-E5D6-4BCA-A929-7A70A778B1D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.44:*:*:*:*:*:*:*", "cpeNameId": "5150F55B-F56A-4018-A7BB-A60048867056"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.45:*:*:*:*:*:*:*", "cpeNameId": "399A360D-E5A4-45D2-B0A0-596BDCBCE16F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.46:*:*:*:*:*:*:*", "cpeNameId": "29DED077-3E24-427C-9BCC-C7BCEF40AB4E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.47:*:*:*:*:*:*:*", "cpeNameId": "C4016B9C-A035-4EED-AA66-350AF4693458"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.48:*:*:*:*:*:*:*", "cpeNameId": "C9FBA8CF-B28D-43A7-9036-4ED6BAA7CC86"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.49:*:*:*:*:*:*:*", "cpeNameId": "CEA7A38C-3A20-4BC6-B421-FA39F0EBAB4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.50:*:*:*:*:*:*:*", "cpeNameId": "D3DDAA5D-9152-4A8E-8FAC-5DA6354EA8A9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.51:*:*:*:*:*:*:*", "cpeNameId": "5B1E05AB-39E9-41A9-BA25-A34017EBA743"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.52:*:*:*:*:*:*:*", "cpeNameId": "D38DA3F3-550D-430C-BED5-3BBA5E00AFB7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.53:*:*:*:*:*:*:*", "cpeNameId": "05DA0214-69E9-4D72-8EB2-A0E28B86A78B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.54:*:*:*:*:*:*:*", "cpeNameId": "BABF7F9E-D0A3-4B3F-BDD3-E047A0F62E78"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.55:*:*:*:*:*:*:*", "cpeNameId": "247F8E95-0A01-4C72-8385-85AC4C15DB9B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.56:*:*:*:*:*:*:*", "cpeNameId": "F59B9524-E1E3-44BD-BFF9-D4A8C06012E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.57:*:*:*:*:*:*:*", "cpeNameId": "971E8A0E-9329-4890-8381-B13996E42DA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.58:*:*:*:*:*:*:*", "cpeNameId": "5F03FBA6-2A33-46FB-ABA4-6EDE3B8CFF87"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.59:*:*:*:*:*:*:*", "cpeNameId": "073E8421-7D98-4CFF-BE86-EDA7A8698CD6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.60:*:*:*:*:*:*:*", "cpeNameId": "7385718A-3A95-4171-9CE7-F9D557110531"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.61:*:*:*:*:*:*:*", "cpeNameId": "68B08025-FBF2-43CB-A2D9-02A72228F125"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.62:*:*:*:*:*:*:*", "cpeNameId": "F1456C09-5C07-47E0-813F-17A430A637FF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.63:*:*:*:*:*:*:*", "cpeNameId": "A6682D39-9C6F-4D16-AE02-FFB7369A0D8C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.64:*:*:*:*:*:*:*", "cpeNameId": "3606F7A9-BF14-48B3-A244-A82BD796D27E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.65:*:*:*:*:*:*:*", "cpeNameId": "31D14F91-BBD8-4628-BC9D-9F6466312BA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.66:*:*:*:*:*:*:*", "cpeNameId": "0EC222A2-0409-4A3F-A023-6DE9616F2A50"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.67:*:*:*:*:*:*:*", "cpeNameId": "89F90F00-BD05-468C-AD0E-BC6A3C42329A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.68:*:*:*:*:*:*:*", "cpeNameId": "5B82AB56-AAA7-4BE7-9982-F2D5DF9F58D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.69:*:*:*:*:*:*:*", "cpeNameId": "55F6B784-B627-409F-A397-09EC85FDDE00"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.70:*:*:*:*:*:*:*", "cpeNameId": "6281CE1A-E38E-4600-85C7-ED8E7D3BF5F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.71:*:*:*:*:*:*:*", "cpeNameId": "20BB7AD1-2148-4356-AB63-CFF168ABB077"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.72:*:*:*:*:*:*:*", "cpeNameId": "AA673595-977E-42E1-9EB2-BCBC8C935D77"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.73:*:*:*:*:*:*:*", "cpeNameId": "C85C53AC-6DF8-46AF-8577-4C52BB4466DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.74:*:*:*:*:*:*:*", "cpeNameId": "C4195A7B-F187-4DFA-869E-6EFC37C15979"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.75:*:*:*:*:*:*:*", "cpeNameId": "F931B916-FC8D-4345-89D7-1131D1A262DE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.76:*:*:*:*:*:*:*", "cpeNameId": "1F18EFD5-05A9-4B23-8C14-5501156AC1F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.77:*:*:*:*:*:*:*", "cpeNameId": "CDA62841-541F-4C7C-A486-D04F1C1036EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.78:*:*:*:*:*:*:*", "cpeNameId": "29D0977D-CF1D-4BF5-8FA9-6C73AD1F065F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.79:*:*:*:*:*:*:*", "cpeNameId": "2C15BF5B-E3E5-4683-81F9-0A1B9A23B7DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.80:*:*:*:*:*:*:*", "cpeNameId": "57858A4E-E3F3-4B5C-B197-6E12B22C7962"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.81:*:*:*:*:*:*:*", "cpeNameId": "DDA3D523-E956-4887-ADEA-DC6A9FB31248"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.82:*:*:*:*:*:*:*", "cpeNameId": "F1282F02-E86D-4226-99B2-B39F1F06684B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.83:*:*:*:*:*:*:*", "cpeNameId": "796F54A2-D588-4117-AC25-79AF1E778377"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.84:*:*:*:*:*:*:*", "cpeNameId": "3123855C-D9BD-4495-A342-612FC3D40FC6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.85:*:*:*:*:*:*:*", "cpeNameId": "0AF6159E-76B9-498B-959A-9404DFE45033"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.86:*:*:*:*:*:*:*", "cpeNameId": "2F109F9F-6E2C-414E-A92D-051A4360F802"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.87:*:*:*:*:*:*:*", "cpeNameId": "9842D0D0-08F2-48D7-AA46-25002987FE0A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.88:*:*:*:*:*:*:*", "cpeNameId": "81FD3C05-3610-4722-A832-A94FE519518F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.89:*:*:*:*:*:*:*", "cpeNameId": "ACC41BAA-65A1-49AF-BC01-5BAC01A17368"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.90:*:*:*:*:*:*:*", "cpeNameId": "07CDD783-885D-4F85-8D89-158D04238D1C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.91:*:*:*:*:*:*:*", "cpeNameId": "8BB9BC65-751D-417E-A021-E7125437DA07"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.92:*:*:*:*:*:*:*", "cpeNameId": "25FDD825-2CE3-44CA-9322-1DD59C97472D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.93:*:*:*:*:*:*:*", "cpeNameId": "191D96F1-1BBD-4683-961F-9DE3A444D1B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.94:*:*:*:*:*:*:*", "cpeNameId": "49788D3F-160D-4352-8AF3-CCEFAD0E801B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.95:*:*:*:*:*:*:*", "cpeNameId": "622D9109-543C-485F-82B3-72A927C6EF13"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.96:*:*:*:*:*:*:*", "cpeNameId": "AC75305F-8552-4AC4-BBC7-5377540FCC6B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.97:*:*:*:*:*:*:*", "cpeNameId": "1C1555FB-46AE-4633-BD9A-78D862394025"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.98:*:*:*:*:*:*:*", "cpeNameId": "1BE7BFD3-E533-488A-82EF-B475141CCE6E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.99:*:*:*:*:*:*:*", "cpeNameId": "4DCC45FA-F87A-4968-AC04-C22FDDE14C16"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.100:*:*:*:*:*:*:*", "cpeNameId": "5B3AD9EF-3264-4C4D-8D25-AA9702653EE7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.101:*:*:*:*:*:*:*", "cpeNameId": "C7B88D9C-248D-461D-BBC5-A888443796B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.102:*:*:*:*:*:*:*", "cpeNameId": "9B419D35-AE67-477C-9D99-6748C2CA2D55"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.103:*:*:*:*:*:*:*", "cpeNameId": "1092A3CB-9C91-4AA9-AD08-59F3D26B68E3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.104:*:*:*:*:*:*:*", "cpeNameId": "8F6493E7-5E52-41F5-867A-C29BC50D1DD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.105:*:*:*:*:*:*:*", "cpeNameId": "E4E770C8-F311-4911-9027-D19481033916"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.106:*:*:*:*:*:*:*", "cpeNameId": "6252E44C-26D7-4015-B536-6ABBD43C83A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.107:*:*:*:*:*:*:*", "cpeNameId": "1BE0B8EA-CF54-4654-85A0-7B655A2DD67B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.108:*:*:*:*:*:*:*", "cpeNameId": "E4B80D52-8159-4A2E-9A7B-DA84A491264A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.109:*:*:*:*:*:*:*", "cpeNameId": "FA7EF58F-1CEA-414A-87F1-9B8E34F63E5C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.110:*:*:*:*:*:*:*", "cpeNameId": "ABB8CF0B-6E74-4F03-A426-042018C7C059"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.111:*:*:*:*:*:*:*", "cpeNameId": "9CBBF318-07D0-493D-A096-D26D507E523E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.112:*:*:*:*:*:*:*", "cpeNameId": "337FBDDB-5C05-45FB-BBBE-91D9AD0B73A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.113:*:*:*:*:*:*:*", "cpeNameId": "63A885E7-F288-41FB-89AB-FB24626824D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.114:*:*:*:*:*:*:*", "cpeNameId": "D49C62C8-8938-49BA-90F4-2C249B76DBBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.115:*:*:*:*:*:*:*", "cpeNameId": "2BA49A88-8F42-41CE-A628-EE02FC14F2E4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.116:*:*:*:*:*:*:*", "cpeNameId": "E3731923-4E3B-42A5-AE80-1EB299C90799"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.117:*:*:*:*:*:*:*", "cpeNameId": "FA801127-FCED-400B-A29E-C566F8B8F133"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.118:*:*:*:*:*:*:*", "cpeNameId": "BB55C4E2-CDF9-4821-8768-E0C587DE6DB2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.119:*:*:*:*:*:*:*", "cpeNameId": "653693DC-33AA-4229-9F9D-AE8DA97FFD72"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.120:*:*:*:*:*:*:*", "cpeNameId": "85DE6D16-0F84-48BF-BC75-9AEA2912BF05"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.121:*:*:*:*:*:*:*", "cpeNameId": "74954A8F-F42E-4566-B639-BC19108CE4B1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.122:*:*:*:*:*:*:*", "cpeNameId": "243DD1C7-3931-4BAE-B999-F201EF56BC0F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.123:*:*:*:*:*:*:*", "cpeNameId": "4DF34A4E-B62F-453A-B02D-48D0252DAD58"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.124:*:*:*:*:*:*:*", "cpeNameId": "9EE0EEB7-F547-473E-99FE-7A1ED3D06EF9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.125:*:*:*:*:*:*:*", "cpeNameId": "B820226E-293D-4400-AD4D-8FB3737E4AB1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.126:*:*:*:*:*:*:*", "cpeNameId": "F7854FF5-3889-4B05-8E67-3568BC48F6C2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.127:*:*:*:*:*:*:*", "cpeNameId": "5FEBF123-1596-4506-9AFC-729E3A8F5799"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.128:*:*:*:*:*:*:*", "cpeNameId": "4D17EF68-1C23-4775-AF3B-14D71E3A9B6B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.129:*:*:*:*:*:*:*", "cpeNameId": "27A443F4-355C-4696-8CE8-BF3F928FE282"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.130:*:*:*:*:*:*:*", "cpeNameId": "B0C390CA-BCEE-469B-9D23-6D44F3215AB9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.131:*:*:*:*:*:*:*", "cpeNameId": "B9376F0F-A3EB-45C4-A7DE-AD7F994FCAAB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.1.132:*:*:*:*:*:*:*", "cpeNameId": "22734EB4-A800-4393-BD9A-CAAE04E6B881"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.0:*:*:*:*:*:*:*", "cpeNameId": "13C4FC8B-F6B4-41F0-AC1C-937BC7EF18FA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.1:*:*:*:*:*:*:*", "cpeNameId": "40224E2D-7B43-48F2-B456-1B9BDF49B4D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.2:*:*:*:*:*:*:*", "cpeNameId": "B9027F20-ED15-4420-897C-2D77E2C2F8C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.3:*:*:*:*:*:*:*", "cpeNameId": "C80D1CD8-2BD6-4ECE-9B13-8F9CBF9C1CAE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.4:*:*:*:*:*:*:*", "cpeNameId": "50DB0290-A30A-4A23-A2C8-2A3FC722D153"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.4:-:*:*:*:*:*:*", "cpeNameId": "FF5F86F4-1E28-40F3-8E82-9C24907FAD3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.4:rc1:*:*:*:*:*:*", "cpeNameId": "14BE90D6-F00B-4F6C-A463-0F4DF51E6FBC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.5:*:*:*:*:*:*:*", "cpeNameId": "78885165-7DD5-4B28-A31A-FBEA3A5E10F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.6:*:*:*:*:*:*:*", "cpeNameId": "794634E8-0FF9-474B-BCDD-8FFA362537C2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.7:*:*:*:*:*:*:*", "cpeNameId": "FB84E920-9D4B-4B69-A907-CCAB65E78C05"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.8:*:*:*:*:*:*:*", "cpeNameId": "E3475366-F920-4E92-AEE9-40563183862B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.9:*:*:*:*:*:*:*", "cpeNameId": "BD6D83FB-D4B3-46C5-B037-78FFCC0CA090"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.10:*:*:*:*:*:*:*", "cpeNameId": "97AE4ED6-6C0F-4336-8A7B-36D7C8D58D78"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.11:*:*:*:*:*:*:*", "cpeNameId": "D709F8FA-D918-4712-95FF-B05FB4A32332"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.12:*:*:*:*:*:*:*", "cpeNameId": "051313B3-1587-451C-A644-C146F138FC76"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.13:*:*:*:*:*:*:*", "cpeNameId": "DD3795AB-5EAB-4200-96B9-4F80E854A16A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.13:-:*:*:*:*:*:*", "cpeNameId": "F4A65157-42C4-467A-AB6C-A92E272A28D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.13:pre15:*:*:*:*:*:*", "cpeNameId": "FAEBF03B-A612-4BE7-B0A7-B299384A78D6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.14:*:*:*:*:*:*:*", "cpeNameId": "F21D5BED-4B96-4749-9EED-EF14924C8B29"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.15:*:*:*:*:*:*:*", "cpeNameId": "D153944E-EFEC-45D3-80BF-859BC60BA635"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.15:-:*:*:*:*:*:*", "cpeNameId": "0B810E74-C3EF-4409-8068-B082386F06E4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.15:pre16:*:*:*:*:*:*", "cpeNameId": "6D0DF215-5C5E-4900-B921-3DEDB4C9263B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.16:*:*:*:*:*:*:*", "cpeNameId": "5D45F05D-E4CF-451F-AFF6-34FABA76C823"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.16:-:*:*:*:*:*:*", "cpeNameId": "2E448DEB-CE6B-474B-9F22-B9CEC1171E3E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.16:pre5:*:*:*:*:*:*", "cpeNameId": "59F23C3B-FEC8-4BAF-8029-1897B81272BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.16:pre6:*:*:*:*:*:*", "cpeNameId": "9211173D-6077-40CA-81FC-59F8D77C9890"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.17:*:*:*:*:*:*:*", "cpeNameId": "EC3FA70E-FD2A-4F16-A043-FC1AF08688B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.17:-:*:*:*:*:*:*", "cpeNameId": "89BD8996-FF8A-4ED4-A368-59A1A2E028FF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.17:pre14:*:*:*:*:*:*", "cpeNameId": "6242F3E2-4DFC-430E-882C-EFA051552CC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.18:*:*:*:*:*:*:*", "cpeNameId": "E7DA0099-EB96-4F50-8358-176D96B1F07D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.19:*:*:*:*:*:*:*", "cpeNameId": "2E4FFFBF-D5C1-4148-8D27-EDEEA7606E0F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.20:*:*:*:*:*:*:*", "cpeNameId": "0C5D3CE2-FFFA-491C-893C-8AD45D417C4F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.21:*:*:*:*:*:*:*", "cpeNameId": "C2F3ABFD-B35B-43C4-9A79-CC6494184B3B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.21:-:*:*:*:*:*:*", "cpeNameId": "275338FC-E82A-42A6-97AC-84E3B1354379"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.21:pre1:*:*:*:*:*:*", "cpeNameId": "9CB97665-1ABE-4DEB-B593-8F417D953693"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.21:pre2:*:*:*:*:*:*", "cpeNameId": "E17A8DCB-84EA-44AA-AB7A-1D2FE2ACFB57"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.21:pre3:*:*:*:*:*:*", "cpeNameId": "21884192-3FF0-4481-BE72-F6829668AAA4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.21:pre4:*:*:*:*:*:*", "cpeNameId": "058F7E60-02ED-488B-B459-D448999ADF94"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.21:rc1:*:*:*:*:*:*", "cpeNameId": "DD080096-4061-4AE3-8524-939C9843DA84"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.21:rc2:*:*:*:*:*:*", "cpeNameId": "2CFF9695-43FD-412E-8F6D-4505ABF081EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.21:rc3:*:*:*:*:*:*", "cpeNameId": "35CB955B-12D3-4B33-A212-45FD327D72C4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.21:rc4:*:*:*:*:*:*", "cpeNameId": "43DEE698-A725-41D5-8346-2C2E65FC6049"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.22:*:*:*:*:*:*:*", "cpeNameId": "6856B62F-5614-4AFD-BEAF-5FCEBF4C0D49"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.22:-:*:*:*:*:*:*", "cpeNameId": "C7CE2508-6250-495D-900C-0DA780E0BEAC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.22:rc1:*:*:*:*:*:*", "cpeNameId": "40EC7F3E-946B-4554-A7D4-222CE4672195"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.22:rc2:*:*:*:*:*:*", "cpeNameId": "29DCD7D9-D89E-4043-BBA3-4D61FBE12070"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.22:rc3:*:*:*:*:*:*", "cpeNameId": "B39A5411-C54A-4227-8457-74BECBAC5C18"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.23:*:*:*:*:*:*:*", "cpeNameId": "33BB0B9F-FF76-4B5C-A8FF-9935CA325FA4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.23:-:*:*:*:*:*:*", "cpeNameId": "31A3B878-E962-4031-BB6F-73958422545C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.23:rc1:*:*:*:*:*:*", "cpeNameId": "6D21A143-BADB-4601-9E00-34FCF81ACDBF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.23:rc2:*:*:*:*:*:*", "cpeNameId": "C6A5E759-0277-4733-ABF1-5612C7934BC6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.24:*:*:*:*:*:*:*", "cpeNameId": "2E8A4817-1AD7-4282-AADB-6C8C93B4E296"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.24:-:*:*:*:*:*:*", "cpeNameId": "B54F162F-BF50-4B5A-A91C-C4E43DD74AA4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.24:rc2:*:*:*:*:*:*", "cpeNameId": "9484FF19-FA04-4B10-8D99-5CBDF3A54E4D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.24:rc3:*:*:*:*:*:*", "cpeNameId": "772D3B39-3AAF-40C7-9787-8FF438BBAF5B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.24:rc4:*:*:*:*:*:*", "cpeNameId": "9F32508C-F21F-48AF-B33C-43A4DF42D7F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.24:rc5:*:*:*:*:*:*", "cpeNameId": "83DE2963-50A3-43B0-A0D7-85B2E7C8AA35"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.25:*:*:*:*:*:*:*", "cpeNameId": "8025A452-5260-476B-B0C8-991B42143C58"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.26:*:*:*:*:*:*:*", "cpeNameId": "6C2F0EF8-2392-45FF-8111-DADD78C904FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.27:-:*:*:*:*:*:*", "cpeNameId": "F69A41E0-C0AF-4962-8A77-4BFCE08A782E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.27:pre1:*:*:*:*:*:*", "cpeNameId": "89F0DB43-CA84-430A-95CC-49CAA09A6B2B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.27:pre2:*:*:*:*:*:*", "cpeNameId": "F0C58AFE-37C2-40EE-974E-21444F448F97"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.27:rc1:*:*:*:*:*:*", "cpeNameId": "6E6A4EAD-756C-4ABE-A253-CF39FD80CADA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.2.27:rc2:*:*:*:*:*:*", "cpeNameId": "878BBACB-F697-4935-AE53-DA015DEC8980"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.0:*:*:*:*:*:*:*", "cpeNameId": "6885DFBA-2302-4B86-B781-70298C5578CC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.1:*:*:*:*:*:*:*", "cpeNameId": "D5DD8818-9E53-400C-90BB-01099CB5C0BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.2:*:*:*:*:*:*:*", "cpeNameId": "9127467F-1841-43A9-ADD3-AF5A5F62A7D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.3:*:*:*:*:*:*:*", "cpeNameId": "9358DA4D-6117-4594-928C-3F1E853B232C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.4:*:*:*:*:*:*:*", "cpeNameId": "E57F3367-DB6B-4240-B5FA-AB7C4CFA49CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.5:*:*:*:*:*:*:*", "cpeNameId": "C6D254B9-7189-4947-A7BB-27AA4426CDB3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.6:*:*:*:*:*:*:*", "cpeNameId": "4B8BA1F4-C144-4605-8D9F-5733EF6DFDFC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.7:*:*:*:*:*:*:*", "cpeNameId": "2C2F8004-1C51-4F78-9807-3E4CC7F67AC2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.8:*:*:*:*:*:*:*", "cpeNameId": "3FC6518A-86A4-47F5-852A-167597E9D027"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.9:*:*:*:*:*:*:*", "cpeNameId": "14285535-B19A-4499-81E5-09235F64B40C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.10:*:*:*:*:*:*:*", "cpeNameId": "1829C195-B08C-4EC3-AE12-BB4645EFB49B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.11:*:*:*:*:*:*:*", "cpeNameId": "225ED22A-CF9E-45A8-B2FB-5EDFF5D1DA03"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.12:*:*:*:*:*:*:*", "cpeNameId": "8CFE2386-BF62-4778-825F-0F621492CBE4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.13:*:*:*:*:*:*:*", "cpeNameId": "1EA48224-9060-45AB-B697-8FC8A7629AEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.14:*:*:*:*:*:*:*", "cpeNameId": "B3920E7C-3DAC-406E-B5A7-2B4298C0E084"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.15:*:*:*:*:*:*:*", "cpeNameId": "63F1A1C7-6FF2-4189-896F-47D9C2FF7A65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.16:*:*:*:*:*:*:*", "cpeNameId": "80B26697-B044-45D6-AB99-08FE810646C9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.17:*:*:*:*:*:*:*", "cpeNameId": "47E8D67E-D9B5-45BB-9549-9AC6B43A0D8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.18:*:*:*:*:*:*:*", "cpeNameId": "32ADDC21-EDCD-428E-8015-D2E479E88AAF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.19:*:*:*:*:*:*:*", "cpeNameId": "79731EB0-0B01-4A1E-B451-1095138F101A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.20:*:*:*:*:*:*:*", "cpeNameId": "818CF9A0-EE53-4550-AC60-7E3EE0B8E678"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.21:*:*:*:*:*:*:*", "cpeNameId": "5C09F2E6-2A40-4DC2-8FF9-56DDE0BC4A1A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.22:*:*:*:*:*:*:*", "cpeNameId": "233C2A76-D5EC-4824-B10F-1D7655C2D578"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.23:*:*:*:*:*:*:*", "cpeNameId": "266E3C2D-D70B-4F6B-BE6B-909397E932A7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.24:*:*:*:*:*:*:*", "cpeNameId": "B3B84DE9-2D07-4D6F-976A-6B60FC10D2D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.25:*:*:*:*:*:*:*", "cpeNameId": "B3B43958-4B32-450D-A3A9-F93F219339F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.26:*:*:*:*:*:*:*", "cpeNameId": "8BFBAF02-EC4D-44C8-A752-50AACBA300A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.27:*:*:*:*:*:*:*", "cpeNameId": "0CFDA004-5E21-4FED-9DA0-8501AA176910"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.28:*:*:*:*:*:*:*", "cpeNameId": "B401D087-9FCD-4F53-A37E-5579A9FC27D7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.29:*:*:*:*:*:*:*", "cpeNameId": "52318DAD-5351-4823-A06F-984C28AE7B7C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.30:*:*:*:*:*:*:*", "cpeNameId": "E5405848-ACAD-4719-9E6C-6DFFCC559ADA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.31:*:*:*:*:*:*:*", "cpeNameId": "91A40219-12C1-4A39-918C-35769BB148DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.32:*:*:*:*:*:*:*", "cpeNameId": "2EDAB694-7FDD-4DA6-83F8-8C2B370D2389"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.33:*:*:*:*:*:*:*", "cpeNameId": "76F07DEA-92A3-4DDE-963C-11AC3B8DD0FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.34:*:*:*:*:*:*:*", "cpeNameId": "93584B0B-448C-4555-BA08-931D1CB18F12"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.35:*:*:*:*:*:*:*", "cpeNameId": "F821F5BB-25C4-4A4C-8C52-46238CCC4390"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.36:*:*:*:*:*:*:*", "cpeNameId": "7502F79C-1AE1-4782-81B9-36D71087CEB1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.37:*:*:*:*:*:*:*", "cpeNameId": "323C16CA-8499-438D-B838-ED4F7BA3AB5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.38:*:*:*:*:*:*:*", "cpeNameId": "79B12734-7C91-4D23-9172-DDF7004C4C5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.39:*:*:*:*:*:*:*", "cpeNameId": "83261266-EF03-423E-8786-ECA0D15575D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.40:*:*:*:*:*:*:*", "cpeNameId": "E7C31995-8FCB-43BF-B78C-6B5CD6D117A7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.41:*:*:*:*:*:*:*", "cpeNameId": "27C1D4F1-AA28-447B-8CE2-500F8CB64510"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.42:*:*:*:*:*:*:*", "cpeNameId": "CE72B4C4-C7B3-4008-92E6-34D670AA52F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.43:*:*:*:*:*:*:*", "cpeNameId": "BE45EF91-4154-4453-8148-159BEDCCED39"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.44:*:*:*:*:*:*:*", "cpeNameId": "1678C3C2-414B-497D-8144-75A45682A36C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.45:*:*:*:*:*:*:*", "cpeNameId": "B6DA579B-A5A0-40C7-8AA1-4440F4C61648"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.46:*:*:*:*:*:*:*", "cpeNameId": "676CA150-B5C0-4A55-8850-54A8D11FF583"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.47:*:*:*:*:*:*:*", "cpeNameId": "F0C3DFFB-F7F7-4465-A2C6-3122AE043C5C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.48:*:*:*:*:*:*:*", "cpeNameId": "17AC55BE-248B-4DB3-AB48-510E3C3CA5FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.49:*:*:*:*:*:*:*", "cpeNameId": "4F7665BF-DD6C-4BA9-AF78-22E1B273F8A0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.50:*:*:*:*:*:*:*", "cpeNameId": "C23F55C8-126E-4C56-B8FE-FC7FAE12C242"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.51:*:*:*:*:*:*:*", "cpeNameId": "9CCC5433-4B7D-42D5-B5CC-435A412AC581"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.99:*:*:*:*:*:*:*", "cpeNameId": "8BC66B77-A2F1-4297-9227-7B4E0816AB74"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.99:-:*:*:*:*:*:*", "cpeNameId": "152EE140-EB5C-4E61-BA75-B0474EBF3A58"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.99:pre1:*:*:*:*:*:*", "cpeNameId": "F69B39B4-0DD3-4DC8-A077-B2D67EC4D416"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.99:pre2:*:*:*:*:*:*", "cpeNameId": "C3E83FEB-BB0A-4C82-8DE2-A02F20F3320A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.99:pre3:*:*:*:*:*:*", "cpeNameId": "2353E47B-F4D6-4924-9EF7-4EF56FAAA72B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.99:pre4:*:*:*:*:*:*", "cpeNameId": "9EF97749-AC1B-4563-88DE-1E98B54280DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.99:pre5:*:*:*:*:*:*", "cpeNameId": "F77FEBD2-660A-43AE-A3C2-FDD03BF1019C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.99:pre6:*:*:*:*:*:*", "cpeNameId": "4E285E79-9C0E-46FE-9183-998F1143A604"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.99:pre7:*:*:*:*:*:*", "cpeNameId": "8AFE6D23-637C-44C2-BBC5-A537B0F800F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.99:pre8:*:*:*:*:*:*", "cpeNameId": "32647711-DE5E-4593-8810-82594D35C354"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.3.99:pre9:*:*:*:*:*:*", "cpeNameId": "ADB0A585-EB61-47F3-8A47-DB3D5225D9D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*", "cpeNameId": "FB317221-B926-4694-996D-C320D54E923E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.0:-:*:*:*:*:*:*", "cpeNameId": "3C7652E2-F955-4E7A-85F7-8158BEA2CD12"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*", "cpeNameId": "88AF315A-51ED-4ECA-BC81-CF3559C5C9B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*", "cpeNameId": "96EE8CF9-9892-4F3A-9DCB-41960117A8F7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*", "cpeNameId": "8D04D7E3-D059-4A4E-8CD0-B76FFC7D5978"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*", "cpeNameId": "B4951F0C-7B41-4405-9E58-945B5E680C8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*", "cpeNameId": "456AF411-A61A-4BB7-98D0-E9891D2DA01D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*", "cpeNameId": "996FC593-0E5E-4C17-A8A4-3C0BEC73D909"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*", "cpeNameId": "F70103F6-D472-4920-854D-F59DA88CE2CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*", "cpeNameId": "EA386B3A-D846-416D-82E2-DFA03B14E5A6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*", "cpeNameId": "7078E669-81FB-4C6B-853E-958C3FD1EFF9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*", "cpeNameId": "1C040CFE-8C6E-4491-88BF-F39BA1D314A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*", "cpeNameId": "40D26360-8A9B-4004-B821-61644EBBAE46"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*", "cpeNameId": "1C35EF4D-20E6-4D0B-B063-2E4848E398E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*", "cpeNameId": "7E7C9989-A526-4E30-B79F-58E42063F1C5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*", "cpeNameId": "2ED7406F-31F5-4EBF-AA7E-B6A257635CD3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*", "cpeNameId": "82E1BFE2-2D96-44CA-B044-6E194DAB8830"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.3:-:*:*:*:*:*:*", "cpeNameId": "B3BD888E-4C47-4AF3-9B64-03A571B9E0DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.3:pre3:*:*:*:*:*:*", "cpeNameId": "CBF260F5-ED2F-4A9B-B02F-18D3926D3F9A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*", "cpeNameId": "C57060CB-0575-417A-ABC8-CCAEDAA71EE3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*", "cpeNameId": "A6BBEF03-1360-41B0-98A1-7B9952777B2B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*", "cpeNameId": "40545821-7236-4AB9-BD16-633EC3F85471"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*", "cpeNameId": "A954622D-3B3C-4D9D-A2B0-4DA7AB78596E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*", "cpeNameId": "48BC2B29-8ADD-4D41-860D-11F75168E27F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*", "cpeNameId": "A259E0E8-0757-4478-ABB7-3DEF981D4167"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*", "cpeNameId": "D8D60D91-78C0-4543-93D2-EF50ECC26C06"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*", "cpeNameId": "7F34EBED-EBDB-4B10-A9EC-B4C0A56BFD57"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.11:-:*:*:*:*:*:*", "cpeNameId": "B656327E-C463-4FB1-8DBE-0860BAD611A0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.11:pre3:*:*:*:*:*:*", "cpeNameId": "C9953E5D-82CA-46CE-B0D1-3CE85D4F1147"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*", "cpeNameId": "E9E42A6D-67CA-4104-94F9-7F9612D764D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*", "cpeNameId": "D355D8A7-3332-4F7C-8537-45447BBAB886"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*", "cpeNameId": "5605786D-125D-49D6-9673-5A8AC4A0DA0E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*", "cpeNameId": "1D48BA0E-DEDE-4CD0-A531-2EAFA0676A84"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*", "cpeNameId": "DA7EAA8F-051D-493E-A4D7-5D97E9C5E7AA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*", "cpeNameId": "CCC542D5-AACD-49D8-8122-D3E80094CC9C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*", "cpeNameId": "3D6A8C53-91FB-4E3E-A5ED-ECDD050BDB2C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.18:-:*:*:*:*:*:*", "cpeNameId": "F4DFF799-273D-475E-B75C-B6706B6E0EB7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*", "cpeNameId": "10F2A87E-192B-48C1-BA18-97A9C1C1292A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*", "cpeNameId": "55C8238F-8089-4298-870B-35F6600CB235"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*", "cpeNameId": "E35AAFAC-CB47-4D14-9E2E-3902943D7123"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*", "cpeNameId": "D6ADF52D-1247-499F-994F-78DB03A9AA14"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*", "cpeNameId": "FED1E8E1-D567-4D93-999A-325CF2806B56"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*", "cpeNameId": "AD1072E7-F17C-4F3F-95A3-CF087E36D4A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*", "cpeNameId": "1E9F91DC-9717-4A92-9744-A6135B5D3339"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*", "cpeNameId": "9024BBA6-B1F4-4D09-BD83-3481FD82194D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre9:*:*:*:*:*:*", "cpeNameId": "ACB44D2D-FF10-4C61-B708-612E67499ED5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*", "cpeNameId": "2A1BD83D-C6BE-4A7C-B1E6-94808B6E7E8D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.19:-:*:*:*:*:*:*", "cpeNameId": "A10C76A6-812A-4A53-A0F9-EDF8B585E81B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*", "cpeNameId": "58F6776B-59D3-4BE8-9360-D17F0B137A16"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*", "cpeNameId": "457C36BD-BDAA-4E5A-B8DA-4B44A81F43DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*", "cpeNameId": "6E56681C-1104-417D-AA8D-171FB78B1E25"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*", "cpeNameId": "837DEBCB-2979-4F3D-BBF0-025A50DA5078"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*", "cpeNameId": "27B17801-33BF-405A-8EB9-AB8926C5810D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*", "cpeNameId": "521BCA41-D09C-4740-9535-EE017D4E3E09"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*", "cpeNameId": "115856F4-505E-42A4-A941-7D35E8F03ECD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*", "cpeNameId": "C35301BB-E1C3-4BB1-BD60-54CEF634BF24"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.21:-:*:*:*:*:*:*", "cpeNameId": "470DF9FB-EAB5-4BDD-B981-614496D91818"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*", "cpeNameId": "FD176F1D-3356-467E-8C10-3431814EEC3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*", "cpeNameId": "8C22F5D4-9780-4C5E-A373-356082667D3A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*", "cpeNameId": "F52984A0-AB95-46F2-9E56-54E347651BE5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*", "cpeNameId": "8123BB85-CE77-4911-B1E5-C5C30CA08C3E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.22:-:*:*:*:*:*:*", "cpeNameId": "0007A6A4-C5F9-4A83-AC34-F28AD735F4B2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.22:pre10:*:*:*:*:*:*", "cpeNameId": "F9A55986-F3A1-46D2-9D48-53676EA8F1FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*", "cpeNameId": "E6303281-22FC-4F0F-88DC-82DD59189367"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.23:-:*:*:*:*:*:*", "cpeNameId": "C7F39251-4CBF-42A8-9081-976568CC4C3F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*", "cpeNameId": "BF1CC304-1331-49F6-9293-4FC7C627FB15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*", "cpeNameId": "EA7ED7D4-ECF0-4633-9323-1F894F7981C2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*", "cpeNameId": "6CEC9267-FB0A-4F0A-B641-30CE574247AA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*", "cpeNameId": "E9E66A77-265D-4E40-BCB7-47AAD1205426"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*", "cpeNameId": "CA376C60-4AA6-4343-BEB6-7AC90A243040"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.27:-:*:*:*:*:*:*", "cpeNameId": "410F50F7-6B6A-4CF8-BF2F-41DE465E27D6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*", "cpeNameId": "A196A84B-8091-4BC1-8495-1E360DBEE485"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre2:*:*:*:*:*:*", "cpeNameId": "88D20409-760F-4F7C-B313-035B1F464D1B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre3:*:*:*:*:*:*", "cpeNameId": "ABB8A004-E824-4154-B2BD-3E33AC87BC02"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre4:*:*:*:*:*:*", "cpeNameId": "9A0ACD69-C4D9-4D63-A903-901D44B9046C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre5:*:*:*:*:*:*", "cpeNameId": "E102791E-51B0-46C4-84AC-6CDC80F2830C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*", "cpeNameId": "F0D012A2-1151-40D0-B4D3-741DEF693761"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.29:*:*:*:*:*:*:*", "cpeNameId": "B0303B63-EE51-47CF-8A45-1B2C9C12650B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.29:-:*:*:*:*:*:*", "cpeNameId": "5DE6082C-7706-480F-8010-68047ECB0223"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.29:rc1:*:*:*:*:*:*", "cpeNameId": "C6932552-CDF1-47A0-A056-8DE8D6D8F355"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.29:rc2:*:*:*:*:*:*", "cpeNameId": "FFB53A6C-F42A-4928-9959-00D9528BD357"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.30:*:*:*:*:*:*:*", "cpeNameId": "A2F14953-9888-4711-829C-C3181A90F657"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.30:-:*:*:*:*:*:*", "cpeNameId": "0E9275B5-7676-4221-805B-E85345477A0C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.30:rc2:*:*:*:*:*:*", "cpeNameId": "14B31F1E-3790-4495-8815-4A7C50EB16B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.30:rc3:*:*:*:*:*:*", "cpeNameId": "D5B96E2D-856B-4DB0-BD77-4A3E6D3CB76A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.31:*:*:*:*:*:*:*", "cpeNameId": "92D1D95B-D840-46D5-A7CB-F4F89088E7B1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.31:-:*:*:*:*:*:*", "cpeNameId": "1FD116AC-FE4C-42BC-AD37-82A3757E97E5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.31:pre1:*:*:*:*:*:*", "cpeNameId": "C46FC2E2-18E8-40F8-999E-1581850E3DB9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.32:*:*:*:*:*:*:*", "cpeNameId": "2631F388-B2FE-452B-875A-12EF66EE1C1D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.32:-:*:*:*:*:*:*", "cpeNameId": "CD7300DE-A299-40F2-9838-F574B6ACA3FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.32:pre1:*:*:*:*:*:*", "cpeNameId": "B2B3057D-BED0-4B7E-9A0A-915F8A36704B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.32:pre2:*:*:*:*:*:*", "cpeNameId": "031C80FE-1D10-4415-A764-EEBA523BA433"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.33:*:*:*:*:*:*:*", "cpeNameId": "F17755F8-8B46-4913-9981-DD4FAD214047"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.33:-:*:*:*:*:*:*", "cpeNameId": "C5C89978-DB1A-497C-AC8E-0C77B05916DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.33:pre1:*:*:*:*:*:*", "cpeNameId": "71A87B72-D245-4DE2-B665-F7F40DEAB332"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.33.1:*:*:*:*:*:*:*", "cpeNameId": "9BC4BBFC-436E-42A4-B1E2-BFAE970E14E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.33.2:*:*:*:*:*:*:*", "cpeNameId": "1BC181B3-50F6-419D-A0D4-AF6A50699FD6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.33.3:*:*:*:*:*:*:*", "cpeNameId": "5399C4B2-D188-4846-9458-A81AC2532D3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.33.4:*:*:*:*:*:*:*", "cpeNameId": "8AC7FAE5-0D23-46F0-80EF-2E2135F06AC9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.33.5:*:*:*:*:*:*:*", "cpeNameId": "1B939C49-7AC7-4AA8-B8B1-07543255917E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.34:*:*:*:*:*:*:*", "cpeNameId": "21E608F2-2753-4313-9266-B784970D3217"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.34:-:*:*:*:*:*:*", "cpeNameId": "1ACAD21E-C198-4EF5-8879-8D5D0D8CBD7C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.34:rc3:*:*:*:*:*:*", "cpeNameId": "8FB33F0A-1A60-45F4-9E7F-BB29DF2BCCF0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.34.1:*:*:*:*:*:*:*", "cpeNameId": "816CD484-B57C-4CF2-A20C-8B6DE30E425E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.34.2:*:*:*:*:*:*:*", "cpeNameId": "208BA8AF-508C-445E-9A88-779D72EC5150"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.35:*:*:*:*:*:*:*", "cpeNameId": "5C182757-B817-4822-8C89-DBDCBD041302"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.35.2:*:*:*:*:*:*:*", "cpeNameId": "2F7CD3A7-2FDD-4638-95A6-1BE501F754B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.36:*:*:*:*:*:*:*", "cpeNameId": "E802846E-533A-4735-9809-337F43415B35"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.36.1:*:*:*:*:*:*:*", "cpeNameId": "91AC05F1-4DC8-4334-9D57-265B3E234225"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.36.2:*:*:*:*:*:*:*", "cpeNameId": "7D099047-FCF4-4F24-A718-AAC659CBD949"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.36.3:*:*:*:*:*:*:*", "cpeNameId": "CC82E364-BA22-46CF-B591-AEAFC5388062"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.36.4:*:*:*:*:*:*:*", "cpeNameId": "886B7EC6-5529-4330-B5AF-53D21F1E75D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.36.5:*:*:*:*:*:*:*", "cpeNameId": "A22E7DB2-C698-4E4F-8642-690BD180C02B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.36.6:*:*:*:*:*:*:*", "cpeNameId": "1070BFCA-9E6C-4D0D-8D4A-0C1C5E186553"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.37:*:*:*:*:*:*:*", "cpeNameId": "D19BE961-C7BE-43E1-A240-EB0F118E98AA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.37.5:*:*:*:*:*:*:*", "cpeNameId": "858FDD69-C0DC-4A94-A0C8-B8CDEA948C59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.4.37.6:*:*:*:*:*:*:*", "cpeNameId": "997B7828-A817-4EAB-87D2-6ECD3AC80740"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.0:*:*:*:*:*:*:*", "cpeNameId": "BA4E2099-C85B-4927-AF7F-869F4D8CC388"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.1:*:*:*:*:*:*:*", "cpeNameId": "0AC0FCC8-A0D2-4D6A-80EB-3FE9A098AF37"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.2:*:*:*:*:*:*:*", "cpeNameId": "6823F058-708A-40FB-9A6D-D7E21E4FACED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.3:*:*:*:*:*:*:*", "cpeNameId": "F27D74C4-0419-4F04-85D5-2648EC8FA70D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.4:*:*:*:*:*:*:*", "cpeNameId": "DF8B4E31-F2A3-4F4B-9FFB-E1B0FF57614E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.5:*:*:*:*:*:*:*", "cpeNameId": "28591C13-ECC2-4651-8905-D599BD000BFC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.6:*:*:*:*:*:*:*", "cpeNameId": "18919A0C-BA5B-42B4-9E29-07580B9AB477"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.7:*:*:*:*:*:*:*", "cpeNameId": "FB9F8721-8B66-43F6-8458-F0B472011CB3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.8:*:*:*:*:*:*:*", "cpeNameId": "1339DBBF-8293-4981-8A48-512488F08740"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.9:*:*:*:*:*:*:*", "cpeNameId": "2AD365E3-529A-4BD2-B1DD-0E37CC9A88F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.10:*:*:*:*:*:*:*", "cpeNameId": "09A526F3-9141-46EF-9333-F564B9F6F8E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.11:*:*:*:*:*:*:*", "cpeNameId": "A88DEE0A-8864-4E20-8082-E842565B2A0E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.12:*:*:*:*:*:*:*", "cpeNameId": "62862EE1-CA27-4D0F-B925-1765E164C212"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.13:*:*:*:*:*:*:*", "cpeNameId": "0301E10D-887D-43F2-826A-FC9758993FB2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.14:*:*:*:*:*:*:*", "cpeNameId": "30551DAC-492E-4F48-89F6-63BF5548759C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.15:*:*:*:*:*:*:*", "cpeNameId": "9CBE6C70-F3AF-40B0-8F5D-69DA1E2DC07A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.16:*:*:*:*:*:*:*", "cpeNameId": "A82F0DF7-0B65-4361-8973-1ED627D787BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.17:*:*:*:*:*:*:*", "cpeNameId": "566E2D17-7CCA-4C4C-9930-C07052555F2E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.18:*:*:*:*:*:*:*", "cpeNameId": "9B682EC8-AA07-4303-918B-04838D054669"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.19:*:*:*:*:*:*:*", "cpeNameId": "5CCCA282-FE0F-4011-BF32-94592DF1B766"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.20:*:*:*:*:*:*:*", "cpeNameId": "5807BC8F-8278-4B14-B151-FB5BFD180D8F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.21:*:*:*:*:*:*:*", "cpeNameId": "12163A05-AEEE-4923-82F7-6497F0742CCE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.22:*:*:*:*:*:*:*", "cpeNameId": "6068E3CD-E21C-49E1-BE48-3A53905020EE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.23:*:*:*:*:*:*:*", "cpeNameId": "262686EE-D7BF-403D-AD11-07627715A480"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.24:*:*:*:*:*:*:*", "cpeNameId": "7196629D-CD2C-4A02-873A-7F6C2D1F93DE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.25:*:*:*:*:*:*:*", "cpeNameId": "48D122AB-988C-48C9-97C3-5238089EAE07"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.26:*:*:*:*:*:*:*", "cpeNameId": "0778A27E-2311-4DB0-AF4B-30A87525DB94"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.27:*:*:*:*:*:*:*", "cpeNameId": "1EFD1831-68B8-4D79-865D-DB63DF8A670C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.28:*:*:*:*:*:*:*", "cpeNameId": "4FC02F5B-5642-43B2-AAD4-C6213265C5EC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.29:*:*:*:*:*:*:*", "cpeNameId": "C7137075-70A6-4683-8EA8-95B2C334AB4B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.30:*:*:*:*:*:*:*", "cpeNameId": "60A8680E-BD1A-4B5D-B25D-F2204CD6FBD0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.31:*:*:*:*:*:*:*", "cpeNameId": "B6A2E648-1E74-473D-B366-257891AFB97C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.32:*:*:*:*:*:*:*", "cpeNameId": "DF160156-422B-46CF-96B8-1D6F35A903CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.33:*:*:*:*:*:*:*", "cpeNameId": "BC79535A-46D0-4D1F-884C-EC7C1A2E280D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.34:*:*:*:*:*:*:*", "cpeNameId": "2C437763-12C6-4A61-9D1D-11BC27D1E263"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.35:*:*:*:*:*:*:*", "cpeNameId": "273F3E40-2768-40BF-8F01-E39F7301FCBE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.36:*:*:*:*:*:*:*", "cpeNameId": "AC847908-F547-46CE-B4C9-A70CF3717EE2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.37:*:*:*:*:*:*:*", "cpeNameId": "B9B74A29-331F-4775-A4EF-1B7D0FBA5950"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.38:*:*:*:*:*:*:*", "cpeNameId": "A783DB98-8A4E-48BE-91F0-EA59E342FA8B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.39:*:*:*:*:*:*:*", "cpeNameId": "136CBFC5-0872-46E9-B220-C8CF1D83A971"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.40:*:*:*:*:*:*:*", "cpeNameId": "D2A9BC70-7256-453B-AAB9-DC43F1B7BAB2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.41:*:*:*:*:*:*:*", "cpeNameId": "C114C19E-EF1E-4D72-9406-084EB05F0F51"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.42:*:*:*:*:*:*:*", "cpeNameId": "55CED012-D8C6-4AEC-A096-645E648DACEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.43:*:*:*:*:*:*:*", "cpeNameId": "A2CA2A15-4549-4848-B74C-BA2C29EC75A7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.44:*:*:*:*:*:*:*", "cpeNameId": "9F6032FA-EAF9-450A-AC5D-536A700AEC2F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.45:*:*:*:*:*:*:*", "cpeNameId": "07A60662-C49A-46E0-86D8-A4ADD3C3D17A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.46:*:*:*:*:*:*:*", "cpeNameId": "9175BF1D-F50B-4C09-900C-FEAE877890F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.47:*:*:*:*:*:*:*", "cpeNameId": "BFAC0BC3-D9CC-4CA3-BE42-5E3FFD333666"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.48:*:*:*:*:*:*:*", "cpeNameId": "5DB8C2C4-D6B4-41AB-97C4-E78733C9BDC5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.49:*:*:*:*:*:*:*", "cpeNameId": "BDB65DE5-5372-4FF4-8BB3-D9E59254E514"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.50:*:*:*:*:*:*:*", "cpeNameId": "F1E8669B-EC7C-4FBC-9757-3570C5248EB2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.51:*:*:*:*:*:*:*", "cpeNameId": "85F3CC65-9ED1-4CD5-8325-7772CFA649A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.52:*:*:*:*:*:*:*", "cpeNameId": "B9EB3872-D9E5-42CA-88B4-9CE498692242"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.53:*:*:*:*:*:*:*", "cpeNameId": "F6242A61-FD1E-40EC-AAC5-0B4F7B321076"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.54:*:*:*:*:*:*:*", "cpeNameId": "23DD1C10-88D6-4D0E-95B9-134E1389E283"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.55:*:*:*:*:*:*:*", "cpeNameId": "4F661345-3C05-4FBF-B99D-FDF13BBFB6E7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.56:*:*:*:*:*:*:*", "cpeNameId": "F8EFC398-0C3F-4755-A662-233C0889DE16"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.57:*:*:*:*:*:*:*", "cpeNameId": "4395B935-E03C-4803-A318-52D2E88D4075"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.58:*:*:*:*:*:*:*", "cpeNameId": "101D8A98-9E7A-4549-BA57-0664E19876A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.59:*:*:*:*:*:*:*", "cpeNameId": "ADD23EFD-A2AE-4BB5-B3DB-C4F8412AC4E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.60:*:*:*:*:*:*:*", "cpeNameId": "E97EFCA1-BCA7-4086-B358-63DB27335269"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.61:*:*:*:*:*:*:*", "cpeNameId": "67F32AC2-728F-4D14-9C4E-A72153FD8929"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.62:*:*:*:*:*:*:*", "cpeNameId": "EA2C3762-51BE-4704-B7F4-75CB116DC006"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.63:*:*:*:*:*:*:*", "cpeNameId": "DD335EE4-DB9E-4241-B1F8-EBB27B07BE49"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.64:*:*:*:*:*:*:*", "cpeNameId": "061CB600-4BF2-4B21-882F-FE34305F3A5E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.65:*:*:*:*:*:*:*", "cpeNameId": "45FA5113-81F1-4771-9CE3-9D6A21B78203"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.66:*:*:*:*:*:*:*", "cpeNameId": "B5883846-AFFD-4195-B628-C27A6E3EFAE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.67:*:*:*:*:*:*:*", "cpeNameId": "3565FC04-8DC4-4EFC-BC5E-0A6E47778B66"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.68:*:*:*:*:*:*:*", "cpeNameId": "52D574D5-A16B-463D-AFBE-A1476982B157"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.69:*:*:*:*:*:*:*", "cpeNameId": "3114E01B-1020-40CA-A91B-A091E53A6AA0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.5.75:*:*:*:*:*:*:*", "cpeNameId": "D953ACAB-158B-4068-BD38-76091959E5FF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6:*:*:*:*:*:*:*", "cpeNameId": "5AAC5E77-EEA3-4821-9EBA-7A921B03389A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*", "cpeNameId": "A89B1895-59A2-4496-842E-860E3352102C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.0:-:*:*:*:*:*:*", "cpeNameId": "C1208401-DB46-42CD-95D6-D10E6275D760"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*", "cpeNameId": "99E228E2-1E71-4B97-AA81-7507BA657C16"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*", "cpeNameId": "2B933EF1-1310-4381-81F0-CCE547BA0CB3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*", "cpeNameId": "9D6EB42E-A597-45CD-8BF6-578ACFEE20A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*", "cpeNameId": "54A53111-D513-4CC2-BE56-5634E0FD7EBC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*", "cpeNameId": "A0D092AE-1507-4775-94DF-FB68869E2BA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*", "cpeNameId": "7F55A3CB-B4C9-41BF-9053-6E5C331076BE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*", "cpeNameId": "F6CF8C73-3118-41DD-A695-3BD6D7D9A3F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*", "cpeNameId": "83E6E096-ED3A-44F2-AF15-93ACE5A79FC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*", "cpeNameId": "2A054947-7DA1-4FE5-9572-9A2EB1A20617"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*", "cpeNameId": "98433FA6-9682-43B2-9E3E-35A6849BA2DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*", "cpeNameId": "69A52C25-5CB9-4C41-B6A2-856F46CE1F87"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*", "cpeNameId": "B2DFB42B-1D6B-4500-B7FE-2EEBA7B08F0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.1:-:*:*:*:*:*:*", "cpeNameId": "35B6D3BB-E290-4E84-8785-71E53B05E502"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*", "cpeNameId": "674626C2-4F05-4824-904D-EB281442138B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*", "cpeNameId": "9FC5142D-3741-4732-9045-3682B9574685"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.1:rc3:*:*:*:*:*:*", "cpeNameId": "DAB49446-7990-4CF5-BA6A-B89173A593A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*", "cpeNameId": "DF3171C4-00E8-4B0F-97EB-2F3EC3394A87"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.2:-:*:*:*:*:*:*", "cpeNameId": "1B4C49FC-8606-45D7-94D1-19C5626D69C7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.2:rc1:*:*:*:*:*:*", "cpeNameId": "FA46E5D1-9EAD-44AC-9690-C3EBC05C6EB1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.2:rc2:*:*:*:*:*:*", "cpeNameId": "69C80F8F-650D-47B3-ADF1-2C286A3B530B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.2:rc3:*:*:*:*:*:*", "cpeNameId": "BBA4769C-07C5-4A1C-9A92-50041E1E2B80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*", "cpeNameId": "C5AE4EB6-4CD1-416B-BDD4-70428924A7AD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.3:-:*:*:*:*:*:*", "cpeNameId": "C5F86C20-90F5-4112-B951-9980AF64D1B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.3:rc1:*:*:*:*:*:*", "cpeNameId": "6EC8517C-25D6-40E3-97DD-487A41CBEB8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.3:rc2:*:*:*:*:*:*", "cpeNameId": "659C6C98-CEAE-47FC-9B9E-2BD6C4CD83E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.3:rc3:*:*:*:*:*:*", "cpeNameId": "8E9073F2-E5D8-4339-BD58-8FAF15C00EF7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.3:rc4:*:*:*:*:*:*", "cpeNameId": "DCB5E432-E2CB-4349-BE6C-5B772CEB23A5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*", "cpeNameId": "436732C9-CEB7-459C-82CA-0DA300F5309B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.4:-:*:*:*:*:*:*", "cpeNameId": "029F79FE-EC00-4E10-8F68-201F23DDA90F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.4:rc1:*:*:*:*:*:*", "cpeNameId": "59153938-208A-42C0-A9F2-5763B8387EC1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.4:rc2:*:*:*:*:*:*", "cpeNameId": "A91FBC5E-D0DF-4817-8515-6C7B2C429447"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.4:rc3:*:*:*:*:*:*", "cpeNameId": "F5A83A6F-7E60-4C69-8D32-EF74823C5AE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*", "cpeNameId": "5ACC730F-7A40-408A-B35C-486F6E5D9484"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.5:-:*:*:*:*:*:*", "cpeNameId": "481F64FE-DB75-48F6-BD68-9590DFA79630"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.5:rc1:*:*:*:*:*:*", "cpeNameId": "3151F9B9-F5F2-459E-BA86-2FFBC705821E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.5:rc2:*:*:*:*:*:*", "cpeNameId": "17E91D87-DE58-4ABE-8856-5820D2F375B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.5:rc3:*:*:*:*:*:*", "cpeNameId": "3B7E0656-7A57-4400-87FF-F3623AA09CAC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*", "cpeNameId": "28CB8353-6739-4BFA-841D-BA39BA900FE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.6:-:*:*:*:*:*:*", "cpeNameId": "8B471054-1F09-4CB6-929B-041C53E7B67A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*", "cpeNameId": "99653018-EFA6-43F7-9241-ACB328324AB6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.6:rc2:*:*:*:*:*:*", "cpeNameId": "579FB92D-3ECF-4411-B8B9-E84AB3DFB8D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.6:rc3:*:*:*:*:*:*", "cpeNameId": "ED0B1928-3472-4EEA-A5AA-9799CDB7D790"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*", "cpeNameId": "2C131898-E446-49D6-8823-34BD06B9444D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.7:-:*:*:*:*:*:*", "cpeNameId": "FA35726E-503D-4326-B400-8342B3F34C56"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*", "cpeNameId": "5DC69ED4-4C0B-46F2-AAA7-9FD05945ACF3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.7:rc2:*:*:*:*:*:*", "cpeNameId": "16F6AB59-7CC2-4CAA-9560-74FA72101EE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.7:rc3:*:*:*:*:*:*", "cpeNameId": "A5864419-1EBC-489B-BC0F-961D051F4DE2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*", "cpeNameId": "AD3F7197-3AC9-444A-B871-43472B7496E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*", "cpeNameId": "367D2EC1-9FE4-4D99-96C5-BBC752F5A303"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*", "cpeNameId": "64C591D9-B5FC-431C-81BB-5B28D1D744B2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*", "cpeNameId": "101E1502-F38A-4B76-8A31-08E122F52653"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc4:*:*:*:*:*:*", "cpeNameId": "91D55BBA-0525-4D47-9765-744972086AFA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*", "cpeNameId": "F8BEC7E1-57BD-426F-AEC2-DC654C17D8CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:*:*:*:*:*:*", "cpeNameId": "2DA3A643-7A26-461D-94A7-00BC882A9DC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*", "cpeNameId": "A46EF98A-79F8-4254-A90F-1A9C0C44412B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.9:final:*:*:*:*:*:*", "cpeNameId": "0207ACEA-69EE-44BB-A3D9-A8A147E8A18D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.9:rc1:*:*:*:*:*:*", "cpeNameId": "04EE4AF1-789E-449E-A3B5-4C5E51C5C803"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.9:rc2:*:*:*:*:*:*", "cpeNameId": "349B914E-94D6-45C4-A0BE-C004F7CAA64E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.9:rc3:*:*:*:*:*:*", "cpeNameId": "AB48A63A-1E9A-4898-999F-F2B9BD3AB6E9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.9:rc4:*:*:*:*:*:*", "cpeNameId": "8CAC05F6-6ADE-4CFA-902B-046FF30BF820"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*", "cpeNameId": "FD5A1616-E2CD-423B-986A-18DB1AA925FF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.10:-:*:*:*:*:*:*", "cpeNameId": "34BC934B-616A-4246-80B0-F38811D3C593"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.10:rc1:*:*:*:*:*:*", "cpeNameId": "E565C116-27A7-4014-A780-B605C4074F1B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*", "cpeNameId": "CBBC94D5-C555-4ABB-98E5-F2D49288D853"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.10:rc3:*:*:*:*:*:*", "cpeNameId": "FE8FAC31-D8A1-417C-B99C-CBB20C22619C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*", "cpeNameId": "ED1506E2-E8CD-46EB-B651-FF5539B99265"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.11:-:*:*:*:*:*:*", "cpeNameId": "9CB72A28-61C6-4357-B258-72F95917647D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc1:*:*:*:*:*:*", "cpeNameId": "2F959170-89C8-4D29-A4B4-A583E3BB855C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*", "cpeNameId": "2538A481-8325-4A21-80E2-126581E8F68B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*", "cpeNameId": "4045FB8E-C609-42E2-B897-F609F042D869"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*", "cpeNameId": "077E03AB-9887-432D-9534-73DDA9DAC95E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc5:*:*:*:*:*:*", "cpeNameId": "3983F5C4-9001-476D-BE72-BDD8AE96CCCF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*", "cpeNameId": "4941269A-ED6E-4026-8A32-A1C2188D077D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*", "cpeNameId": "E3FBE6AF-981D-422B-9459-7FBC8D8BA673"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*", "cpeNameId": "F9E3A9C8-6F02-4FC4-9508-CF68A6611FFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*", "cpeNameId": "B45D45D8-BCBC-40F8-AB85-7F27CA4C4E80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*", "cpeNameId": "4FC0A3D9-5B2F-4060-991D-A63A98B60A30"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*", "cpeNameId": "49A28E4C-D822-4A75-B13C-98C8D4B3987E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*", "cpeNameId": "E08D20DF-4D3A-421B-BEF8-11E4F7A91335"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*", "cpeNameId": "D39A84EF-5DCE-4E04-A97A-15FBBD1EE654"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*", "cpeNameId": "60990D54-763D-4AD7-96F6-7B77264DB4EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*", "cpeNameId": "67507948-D572-40E5-8008-DDCD69422D93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*", "cpeNameId": "A6147179-8F14-4C61-9CD1-759BF6B831A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*", "cpeNameId": "62D3BCD4-F795-47E5-B4B2-EE26CA1F8FD0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*", "cpeNameId": "95052DA2-96F5-4DEE-BAC5-74E44DE1C706"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.12:-:*:*:*:*:*:*", "cpeNameId": "92750F2E-8C1C-4D26-BC39-812F5EE6D41C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*", "cpeNameId": "DEAEAE4F-035C-4D8A-9B5E-37235CDBB66C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*", "cpeNameId": "A2C31105-7EE3-49BF-9D99-9D0D985B0A02"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*", "cpeNameId": "B6F7AE05-A4C0-4ED6-8E6A-ADDC0F929ACF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*", "cpeNameId": "1BFA0280-B20C-45B4-95EC-26F1BC2BF6F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*", "cpeNameId": "17A95A11-FDC8-409B-A606-271712C029C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc6:*:*:*:*:*:*", "cpeNameId": "2BFF67D6-997D-42C6-B16F-4DD3D5E3A10A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*", "cpeNameId": "A867D37C-372B-43F6-95B3-BCFD141758DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*", "cpeNameId": "E2171560-01D1-4C76-A37D-7A007ABC70BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*", "cpeNameId": "F44E7431-7746-4924-8267-973379A55C9C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*", "cpeNameId": "8689CE67-A0AA-49DB-97CB-C103FD236419"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*", "cpeNameId": "05D965C7-D8DB-47E2-BAE6-1637A93CD489"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*", "cpeNameId": "6E9D3EB5-1B92-471F-A14A-A159E3D7CF1A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.12.12:*:*:*:*:*:*:*", "cpeNameId": "5321FA64-0B4C-44FF-A25B-71BC8089333F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.12.22:*:*:*:*:*:*:*", "cpeNameId": "0F17C8FD-25B6-4A61-BB31-85BAEB680545"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*", "cpeNameId": "388ADE6F-11C9-4415-BC9A-8697B31FA27E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.13:-:*:*:*:*:*:*", "cpeNameId": "E0ED8652-3239-4DAD-A7FE-6939510A9338"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*", "cpeNameId": "E4E97497-874C-44E8-9C77-FAFD9E4901BA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc2:*:*:*:*:*:*", "cpeNameId": "602A749B-FF44-47E6-A0A3-61060815E33E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc3:*:*:*:*:*:*", "cpeNameId": "04E1BF43-BA11-407A-8BFB-EBAE4590F580"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*", "cpeNameId": "D67E5162-1C40-4582-8F3F-AA6256D15FB7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc5:*:*:*:*:*:*", "cpeNameId": "B922DCB9-51FD-4B5B-9219-FCA982B0EE7A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*", "cpeNameId": "8BF87194-F389-4069-9455-29D577E706EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*", "cpeNameId": "ED7DDAFD-79BC-4C36-8283-74583A337C72"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*", "cpeNameId": "FB695AF3-F47E-4CEA-A02B-FCC7EDF7756C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*", "cpeNameId": "524B46F7-14D0-4159-8367-75760DB6F23A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*", "cpeNameId": "4EA15FE0-5375-40DA-9715-68C4618C7813"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*", "cpeNameId": "1207EFC4-9E4E-429F-8975-A0EFB22803CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*", "cpeNameId": "C1E7396E-DEEF-43F2-A624-D61E034305D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*", "cpeNameId": "9BF42545-B415-49C0-8E1F-17664EEACB68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.14:-:*:*:*:*:*:*", "cpeNameId": "93E735B9-0621-4DA6-A49B-9169A67D37B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*", "cpeNameId": "3A5525C6-4252-46EC-8399-9EDEF7F39989"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*", "cpeNameId": "CBE7DC4D-D200-4173-B585-9A5D5365B34B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc3:*:*:*:*:*:*", "cpeNameId": "E7771F92-73BD-417D-B41A-053B851E9719"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc4:*:*:*:*:*:*", "cpeNameId": "324B89B8-87FB-4F07-9F6F-B7CD98B657BF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc5:*:*:*:*:*:*", "cpeNameId": "56DB9DF7-FDF3-44C8-AB4E-B3631C7CA29B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*", "cpeNameId": "68AA2406-C573-466E-88FC-35F7DDDB15A7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*", "cpeNameId": "6FDE0601-BD39-45BB-B9CB-A65999C80618"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*", "cpeNameId": "23DA914F-A588-4595-9EBC-8F77364659E4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*", "cpeNameId": "D88E90A8-F670-4294-B10C-0F252161A64B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*", "cpeNameId": "9F87CFB2-C2FF-40CD-A9A3-DA9B389F7AA9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*", "cpeNameId": "DBD9CA65-4DF8-4893-A205-A76EA64BD1CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*", "cpeNameId": "D03DCC4E-39DB-4B7A-AE43-79941136D54A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*", "cpeNameId": "352D1A5D-B1C5-44B5-B617-DED021A3D043"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.15:-:*:*:*:*:*:*", "cpeNameId": "C8E4BD45-7319-449E-90FC-3F43570BFC6C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc1:*:*:*:*:*:*", "cpeNameId": "53F4E7B1-D40A-42D2-81AC-4145230D0BD9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc2:*:*:*:*:*:*", "cpeNameId": "22D3FC80-31C0-4770-A5AA-FC1DF9FEA455"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc3:*:*:*:*:*:*", "cpeNameId": "BC2AB32A-12A9-43AD-9189-0DCBE0437F7C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc4:*:*:*:*:*:*", "cpeNameId": "AB024563-D5F5-4499-9309-77409381EB6A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc5:*:*:*:*:*:*", "cpeNameId": "6AA2619F-F8D6-435E-8F37-44D72F239143"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc6:*:*:*:*:*:*", "cpeNameId": "62DBB2E8-9EE4-450D-B243-A2438534A8C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc7:*:*:*:*:*:*", "cpeNameId": "F7C7637E-C1A2-4B46-8A68-7B6B11BC2019"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*", "cpeNameId": "3E486F6A-0AD2-4FA8-9247-A980C2A74462"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*", "cpeNameId": "A7783326-5AE4-487D-B3D6-E1CBFBFB4C27"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*", "cpeNameId": "3DA41A51-AC84-41D5-925B-7822866E1961"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*", "cpeNameId": "77D85E13-1A18-4E26-8102-04E799137135"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*", "cpeNameId": "7B4EB9A6-F78E-45B8-959B-927D5D46E27C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*", "cpeNameId": "38750E8F-FB6B-47A6-9862-A369FD8191EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*", "cpeNameId": "4A82AD99-9C08-442F-8737-16B3A4B2D4FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.15.8:*:*:*:*:*:*:*", "cpeNameId": "63BFBA8A-7EFC-4495-8ACF-584FC8CFB411"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.15.9:*:*:*:*:*:*:*", "cpeNameId": "6E76C52E-17D6-4480-A207-0C84D09E8EA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.15.10:*:*:*:*:*:*:*", "cpeNameId": "D6717E76-477B-4D32-8423-1FC2214FCC9B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.15.11:*:*:*:*:*:*:*", "cpeNameId": "DFDCF4BB-4013-4C2D-A5D2-1973772078F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*", "cpeNameId": "AE61F2EE-6A7D-46E1-9857-885A5DF5A2D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16:-:*:*:*:*:*:*", "cpeNameId": "174D83CE-0FE4-47F0-A163-62810826EE59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc1:*:*:*:*:*:*", "cpeNameId": "FE872156-B962-4720-82DD-587D82FA56D6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc2:*:*:*:*:*:*", "cpeNameId": "3CEB52B9-2691-4DBD-B172-DACFC59FF048"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc3:*:*:*:*:*:*", "cpeNameId": "1D8E6D9E-018C-4AF2-8DF1-3093E6B5E0CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc4:*:*:*:*:*:*", "cpeNameId": "37FF5680-FBFC-441F-9335-B088B2EE5384"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc5:*:*:*:*:*:*", "cpeNameId": "89851FAC-FF79-41DC-A88C-DFF906F20589"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc6:*:*:*:*:*:*", "cpeNameId": "51884B54-F4FB-4486-B332-15966D48C2D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc7:*:*:*:*:*:*", "cpeNameId": "B9314C17-D68B-4DA3-81F8-625D132FA486"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*", "cpeNameId": "DE562D63-72CD-474E-AB95-64B76FBFC53C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*", "cpeNameId": "88166C73-36EB-4860-8218-5B175452C475"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*", "cpeNameId": "8FC8BB73-D7F7-4F4A-BF47-E81FF3A8EE9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*", "cpeNameId": "CA6B32E2-2A2B-42A6-9D17-41F9149CC13A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*", "cpeNameId": "5D4A54A3-54F6-4DC8-A991-299A4C2AD237"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*", "cpeNameId": "6B326571-D6E7-48AF-ADBB-19ECC604EE84"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*", "cpeNameId": "2EBA85FA-3DA2-431E-B5A1-BA762625DA48"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*", "cpeNameId": "7306B929-3275-43A9-B504-CFF7954729FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*", "cpeNameId": "A7F28069-05B1-4AD4-A449-D4D1291A89C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*", "cpeNameId": "639D4CCE-CB78-4DE4-B256-86438E036721"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*", "cpeNameId": "5EFB6B25-B3B5-49DC-8807-19CDA3A99E4E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*", "cpeNameId": "8C11BD3A-D469-4F92-B30E-A93D369017DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*", "cpeNameId": "14A91962-F886-4A75-93DA-49E8537165FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*", "cpeNameId": "7D522947-39C2-42C5-B403-70E0D5805C22"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*", "cpeNameId": "8F33298C-D06B-448C-82DA-DC48EF44FF10"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*", "cpeNameId": "2F8AFDAE-1D5F-4E8A-94D5-026F75CEA4C9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*", "cpeNameId": "944431F2-EAD4-4442-AA69-57C31FAA2427"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*", "cpeNameId": "4A6BE924-3647-4AB8-84D5-9D7A19E20679"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*", "cpeNameId": "DD5110E0-CEAD-4530-8243-153F14651956"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*", "cpeNameId": "E2DFCCF8-B527-4CCD-B7B4-D26D35C3C9A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*", "cpeNameId": "E93B556D-2B1A-4B1E-B798-02776E456C65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*", "cpeNameId": "2129A427-CEB9-4AC1-A36F-DEA22E4D96A5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*", "cpeNameId": "5E9142CE-7B3F-4003-ABC9-08384BE83977"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*", "cpeNameId": "D86CC329-0C50-4D51-B140-A1D60473D769"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.25:*:*:*:*:*:*:*", "cpeNameId": "5DCA96E1-1AA3-4F1A-BC9C-4B9AA3B1BBFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.26:*:*:*:*:*:*:*", "cpeNameId": "E5ADCD84-117A-4B9D-8D5F-B9D72DB24AAB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*", "cpeNameId": "545A8C75-A56F-4460-90D8-588A9C8F7F6C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.28:*:*:*:*:*:*:*", "cpeNameId": "076232E6-01DF-4BAA-85EB-9EE47C8838E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.29:*:*:*:*:*:*:*", "cpeNameId": "2DEEC011-75FE-404F-945F-60753D8F0DE0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.30:*:*:*:*:*:*:*", "cpeNameId": "6E9CFC53-BDDB-4024-A7EA-1878E3A2B56D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.31:*:*:*:*:*:*:*", "cpeNameId": "FCB2E0B4-EA1C-4F05-AFD1-BA1B17848DE3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.32:*:*:*:*:*:*:*", "cpeNameId": "C59F9830-942C-4A26-A628-65F0F5F22CE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.33:*:*:*:*:*:*:*", "cpeNameId": "463CD740-54BA-49DD-B2BB-F77F1CB546FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.34:*:*:*:*:*:*:*", "cpeNameId": "DE9C3D58-780E-4442-9350-ECA9DE0E598C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.35:*:*:*:*:*:*:*", "cpeNameId": "E1C93D61-110C-441C-873D-9995FAF19136"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.36:*:*:*:*:*:*:*", "cpeNameId": "E4F2322B-CF60-4443-9B5F-920F78DD53E3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.37:*:*:*:*:*:*:*", "cpeNameId": "E792A0DD-FAF1-4C27-9870-00E6BAB94830"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.38:*:*:*:*:*:*:*", "cpeNameId": "E342CAC2-7E27-472A-9BF3-1700531BC7C9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.39:*:*:*:*:*:*:*", "cpeNameId": "8E56DD41-1B8E-4497-95AC-6D8BDBBF5564"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.40:*:*:*:*:*:*:*", "cpeNameId": "2E71DEA1-70E3-4CEA-A8BF-A8C771C5E380"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.41:*:*:*:*:*:*:*", "cpeNameId": "7E56F268-2D85-439B-A690-8D4472C91BFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.42:*:*:*:*:*:*:*", "cpeNameId": "E663B068-9CE7-40BC-915B-19B109B40F4C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.43:*:*:*:*:*:*:*", "cpeNameId": "CB35D71B-C613-40B0-98FD-204120711481"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.44:*:*:*:*:*:*:*", "cpeNameId": "8258690F-E6DF-4E27-ADF5-4B1E089E4344"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.45:*:*:*:*:*:*:*", "cpeNameId": "4EBD8C35-B4FC-42C3-B402-CB280DA0F44F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.46:*:*:*:*:*:*:*", "cpeNameId": "32AE1D02-1A39-432C-AB41-BC6DEF98725C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.47:*:*:*:*:*:*:*", "cpeNameId": "33155616-E047-41B0-8352-1A7B70199260"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.48:*:*:*:*:*:*:*", "cpeNameId": "7B81466F-1EE6-468B-8A0F-9E98166199A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.49:*:*:*:*:*:*:*", "cpeNameId": "2CA3F258-542A-4FAE-841D-1DFF440DEC1D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.50:*:*:*:*:*:*:*", "cpeNameId": "8FCF7FE7-9BD3-4704-A5F4-8528DB6220F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.51:*:*:*:*:*:*:*", "cpeNameId": "E9D3B8CA-146A-4F5E-8B6F-A9D7EBEA4A64"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.52:*:*:*:*:*:*:*", "cpeNameId": "BD8E753C-155A-483E-849D-DD27F0FF4507"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.53:*:*:*:*:*:*:*", "cpeNameId": "8D732D62-E61A-4770-8AB7-2C483A595BD9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.54:*:*:*:*:*:*:*", "cpeNameId": "C53E51C0-344D-4999-9397-4C2AF2E209DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.55:*:*:*:*:*:*:*", "cpeNameId": "90237CA4-7E0A-4DC6-BBD3-D777C53FCBFB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.56:*:*:*:*:*:*:*", "cpeNameId": "2E437365-6455-4C52-8AAE-64AB2DB06FA6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.57:*:*:*:*:*:*:*", "cpeNameId": "4A87DD28-FAFD-43D1-B19C-433B9AB468F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.58:*:*:*:*:*:*:*", "cpeNameId": "1049FB25-E060-40CA-BB86-6FA489DAF1D7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.59:*:*:*:*:*:*:*", "cpeNameId": "33B62B86-89DE-4047-B2FA-572CDF1D1593"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.60:*:*:*:*:*:*:*", "cpeNameId": "9552CC8A-12DD-4347-9B46-099AA26C63F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.61:*:*:*:*:*:*:*", "cpeNameId": "939A8266-2B11-4462-8AFE-B299DDCCA3F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.16.62:*:*:*:*:*:*:*", "cpeNameId": "A55E244B-E4AA-4362-8331-0AA6E5E8C41F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*", "cpeNameId": "7F2FE563-E605-451B-B029-781828E8A074"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.17:-:*:*:*:*:*:*", "cpeNameId": "A3CC92FE-0731-44B6-B9C2-030C82B4CABF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc1:*:*:*:*:*:*", "cpeNameId": "478C47C4-E968-4D85-884C-09B4BEDAB815"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc2:*:*:*:*:*:*", "cpeNameId": "34865087-1ADE-4088-8888-E4107E37CB6C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc3:*:*:*:*:*:*", "cpeNameId": "B33F1CAD-A981-4703-A34D-1EF578FDE5F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc4:*:*:*:*:*:*", "cpeNameId": "DEADBC67-033F-4F6D-AC3A-0713085A99C5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc5:*:*:*:*:*:*", "cpeNameId": "E3C8ACA4-5C16-4AC8-83E4-DBF94BDA9CE8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc6:*:*:*:*:*:*", "cpeNameId": "1AEBC09D-C423-4198-A3E3-B55A425926F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*", "cpeNameId": "C30EDDBD-0EDC-466B-B615-C5B42BFAD28E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*", "cpeNameId": "F71013D9-9CDD-4D92-B4E5-942056E565D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*", "cpeNameId": "0831BAAC-1FD2-4EBF-9511-A218D885D4B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*", "cpeNameId": "B511ED8F-F455-4845-975E-4F29C805F5AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*", "cpeNameId": "24A8B8ED-D26D-429B-8B52-E671A5938951"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*", "cpeNameId": "0ECDFB1A-237E-40FA-A36F-6CDE958BE2EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*", "cpeNameId": "F8D74FEA-D8AC-4691-B204-D32E0C6605B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*", "cpeNameId": "C3720CF7-DD88-499D-8461-985E5488EE03"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*", "cpeNameId": "7DDD59C2-6520-4E98-AD3B-B3B686BB34EE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*", "cpeNameId": "BF463B55-D54F-419C-93DF-5B842788F176"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*", "cpeNameId": "B87D7B1A-7432-447C-B257-DF293E59C4CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*", "cpeNameId": "AB38146F-61C8-4BFF-ADAA-B9790D6D2688"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*", "cpeNameId": "3CFB0322-5124-4840-9A7E-B3ADA0B290B8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*", "cpeNameId": "019F89B2-6D0A-492B-AB0F-B9D67DC02B8C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*", "cpeNameId": "3CF5F7CF-74E3-44E3-9467-F087163891DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.18:-:*:*:*:*:*:*", "cpeNameId": "B84AD8B1-97D4-44E1-9AAA-EB2833DC6F4F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*", "cpeNameId": "8A53347F-8F9B-4FF1-B80D-CEFEDFBC508A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*", "cpeNameId": "1ADFBB6B-58D2-44A0-8ED0-477E34D379D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*", "cpeNameId": "96E75324-FDDA-45D6-8FCA-9D8D9C80EF18"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*", "cpeNameId": "AC16DB99-6834-46F9-9521-201FFAC3057F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*", "cpeNameId": "6BFB0B02-D2EA-4194-A7B8-1EE3A703DDE7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*", "cpeNameId": "A675B686-8E46-42D2-BA05-C32B1CAE46E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*", "cpeNameId": "61D388F6-EAAB-4336-A039-A4CAE33FE77B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.18.0:*:*:*:*:*:*:*", "cpeNameId": "75F610AC-9A76-4CB1-85E7-B7DBD74C8DCF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*", "cpeNameId": "A4F08FEE-5F55-4EF3-BCD3-EEBA83F00D37"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*", "cpeNameId": "16A0E0AB-9DDA-43D3-86FF-0DF62072561B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*", "cpeNameId": "E791FC39-2A00-4471-9A3A-C75E1B1E64F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*", "cpeNameId": "BB3B89C1-1552-47E3-905A-FC1A64B9332D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*", "cpeNameId": "CA04A0FC-983F-4ACB-9A50-16FDF4787E4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*", "cpeNameId": "8900EE54-0738-4016-860B-A6B22C7DA5A3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*", "cpeNameId": "AC0C457A-323C-477D-AC78-D03871D4F569"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*", "cpeNameId": "F9F72925-119F-4E41-BD56-E53C0E99AA73"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*", "cpeNameId": "20EA1762-2A4D-4178-B223-1C96D246AE8C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.19:-:*:*:*:*:*:*", "cpeNameId": "814CA6EA-E5CF-4B9B-81F0-84AF1CAEF41B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc1:*:*:*:*:*:*", "cpeNameId": "1C3EA887-1E94-405E-BF75-DD15C71D041A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc2:*:*:*:*:*:*", "cpeNameId": "A1F1D101-0E54-474E-8667-9B6CFB524B8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc3:*:*:*:*:*:*", "cpeNameId": "51E01BA9-253D-4BDC-B22D-DA77224F71BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc4:*:*:*:*:*:*", "cpeNameId": "0B684AB1-90C4-4761-B136-F51F7D2C17CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc5:*:*:*:*:*:*", "cpeNameId": "59899822-E1DC-460D-A840-6725374EE633"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc6:*:*:*:*:*:*", "cpeNameId": "1E381AAD-2D0E-4859-90EC-A660E3B7B7CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.19.0:*:*:*:*:*:*:*", "cpeNameId": "E2AE40EE-377E-48F5-BAAF-72C7C8195993"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*", "cpeNameId": "B15089C6-57BF-4652-A050-929097D0D5A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*", "cpeNameId": "2E58516D-F481-4FB6-9BC8-88A95615E890"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*", "cpeNameId": "682240A3-8246-48AB-87B0-6BBB96ECBDC0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*", "cpeNameId": "F76A8B1F-AF42-4DEA-8414-6B625F6E316B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*", "cpeNameId": "D0BC611E-A8DA-4945-8776-8F266620BBBD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*", "cpeNameId": "42410926-2960-4368-9F5D-E6F62078B9B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*", "cpeNameId": "C0261393-AC10-423E-892C-9E421F6974A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*", "cpeNameId": "6B51DE9A-A4AA-4A0E-BBE6-897DB644F6AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20:-:*:*:*:*:*:*", "cpeNameId": "B97C9E25-7A4A-4C09-8051-663C5AA0A9F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20:rc1:*:*:*:*:*:*", "cpeNameId": "27D689A6-8079-45F9-9390-400AC012BFDD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20:rc2:*:*:*:*:*:*", "cpeNameId": "D43C5016-2DB9-4723-BA89-09FB74FCFBCD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20:rc3:*:*:*:*:*:*", "cpeNameId": "B3220E12-F16F-46D6-9769-D31840DD76C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20:rc4:*:*:*:*:*:*", "cpeNameId": "CFBF8DA4-A36C-4276-B1A8-688DB292F622"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20:rc5:*:*:*:*:*:*", "cpeNameId": "A1D12713-789A-46A7-8E1E-AD5B9E5BCC42"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20:rc6:*:*:*:*:*:*", "cpeNameId": "A255FBF3-5D44-4875-B13B-9D62E1243661"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20:rc7:*:*:*:*:*:*", "cpeNameId": "7E7AE308-2CFC-4492-894B-8D4A3A09E0CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*", "cpeNameId": "801FC206-DF3F-4B03-84EA-8340AD1F8037"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*", "cpeNameId": "63E639ED-60D3-4EFB-B20F-FD710A81944A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*", "cpeNameId": "AEB9FA66-7B8A-4FFD-BB9C-65F733E7D116"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*", "cpeNameId": "4CFF2BEC-F792-42FD-B933-3AB0BB7F3ECA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*", "cpeNameId": "45A09049-2699-4DCD-9CED-73A3D282DE7C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*", "cpeNameId": "8909D5F8-66FA-4EA4-ADF7-CDA0A67C30F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*", "cpeNameId": "58817446-1B83-4434-A54A-9BB63DE0D4B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*", "cpeNameId": "F217A5B3-C788-4F34-8D51-4E9FC1997497"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*", "cpeNameId": "CDC24E6C-5694-435D-8CED-6A9E5A0A2067"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*", "cpeNameId": "506CEF8D-211E-497E-AE6A-FDBF1A12167B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*", "cpeNameId": "36091D6E-873C-4C3B-964E-DFE734896ADB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*", "cpeNameId": "B353253D-5DCA-46A6-8E8F-23F7849D8323"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*", "cpeNameId": "0E4908DB-FEB4-4077-8309-1E45FC9595B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*", "cpeNameId": "3B9FC266-ACBC-4F9B-84C4-00871BE5F8EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*", "cpeNameId": "CB3A11BC-79F9-4651-A3DE-39AD6E18D1B1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*", "cpeNameId": "2353C8DD-9510-42DA-AE50-E8F8A5574459"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*", "cpeNameId": "C43CBDFE-2E2D-4FC7-9D7C-F4E1C7C495A0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*", "cpeNameId": "AFF658D9-AC30-483F-BF16-EF65B060E7BF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*", "cpeNameId": "962F6424-1A32-4F84-8105-B4357936B688"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*", "cpeNameId": "E8CAB38A-F9FD-4A6E-A283-5D62A92A1B49"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*", "cpeNameId": "510778E4-0178-4F95-8355-921C63FEE908"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*", "cpeNameId": "BCAB8A69-E8C8-4BEB-9DA1-131075AB484F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.21:-:*:*:*:*:*:*", "cpeNameId": "2AB8FE39-016F-46B6-80F1-7A5C9C1E9492"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.21:git1:*:*:*:*:*:*", "cpeNameId": "6DED897B-6273-48AF-917E-2B2972CA9122"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.21:git2:*:*:*:*:*:*", "cpeNameId": "3D9FD193-54F7-453F-9A9E-B6FCADCAB78E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.21:git3:*:*:*:*:*:*", "cpeNameId": "CB2D323D-D563-4AB9-B8AC-2997E857CD0E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.21:git4:*:*:*:*:*:*", "cpeNameId": "87ADBC5E-E9F7-45D3-9A24-A8F5682E60D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.21:git5:*:*:*:*:*:*", "cpeNameId": "E4BF7055-2FEA-4C32-AE63-780B8B9A382B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.21:git6:*:*:*:*:*:*", "cpeNameId": "9AAA38E7-2671-403A-AC6D-80769C9CE5B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.21:git7:*:*:*:*:*:*", "cpeNameId": "B2D7D320-D4FB-4E3E-BCCF-2E9FB36D2493"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc1:*:*:*:*:*:*", "cpeNameId": "6FCC2AED-A9F2-471C-A193-AAF31FB72E3F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc2:*:*:*:*:*:*", "cpeNameId": "12807753-BCDA-498F-98D6-54F5571A6FD3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc3:*:*:*:*:*:*", "cpeNameId": "614D10D9-2AED-46C7-85C6-FF6D4BA23EB2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc4:*:*:*:*:*:*", "cpeNameId": "EBC57252-6CBD-49BF-971D-B2ADF963A099"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc5:*:*:*:*:*:*", "cpeNameId": "AE9ACDEC-AC61-4FDB-8F94-3CBD7601BDAE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc6:*:*:*:*:*:*", "cpeNameId": "248135E7-8ECB-4747-98A2-92D61E8AE1D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc7:*:*:*:*:*:*", "cpeNameId": "7AF9C9FB-C50F-4BF9-B1B9-2F3072E24DAA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*", "cpeNameId": "46017C3E-4534-4835-96A2-CC2D826395A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*", "cpeNameId": "4768AC1E-5112-4C2D-A8DF-6E288CFA85EC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*", "cpeNameId": "12CC828E-E989-49EE-B4FA-12070327CF32"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*", "cpeNameId": "7F4B2F9F-85A6-4E2D-8CE3-F2D0F3F77D97"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*", "cpeNameId": "BD095BBF-A125-48E3-B17B-6B1BD4D136A6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*", "cpeNameId": "B6E2B00E-D117-4FC6-BB9C-2444EBAA7E00"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:*", "cpeNameId": "8B5450D5-ECB9-4193-93D7-EEF907731609"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*", "cpeNameId": "7F95E21F-D80B-4C5B-9A80-329E5C6D7A01"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22:-:*:*:*:*:*:*", "cpeNameId": "D8D13AB8-A6A2-4D95-B6D2-6279459B8E78"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22:rc1:*:*:*:*:*:*", "cpeNameId": "FE4F440D-2AAB-4F9D-895B-2BDBFE51F323"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22:rc2:*:*:*:*:*:*", "cpeNameId": "8C4E58A3-CEDC-49D5-8C0F-EF76DD421E3B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22:rc3:*:*:*:*:*:*", "cpeNameId": "68EE0C2F-FE6A-49FA-AF8B-D003123BC6F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22:rc4:*:*:*:*:*:*", "cpeNameId": "C85503AD-0D6A-421E-BEBA-98CEE922A04F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22:rc5:*:*:*:*:*:*", "cpeNameId": "2A79A98F-7C82-429F-8466-7C66FFBBE5E3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22:rc6:*:*:*:*:*:*", "cpeNameId": "2BBA39CF-A81F-4B07-8EC8-F2239B713BC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22:rc7:*:*:*:*:*:*", "cpeNameId": "8F11D134-5A81-42D4-9027-FDF9160EF978"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*", "cpeNameId": "1B839A54-B355-4661-88F7-0DDEEAE700E9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22.2:*:*:*:*:*:*:*", "cpeNameId": "B9758247-C486-49C2-8B1A-7C946587FB91"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*", "cpeNameId": "7C8FF21D-8105-4B74-846B-73AC40E505B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*", "cpeNameId": "F4FF69C8-CCA6-44F0-8D64-2D990B4D6BC2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*", "cpeNameId": "04A420F1-1A90-4B8F-B9C0-DCD8F7DBAEC2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*", "cpeNameId": "C733AB5C-5C26-4C61-BFCA-367F7BC01C45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*", "cpeNameId": "77E95C6F-6DE6-41A9-B58C-BD3C4A64F155"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22.8:*:*:*:*:*:*:*", "cpeNameId": "3159E118-52DD-438A-8539-68401E466DBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22.9:*:*:*:*:*:*:*", "cpeNameId": "6B4DDF81-97B5-4CF2-BB2A-A537BD27E3F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22.10:*:*:*:*:*:*:*", "cpeNameId": "4896543A-B707-4AF7-9309-29C9FC82EF9A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22.11:*:*:*:*:*:*:*", "cpeNameId": "937E3A71-01F0-4469-8F6A-93B3BBCE5375"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22.12:*:*:*:*:*:*:*", "cpeNameId": "F464711C-D915-4D76-A926-139D0965F14D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22.13:*:*:*:*:*:*:*", "cpeNameId": "735ECD89-7A68-48DA-AA51-769B2BB0D303"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22.14:*:*:*:*:*:*:*", "cpeNameId": "4953E7DD-BA0E-49B4-8DD3-201AFFDDB0EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22.15:*:*:*:*:*:*:*", "cpeNameId": "9A18CDC3-A241-42FB-8FBE-38F2679C67B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22.16:*:*:*:*:*:*:*", "cpeNameId": "E81C6D76-C9B6-49F2-AC07-E3543064A924"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22.17:*:*:*:*:*:*:*", "cpeNameId": "D8AE7F68-AAF9-487D-AD1D-AF0A6295363B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22.18:*:*:*:*:*:*:*", "cpeNameId": "3DF384B9-E2F5-4C7C-B657-C40B2B6A7531"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22.19:*:*:*:*:*:*:*", "cpeNameId": "7CEDA023-893A-4EA9-B40E-80186D084DA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22.20:*:*:*:*:*:*:*", "cpeNameId": "8E1C5897-7149-4E91-BA83-516C152FBB9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22.21:*:*:*:*:*:*:*", "cpeNameId": "71083EFC-9FF7-4EFC-A0C5-21EB4C2B5DA7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.22.22:*:*:*:*:*:*:*", "cpeNameId": "FCD0B81B-640D-4BF0-8DCF-708E1BF44997"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*", "cpeNameId": "F899EDE8-660D-4179-8166-585CBD56912B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23:-:*:*:*:*:*:*", "cpeNameId": "0F9C73D7-24C5-4D6E-B7CA-7B0D858C7246"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc1:*:*:*:*:*:*", "cpeNameId": "0989C89A-74EA-408E-AC27-0F2B1116D972"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc2:*:*:*:*:*:*", "cpeNameId": "42392E36-6BE7-48B0-ABA6-BB822FC049EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc3:*:*:*:*:*:*", "cpeNameId": "8CF6751B-E269-40EC-ACC3-5F0BA888895E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc4:*:*:*:*:*:*", "cpeNameId": "78EFDE7D-F1A6-48EA-A930-7750EF03C813"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc5:*:*:*:*:*:*", "cpeNameId": "7B86BF4D-8E94-4273-A3AB-F4636ADE74FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc6:*:*:*:*:*:*", "cpeNameId": "4E201B7E-7829-4143-9B10-94F5405CCF14"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc7:*:*:*:*:*:*", "cpeNameId": "731BC0F5-0124-40C7-8952-4E861C892EFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc8:*:*:*:*:*:*", "cpeNameId": "C7C465B8-3A96-45E4-8A03-B1EC67683B28"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc9:*:*:*:*:*:*", "cpeNameId": "2CBFD323-BA51-473A-B2B3-DD293ABC871A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*", "cpeNameId": "562BF749-10BE-428C-B290-798F8B753286"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*", "cpeNameId": "741428B0-71BE-4319-AACB-91EFE03FA524"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*", "cpeNameId": "08EC977C-9DFA-4AAF-B0D1-B931AD1A51C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*", "cpeNameId": "F2777786-9633-4CFC-8CD6-AF1C114A913F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*", "cpeNameId": "0F6BBD72-4F59-40B8-802A-4AE975680033"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*", "cpeNameId": "141E6E61-E166-4111-AD8E-3FF747F3C70D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*", "cpeNameId": "F58426E0-FE1A-4702-8536-C4C46CC3A3DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23.8:*:*:*:*:*:*:*", "cpeNameId": "260C141F-D03D-4EAF-A53B-16272147A86B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*", "cpeNameId": "5968F83E-4924-4E51-9726-891079C59708"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23.10:*:*:*:*:*:*:*", "cpeNameId": "AFA3BEB9-5020-4130-A07D-2E3DDBB6FBA6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23.11:*:*:*:*:*:*:*", "cpeNameId": "3A0CB6DF-045E-48D4-893E-B36663E6125D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23.12:*:*:*:*:*:*:*", "cpeNameId": "325BE2DE-735F-40B5-92F8-C6E71BEF1A99"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23.13:*:*:*:*:*:*:*", "cpeNameId": "D1DC0074-5F78-4F15-AA90-5DFAC4FC5A4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23.14:*:*:*:*:*:*:*", "cpeNameId": "91BC293A-2CCB-4B70-9C72-24C8F693E568"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23.15:*:*:*:*:*:*:*", "cpeNameId": "F85C441B-085E-4F46-8C32-80F7A208EB0E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23.16:*:*:*:*:*:*:*", "cpeNameId": "09444FC7-3635-4436-AC17-113EF645FC01"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.23.17:*:*:*:*:*:*:*", "cpeNameId": "80090E1D-5100-4D14-926D-6F350327FBA4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*", "cpeNameId": "FC1168AE-393B-4265-98F2-A3F04DBB528A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.24:-:*:*:*:*:*:*", "cpeNameId": "FE9EE0D6-1A6D-4F88-97C4-A9505A6F856D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc1:*:*:*:*:*:*", "cpeNameId": "B7F4E2CA-53B0-4DBF-B630-763F672CB234"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc2:*:*:*:*:*:*", "cpeNameId": "FABD206A-0F60-4E6F-9195-BDD662A90987"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc3:*:*:*:*:*:*", "cpeNameId": "DE794BF5-5DC4-4B5D-B491-4B82E6FEB27A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc4:*:*:*:*:*:*", "cpeNameId": "F987AC8B-EEDA-4220-BD6D-3619D6A78F2C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc5:*:*:*:*:*:*", "cpeNameId": "A04749DB-1911-444F-B99A-E8A864522140"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc6:*:*:*:*:*:*", "cpeNameId": "EAC3D561-5940-4070-8D81-CFDC1CEC7798"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc7:*:*:*:*:*:*", "cpeNameId": "E546F2AF-8DB1-485F-9806-2DFC97B4B863"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc8:*:*:*:*:*:*", "cpeNameId": "8DE9E5BC-C5E8-447D-AF65-EFA52E7A5B4F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.24.1:*:*:*:*:*:*:*", "cpeNameId": "FCCA316C-7837-4C3E-A49B-FAB6EB495BAC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.24.2:*:*:*:*:*:*:*", "cpeNameId": "8E97A26D-D55D-410B-AA72-34AC62F5CF66"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.24.3:*:*:*:*:*:*:*", "cpeNameId": "1C902BEC-02CB-4DBF-AA6C-8C7CB17EE3D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.24.4:*:*:*:*:*:*:*", "cpeNameId": "A9870A06-1B49-4F3A-8C2D-315A106A1215"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.24.5:*:*:*:*:*:*:*", "cpeNameId": "FED92B84-FE68-42C2-8574-0C08AECA70AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.24.6:*:*:*:*:*:*:*", "cpeNameId": "6492B539-4020-4A6E-BD8A-CD885FC90943"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.24.7:*:*:*:*:*:*:*", "cpeNameId": "AD36F01D-6AAE-4D7A-BF2C-539C8DC132F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*", "cpeNameId": "A1071BFF-898A-4DC6-93A3-E95A1F2941CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25:-:*:*:*:*:*:*", "cpeNameId": "F72C5AA2-75A5-4C3B-8F34-5B0D34904B6A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25:rc1:*:*:*:*:*:*", "cpeNameId": "983AB272-A210-48CB-A1F7-B62DE582CDCD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25:rc2:*:*:*:*:*:*", "cpeNameId": "5305D38B-310F-493C-9138-D6F350536680"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25:rc3:*:*:*:*:*:*", "cpeNameId": "DBD38A9D-ADEC-49FC-898C-C4A1756B4BFB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25:rc4:*:*:*:*:*:*", "cpeNameId": "A0986B4D-8125-479A-AD7D-6353AF47B587"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25:rc5:*:*:*:*:*:*", "cpeNameId": "CEEF21D6-6A5E-4B02-9200-73C9AA6AD91C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25:rc6:*:*:*:*:*:*", "cpeNameId": "4492946F-F7D0-4457-A825-BEF0F6837174"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25:rc7:*:*:*:*:*:*", "cpeNameId": "EA7D62FB-8298-489F-82DA-1E3A0487F2C9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25:rc8:*:*:*:*:*:*", "cpeNameId": "36275902-C509-4634-B93E-C1DE23024B17"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25:rc9:*:*:*:*:*:*", "cpeNameId": "784B0C9A-EDD9-4AEB-8D70-899520854A68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*", "cpeNameId": "C555BB67-EED7-4D9A-ADD7-A7AA577A269B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*", "cpeNameId": "4387A8F8-129A-41CA-BDBB-0948B2B2FDD0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:*", "cpeNameId": "5E85D136-1C00-4818-9FDC-387CD3F0D07A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:*", "cpeNameId": "BD3F2189-2F6B-4D38-BCA4-D6120C8E0EF4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:*:*:*:*:*:*", "cpeNameId": "B310130C-6AE4-4EDF-AA4C-652E32D8BC52"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:*:*:*:*:*:*", "cpeNameId": "23CE5AE6-B3ED-48AD-86EA-F6B9729AFB79"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:*:*:*:*:*:*", "cpeNameId": "0286C9EE-1A7A-4A37-BC89-91D55AF443BF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:*:*:*:*:*:*", "cpeNameId": "ADFE784D-1292-4323-9A6E-5D89BA06C938"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25.9:*:*:*:*:*:*:*", "cpeNameId": "1EA55A4C-7C6A-44DF-B78B-8EBB407765DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25.10:*:*:*:*:*:*:*", "cpeNameId": "F5B3E918-51C9-4C8D-A2BC-B86E1354FB4D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25.11:*:*:*:*:*:*:*", "cpeNameId": "5394B8A8-C0CF-4689-A45F-D7F6949C4916"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25.12:*:*:*:*:*:*:*", "cpeNameId": "96D17BC3-17F6-4236-ADCE-3522376A1091"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25.13:*:*:*:*:*:*:*", "cpeNameId": "E93E92D4-6D48-4E01-BE1B-1D10560AAD05"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25.14:*:*:*:*:*:*:*", "cpeNameId": "0BCCFB39-620C-415A-9BE9-C4DFB0F09F05"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25.15:*:*:*:*:*:*:*", "cpeNameId": "8CAD33BA-EA75-44C6-BD5F-995C0D0F3955"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25.16:*:*:*:*:*:*:*", "cpeNameId": "F1474B07-6068-4EDD-84E5-41CC13C9EB98"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25.17:*:*:*:*:*:*:*", "cpeNameId": "A2DD704B-0386-4F91-9518-D763CE8269C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25.18:*:*:*:*:*:*:*", "cpeNameId": "7EC54A62-DA8C-4BDA-B652-B7C98A99FE6E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25.19:*:*:*:*:*:*:*", "cpeNameId": "5E4B2B2E-6F75-4A0B-B37D-0D6B80B3310D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.25.20:*:*:*:*:*:*:*", "cpeNameId": "0C30281F-8CA1-46A3-8BB4-CD36FEC99CD4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.26:*:*:*:*:*:*:*", "cpeNameId": "4A62D5E5-8773-4466-899D-2B0C99577A8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.26:-:*:*:*:*:*:*", "cpeNameId": "F615D17C-63EE-44BB-ABEB-E56B0324466D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.26:rc1:*:*:*:*:*:*", "cpeNameId": "46898195-81E5-4B6C-9979-0A7EEBBA100A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.26:rc2:*:*:*:*:*:*", "cpeNameId": "ED404F71-B3DD-4497-8FFD-3AA02DF9B50E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.26:rc3:*:*:*:*:*:*", "cpeNameId": "75EFA32A-138A-43FA-AFE9-7F4FE7A6CB53"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.26:rc4:*:*:*:*:*:*", "cpeNameId": "B46BBED3-2FA3-4663-9C06-618C1871D71B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.26:rc5:*:*:*:*:*:*", "cpeNameId": "4B6CED62-4106-4F88-A121-27AF4BB4C17D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.26:rc6:*:*:*:*:*:*", "cpeNameId": "3369829B-F537-446E-A8B3-2E7FF1205A9C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.26:rc7:*:*:*:*:*:*", "cpeNameId": "D0BC502A-D02E-4863-BACF-55C9041B327A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.26:rc8:*:*:*:*:*:*", "cpeNameId": "2C0A5E1B-DE35-4BD1-AD09-B847BA76CBC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.26:rc9:*:*:*:*:*:*", "cpeNameId": "AB19A9EE-8236-485A-8C7B-119580A6F3C5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.26.1:*:*:*:*:*:*:*", "cpeNameId": "DE3E36D5-4331-46E8-ACF6-AA1E94CA8869"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.26.2:*:*:*:*:*:*:*", "cpeNameId": "16062DAC-D861-479C-B4F3-B293A4391CC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.26.3:*:*:*:*:*:*:*", "cpeNameId": "DFA74C56-9354-490A-BE76-54D16AA99803"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.26.4:*:*:*:*:*:*:*", "cpeNameId": "F5D51B53-22C2-4E28-8052-9F2FFF10178E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.26.5:*:*:*:*:*:*:*", "cpeNameId": "A2B56597-8237-44FF-9EB5-4AAB2A53A91F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.26.6:*:*:*:*:*:*:*", "cpeNameId": "18E811C8-4BEB-4E26-BFF7-5885553C91AF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.26.7:*:*:*:*:*:*:*", "cpeNameId": "EF704FF9-35B8-40F6-9772-8AAF4835E281"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.26.8:*:*:*:*:*:*:*", "cpeNameId": "E32239A8-9CAA-413E-868F-B6A6D8CA8091"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27:*:*:*:*:*:*:*", "cpeNameId": "2790E826-ABA8-4AD2-8EA5-A9964BB534A9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27:-:*:*:*:*:*:*", "cpeNameId": "0DF899BD-4622-418D-97BD-9C1D4951C9C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc1:*:*:*:*:*:*", "cpeNameId": "5B20145D-3A00-4393-85EB-AB9013909AFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc2:*:*:*:*:*:*", "cpeNameId": "1A709E25-B7AA-4E0D-852B-6DBD7F880990"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc3:*:*:*:*:*:*", "cpeNameId": "150829BD-7F83-4EEF-832E-B77084FA7CE0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc4:*:*:*:*:*:*", "cpeNameId": "0DCE95CF-E111-4635-A3E8-A2FD4FBF0146"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc5:*:*:*:*:*:*", "cpeNameId": "0F92F357-AAE6-4B1D-A98B-14BC0D69C796"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc6:*:*:*:*:*:*", "cpeNameId": "56FEE000-39CE-407A-92FC-1A9B0FB30BA9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc7:*:*:*:*:*:*", "cpeNameId": "472867B2-3767-4AD0-AA56-AC131E92F74C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc8:*:*:*:*:*:*", "cpeNameId": "94046B34-8587-451A-88DB-08A21630F886"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc9:*:*:*:*:*:*", "cpeNameId": "958CD977-4936-4773-9510-AA4D4AD95A62"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.1:*:*:*:*:*:*:*", "cpeNameId": "E5E533E0-3433-4563-A5B1-4019A60967E3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.2:*:*:*:*:*:*:*", "cpeNameId": "1B8EA349-6D08-41EA-BFB5-BB54A6BA54D6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.3:*:*:*:*:*:*:*", "cpeNameId": "E2476EE2-74EB-4B7E-977D-838ADDD32BA0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.4:*:*:*:*:*:*:*", "cpeNameId": "A36309D9-EE60-4375-B533-2CFA96AB57B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.5:*:*:*:*:*:*:*", "cpeNameId": "05BDF88D-8BB4-4FA6-8750-3D3BE700756F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.6:*:*:*:*:*:*:*", "cpeNameId": "4BE8605D-64CE-48C0-B960-789A120AD07D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.7:*:*:*:*:*:*:*", "cpeNameId": "0E0B4678-634E-47EA-BB83-E8D93A08DC32"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.8:*:*:*:*:*:*:*", "cpeNameId": "DD4983E1-3798-49A1-BAA7-E4B841E66E4E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.9:*:*:*:*:*:*:*", "cpeNameId": "78BC09AF-A41A-40D8-A17B-4249CCCABD05"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.10:*:*:*:*:*:*:*", "cpeNameId": "EA82C261-9D48-49E5-9FD8-39DCD8E6A39F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.11:*:*:*:*:*:*:*", "cpeNameId": "65AD90CE-1720-45DE-BE98-887AA0BB844E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.12:*:*:*:*:*:*:*", "cpeNameId": "15826A72-064E-4D06-BFA8-5A6757FD26F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.13:*:*:*:*:*:*:*", "cpeNameId": "DD52275D-40E2-4253-85F1-1C71864B4CCD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.14:*:*:*:*:*:*:*", "cpeNameId": "347A8267-499B-4EC5-9D27-D6CBBB231A39"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.15:*:*:*:*:*:*:*", "cpeNameId": "0A70CE63-8D40-4DA5-8AB7-1487830FE3D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.16:*:*:*:*:*:*:*", "cpeNameId": "7A43F0B5-E415-426E-BA98-2185D4C4D818"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.17:*:*:*:*:*:*:*", "cpeNameId": "61E08977-1B97-405E-8D38-0F279138A1D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.18:*:*:*:*:*:*:*", "cpeNameId": "C818E1AE-E774-49FF-91F1-0C6C21C01F48"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.19:*:*:*:*:*:*:*", "cpeNameId": "CC57F9BC-E18A-4893-A6D6-5B964136B801"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.20:*:*:*:*:*:*:*", "cpeNameId": "52A97B62-35C0-4460-AB8A-A72333D73662"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.21:*:*:*:*:*:*:*", "cpeNameId": "7D6229A0-1E7C-412C-AD96-BA8DDFE0DA69"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.22:*:*:*:*:*:*:*", "cpeNameId": "04D91CD6-EE7C-48EC-89F0-EDABCC09D57F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.23:*:*:*:*:*:*:*", "cpeNameId": "099F70DF-74CE-4AFE-A236-7B810AC52A3A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.24:*:*:*:*:*:*:*", "cpeNameId": "E786E389-48B5-4F47-807C-B04BACE1DA31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.25:*:*:*:*:*:*:*", "cpeNameId": "C297DD6A-638A-4A39-AF16-C4EB8FBC6636"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.26:*:*:*:*:*:*:*", "cpeNameId": "F2174C61-0E63-46B3-B862-DB975200101F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.27:*:*:*:*:*:*:*", "cpeNameId": "88CDAE17-4187-46A5-B1E9-58A720560CD0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.28:*:*:*:*:*:*:*", "cpeNameId": "98B65B74-6BD5-4B4C-A755-71F7D5E86E49"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.29:*:*:*:*:*:*:*", "cpeNameId": "D2F56B19-53B0-4B46-BC10-A3A3C6ECBEC6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.30:*:*:*:*:*:*:*", "cpeNameId": "072FB2C5-BDB8-433A-97A1-9E03CC2AC5F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.31:*:*:*:*:*:*:*", "cpeNameId": "ADBF15ED-CF10-4594-82C5-E07C3ABFA91A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.32:*:*:*:*:*:*:*", "cpeNameId": "D39CF73F-85BA-4369-A922-66C2D378695D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.33:*:*:*:*:*:*:*", "cpeNameId": "BF4A56DD-0EA5-46A0-89F4-0B0C58243B7D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.34:*:*:*:*:*:*:*", "cpeNameId": "19F0D67E-631D-4CDE-B709-54157E35B9D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.35:*:*:*:*:*:*:*", "cpeNameId": "D1B36EA6-CF60-4C04-8287-D702B9E0E6F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.36:*:*:*:*:*:*:*", "cpeNameId": "45574092-C4A7-4717-ABF5-04A212518E46"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.37:*:*:*:*:*:*:*", "cpeNameId": "AE746EF3-51ED-4E27-B54F-730589843358"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.38:*:*:*:*:*:*:*", "cpeNameId": "223C86A8-448E-4061-933C-7192520DBF2D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.39:*:*:*:*:*:*:*", "cpeNameId": "0D81CEA2-087C-4454-97B1-DE8EA7A5D838"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.40:*:*:*:*:*:*:*", "cpeNameId": "DC82114E-0E4E-477B-B470-AE06B623816B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.41:*:*:*:*:*:*:*", "cpeNameId": "CDB6AB78-8D68-4F8A-8DD0-437C95D5ABE4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.42:*:*:*:*:*:*:*", "cpeNameId": "A43260B8-5585-4E18-B780-6687ABE8FB3E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.43:*:*:*:*:*:*:*", "cpeNameId": "C75BF8F5-D9C7-4AB3-A1C4-C582930D0131"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.44:*:*:*:*:*:*:*", "cpeNameId": "B270E648-24C9-4306-A9AA-9FAE95731FED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.45:*:*:*:*:*:*:*", "cpeNameId": "CDB23066-513D-4A5C-AACD-D2091830BFEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.46:*:*:*:*:*:*:*", "cpeNameId": "0AC68B1E-619E-41E5-8775-E18E8E134E04"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.47:*:*:*:*:*:*:*", "cpeNameId": "239EB815-BDE5-466A-A0AF-D69304E081EE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.48:*:*:*:*:*:*:*", "cpeNameId": "0E31D12F-2AF1-45F0-BDB3-BAEB6B422670"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.49:*:*:*:*:*:*:*", "cpeNameId": "EC1BD23B-8DA3-469D-9BDB-CEA32D29623C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.50:*:*:*:*:*:*:*", "cpeNameId": "BB74365F-01F9-42CA-ADA4-C8DF55F8A913"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.51:*:*:*:*:*:*:*", "cpeNameId": "08E8D5B2-9DAB-42F3-96A9-7A7EE3434E65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.52:*:*:*:*:*:*:*", "cpeNameId": "1DC0EB32-01BE-4EC8-AB44-4E157B999D0D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.53:*:*:*:*:*:*:*", "cpeNameId": "82B2940F-FC6E-4380-AFA9-D81897C7CE50"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.54:*:*:*:*:*:*:*", "cpeNameId": "6447E5AE-619E-444C-A23F-C287C0B20044"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.55:*:*:*:*:*:*:*", "cpeNameId": "86B8E235-B91D-41EE-8D45-BB912733ACC8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.56:*:*:*:*:*:*:*", "cpeNameId": "C5B65939-DB29-45A8-85D1-6C814C5DA778"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.57:*:*:*:*:*:*:*", "cpeNameId": "B73A29CD-2502-47AD-9061-000C559BB7E7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.58:*:*:*:*:*:*:*", "cpeNameId": "92FB187F-66E9-4DCD-BED9-522F3079D42F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.59:*:*:*:*:*:*:*", "cpeNameId": "EAC43A22-676C-42EB-8F81-994A51EDCD53"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.60:*:*:*:*:*:*:*", "cpeNameId": "343321F0-2753-47AA-BBA4-C20376BDCCE6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.61:*:*:*:*:*:*:*", "cpeNameId": "EEE9C54F-1BCE-4AF9-8C81-75FC8624A8CE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.27.62:*:*:*:*:*:*:*", "cpeNameId": "0BE18EBB-7FFE-4741-80F1-DEE19EC41708"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.28:*:*:*:*:*:*:*", "cpeNameId": "3E259BBA-BD85-456A-8F24-5CE2F9D73E0D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.28:-:*:*:*:*:*:*", "cpeNameId": "9C937810-3BE5-48C1-9FA0-1666E8309C50"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc1:*:*:*:*:*:*", "cpeNameId": "F6B6D177-8587-4DD2-B5A2-D7E1A7AACEBC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc2:*:*:*:*:*:*", "cpeNameId": "1D4B4CBD-528F-4381-8902-5E7338025136"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc3:*:*:*:*:*:*", "cpeNameId": "10C0C788-A8AA-4B42-8C36-BEE831DBF83B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc4:*:*:*:*:*:*", "cpeNameId": "4C530FAA-D8D8-4860-8133-DFE0837106B2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc5:*:*:*:*:*:*", "cpeNameId": "46B4F598-4A98-4943-9036-FCD94656EED1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc6:*:*:*:*:*:*", "cpeNameId": "0B4F7700-E64E-4CBA-A777-AF33E62E5F5C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc7:*:*:*:*:*:*", "cpeNameId": "AE60E3EE-BB1D-4BC8-945A-C71569C70EF6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc8:*:*:*:*:*:*", "cpeNameId": "770DFF4B-4436-45E8-A4DD-B5E2B43EF22A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc9:*:*:*:*:*:*", "cpeNameId": "6B08B85E-42B0-403F-876C-B5A926F1C7C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.28.1:*:*:*:*:*:*:*", "cpeNameId": "1ED7C557-830D-4B61-9C6E-7FF7717B544C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.28.2:*:*:*:*:*:*:*", "cpeNameId": "09B7E5EB-3F81-4957-B813-24BDE84F95C9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.28.3:*:*:*:*:*:*:*", "cpeNameId": "49668897-85CB-4870-96CB-BEBD3FE53A0A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.28.4:*:*:*:*:*:*:*", "cpeNameId": "0D226286-EDEF-467F-B430-4BD1D1932726"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.28.5:*:*:*:*:*:*:*", "cpeNameId": "BF7087A5-9A38-411F-B4A1-8CAD18FC6977"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.28.6:*:*:*:*:*:*:*", "cpeNameId": "F0B865E7-DCD7-4E6E-AA6F-92B15BBE57BE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.28.7:*:*:*:*:*:*:*", "cpeNameId": "9FEA0E3F-8F2A-4077-9985-8DE2A055F362"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.28.8:*:*:*:*:*:*:*", "cpeNameId": "BE173659-26D4-49E1-B1B2-EC6BCD3F5879"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.28.9:*:*:*:*:*:*:*", "cpeNameId": "4E897E7B-3284-4E9F-AE1C-1D3F7AD780B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.28.10:*:*:*:*:*:*:*", "cpeNameId": "195078CF-C766-44CB-A514-7589C94A315E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.29:*:*:*:*:*:*:*", "cpeNameId": "70E78C9F-AD53-46BB-9AC0-6981DE5BDB73"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.29:-:*:*:*:*:*:*", "cpeNameId": "0BB6EE8C-8C31-4D1A-828B-4818CF07343A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc1:*:*:*:*:*:*", "cpeNameId": "DB6B4A0E-C9DC-4009-B268-936590A92FA6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc2:*:*:*:*:*:*", "cpeNameId": "6C70B8CE-BAD8-4BB0-81B8-56C67BC63FEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc3:*:*:*:*:*:*", "cpeNameId": "6429C36E-A421-4F90-8A45-200DDD939119"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc4:*:*:*:*:*:*", "cpeNameId": "941CB1DE-140F-4A1E-AC50-E717D6925D03"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc5:*:*:*:*:*:*", "cpeNameId": "8041C971-6E89-49F2-9586-00EDAD482433"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc6:*:*:*:*:*:*", "cpeNameId": "22FA1B82-9783-40DB-B0D0-A8A5DFB267BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc7:*:*:*:*:*:*", "cpeNameId": "7E2BD170-B0AF-42DF-B5DC-03FCC30984AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc8:*:*:*:*:*:*", "cpeNameId": "54407239-6C32-438C-9FD4-30FA687A942B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.29.1:*:*:*:*:*:*:*", "cpeNameId": "555CA3F6-C7C4-4A45-8450-7EFB248F82C2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.29.2:*:*:*:*:*:*:*", "cpeNameId": "37861F7D-9F16-4A60-949B-39203B201457"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.29.3:*:*:*:*:*:*:*", "cpeNameId": "4ABE382F-45DC-4186-8EA6-27FE6C227677"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.29.4:*:*:*:*:*:*:*", "cpeNameId": "F75E3CDD-BC58-4E45-A90A-F84C4224FD6B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.29.5:*:*:*:*:*:*:*", "cpeNameId": "B827F93E-20F9-498D-9584-1B2904D75FF1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.29.6:*:*:*:*:*:*:*", "cpeNameId": "51C632EB-6311-456B-941F-0492D883387C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.30:*:*:*:*:*:*:*", "cpeNameId": "73C3197A-810E-4593-AFEF-9363ED7A8DCA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.30:-:*:*:*:*:*:*", "cpeNameId": "16391C3F-5031-4F6F-B71C-413686EEC4D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc1:*:*:*:*:*:*", "cpeNameId": "FA3E029C-5432-4B0D-83C6-772BDB315878"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc2:*:*:*:*:*:*", "cpeNameId": "6749D71C-BB66-41D6-BF5E-E83B96993755"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc3:*:*:*:*:*:*", "cpeNameId": "CD174C4D-AC77-4A7D-AC9F-C1E05BC5A9F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc4:*:*:*:*:*:*", "cpeNameId": "3EDFAC9B-F0DF-4114-8FF8-4DE1E17DC3F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc5:*:*:*:*:*:*", "cpeNameId": "D85B3958-576D-460F-A6B0-0396D6A3069A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc6:*:*:*:*:*:*", "cpeNameId": "28683ECD-A142-41FB-AC67-1F075BFDE039"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc7:*:*:*:*:*:*", "cpeNameId": "54506839-8D39-4E03-B4BB-B229BE47193C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc8:*:*:*:*:*:*", "cpeNameId": "E8176DC9-66B8-4B0F-A626-AE6717158078"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.30.1:*:*:*:*:*:*:*", "cpeNameId": "9765B610-1A09-42F3-B428-1E7734B8302A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.30.2:*:*:*:*:*:*:*", "cpeNameId": "07755770-3DD8-4B95-977D-EC4A9A170C60"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.30.3:*:*:*:*:*:*:*", "cpeNameId": "1791B124-A22B-4581-8902-610B41DA219D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.30.4:*:*:*:*:*:*:*", "cpeNameId": "D531D6F0-9334-4F50-8BFB-E8023947AD91"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.30.5:*:*:*:*:*:*:*", "cpeNameId": "4301138C-DC55-4E2F-B546-E5BDBFC2D223"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.30.6:*:*:*:*:*:*:*", "cpeNameId": "52BE2D83-F300-4738-A457-72AC1EC750D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.30.7:*:*:*:*:*:*:*", "cpeNameId": "82DC10BA-DF42-42BF-A85B-25B620BCBC50"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.30.8:*:*:*:*:*:*:*", "cpeNameId": "8FEE9116-082A-41DE-A603-55B9DBEC277C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.30.9:*:*:*:*:*:*:*", "cpeNameId": "37426594-067E-4E40-A219-F436A2A76B5A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.30.10:*:*:*:*:*:*:*", "cpeNameId": "E379641B-5EF1-418F-A573-1E257372FC2C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.31:*:*:*:*:*:*:*", "cpeNameId": "32107018-3176-4461-B695-CA90B11CEFF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.31:-:*:*:*:*:*:*", "cpeNameId": "904E45B0-596D-445F-88F0-4758329E965A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc1:*:*:*:*:*:*", "cpeNameId": "E78A3426-31D6-47C5-8530-7BBA5E0CFF7D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc2:*:*:*:*:*:*", "cpeNameId": "5683FD7B-3EBA-4E6D-A9D4-A058551335B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc3:*:*:*:*:*:*", "cpeNameId": "58A85B13-BC9D-4A66-8ABF-D57794F353C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc4:*:*:*:*:*:*", "cpeNameId": "676CC411-2EF1-42C1-816B-915E2341B7F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc5:*:*:*:*:*:*", "cpeNameId": "51486B24-0FA2-41AD-87D1-B7DE198ACCE7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc6:*:*:*:*:*:*", "cpeNameId": "F774E2E4-D630-4340-9460-D79869DDC5A3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc7:*:*:*:*:*:*", "cpeNameId": "372DEBD7-AC3B-4184-834B-D7E3EB4E7ECB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc8:*:*:*:*:*:*", "cpeNameId": "B211AAF4-D3CC-469A-9375-302029AD5090"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc9:*:*:*:*:*:*", "cpeNameId": "26F3FD0F-4668-43F3-BC8C-3888DB91440A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.31.1:*:*:*:*:*:*:*", "cpeNameId": "31AFDC12-3D37-4914-B0BC-0FA91FCC285B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.31.2:*:*:*:*:*:*:*", "cpeNameId": "B6D7824A-6FA0-4A30-8FCA-ABFB9ACB4854"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.31.3:*:*:*:*:*:*:*", "cpeNameId": "4FFF9DF3-ED46-4E5C-B13E-4AADB79EB422"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.31.4:*:*:*:*:*:*:*", "cpeNameId": "0EA0E052-1F4F-44F8-8882-633B5409F72B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.31.5:*:*:*:*:*:*:*", "cpeNameId": "88F0648F-F89A-4A16-B160-66C6E87D03AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.31.6:*:*:*:*:*:*:*", "cpeNameId": "49477242-0936-4F64-B8CF-78BE5DC44612"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.31.7:*:*:*:*:*:*:*", "cpeNameId": "9C9AA31E-7B53-4192-9AC0-76B0B071B88C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.31.8:*:*:*:*:*:*:*", "cpeNameId": "35F94EF7-A596-4915-B21B-28F17A2F5F79"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.31.9:*:*:*:*:*:*:*", "cpeNameId": "25508389-F678-48E7-BC50-A553D99833C5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.31.10:*:*:*:*:*:*:*", "cpeNameId": "CE889437-2B1D-4B63-8B38-7B59AA2C8547"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.31.11:*:*:*:*:*:*:*", "cpeNameId": "9724A842-594E-4FDC-B466-A44510F53A34"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.31.12:*:*:*:*:*:*:*", "cpeNameId": "B2CD6601-A07B-4F7B-BE19-603388314A80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.31.13:*:*:*:*:*:*:*", "cpeNameId": "EC02B61D-6176-41B7-A4A9-992BD0C677A0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.31.14:*:*:*:*:*:*:*", "cpeNameId": "018D332C-E9AD-4707-A626-D94DC66E4DD3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32:*:*:*:*:*:*:*", "cpeNameId": "B84DD25E-9236-47B3-A2F3-DEE51128FDB1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32:-:*:*:*:*:*:*", "cpeNameId": "FF1E2599-A7FD-4F08-9714-82CB19ADEA17"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32:rc1:*:*:*:*:*:*", "cpeNameId": "284975E1-4145-4019-B896-6DC6D43DE002"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32:rc2:*:*:*:*:*:*", "cpeNameId": "F748C7D3-B079-4291-B6F5-D54C343E71D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32:rc3:*:*:*:*:*:*", "cpeNameId": "06A9BF66-3407-478A-8062-5F888828DC87"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32:rc4:*:*:*:*:*:*", "cpeNameId": "5683DB07-E0C6-49B6-81BF-CF185778B8DE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32:rc5:*:*:*:*:*:*", "cpeNameId": "A8D2C95D-E6DC-4323-9C09-9AE6D3D280FF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32:rc6:*:*:*:*:*:*", "cpeNameId": "286D2CCA-C82F-476D-841E-9595F5BCB187"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32:rc7:*:*:*:*:*:*", "cpeNameId": "33353C58-1BE0-4934-8911-2A82243F8D81"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32:rc8:*:*:*:*:*:*", "cpeNameId": "6C925EB0-C9E7-4EDB-95A6-F44F0C3DD41D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.1:*:*:*:*:*:*:*", "cpeNameId": "7E7F5713-0396-4642-A4BA-CF19784AA92C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.2:*:*:*:*:*:*:*", "cpeNameId": "60F9012F-E04C-4114-AEDF-ED120B492993"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.3:*:*:*:*:*:*:*", "cpeNameId": "6BCC7080-4892-4BD1-A995-E81BEECC4532"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.4:*:*:*:*:*:*:*", "cpeNameId": "F011FFE9-8D65-4A60-AC17-8594D2945D9A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.5:*:*:*:*:*:*:*", "cpeNameId": "BB42DBF5-C816-4416-A89B-4A8E014AFFCB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.6:*:*:*:*:*:*:*", "cpeNameId": "E21ADCCB-8C05-4587-AAB0-A3FB9CB217B6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.7:*:*:*:*:*:*:*", "cpeNameId": "9F8F82AB-1FAD-4F64-808F-9BE482083837"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.8:*:*:*:*:*:*:*", "cpeNameId": "3C3C359B-1945-480D-A418-49BB5A98D4AF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.9:*:*:*:*:*:*:*", "cpeNameId": "8C4BBF9A-4D46-4E0B-9EB9-F232E3C850C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.10:*:*:*:*:*:*:*", "cpeNameId": "5BBB66FB-CC1C-4D83-8E12-395E1F9A224E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.11:*:*:*:*:*:*:*", "cpeNameId": "46F85D55-61F7-4133-8285-476B2B9502E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.12:*:*:*:*:*:*:*", "cpeNameId": "9FD63890-5E2D-4B82-AF8E-D694E734B255"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.13:*:*:*:*:*:*:*", "cpeNameId": "F763CEB2-BAD5-49B1-8A1C-4822499EFF4C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.14:*:*:*:*:*:*:*", "cpeNameId": "D8295337-F7C6-4A82-8E4A-D94D92DDB8CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.15:*:*:*:*:*:*:*", "cpeNameId": "88A39279-E679-413F-83EB-AEEC45FC635C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.16:*:*:*:*:*:*:*", "cpeNameId": "FDCB43C3-EED0-41DA-AEC7-DACF6C89D76B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.17:*:*:*:*:*:*:*", "cpeNameId": "04710DDC-353D-41C7-B64B-66947FAD65A5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.18:*:*:*:*:*:*:*", "cpeNameId": "E64C2B5B-8700-4F0F-A4F5-9947E078D4AD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.19:*:*:*:*:*:*:*", "cpeNameId": "A8E4C5F1-1E45-4E5B-9A6F-0DEE81FA9579"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.20:*:*:*:*:*:*:*", "cpeNameId": "0D0CF31A-64CE-4735-BFAE-3943C70868D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.21:*:*:*:*:*:*:*", "cpeNameId": "1A7F67CF-CA68-4EB4-972D-B4D77951FE8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.22:*:*:*:*:*:*:*", "cpeNameId": "F82E1D4E-F3A0-49CB-9ACA-DD50AAF65450"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.23:*:*:*:*:*:*:*", "cpeNameId": "7342B377-1EB4-4FEF-858E-FD01F39D028E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.24:*:*:*:*:*:*:*", "cpeNameId": "23A18BF8-F590-4E19-90F9-689A19F93D18"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.25:*:*:*:*:*:*:*", "cpeNameId": "DC29FE99-8420-4B3D-8422-71F239A8C83E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.26:*:*:*:*:*:*:*", "cpeNameId": "BFBADBE1-D59E-4AD6-8E51-D7819A06D11F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.27:*:*:*:*:*:*:*", "cpeNameId": "C72A0E7B-F4F7-47B5-8511-E82D0777CA59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.28:*:*:*:*:*:*:*", "cpeNameId": "B548C6E1-EBAA-4EC2-A5D8-CB65CCC0EA8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.29:*:*:*:*:*:*:*", "cpeNameId": "B3F260A1-6E92-4667-9576-FD6D42D98BF6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.30:*:*:*:*:*:*:*", "cpeNameId": "4D80339B-16C2-4099-B28D-F260ECCE66FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.31:*:*:*:*:*:*:*", "cpeNameId": "EF2DDA37-C9D0-499E-A22D-6002B7118796"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.32:*:*:*:*:*:*:*", "cpeNameId": "71898FCF-4471-4ED7-A1C2-7E657F50710C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.33:*:*:*:*:*:*:*", "cpeNameId": "ABCF5DCE-21E4-4FD3-8A99-8A187EC8268E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.33:test79:*:*:*:*:*:*", "cpeNameId": "CB1C0DE5-7A2E-4DD6-B809-114AE40251E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.34:*:*:*:*:*:*:*", "cpeNameId": "0A52F791-A986-4DDE-8EB9-DE44E056410C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.35:*:*:*:*:*:*:*", "cpeNameId": "0CD77DA5-2E91-4A98-B94C-0EEC06B93BFB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.36:*:*:*:*:*:*:*", "cpeNameId": "059A6461-4777-4A16-B2CE-98794F9370BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.37:*:*:*:*:*:*:*", "cpeNameId": "C04C8FF7-673B-4326-97CA-127564571C7C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.38:*:*:*:*:*:*:*", "cpeNameId": "4ACEECFB-4647-4204-AF6C-8317420C1943"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.39:*:*:*:*:*:*:*", "cpeNameId": "45BD9A96-7AA7-4CD6-AEF3-73C461EB633D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.40:*:*:*:*:*:*:*", "cpeNameId": "A8F94D8A-3C55-432D-A3BC-4F09725F35F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.41:*:*:*:*:*:*:*", "cpeNameId": "17703EB7-F195-49A7-B2DC-73E8431672D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.42:*:*:*:*:*:*:*", "cpeNameId": "764E27F8-EE1F-48CE-BFAA-F9DE29531A7D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.43:*:*:*:*:*:*:*", "cpeNameId": "E37D2797-038C-43F2-ABD4-AEF8F4CF2781"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.44:*:*:*:*:*:*:*", "cpeNameId": "F9CBC127-2CFB-4CC0-881F-58479DC3E9AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.45:*:*:*:*:*:*:*", "cpeNameId": "76DC87BF-E081-4C85-985B-A093A5C6AB98"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.46:*:*:*:*:*:*:*", "cpeNameId": "299AA2FA-C7C3-41B3-8C3B-E75092F52BD9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.47:*:*:*:*:*:*:*", "cpeNameId": "47F5C2B8-EEC2-469B-A01A-BB00F5450C75"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.48:*:*:*:*:*:*:*", "cpeNameId": "B3E73505-8209-495A-9B0B-5D15428E66A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.49:*:*:*:*:*:*:*", "cpeNameId": "51B8B995-D654-4877-A0F7-0649088750CC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.50:*:*:*:*:*:*:*", "cpeNameId": "59AF4A34-971B-41A5-A770-6C86DD6957C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.51:*:*:*:*:*:*:*", "cpeNameId": "0EBDC718-939A-4757-976B-6B015E2AE6D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.52:*:*:*:*:*:*:*", "cpeNameId": "7E9C15D4-1CEB-4FB1-A2E4-8D2D89A8968E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.53:*:*:*:*:*:*:*", "cpeNameId": "0939267C-0008-4970-B859-160FC265AA06"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.54:*:*:*:*:*:*:*", "cpeNameId": "6E1000E5-2C6E-485A-BDF5-693A60BF4D43"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.55:*:*:*:*:*:*:*", "cpeNameId": "71E7147B-F66E-453D-8340-848308CE841D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.56:*:*:*:*:*:*:*", "cpeNameId": "1A5F1F56-5613-46C8-A3C3-F52829AF2CB4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.57:*:*:*:*:*:*:*", "cpeNameId": "BFA176A4-D5D3-4D24-9490-6C1623EC09D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.32.58:*:*:*:*:*:*:*", "cpeNameId": "ED63AF7E-181E-4D8B-A93C-CD0A23F5D3AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33:*:*:*:*:*:*:*", "cpeNameId": "E0701937-B1E4-449C-8EDA-C25CF3CA068F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33:-:*:*:*:*:*:*", "cpeNameId": "41F18F48-7992-41E5-8E90-6699F61D402D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc1:*:*:*:*:*:*", "cpeNameId": "5DCECCE8-92EF-49BC-BC1B-491072D123D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc2:*:*:*:*:*:*", "cpeNameId": "28A987BC-7671-4454-961E-6FE744AE74AA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc3:*:*:*:*:*:*", "cpeNameId": "8DDB9D41-21A0-465E-B133-6C597CBF9536"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc4:*:*:*:*:*:*", "cpeNameId": "7E2C2957-3552-4DE7-B7E2-EED2BC12C6BF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc5:*:*:*:*:*:*", "cpeNameId": "0F35C08D-FD70-477B-8AD4-2BECB5328FA8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc6:*:*:*:*:*:*", "cpeNameId": "8B5C3794-D0A5-4955-A170-7C2549237C8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc7:*:*:*:*:*:*", "cpeNameId": "40FEA887-02C4-4C93-B63E-05D8BEA89FC1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc8:*:*:*:*:*:*", "cpeNameId": "A373875A-99F2-45FD-809D-D7C560688B99"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33.1:*:*:*:*:*:*:*", "cpeNameId": "FFB81A8B-9955-4803-B1AD-A238AB44F5A6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33.2:*:*:*:*:*:*:*", "cpeNameId": "2AA52B35-4765-49A9-8C1D-EE35B9861716"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33.3:*:*:*:*:*:*:*", "cpeNameId": "CB193280-16DB-466F-AA85-769366BFF06F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33.4:*:*:*:*:*:*:*", "cpeNameId": "AD765585-16C1-40BA-8D46-39F9229BF863"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33.5:*:*:*:*:*:*:*", "cpeNameId": "DB2393AC-C887-4E7A-B0B8-48F8995F00C7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33.6:*:*:*:*:*:*:*", "cpeNameId": "3AE609BD-09AC-4CF9-ACF2-5C523C508BDD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33.7:*:*:*:*:*:*:*", "cpeNameId": "F8863509-1699-46F8-AE0E-FA196D38FA70"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33.7:*:*:*:*:*:x86:*", "cpeNameId": "ABC7C1CB-8C78-442B-B917-372CFABA6899"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33.8:*:*:*:*:*:*:*", "cpeNameId": "9E8CB108-0630-4678-A138-558509FD4087"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33.9:*:*:*:*:*:*:*", "cpeNameId": "F749DFD5-086A-4420-A76D-1A02A09224A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33.10:*:*:*:*:*:*:*", "cpeNameId": "2B423029-28A5-436B-81E4-84BC4226DE6B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33.11:*:*:*:*:*:*:*", "cpeNameId": "6C06B714-F720-44C5-AB3D-E8FFC014D79E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33.12:*:*:*:*:*:*:*", "cpeNameId": "6E00BCAA-1C2E-4765-B0D1-0F0DAA9DD746"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33.13:*:*:*:*:*:*:*", "cpeNameId": "C09CD363-0B8A-4D46-B742-52A182D62DDB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33.14:*:*:*:*:*:*:*", "cpeNameId": "A3C0F51F-B47B-4939-9DE7-852BF0BA1DDA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33.15:*:*:*:*:*:*:*", "cpeNameId": "D3406D47-E643-45EA-938E-6237D7A796BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33.16:*:*:*:*:*:*:*", "cpeNameId": "0B989579-A07D-4FC4-A935-095269100AF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33.17:*:*:*:*:*:*:*", "cpeNameId": "37D4AC37-54BB-4243-B356-FD488E8E6AF7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33.18:*:*:*:*:*:*:*", "cpeNameId": "BE1B43E6-4E25-4B12-95B3-0959361E32F7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33.19:*:*:*:*:*:*:*", "cpeNameId": "C748F822-D4CF-4F3E-BBAA-9B7D191CB1E3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.33.20:*:*:*:*:*:*:*", "cpeNameId": "16472F93-3A43-4ED4-A861-77E57C93FBAF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.34:*:*:*:*:*:*:*", "cpeNameId": "6E64BEEE-7AE2-41BC-9352-29FEB574E415"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.34:-:*:*:*:*:*:*", "cpeNameId": "B5624367-44EC-4607-9C48-9401AB9BBF9C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.34:rc1:*:*:*:*:*:*", "cpeNameId": "D8193475-2448-4475-86F0-350A9B00B0B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.34:rc2:*:*:*:*:*:*", "cpeNameId": "78583118-0C98-4634-81DB-257595D06332"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.34:rc3:*:*:*:*:*:*", "cpeNameId": "CA50680B-2826-4A93-96B3-27C6EE324433"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.34:rc4:*:*:*:*:*:*", "cpeNameId": "1573078B-0CBB-4B33-9C05-10E56B15C607"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.34:rc5:*:*:*:*:*:*", "cpeNameId": "AD966433-4E32-45DD-92FA-B11DF3D2039F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.34:rc6:*:*:*:*:*:*", "cpeNameId": "F3A17922-41D4-4885-8193-EE39C8A4DDD8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.34:rc7:*:*:*:*:*:*", "cpeNameId": "27A6BFE5-0DB4-41C2-991B-96E9B0746644"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.34.1:*:*:*:*:*:*:*", "cpeNameId": "97A96C2A-73E2-4A41-BFF9-36BA519F3887"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.34.2:*:*:*:*:*:*:*", "cpeNameId": "F2D9B0C3-4B00-4248-897E-6A1EB2432140"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.34.3:*:*:*:*:*:*:*", "cpeNameId": "E2B4241F-3464-46FC-9E4E-2AD9DDF8D3D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.34.4:*:*:*:*:*:*:*", "cpeNameId": "3C6AA2DA-DE73-4F04-BFB2-FC7A674C0E90"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.34.5:*:*:*:*:*:*:*", "cpeNameId": "F0D5F1A7-EA09-4F2D-AD13-8F683BA19114"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.34.6:*:*:*:*:*:*:*", "cpeNameId": "015FF8C4-4BD7-4F72-88C7-A10DFB459C9A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.34.7:*:*:*:*:*:*:*", "cpeNameId": "D246A09B-5EFA-4F8D-9F6B-A60F84CC1428"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.34.8:*:*:*:*:*:*:*", "cpeNameId": "0A842E50-77B3-4A6B-BD93-3EF41DFACAFB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.34.9:*:*:*:*:*:*:*", "cpeNameId": "EF373871-65CA-4495-A51E-9026A9037344"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.34.10:*:*:*:*:*:*:*", "cpeNameId": "495D4681-BB0F-49DA-A9E0-3B0F970522DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.35:*:*:*:*:*:*:*", "cpeNameId": "A5F1F57E-F1B3-439E-B8D7-D4118D46DFF3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.35:-:*:*:*:*:*:*", "cpeNameId": "F279C1AF-6DC6-4B6F-81E7-24B7FF90F2B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.35:rc1:*:*:*:*:*:*", "cpeNameId": "024E1EE8-95FC-4A51-BEDB-2182FE911FF4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.35:rc2:*:*:*:*:*:*", "cpeNameId": "5278D3A0-4EA0-463B-96D7-4DCC6DBF28B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.35:rc3:*:*:*:*:*:*", "cpeNameId": "E185549B-194C-4EB9-BB68-6D905CC754E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.35:rc4:*:*:*:*:*:*", "cpeNameId": "D0377D96-70CB-4FD4-B636-8AA945CF59C4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.35:rc5:*:*:*:*:*:*", "cpeNameId": "4FDA4A38-3B43-4F5A-9D27-8D2E8B947AD4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.35:rc6:*:*:*:*:*:*", "cpeNameId": "C22C75EC-2543-4E16-ABC8-F6633D8EB370"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.35.1:*:*:*:*:*:*:*", "cpeNameId": "59C4690C-390B-4D06-89BF-6031625EBAC6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.35.2:*:*:*:*:*:*:*", "cpeNameId": "7AFD2340-F190-4D3A-87C2-57E0E9093C41"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.35.3:*:*:*:*:*:*:*", "cpeNameId": "6CD6AE2D-F61F-4302-B88B-F66AD2D1167C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.35.4:*:*:*:*:*:*:*", "cpeNameId": "28B843FE-6F22-4A60-8B3E-2C0FA9EE29B6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.35.5:*:*:*:*:*:*:*", "cpeNameId": "8021995C-3681-4250-B6D6-5790663141DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.35.6:*:*:*:*:*:*:*", "cpeNameId": "0EC27DC3-B64F-4700-89C2-6CB7852F3B2B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.35.7:*:*:*:*:*:*:*", "cpeNameId": "A968AAD3-4259-4AAC-B27F-382B3385104B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.35.8:*:*:*:*:*:*:*", "cpeNameId": "57F231B2-7C02-403E-AC95-4F727EA3748E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.35.9:*:*:*:*:*:*:*", "cpeNameId": "D019B25B-C8C6-4FE1-94EF-6877DA90A629"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.35.10:*:*:*:*:*:*:*", "cpeNameId": "D8517CE5-5BDC-41FB-B86D-CCE2B8B9915F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.35.11:*:*:*:*:*:*:*", "cpeNameId": "F9324485-6097-467A-B22D-A8A8D68AFC60"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.35.12:*:*:*:*:*:*:*", "cpeNameId": "879A4E34-755F-4598-BCA5-D19C1E16617F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.35.13:*:*:*:*:*:*:*", "cpeNameId": "A14B3A65-4CF4-4DCC-8215-713F5BD54535"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.36:*:*:*:*:*:*:*", "cpeNameId": "830D5BE4-4429-4714-A820-D84A2D25E32E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.36:*:*:*:*:*:x64:*", "cpeNameId": "036A181A-AD95-4FD3-9860-85D95628861B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*", "cpeNameId": "0CCF1BAF-FDB8-4FAA-9CE7-9C696FE11EE6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*", "cpeNameId": "D933A11A-5D47-431A-9D07-6339FC545A8B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*", "cpeNameId": "BC4D0D78-E5E9-433E-AB14-36F55BAB1602"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*", "cpeNameId": "6D2D72E8-F623-45BB-A5EF-58806425F3E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*", "cpeNameId": "24696EA9-A364-4C08-B92C-E5A1E0E1075E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc5:*:*:*:*:*:*", "cpeNameId": "987D78AB-C6DD-405D-BA79-53689E0FEEC6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc6:*:*:*:*:*:*", "cpeNameId": "226F03E7-D1F4-45C2-B35A-5E6613A863BF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc7:*:*:*:*:*:*", "cpeNameId": "AA146A8B-3E23-458C-BA2C-7EEA7379042D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc8:*:*:*:*:*:*", "cpeNameId": "3C8FDDB9-496F-474B-AFA6-15F23FD5B5D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.36.1:*:*:*:*:*:*:*", "cpeNameId": "3D342653-002E-4305-84FB-FA98B7DF4588"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.36.1:*:*:*:*:*:x64:*", "cpeNameId": "2D224F8D-EA22-42EA-B8D7-5C6462F94F27"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.36.2:*:*:*:*:*:*:*", "cpeNameId": "578EEDCA-EC5F-4BF6-BD7F-D2C6C4AC57D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.36.2:*:*:*:*:*:x64:*", "cpeNameId": "D61E8A48-0014-416B-B3EC-229851F5F18E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.36.3:*:*:*:*:*:*:*", "cpeNameId": "833EC004-4D2B-4116-86C2-5D15F8C8234E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.36.4:*:*:*:*:*:*:*", "cpeNameId": "263852AE-50D9-4799-99FF-BF35AE06DA89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.37:*:*:*:*:*:*:*", "cpeNameId": "51A27A7D-C66E-4F9C-ABD0-F05198094D4B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*", "cpeNameId": "6EF76427-A8DC-4389-89A7-77E6A37822D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*", "cpeNameId": "CA385F2E-576D-49E3-AF29-8C18439233C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.37:rc2:*:*:*:*:*:*", "cpeNameId": "C7BC3820-42F5-44C8-B6BA-44685480B6FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.37:rc3:*:*:*:*:*:*", "cpeNameId": "888640C2-0A06-4E8D-BB58-3D7AF6F5EC6F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.37:rc4:*:*:*:*:*:*", "cpeNameId": "79FCA534-4DC0-4DA6-ACBF-4FC4998E7271"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.37:rc5:*:*:*:*:*:*", "cpeNameId": "8A73C3C8-D274-4780-82F7-37D801BF75F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.37:rc6:*:*:*:*:*:*", "cpeNameId": "ADB81B14-8E7F-4512-B94C-D020BF470A15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.37:rc7:*:*:*:*:*:*", "cpeNameId": "56258E42-3491-478B-8B36-8E5F7D50002E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.37:rc8:*:*:*:*:*:*", "cpeNameId": "7BF68433-6DEA-4AC3-8B7F-3B4F35C0D34A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.37.1:*:*:*:*:*:*:*", "cpeNameId": "89A6D27B-7A4D-4040-AAF2-984217F868CC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.37.2:*:*:*:*:*:*:*", "cpeNameId": "7CF2F010-7A5C-4B42-99CC-393BFB3137C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.37.3:*:*:*:*:*:*:*", "cpeNameId": "EE97F688-74A3-484A-9506-FBD006E43AC0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.37.4:*:*:*:*:*:*:*", "cpeNameId": "8939F2F9-9D6C-4933-8CC3-4D50A911A1F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.37.4:test14:*:*:*:*:*:*", "cpeNameId": "5CE81605-02FE-493E-8BDD-457648A206BA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.37.5:*:*:*:*:*:*:*", "cpeNameId": "3DACF4FD-898D-4D39-9439-20FF60985681"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.37.6:*:*:*:*:*:*:*", "cpeNameId": "1B9F51E7-5995-482F-A894-2DAEF202563A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.38:*:*:*:*:*:*:*", "cpeNameId": "B4588F83-FDA5-4BEE-8D33-CBAED99B1B3A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*", "cpeNameId": "7BC2979D-B277-4B3C-8AA3-84D988C1DB2A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*", "cpeNameId": "21E10EBE-70A5-4FD6-BA60-5EEE8C7F306E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.38:rc2:*:*:*:*:*:*", "cpeNameId": "63217640-5D4D-4A82-BFF7-EB376DBC124B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.38:rc3:*:*:*:*:*:*", "cpeNameId": "D6395AAF-8E1A-47C1-8C64-721CDBBB5418"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.38:rc4:*:*:*:*:*:*", "cpeNameId": "1C43D8BF-5A1A-4BDC-8FC9-D9C2A50608AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.38:rc5:*:*:*:*:*:*", "cpeNameId": "4F8C1BDE-4C9F-44A1-BB67-8B621C3C1432"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.38:rc6:*:*:*:*:*:*", "cpeNameId": "C875E3E4-2012-49F2-AA84-110E27576719"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.38:rc7:*:*:*:*:*:*", "cpeNameId": "A9FB268C-B873-4E21-879F-16DCBD5F6D3C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.38:rc8:*:*:*:*:*:*", "cpeNameId": "F54E1625-1EC6-45E7-8099-F0A18592EBD3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.38:test3:*:*:*:*:*:*", "cpeNameId": "6D866502-1259-42AD-A786-E41F6234FCDD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.38.1:*:*:*:*:*:*:*", "cpeNameId": "5D9A8D8A-E080-4EF7-A1C9-19BF64815CBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.38.2:*:*:*:*:*:*:*", "cpeNameId": "74026282-35D2-48B4-A821-66F3E9564750"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.38.3:*:*:*:*:*:*:*", "cpeNameId": "5B670C64-4EB7-48B1-9810-06DE4798A3F7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.38.4:*:*:*:*:*:*:*", "cpeNameId": "0E41F19F-6411-4FC5-BED6-A029C21E58F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.38.5:*:*:*:*:*:*:*", "cpeNameId": "9159401B-4BF5-4106-9B5A-522551978E46"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.38.6:*:*:*:*:*:*:*", "cpeNameId": "DBE2FFB6-D82B-4045-914E-59C2DC1C238C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.38.7:*:*:*:*:*:*:*", "cpeNameId": "59F0A69D-4B11-4976-9A8D-58E345421F41"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.38.8:*:*:*:*:*:*:*", "cpeNameId": "BC1799E7-0FFC-4A6D-9BDB-76D8549892EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.39:*:*:*:*:*:*:*", "cpeNameId": "D04C0ECE-DEFE-419B-85AA-F4B66284EA8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.39:-:*:*:*:*:*:*", "cpeNameId": "16E725A7-CC6E-43DF-8E88-D8C367279563"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.39:rc1:*:*:*:*:*:*", "cpeNameId": "8B8C2DCD-9CA5-402E-A242-64088376BE2C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.39:rc2:*:*:*:*:*:*", "cpeNameId": "FD737D2A-CEE3-49C7-8143-4EC50473F72B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.39:rc3:*:*:*:*:*:*", "cpeNameId": "E7064488-FFA2-4EF4-A4C2-111B4A2E4B68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.39:rc4:*:*:*:*:*:*", "cpeNameId": "9C245568-B83F-484E-89D2-C89506EB980E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.39:rc5:*:*:*:*:*:*", "cpeNameId": "442C4D3F-52DB-454B-A1FB-DE2ED005A059"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.39:rc6:*:*:*:*:*:*", "cpeNameId": "7329DBC0-CA51-46AE-AEA6-1C011EEDB7AA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.39:rc7:*:*:*:*:*:*", "cpeNameId": "DFDCDF61-299F-46F2-8B6E-DE8D022B99DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.39.1:*:*:*:*:*:*:*", "cpeNameId": "41589B0B-633E-4F26-AF4B-0A00EBE66C73"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.39.2:*:*:*:*:*:*:*", "cpeNameId": "BE8F0727-B5BD-40A5-BC56-3BAF281669D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.39.3:*:*:*:*:*:*:*", "cpeNameId": "85836889-D29B-4265-8509-4B356A3E0208"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.6.39.4:*:*:*:*:*:*:*", "cpeNameId": "D3F85891-4741-40CB-9CA3-B1630B886CFB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.7:*:*:*:*:*:*:*", "cpeNameId": "7EE48E7B-E04C-4947-8809-94455D5A6672"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:2.16.12:*:*:*:*:*:*:*", "cpeNameId": "5BDDD34D-C7A6-475A-A6B6-4217F2317262"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0:*:*:*:*:*:*:*", "cpeNameId": "E675CA19-0205-4D08-AD72-56813FC90E70"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0:-:*:*:*:*:*:*", "cpeNameId": "7378F6A7-89A4-4C9A-A54E-19252CD12A29"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*", "cpeNameId": "2C4825EF-D76D-4B26-9063-D92A4AB559D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*", "cpeNameId": "40C9F38D-6AF4-4F10-B006-CB1752879625"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0:rc3:*:*:*:*:*:*", "cpeNameId": "585940B2-EA29-4B97-BA4F-61B097C6CBEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0:rc4:*:*:*:*:*:*", "cpeNameId": "02128A6F-BD25-4C7E-96B0-E934E0800527"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0:rc5:*:*:*:*:*:*", "cpeNameId": "E3D54552-B5F7-483A-B434-50876D8BE038"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0:rc6:*:*:*:*:*:*", "cpeNameId": "7917FAA4-F74F-4EC3-8EFA-45271A7CB611"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0:rc7:*:*:*:*:*:*", "cpeNameId": "6705E5DC-2EA5-4339-A661-2FA31705DE42"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.0:*:*:*:*:*:*:*", "cpeNameId": "65A07F88-5A18-4758-8009-E7B920F40BB4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*", "cpeNameId": "19D521AB-0EC6-4522-B370-D65784E91786"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*", "cpeNameId": "11C5EA6B-3069-4756-8EB0-672A731B7AC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*", "cpeNameId": "CC519536-8DA7-4EC5-B61C-8681F99ACE91"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*", "cpeNameId": "4BCDC685-168E-45BA-B094-60AA9C952B59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*", "cpeNameId": "6207B1AE-0269-4BD5-BDA7-AA74F02D1FB5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*", "cpeNameId": "AA42AD78-B3F2-4383-B9C9-A1B638311A42"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*", "cpeNameId": "41480C9A-E551-486E-93FF-6A29A22BAAD1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*", "cpeNameId": "13AA137D-8350-44EC-8441-5BB5718682B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*", "cpeNameId": "1D9B8597-0D82-4787-8645-DE471DEFD11E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*", "cpeNameId": "87DFB95C-8CFD-42A1-BA96-FFEACF82588D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*", "cpeNameId": "45A9FDEE-219A-4C1D-8655-C2CFC646F7F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*", "cpeNameId": "403E8590-8BD5-4AAB-98B2-AAB85799E004"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*", "cpeNameId": "69DAA3C2-5DA7-4095-9494-EB95050D5C17"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*", "cpeNameId": "BF6CEA34-C360-46CC-A019-17C97110AB54"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*", "cpeNameId": "79AD64FE-8BBF-4223-8681-058D2C8372AD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*", "cpeNameId": "FC822FF0-8BBB-401D-809A-C21A970BEC3A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*", "cpeNameId": "8844B560-DA2A-4108-A9AB-EFF569DA827D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*", "cpeNameId": "9E7DCDFE-98E8-4B87-B7CF-588CA714E476"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*", "cpeNameId": "409F6C37-8840-46DD-85DB-41DF168EC50A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*", "cpeNameId": "F3EC1D7C-D551-4FE4-9D6C-F8DB800AD02A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*", "cpeNameId": "FBE11D30-3565-49A0-8FF6-5BE71775F59C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*", "cpeNameId": "F9C36003-FBD9-475C-80D6-50D950056F4C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*", "cpeNameId": "EC17CEC8-28AC-4AFA-BFCF-DB36D66DA96B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*", "cpeNameId": "45388B7F-6654-4BB0-9930-988F4074353C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*", "cpeNameId": "4863743C-6FAB-47B3-BD7E-02C91AD2F40A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*", "cpeNameId": "F9657A59-9283-4F6E-B331-BCB73DC618F4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*", "cpeNameId": "0FA42FBB-5EC9-4ACB-A6D9-3766140F1D71"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*", "cpeNameId": "4320A7E1-30F3-427F-97C3-F4367D341803"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*", "cpeNameId": "1B337381-F959-4399-A5F5-F0E8B61CDC14"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*", "cpeNameId": "2EE72F21-D55D-480B-9451-5E6BDF5E931C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*", "cpeNameId": "A77A6813-5267-4B56-941D-CC457FFDAE51"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*", "cpeNameId": "B834EA7C-1F83-41D8-B294-4D20D4FCDCCB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*", "cpeNameId": "436BC3D4-9452-4850-8FBE-347D8E07B15E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*", "cpeNameId": "3EF9D92E-9A9C-4853-904F-F0631D5A252D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.35:*:*:*:*:*:*:*", "cpeNameId": "02EDAB5F-5D03-47DD-9DE1-6ECACD88C6D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.36:*:*:*:*:*:*:*", "cpeNameId": "6A091D60-9CFD-444F-8A1E-5EE48F65D9B1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.37:*:*:*:*:*:*:*", "cpeNameId": "C151F6F7-9640-42E1-A90D-005D6A2DA4E5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.38:*:*:*:*:*:*:*", "cpeNameId": "441BF329-7728-4258-BC0F-1F862629857E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.39:*:*:*:*:*:*:*", "cpeNameId": "F469D65B-5013-4D44-97C6-6836DACD09F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.40:*:*:*:*:*:*:*", "cpeNameId": "C2ADD944-42AB-4840-8900-090BE1CF7E75"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.41:*:*:*:*:*:*:*", "cpeNameId": "FD8DB916-9217-43FE-9E10-09CB422FED1D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.42:*:*:*:*:*:*:*", "cpeNameId": "B373C2B9-8D11-424F-B2DB-96D87E0EE182"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.43:*:*:*:*:*:*:*", "cpeNameId": "63577543-E0B1-4295-83BA-AEC0CFE2CA67"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.44:*:*:*:*:*:*:*", "cpeNameId": "22C0156C-FD96-419C-B32B-B7094E00E141"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.45:*:*:*:*:*:*:*", "cpeNameId": "0C86BCD6-2EBB-4DA8-9FE6-B66F1D0F5C66"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.46:*:*:*:*:*:*:*", "cpeNameId": "70E25B32-6AD5-4801-93A2-B16A871A102C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.47:*:*:*:*:*:*:*", "cpeNameId": "40D74137-22F3-4AE3-AD16-2E83858740D7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.48:*:*:*:*:*:*:*", "cpeNameId": "7FAE531F-6ADB-4A5B-AD4D-C95BD3ADE7E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.49:*:*:*:*:*:*:*", "cpeNameId": "DB682532-CEBA-4F65-8A1F-8A5ADA6C1868"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.50:*:*:*:*:*:*:*", "cpeNameId": "7B38EDFF-EE60-42D1-B149-1726A0995C75"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.51:*:*:*:*:*:*:*", "cpeNameId": "8208AC95-1E18-4994-87B1-5FABA1C6DCC6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.52:*:*:*:*:*:*:*", "cpeNameId": "1292E697-8D68-493E-BC7E-A26C01903831"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.53:*:*:*:*:*:*:*", "cpeNameId": "989B896A-4115-40C8-8AF9-1A3C764C5FB4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.54:*:*:*:*:*:*:*", "cpeNameId": "0522C8A4-4663-4F43-AAAF-86074AA109F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.55:*:*:*:*:*:*:*", "cpeNameId": "7C1D5397-712D-4969-85F6-687827706FC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.56:*:*:*:*:*:*:*", "cpeNameId": "C2EA4C85-8FB2-4652-8896-1F80CA69B4CC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.57:*:*:*:*:*:*:*", "cpeNameId": "D62265EA-FE33-4366-AC2E-60EF6D2D844A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.58:*:*:*:*:*:*:*", "cpeNameId": "BD449DB4-A455-4DAA-9A5A-15C5C214E0E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.59:*:*:*:*:*:*:*", "cpeNameId": "2C207BA3-3196-4162-A095-1BF15C1A40C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.60:*:*:*:*:*:*:*", "cpeNameId": "6B52552D-E347-45FE-94C5-06CAF93047CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.61:*:*:*:*:*:*:*", "cpeNameId": "BA7D8FCF-CEFA-479A-AC26-E0C3E6B7F41F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.62:*:*:*:*:*:*:*", "cpeNameId": "831D56C8-73FC-4AB7-B0AE-6E97F2B6DEE8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.63:*:*:*:*:*:*:*", "cpeNameId": "92718423-DB5F-43F8-B50E-5A152FEB539C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.64:*:*:*:*:*:*:*", "cpeNameId": "8A1828A7-EA44-44CC-8B84-9AF45830D686"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.65:*:*:*:*:*:*:*", "cpeNameId": "5FADB7C1-8112-496C-91E4-8E433134A897"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.66:*:*:*:*:*:*:*", "cpeNameId": "70E429A5-8718-4201-8FA1-647CF2124B22"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.67:*:*:*:*:*:*:*", "cpeNameId": "4EE9D2D4-E60A-4B7C-AF46-939730C93FF7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.68:*:*:*:*:*:*:*", "cpeNameId": "7E91D5E5-AE29-4D71-B3DA-1DD89AEACFE6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.69:*:*:*:*:*:*:*", "cpeNameId": "2947D661-699F-428E-B711-88005A7133C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.70:*:*:*:*:*:*:*", "cpeNameId": "67B242CD-5A0E-495E-9144-297D99750A21"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.71:*:*:*:*:*:*:*", "cpeNameId": "628147F9-08F1-4660-A2BA-A56A13027ABE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.72:*:*:*:*:*:*:*", "cpeNameId": "FB49D42B-1F6C-4E5A-B4D2-848B86BD6415"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.73:*:*:*:*:*:*:*", "cpeNameId": "232E9DEE-969C-429A-8F35-E2BF995E5D9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.74:*:*:*:*:*:*:*", "cpeNameId": "E99EC0F2-5BC3-4E91-A664-08C56D488D65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.75:*:*:*:*:*:*:*", "cpeNameId": "CEB2EFD5-48BD-4F69-B231-B7833D4BF597"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.76:*:*:*:*:*:*:*", "cpeNameId": "3796A094-63F8-44FB-9A81-94D6C5CDE459"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.77:*:*:*:*:*:*:*", "cpeNameId": "A7A8A856-5781-4BBA-8329-FA71DCD6129B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.78:*:*:*:*:*:*:*", "cpeNameId": "68747D1F-FA23-444F-9602-07694CF7C245"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.79:*:*:*:*:*:*:*", "cpeNameId": "AF9BBD94-2571-45AF-98FA-7C1F9E48B476"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.80:*:*:*:*:*:*:*", "cpeNameId": "6100C07E-82B6-4EFC-B7E3-42E13A5EDFB9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.81:*:*:*:*:*:*:*", "cpeNameId": "721BA4C3-5D58-46D7-AFA7-CF4AFB5922E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.82:*:*:*:*:*:*:*", "cpeNameId": "15CAC92C-9CCE-408D-8E54-784800BE06A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.83:*:*:*:*:*:*:*", "cpeNameId": "2826A327-2B91-46DF-97AD-617D889DC5B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.84:*:*:*:*:*:*:*", "cpeNameId": "6419F315-F012-47BE-B150-600BDF5DAB5F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.85:*:*:*:*:*:*:*", "cpeNameId": "E42EB24B-5E95-482D-8606-3B68612956B6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.86:*:*:*:*:*:*:*", "cpeNameId": "2ADA9A58-7414-48C0-8E14-C4C52867BDBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.87:*:*:*:*:*:*:*", "cpeNameId": "88328D39-6E68-4A6B-96CD-8AF0DBC12851"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.88:*:*:*:*:*:*:*", "cpeNameId": "C7C076EB-891E-4BBF-A97B-4A77D39AC9D6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.89:*:*:*:*:*:*:*", "cpeNameId": "D2A0C560-0D1E-4D5C-A332-8CD32DF1C1D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.90:*:*:*:*:*:*:*", "cpeNameId": "744B6D49-F611-44B4-B39A-C204D21E3242"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.91:*:*:*:*:*:*:*", "cpeNameId": "725F0655-1AC5-4187-A185-FFC269DE6FEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.92:*:*:*:*:*:*:*", "cpeNameId": "F7187593-4AED-4E10-92E9-6D3F82DD8579"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.93:*:*:*:*:*:*:*", "cpeNameId": "76399886-4A4B-44BF-8E93-0B92F48C99C5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.94:*:*:*:*:*:*:*", "cpeNameId": "A3024F96-1973-43A6-A7FD-43343CF76EB6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.95:*:*:*:*:*:*:*", "cpeNameId": "690FFA55-4453-4857-91C2-0D88810A66DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.96:*:*:*:*:*:*:*", "cpeNameId": "3A1ABD5D-BAD9-44B6-A0D4-1344F61E77DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.97:*:*:*:*:*:*:*", "cpeNameId": "71A37886-3645-4B90-9390-6CAF4FE60D6A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.98:*:*:*:*:*:*:*", "cpeNameId": "D45B1D79-B01F-4320-9848-84F9EB4FE9AF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.99:*:*:*:*:*:*:*", "cpeNameId": "EC8D5342-4755-4A6D-BA20-77E5F5370DEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.100:*:*:*:*:*:*:*", "cpeNameId": "F5951A11-6C81-4D3B-91BE-5CE7330BB269"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.0.101:*:*:*:*:*:*:*", "cpeNameId": "D8180B1F-6D3F-4CB6-9A15-24563250EBB7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.1:*:*:*:*:*:*:*", "cpeNameId": "1A99542D-BF2C-4927-A675-45A94E909357"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.1:-:*:*:*:*:*:*", "cpeNameId": "8DCEFDB7-A0F1-4A58-B4F7-E4938647D892"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.1:rc1:*:*:*:*:*:*", "cpeNameId": "717D6C63-BFAA-4E03-9B6B-15AAC4F9407E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.1:rc2:*:*:*:*:*:*", "cpeNameId": "7313BBA3-2A42-4FE2-A6BB-65365FE1CF07"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.1:rc3:*:*:*:*:*:*", "cpeNameId": "48093C34-2181-4EAB-A2B4-591509C094FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.1:rc4:*:*:*:*:*:*", "cpeNameId": "DD0227A7-CC9C-4388-90DF-D06E801AF684"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.1.1:*:*:*:*:*:*:*", "cpeNameId": "BA7B47E4-ED28-4B5B-BD88-B5A1E86D045E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.1.2:*:*:*:*:*:*:*", "cpeNameId": "6769988D-645B-4085-A555-29C3B5A8D145"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.1.3:*:*:*:*:*:*:*", "cpeNameId": "B193E5C5-3B2C-4F7C-B904-A8FF6B790499"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.1.4:*:*:*:*:*:*:*", "cpeNameId": "7C3CAF66-E6E1-4714-A480-58CDA92428F4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.1.5:*:*:*:*:*:*:*", "cpeNameId": "21D6F078-9090-4B3A-8106-59A51323BE4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.1.6:*:*:*:*:*:*:*", "cpeNameId": "AF71BFF8-6FC9-4730-AE11-71DA868C5588"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.1.7:*:*:*:*:*:*:*", "cpeNameId": "7868FADA-294B-477B-802F-8E4BBC7E16E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.1.8:*:*:*:*:*:*:*", "cpeNameId": "679A0479-F91E-4214-9DCE-24EC498FBBC6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.1.9:*:*:*:*:*:*:*", "cpeNameId": "FC6F89EB-BC20-4CBB-9469-7FE7354BB051"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.1.10:*:*:*:*:*:*:*", "cpeNameId": "2CE5B5AD-8FE8-4A79-B181-64A7257B9177"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2:*:*:*:*:*:*:*", "cpeNameId": "C82F3FFF-8B8C-416B-A398-649413127215"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2:-:*:*:*:*:*:*", "cpeNameId": "142046C3-CA5B-4025-9411-EB541CDE90D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2:rc2:*:*:*:*:*:*", "cpeNameId": "316C0C5A-74B0-4A97-A7E5-813A39172BE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2:rc3:*:*:*:*:*:*", "cpeNameId": "7137A9B1-7A4B-4C4C-B199-E40D514AE762"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2:rc4:*:*:*:*:*:*", "cpeNameId": "365499E2-4E7E-4277-9FC9-E026ED6D2AC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2:rc5:*:*:*:*:*:*", "cpeNameId": "62A6EC9B-6434-4B3E-87FB-002EF98FB3ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2:rc6:*:*:*:*:*:*", "cpeNameId": "628D835E-E0A1-4261-A2FE-AE27FABB7E27"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2:rc7:*:*:*:*:*:*", "cpeNameId": "2A6A3167-3A00-4195-BFCE-F7293497B047"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.1:*:*:*:*:*:*:*", "cpeNameId": "06BE7B88-255B-49D0-A934-E81A66DD1B17"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.2:*:*:*:*:*:*:*", "cpeNameId": "C6B8D73E-0E31-44A4-98FF-914527843E1C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.3:*:*:*:*:*:*:*", "cpeNameId": "1D0A6492-1F10-4768-99E0-06D1ED8617AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.4:*:*:*:*:*:*:*", "cpeNameId": "D8B392AA-EFBD-4200-A1F1-1E5C1CEF8C15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.5:*:*:*:*:*:*:*", "cpeNameId": "EA189203-2158-4E92-A526-7E742E4C6B36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.6:*:*:*:*:*:*:*", "cpeNameId": "906FC19A-1DB3-4ED7-8889-1E3A5E212724"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.7:*:*:*:*:*:*:*", "cpeNameId": "7C2DC23E-215E-4973-AD3A-A28BEB5B9113"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.8:*:*:*:*:*:*:*", "cpeNameId": "3431E73A-E239-4EF5-8463-5DE3CF01F38F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.9:*:*:*:*:*:*:*", "cpeNameId": "A200B420-232A-433F-8CDE-ADA898D920A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.10:*:*:*:*:*:*:*", "cpeNameId": "3DF0E7D8-B8D0-4C89-A679-517A3C3BAAD2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.11:*:*:*:*:*:*:*", "cpeNameId": "E35AD74A-5E15-4528-91E4-B098F9FBB16F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.12:*:*:*:*:*:*:*", "cpeNameId": "BDA150E1-DCEE-4F0C-9280-126D1F954319"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.13:*:*:*:*:*:*:*", "cpeNameId": "1BC78E93-7B8F-432C-82AD-51F8A9A393C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.14:*:*:*:*:*:*:*", "cpeNameId": "9658E83F-D08C-4E8A-9133-2EC6AAE1D44D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.15:*:*:*:*:*:*:*", "cpeNameId": "CE33893B-F7EF-4D5C-BCA0-60AD5366E384"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.16:*:*:*:*:*:*:*", "cpeNameId": "18E74DD1-D0E9-444F-AAEB-D3CA998909EC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.17:*:*:*:*:*:*:*", "cpeNameId": "C392515E-4C53-4387-B556-82D87F083A13"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.18:*:*:*:*:*:*:*", "cpeNameId": "653C01CC-5895-420E-9664-9BE57DC5F876"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.19:*:*:*:*:*:*:*", "cpeNameId": "D09E709A-BD26-4493-9781-BACA3475336E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.20:*:*:*:*:*:*:*", "cpeNameId": "4B713D3E-DAD6-4620-B651-3563A957BA36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.21:*:*:*:*:*:*:*", "cpeNameId": "D823C65C-9D03-4124-ABAA-87E1CCB6DE3B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.22:*:*:*:*:*:*:*", "cpeNameId": "C75CB737-F344-4186-94F0-1097298815A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.23:*:*:*:*:*:*:*", "cpeNameId": "FEF99F56-94D5-4296-9901-AAA7B3D59E83"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.24:*:*:*:*:*:*:*", "cpeNameId": "D6BC9731-830A-4BAD-8FD5-34804F733854"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.25:*:*:*:*:*:*:*", "cpeNameId": "180488F5-5C9E-46E4-B3D3-1D8CD40A4F68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.26:*:*:*:*:*:*:*", "cpeNameId": "1A930330-058A-4709-A914-98A5DD1E6606"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.27:*:*:*:*:*:*:*", "cpeNameId": "6A2B3F95-32E2-4F75-888B-FD6D995B9212"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.28:*:*:*:*:*:*:*", "cpeNameId": "00AEA53A-CD82-4C14-90C6-48FAFEE855CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.29:*:*:*:*:*:*:*", "cpeNameId": "B7E70A5A-8202-4848-833D-BF0CCBE7CCFE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.30:*:*:*:*:*:*:*", "cpeNameId": "D9CCE96A-ED37-4DDF-BF43-857F343B4105"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.31:*:*:*:*:*:*:*", "cpeNameId": "52A5EAA5-C3B7-4EFC-9AE6-F5C3B711A632"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.32:*:*:*:*:*:*:*", "cpeNameId": "22431C69-AED0-4983-BD1C-704CA647C81C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.33:*:*:*:*:*:*:*", "cpeNameId": "5B1BB2D1-60F4-4504-9362-6548F78EC490"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.34:*:*:*:*:*:*:*", "cpeNameId": "CB2D7E22-F1CA-4E4A-BE3E-2559040658CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.35:*:*:*:*:*:*:*", "cpeNameId": "B3E2A74F-382B-42E0-8E93-B30DC87668CC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.36:*:*:*:*:*:*:*", "cpeNameId": "429AF5FC-B66D-41E2-9452-46F1DDF3F48A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.37:*:*:*:*:*:*:*", "cpeNameId": "81A05CDA-B968-415D-AFBD-3C5E8254454D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.38:*:*:*:*:*:*:*", "cpeNameId": "8618E6FF-54AE-4238-988E-28A0C522C38C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.39:*:*:*:*:*:*:*", "cpeNameId": "2F7B8E99-84A7-4707-85EF-49C9884C2D14"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.40:*:*:*:*:*:*:*", "cpeNameId": "E0D96BE3-5CC1-4BF8-A364-C20AE8A67C38"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.41:*:*:*:*:*:*:*", "cpeNameId": "6BBAAC8C-E86E-4B0D-9582-12E770A23E61"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.42:*:*:*:*:*:*:*", "cpeNameId": "1BAE21D2-E437-4889-87D8-9E94B9BAB181"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.43:*:*:*:*:*:*:*", "cpeNameId": "83B86D4E-DEDC-41AC-9030-634723C5EFC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.44:*:*:*:*:*:*:*", "cpeNameId": "DEE09A89-7D01-4E76-AD76-5329742D49E7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.45:*:*:*:*:*:*:*", "cpeNameId": "E0CC16F5-DF50-4020-BBE9-43BFDB29D211"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.46:*:*:*:*:*:*:*", "cpeNameId": "80407BC0-0457-4DA6-9EBE-49CAD337DD7D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.47:*:*:*:*:*:*:*", "cpeNameId": "885540C4-709A-46DF-B98C-A237628D9051"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.48:*:*:*:*:*:*:*", "cpeNameId": "2CC641C9-5A91-47E5-A332-928854306A88"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.49:*:*:*:*:*:*:*", "cpeNameId": "9A1FE922-9B98-4059-80B7-32F9EBB3BA15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.50:*:*:*:*:*:*:*", "cpeNameId": "78CEDB41-D210-4225-A89E-8ACE2FA7AC75"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.51:*:*:*:*:*:*:*", "cpeNameId": "7D5E05DB-8EDC-4B50-BEC4-89A2706BD3A9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.52:*:*:*:*:*:*:*", "cpeNameId": "33D503BA-CD64-4BC8-812D-548C75CFCC97"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.53:*:*:*:*:*:*:*", "cpeNameId": "420B543D-D702-4BAD-B9C3-C7BC9F55C253"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.54:*:*:*:*:*:*:*", "cpeNameId": "E26DEAEA-FBAB-48A5-8493-D5392940231A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.55:*:*:*:*:*:*:*", "cpeNameId": "20A94EF2-E013-41B8-B9C3-6D8FAAFC4749"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.56:*:*:*:*:*:*:*", "cpeNameId": "AFC5FCF3-421F-4FB8-AA51-79DECEAB93CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.57:*:*:*:*:*:*:*", "cpeNameId": "869BA085-2A7A-47B5-9983-364A9A85A29A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.58:*:*:*:*:*:*:*", "cpeNameId": "BC8906BF-B55E-4384-8F06-41732DE13A1D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.59:*:*:*:*:*:*:*", "cpeNameId": "653B786B-54D0-4EBB-90C4-7B2FB91A6865"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.60:*:*:*:*:*:*:*", "cpeNameId": "47D7F6C3-43D8-4B41-8DC3-C7169377DD54"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.61:*:*:*:*:*:*:*", "cpeNameId": "91BE8533-CEAE-4D12-8B71-75F81149DB79"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.62:*:*:*:*:*:*:*", "cpeNameId": "B3E4D758-9655-434E-8CF9-32F57D3DC028"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.63:*:*:*:*:*:*:*", "cpeNameId": "1913A11B-D750-4125-85DA-B7FBFB0F616C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.64:*:*:*:*:*:*:*", "cpeNameId": "B494BFB3-2991-4ED8-A6C2-FF35DBB3B81F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.65:*:*:*:*:*:*:*", "cpeNameId": "4807B2C5-66DD-43D0-AB28-2A645FDC6CFA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.66:*:*:*:*:*:*:*", "cpeNameId": "DE631770-040B-4FBC-8409-4F649697BD93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.67:*:*:*:*:*:*:*", "cpeNameId": "0143D4FC-B8AA-435D-B065-8A00A4E1F860"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.68:*:*:*:*:*:*:*", "cpeNameId": "66737E07-144A-4AD8-967C-A34C1024CA3C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.69:*:*:*:*:*:*:*", "cpeNameId": "D781F8E9-0E92-4879-B8AE-67FD07175184"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.70:*:*:*:*:*:*:*", "cpeNameId": "8320F56F-90A3-47FE-AA76-F470509A957F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.71:*:*:*:*:*:*:*", "cpeNameId": "3D480FDE-B0C6-47A7-9034-3C4E4266A8D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.72:*:*:*:*:*:*:*", "cpeNameId": "0BACD049-2C99-4393-BBC5-8D157511F6D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.73:*:*:*:*:*:*:*", "cpeNameId": "FB450388-7DF5-43E4-B9E6-98422EE4EECC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.74:*:*:*:*:*:*:*", "cpeNameId": "1E01BE1F-D164-4DDE-901B-CDE83773AC7F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.75:*:*:*:*:*:*:*", "cpeNameId": "AD91985D-7F93-4062-82C3-471FDEDAC385"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.76:*:*:*:*:*:*:*", "cpeNameId": "081514E8-D66B-4305-815E-5228A9445ACC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.77:*:*:*:*:*:*:*", "cpeNameId": "B29A99D9-1903-4C10-B637-5BA73E5CF91F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.78:*:*:*:*:*:*:*", "cpeNameId": "85DFB807-5015-48B1-8BA4-F78E1ED57E01"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.79:*:*:*:*:*:*:*", "cpeNameId": "F3A79ADD-F28F-4F4D-8A44-99592CAE87AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.80:*:*:*:*:*:*:*", "cpeNameId": "6D43B8AB-6A89-48F2-B814-0562507E0886"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.81:*:*:*:*:*:*:*", "cpeNameId": "FDAC9D48-6BC2-4148-91A4-5375B79F6194"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.82:*:*:*:*:*:*:*", "cpeNameId": "440DE5E6-BC9B-4F99-B4C4-74FB79557DBC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.83:*:*:*:*:*:*:*", "cpeNameId": "EC87BF5B-A78F-485C-8265-AEAF964E1048"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.84:*:*:*:*:*:*:*", "cpeNameId": "B1DBD1CA-3EBB-4FEA-930D-A463D3B5921B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.85:*:*:*:*:*:*:*", "cpeNameId": "DCDC762A-1384-4BCC-A3DD-43D1BFC02FCA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.86:*:*:*:*:*:*:*", "cpeNameId": "FBDBCA76-A7D1-43D3-B0E7-B2683167B1CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.87:*:*:*:*:*:*:*", "cpeNameId": "86FB8493-7660-4CDE-9547-2B6469544D95"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.88:*:*:*:*:*:*:*", "cpeNameId": "0116376E-167D-4241-A75D-FF792BAE4C49"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.89:*:*:*:*:*:*:*", "cpeNameId": "232DA74F-0A85-45E3-AFFE-75DF7D2E8316"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.90:*:*:*:*:*:*:*", "cpeNameId": "A94F5C70-1C71-4DC1-AF94-61988458182D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.91:*:*:*:*:*:*:*", "cpeNameId": "372857DB-A2E5-46B5-859C-5A447EB5EE9C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.92:*:*:*:*:*:*:*", "cpeNameId": "52550675-1EB8-4A92-87E9-02773E1A829C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.93:*:*:*:*:*:*:*", "cpeNameId": "0307A2A8-6976-4C84-B71C-E0A83C53961E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.94:*:*:*:*:*:*:*", "cpeNameId": "418FC315-F587-41E6-A4CF-F356DEF9AD5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.95:*:*:*:*:*:*:*", "cpeNameId": "05080F6D-2FF4-477E-B59C-AD9A38D2E69C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.96:*:*:*:*:*:*:*", "cpeNameId": "F48B03A9-7823-4CE1-B36E-C1DD86837F0E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.97:*:*:*:*:*:*:*", "cpeNameId": "6162425D-432F-4C49-8E27-04F75A166D60"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.98:*:*:*:*:*:*:*", "cpeNameId": "8EB3E252-D235-4E82-BC61-723C64DAA65B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.99:*:*:*:*:*:*:*", "cpeNameId": "613BAE28-98F8-4906-AA51-820B3335EBBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.100:*:*:*:*:*:*:*", "cpeNameId": "3B370497-B377-424D-8A2A-05614E33E414"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.101:*:*:*:*:*:*:*", "cpeNameId": "C3229A18-8555-4037-BBC0-8C0852EDA4A6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.2.102:*:*:*:*:*:*:*", "cpeNameId": "6EF92A3F-1DF7-4826-83C8-6AD59A39265D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3:*:*:*:*:*:*:*", "cpeNameId": "4C56AF79-C2B9-4C63-A51E-9D4CB7529269"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3:-:*:*:*:*:*:*", "cpeNameId": "216C7567-C83B-4498-B0CD-46431830482F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3:rc1:*:*:*:*:*:*", "cpeNameId": "3165F23C-852B-45C1-B6FA-188E656427A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3:rc2:*:*:*:*:*:*", "cpeNameId": "17CD7EFE-3E88-45D0-AC88-B03B00A4A0E9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3:rc3:*:*:*:*:*:*", "cpeNameId": "063AFF14-AB8B-4D13-8BFC-AF437607AE59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3:rc4:*:*:*:*:*:*", "cpeNameId": "DA6C4271-F035-42BD-A918-49966E65D9DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3:rc5:*:*:*:*:*:*", "cpeNameId": "260917D4-E4F2-4870-B50B-A942D3E00035"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3:rc6:*:*:*:*:*:*", "cpeNameId": "E2B66DF7-767D-4223-986E-018BE688F462"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3:rc7:*:*:*:*:*:*", "cpeNameId": "322E8592-6A21-4496-8DD7-F0E90FB0B08D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3.1:*:*:*:*:*:*:*", "cpeNameId": "D542D5ED-4CF2-4408-A91F-FA978B1C5334"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3.2:*:*:*:*:*:*:*", "cpeNameId": "271CBB6E-85D1-4ED7-958A-9ADF338CCB88"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3.3:*:*:*:*:*:*:*", "cpeNameId": "DFFF6BEB-FB02-424F-B4DA-DEE049E81395"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3.4:*:*:*:*:*:*:*", "cpeNameId": "A08B75A7-1E6E-4B08-B2F6-D25FC72C3E7A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3.5:*:*:*:*:*:*:*", "cpeNameId": "6A018015-0114-490B-80FC-B588B1F13E5F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3.6:*:*:*:*:*:*:*", "cpeNameId": "FC6A036B-228C-4A5D-A41E-A36CF4BEB971"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3.7:*:*:*:*:*:*:*", "cpeNameId": "BC9B3FC7-EC05-42E5-BBEC-CBA38E38BD5E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3.8:*:*:*:*:*:*:*", "cpeNameId": "3D1A21A4-5D3D-4FCD-8021-51F2E62F8719"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4:*:*:*:*:*:*:*", "cpeNameId": "7F9645DF-BD4B-4479-BD61-A818171E36D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4:-:*:*:*:*:*:*", "cpeNameId": "5C315BD5-D56F-498D-B5FC-77B6A6AF2571"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4:rc1:*:*:*:*:*:*", "cpeNameId": "9C50F743-0E91-4E50-B542-1DB40389CCFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4:rc2:*:*:*:*:*:*", "cpeNameId": "C7693E1E-3F4A-4B31-84DA-C32CC0A6B4A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4:rc3:*:*:*:*:*:*", "cpeNameId": "B869F0C3-5462-4A49-9C04-91717DAEBE48"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4:rc4:*:*:*:*:*:*", "cpeNameId": "9169DD50-1F78-4AB2-AF6A-9A87A55CD5F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4:rc5:*:*:*:*:*:*", "cpeNameId": "6DFDA097-AE0D-4C22-A612-6B43191ED494"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4:rc6:*:*:*:*:*:*", "cpeNameId": "A2A13DB3-7362-432E-9956-47476E3C8594"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4:rc7:*:*:*:*:*:*", "cpeNameId": "F7DC5C7C-F1E4-4876-BB23-5AE2E0837698"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.1:*:*:*:*:*:*:*", "cpeNameId": "9C88F8A3-ECCB-428C-A8C5-B9952B20B8EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.2:*:*:*:*:*:*:*", "cpeNameId": "0BBD2F2B-55D2-4E99-A64D-85552721CF89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.3:*:*:*:*:*:*:*", "cpeNameId": "3BFBDB35-0D9A-4AED-BC40-130C68E136E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.4:*:*:*:*:*:*:*", "cpeNameId": "8B78F0EB-512E-4DF3-BBB0-B863DE170D9B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.5:*:*:*:*:*:*:*", "cpeNameId": "6EC99C95-4E8A-4204-89A6-D55C83C78499"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.6:*:*:*:*:*:*:*", "cpeNameId": "58DB20D4-AD22-4075-9CC5-C4B2B758491C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.7:*:*:*:*:*:*:*", "cpeNameId": "42125DFB-604A-4336-BB50-FB32DBF2CDB2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.8:*:*:*:*:*:*:*", "cpeNameId": "BEC6A864-F607-43DC-9A5C-6C9881A1638E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.9:*:*:*:*:*:*:*", "cpeNameId": "ADE87835-B344-47B2-8734-3BCA1035C217"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.10:*:*:*:*:*:*:*", "cpeNameId": "847E7314-8B34-4579-B3D5-D9D742132804"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.11:*:*:*:*:*:*:*", "cpeNameId": "C47995DE-5F8C-41A6-AD25-656557A3851C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.12:*:*:*:*:*:*:*", "cpeNameId": "2E13CD82-764F-45B1-BD27-BD9BA15D9AC6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.13:*:*:*:*:*:*:*", "cpeNameId": "E892C72B-87E4-48C9-9425-2A40B8235644"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.14:*:*:*:*:*:*:*", "cpeNameId": "912F5A2C-795B-4A15-B3CD-DF691594C2A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.15:*:*:*:*:*:*:*", "cpeNameId": "3B4AC1FF-B222-4844-8AE1-9FA1685FA572"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.16:*:*:*:*:*:*:*", "cpeNameId": "66D514ED-5C2D-416B-B169-67B838575459"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.17:*:*:*:*:*:*:*", "cpeNameId": "48DFA50A-628C-4C55-961D-ABF2052B406B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.18:*:*:*:*:*:*:*", "cpeNameId": "E58E0E22-013B-43A0-8B3E-5E8854DDD393"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.19:*:*:*:*:*:*:*", "cpeNameId": "77E923D8-A9BC-42BD-8C28-CBF54959A042"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.20:*:*:*:*:*:*:*", "cpeNameId": "19FAA1FA-B770-4D3D-8FFA-CF117BF8FEC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.21:*:*:*:*:*:*:*", "cpeNameId": "1FD4A547-6D4D-483F-892A-DB616570302F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.22:*:*:*:*:*:*:*", "cpeNameId": "4533F044-1645-47CD-BD31-A7700CB4EE52"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.23:*:*:*:*:*:*:*", "cpeNameId": "755BD5E1-FC72-42F6-8C5C-40E449F32E0D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.24:*:*:*:*:*:*:*", "cpeNameId": "85CE79D8-3F06-40DE-B5EA-A99E9257D388"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.25:*:*:*:*:*:*:*", "cpeNameId": "D7CD3755-1AEE-41DA-BB81-AEAB2A339000"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.26:*:*:*:*:*:*:*", "cpeNameId": "BA83EAD2-B9D6-4AA6-B332-4D70AB1CE85C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.27:*:*:*:*:*:*:*", "cpeNameId": "725D03ED-1B8B-4F7F-94DE-D163679B25A6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.28:*:*:*:*:*:*:*", "cpeNameId": "7B46EA94-4CEA-413A-B300-4BC8207D587E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.29:*:*:*:*:*:*:*", "cpeNameId": "613792CE-5F01-4ECD-9273-74E35A76DACA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.30:*:*:*:*:*:*:*", "cpeNameId": "16DDCFE6-2FB0-4ADE-B11D-297DD2135CF1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.31:*:*:*:*:*:*:*", "cpeNameId": "74B55E1A-5C97-49F4-84B4-281E7C53EA9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.32:*:*:*:*:*:*:*", "cpeNameId": "732DD130-EDEF-48B4-AD0F-12010B578C01"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.33:*:*:*:*:*:*:*", "cpeNameId": "18F2FE88-3208-4608-AE5C-3443C0D03E0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.34:*:*:*:*:*:*:*", "cpeNameId": "DC0A746D-3887-488F-A374-EF35CBC969D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.35:*:*:*:*:*:*:*", "cpeNameId": "B46CD7B2-4950-4D52-BDD2-817DCC9D13EC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.36:*:*:*:*:*:*:*", "cpeNameId": "EB53E610-E9E2-4B1F-9816-2CEE82CCC4DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.37:*:*:*:*:*:*:*", "cpeNameId": "7380EA90-66F0-4EA0-B861-12AE47C28F9C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.38:*:*:*:*:*:*:*", "cpeNameId": "606E3372-BAE9-48A8-BC16-866AAB02533A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.39:*:*:*:*:*:*:*", "cpeNameId": "A1B8D27F-3388-4370-B95B-7568B6BA975E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.40:*:*:*:*:*:*:*", "cpeNameId": "9D346BC6-FFA5-473E-ACFD-DAC361B91C5A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.41:*:*:*:*:*:*:*", "cpeNameId": "268803F9-54B1-4A2E-A2F2-4CC26E6A84C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.42:*:*:*:*:*:*:*", "cpeNameId": "0904F99F-9733-447C-BF7E-FEBD996E5877"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.43:*:*:*:*:*:*:*", "cpeNameId": "D21701F8-F7C2-4916-A60D-AD66082E64E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.44:*:*:*:*:*:*:*", "cpeNameId": "8C57B372-D510-41A1-B427-0A796F78B306"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.45:*:*:*:*:*:*:*", "cpeNameId": "1B6AA52B-3A5F-4FA5-873D-00D3E3656401"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.46:*:*:*:*:*:*:*", "cpeNameId": "7DEE950A-5E8D-469E-8441-0CD012D6CD4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.47:*:*:*:*:*:*:*", "cpeNameId": "DA2E3BEC-E551-4742-BD82-5BC5E47EBE75"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.48:*:*:*:*:*:*:*", "cpeNameId": "1EDB923A-9B3C-46CE-976C-150970DDCF32"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.49:*:*:*:*:*:*:*", "cpeNameId": "A47A980A-97AC-40B9-AD50-1DA77D0A020B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.50:*:*:*:*:*:*:*", "cpeNameId": "730CBC8B-0C78-4C84-AFBE-D105CBD5C0F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.51:*:*:*:*:*:*:*", "cpeNameId": "A306D9A3-48CC-4DDC-99CC-E2D8183335DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.52:*:*:*:*:*:*:*", "cpeNameId": "EAC93D54-6A08-4475-B196-85F6673B3B6E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.53:*:*:*:*:*:*:*", "cpeNameId": "F5B7DFA5-C039-40CC-82D0-2916C7F971B6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.54:*:*:*:*:*:*:*", "cpeNameId": "786F2688-E780-46C4-8177-D9CABFC4AA9A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.55:*:*:*:*:*:*:*", "cpeNameId": "3B8D1625-531A-4A51-8567-142C05E10F6B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.56:*:*:*:*:*:*:*", "cpeNameId": "8385A08A-3F7B-43F8-8757-1667E3A28F42"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.57:*:*:*:*:*:*:*", "cpeNameId": "B21C66D5-9C50-403B-BAE5-98D1F1D7001E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.58:*:*:*:*:*:*:*", "cpeNameId": "AAB1ABC2-DCE1-4550-B433-C2B1B419B330"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.59:*:*:*:*:*:*:*", "cpeNameId": "A2D32DA0-65C4-4274-A0FD-E8220E6B407D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.60:*:*:*:*:*:*:*", "cpeNameId": "6B960E11-5BB3-4E40-AE5F-90CFB7F2980B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.61:*:*:*:*:*:*:*", "cpeNameId": "257F2EE3-72EF-4629-94A4-F01A901E85D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.62:*:*:*:*:*:*:*", "cpeNameId": "F128274D-5BF9-45BE-9C1E-3B08DF64E504"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.63:*:*:*:*:*:*:*", "cpeNameId": "EB67B16A-E5A8-4DAE-A8F6-6CD9189F95A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.64:*:*:*:*:*:*:*", "cpeNameId": "21587FC1-355D-4B3F-A06D-DD171F1C62AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.65:*:*:*:*:*:*:*", "cpeNameId": "3B826B1E-86CA-420D-8929-50E4BCAB927C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.66:*:*:*:*:*:*:*", "cpeNameId": "004E1589-DAFD-4B02-A65B-41814392F976"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.67:*:*:*:*:*:*:*", "cpeNameId": "9C287C03-7C7B-4567-ABD1-2860784AC063"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.68:*:*:*:*:*:*:*", "cpeNameId": "6CEEBDCA-447C-4D40-B1CF-1433091347D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.69:*:*:*:*:*:*:*", "cpeNameId": "B60431E1-FFBB-4708-A8E2-47D1BE957937"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.70:*:*:*:*:*:*:*", "cpeNameId": "AF905E35-EF7E-4F3A-B286-8202F6D883E9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.71:*:*:*:*:*:*:*", "cpeNameId": "1D7F6676-187E-4E98-816B-2D3ADD98271D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.72:*:*:*:*:*:*:*", "cpeNameId": "8D85776B-17BC-471E-A6C3-3405CEDEACC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.73:*:*:*:*:*:*:*", "cpeNameId": "58070F9F-FAC4-4033-A486-4275D7C14EAC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.74:*:*:*:*:*:*:*", "cpeNameId": "3908F399-E82F-4734-BFCC-DF569910954D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.75:*:*:*:*:*:*:*", "cpeNameId": "37F2005A-3B64-459E-BECF-5DDF3DC26198"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.76:*:*:*:*:*:*:*", "cpeNameId": "54E1E032-2977-43E0-A0E2-33EE4B8D605D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.77:*:*:*:*:*:*:*", "cpeNameId": "3CE3F6B9-7686-49FF-9E5D-A7FC5B22C04B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.78:*:*:*:*:*:*:*", "cpeNameId": "9A4F3A55-778F-4D01-BD21-BB057B317C80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.79:*:*:*:*:*:*:*", "cpeNameId": "A3B58A38-1DB3-425B-83CB-4D6E9B0D50CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.80:*:*:*:*:*:*:*", "cpeNameId": "013D0308-EFC0-48E6-ABE9-97E8677D7956"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.81:*:*:*:*:*:*:*", "cpeNameId": "C76DEE0E-3C76-4C34-AE57-4F269C0C8345"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.82:*:*:*:*:*:*:*", "cpeNameId": "E0ECA58C-8488-4280-8227-9FD106C4965D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.83:*:*:*:*:*:*:*", "cpeNameId": "B4592A01-0026-4F16-8862-E50EBED75F70"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.84:*:*:*:*:*:*:*", "cpeNameId": "A57E9CF5-FB3E-40F3-9C3F-2C5D3CD218A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.85:*:*:*:*:*:*:*", "cpeNameId": "6DA39A76-5294-44B8-A319-EC0B34E50AC1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.86:*:*:*:*:*:*:*", "cpeNameId": "A5C5F48A-B66E-4C7F-9FF2-C5F0A406CACE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.87:*:*:*:*:*:*:*", "cpeNameId": "2B757A0C-5A39-432A-9B8C-037BA527E46A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.88:*:*:*:*:*:*:*", "cpeNameId": "463F88B6-C5A7-4EE5-8FC4-8D7DE9BB2ADF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.89:*:*:*:*:*:*:*", "cpeNameId": "05E83609-D10C-43C4-82CC-F48ACFBA0C0E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.90:*:*:*:*:*:*:*", "cpeNameId": "AF639F1D-3DB5-4B65-A297-86F88DCEB6BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.91:*:*:*:*:*:*:*", "cpeNameId": "9BD75AFF-1561-4D4E-AEF7-08C63165754D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.92:*:*:*:*:*:*:*", "cpeNameId": "E43540C5-4034-4B55-9F86-EAD8C1B35822"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.93:*:*:*:*:*:*:*", "cpeNameId": "6A67D1C1-1FD3-4FDA-A30F-B9CF2557E49B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.94:*:*:*:*:*:*:*", "cpeNameId": "EE56E2B3-234B-428F-94CC-8284B83F0F80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.95:*:*:*:*:*:*:*", "cpeNameId": "7586CF73-B96D-40A6-B25A-CB257A3C0B1B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.96:*:*:*:*:*:*:*", "cpeNameId": "B3B099C7-C246-4260-BE85-5F4A32C48C8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.97:*:*:*:*:*:*:*", "cpeNameId": "226A5757-D8F7-464F-8061-3DFD1D7016F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.98:*:*:*:*:*:*:*", "cpeNameId": "8FD90207-404B-4137-A313-C80EF0209E29"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.99:*:*:*:*:*:*:*", "cpeNameId": "A0C62D21-AD27-457A-B628-B0FA831541FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.100:*:*:*:*:*:*:*", "cpeNameId": "22E87AE1-0C4D-481A-9AB6-122958F7B806"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.101:*:*:*:*:*:*:*", "cpeNameId": "5F633063-4C78-4FFE-9C72-DFE721C5B99D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.102:*:*:*:*:*:*:*", "cpeNameId": "644B6E4C-743F-4DDB-A586-AF5E6C336D22"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.103:*:*:*:*:*:*:*", "cpeNameId": "501E0F8B-5756-4E68-BEDA-3ABEA9EBECAC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.104:*:*:*:*:*:*:*", "cpeNameId": "67111E0D-8FA5-41D2-A1FE-96F1B3972EF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.105:*:*:*:*:*:*:*", "cpeNameId": "05B2F693-9415-403E-B362-3E90E78F5205"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.106:*:*:*:*:*:*:*", "cpeNameId": "7076EF21-2974-477F-A77F-028724B1ECF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.107:*:*:*:*:*:*:*", "cpeNameId": "CA13D9EC-2887-46B7-895C-E9FC341E03C9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.108:*:*:*:*:*:*:*", "cpeNameId": "434B3877-E6A2-433B-BAE5-71843920F36B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.109:*:*:*:*:*:*:*", "cpeNameId": "5E51C67B-8C45-4064-8260-480C281CBA63"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.110:*:*:*:*:*:*:*", "cpeNameId": "C34040E5-A03A-42A5-AF5B-F3DF66D0329F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.111:*:*:*:*:*:*:*", "cpeNameId": "8B9A38AA-B537-468D-8A06-3C4BB659EDEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.112:*:*:*:*:*:*:*", "cpeNameId": "C8F2983E-8CEE-474F-9B08-E9C13AD643D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.113:*:*:*:*:*:*:*", "cpeNameId": "A7A120EC-E789-4387-B8A3-FCB1DEAC68EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.5:*:*:*:*:*:*:*", "cpeNameId": "A5FD173E-DCE9-4A69-AFAB-4CD661963D1C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.5.1:*:*:*:*:*:*:*", "cpeNameId": "9B2B4A5A-182C-4EF3-9D8E-214596C544A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.5.2:*:*:*:*:*:*:*", "cpeNameId": "C76B49BF-115F-4134-BF91-EBB32275B777"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.5.3:*:*:*:*:*:*:*", "cpeNameId": "0A4A6E87-E6AA-4D67-B8AA-94C4024B4474"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.5.4:*:*:*:*:*:*:*", "cpeNameId": "D20FBE76-D905-4FDD-AC99-2F52A2BF36E4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.5.5:*:*:*:*:*:*:*", "cpeNameId": "5ED861D7-7EB8-497E-8D9C-7AC8A6BD5245"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.5.6:*:*:*:*:*:*:*", "cpeNameId": "F9C71974-A2F0-4B3D-8796-B8BD961BC536"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.5.7:*:*:*:*:*:*:*", "cpeNameId": "FE42B3DE-771E-4966-8642-AFC84050F1A9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6:*:*:*:*:*:*:*", "cpeNameId": "1A03B0CC-33D1-4F25-A957-2010FA603996"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6:-:*:*:*:*:*:*", "cpeNameId": "94EF24E5-AA7C-4277-B924-7F01A6E54EA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6:rc2:*:*:*:*:*:*", "cpeNameId": "BA0D05E0-1454-4C4F-9409-3DBAFC0ADF06"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6:rc3:*:*:*:*:*:*", "cpeNameId": "9191F237-1AB0-40B5-9AAF-04F6014FCDC4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6:rc4:*:*:*:*:*:*", "cpeNameId": "3CDE86D5-C3D3-4542-8F21-59142E917226"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6:rc5:*:*:*:*:*:*", "cpeNameId": "73692F50-41B2-415B-8861-6BC9B52A0AEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6:rc6:*:*:*:*:*:*", "cpeNameId": "105B97CB-41FC-45C9-A16C-EB81B3B5A329"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6:rc7:*:*:*:*:*:*", "cpeNameId": "F7C56EFA-52F1-42F7-9324-C4678DEF9F96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6.1:*:*:*:*:*:*:*", "cpeNameId": "A8A058FA-E4EE-416E-B539-00D8F5473CC6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6.2:*:*:*:*:*:*:*", "cpeNameId": "D5F87239-7A88-434F-9A9E-959FF775108E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6.3:*:*:*:*:*:*:*", "cpeNameId": "0BB0846D-DD56-4DE7-ABBC-B43558653DA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6.4:*:*:*:*:*:*:*", "cpeNameId": "B723EFC1-63BE-4D9A-A008-E02845D21C9A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6.5:*:*:*:*:*:*:*", "cpeNameId": "FB9206A1-D3F5-4400-82E6-34A78EAF67A0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6.6:*:*:*:*:*:*:*", "cpeNameId": "020B7DA4-CE48-49F2-991B-0DCB0AF4935A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6.7:*:*:*:*:*:*:*", "cpeNameId": "3606EADE-8161-4284-A09A-0FFA420DAE96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6.8:*:*:*:*:*:*:*", "cpeNameId": "6763F9A3-4305-41BF-946E-72CC19EE01F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6.9:*:*:*:*:*:*:*", "cpeNameId": "D2E19931-EB6A-4A08-9589-BBC4B2BA05E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6.10:*:*:*:*:*:*:*", "cpeNameId": "CD2E3A03-F96F-493D-9B0E-B96309D9AA93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6.11:*:*:*:*:*:*:*", "cpeNameId": "A0E05409-4816-417B-A5B2-55F4BBBF45C2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.7:*:*:*:*:*:*:*", "cpeNameId": "12E1A3C4-D097-4545-B736-EB5C3A3A3887"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.7.1:*:*:*:*:*:*:*", "cpeNameId": "268526F8-8DBF-4883-8CE7-55CD76A58517"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.7.2:*:*:*:*:*:*:*", "cpeNameId": "B2A9865E-EDBE-452A-9E87-394FF9A4DD2E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.7.3:*:*:*:*:*:*:*", "cpeNameId": "91F07A30-7EF7-4870-86F8-D4E479920742"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.7.4:*:*:*:*:*:*:*", "cpeNameId": "16D48241-0C39-40FF-9BDD-FAC0AE667976"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.7.5:*:*:*:*:*:*:*", "cpeNameId": "4ACA5D3D-9862-46D6-8025-C8B2FBFD0C63"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.7.6:*:*:*:*:*:*:*", "cpeNameId": "A9A20F11-EA62-4A06-B773-E0E0CA1DB1D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.7.7:*:*:*:*:*:*:*", "cpeNameId": "DAC40CB3-B9AC-4DDC-AD0E-EFBAF468A80D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.7.8:*:*:*:*:*:*:*", "cpeNameId": "6DA3C651-639E-49B7-91A6-9352A51BB428"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.7.9:*:*:*:*:*:*:*", "cpeNameId": "43546599-BC37-4DDF-8692-717B4E3F9D04"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.7.10:*:*:*:*:*:*:*", "cpeNameId": "168DEBA5-591C-4BE5-B321-3432CF2FBE1A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8:*:*:*:*:*:*:*", "cpeNameId": "793FEE4E-6EB3-4AD3-8C35-45212DB9045D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.0:*:*:*:*:*:*:*", "cpeNameId": "0874112F-8BB6-4619-A940-6E6B71E792F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.1:*:*:*:*:*:*:*", "cpeNameId": "01FC3991-C111-44A7-808F-0278121EA54A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.2:*:*:*:*:*:*:*", "cpeNameId": "8811DE61-6DB4-4ADE-8F83-41A29664D527"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.3:*:*:*:*:*:*:*", "cpeNameId": "EC3384F9-D061-46C5-9774-76248C5ACE93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.4:*:*:*:*:*:*:*", "cpeNameId": "516830CB-D744-432F-92FE-763EDE2CA5F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.5:*:*:*:*:*:*:*", "cpeNameId": "43AAC1FC-42D7-4D1A-A963-CAB639DD8B00"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.6:*:*:*:*:*:*:*", "cpeNameId": "50313D29-F34E-4C0D-9144-484B999408DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.7:*:*:*:*:*:*:*", "cpeNameId": "5072B87F-09B0-417E-AD87-62C547BACCCC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.8:*:*:*:*:*:*:*", "cpeNameId": "0B3A862B-7B4A-4047-8B20-95188E30CC05"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.9:*:*:*:*:*:*:*", "cpeNameId": "C2049E4B-7E7F-4EE7-9BB1-521933C89D8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.10:*:*:*:*:*:*:*", "cpeNameId": "B409C2ED-789D-4ED8-A8CB-01600CAAA35E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.11:*:*:*:*:*:*:*", "cpeNameId": "D0A3901E-C3E7-42ED-802E-A62C1062B5B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.12:*:*:*:*:*:*:*", "cpeNameId": "85546B06-87AF-486E-8CC0-938579A020EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.13:*:*:*:*:*:*:*", "cpeNameId": "342CDE85-BF76-4CEB-8BA4-67ADC711496D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9:*:*:*:*:*:*:*", "cpeNameId": "C9009932-A990-4A1B-BE48-BED9A9A7FC65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9:-:*:*:*:*:*:*", "cpeNameId": "1CCCD217-0A7E-40A1-9520-617E661F1645"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9:rc1:*:*:*:*:*:*", "cpeNameId": "A7AE781E-2F1A-4C28-9CC5-476CE68CF1D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9:rc2:*:*:*:*:*:*", "cpeNameId": "5A29C44C-C923-4D5B-931C-0CE194896E8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9:rc3:*:*:*:*:*:*", "cpeNameId": "8793DB1D-710C-41A5-8BE4-895C45978720"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9:rc4:*:*:*:*:*:*", "cpeNameId": "A2345A72-55AE-4255-A7C4-73FDC8CDEF5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9:rc5:*:*:*:*:*:*", "cpeNameId": "EB60446B-804B-4948-B1B3-754169BD691E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9:rc6:*:*:*:*:*:*", "cpeNameId": "24401905-3848-4876-894C-45120BA6A0CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9:rc7:*:*:*:*:*:*", "cpeNameId": "2076878B-89D6-47D8-9572-9B9689FC2BEF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9.0:*:*:*:*:*:*:*", "cpeNameId": "169A5C5F-B455-4F6F-BF24-A312ECAFCE52"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9.1:*:*:*:*:*:*:*", "cpeNameId": "FCFDFA6F-C701-4BB1-8735-6C1F0E706C8B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9.2:*:*:*:*:*:*:*", "cpeNameId": "34F883C1-8869-4871-A2C2-7A4EBE52A72A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9.3:*:*:*:*:*:*:*", "cpeNameId": "F698940C-F9F2-4ED7-9AB5-4D5A2A3D7CE8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9.4:*:*:*:*:*:*:*", "cpeNameId": "3126DB9D-16C5-48EB-8548-304D58230779"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9.5:*:*:*:*:*:*:*", "cpeNameId": "01A51FAA-3D22-4445-9C47-192575EEA608"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9.6:*:*:*:*:*:*:*", "cpeNameId": "750F5059-2C73-4554-9789-1D880CA5DEE7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9.7:*:*:*:*:*:*:*", "cpeNameId": "D928DDB6-091C-4CA2-804C-390334A896B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9.8:*:*:*:*:*:*:*", "cpeNameId": "4EEC2898-AB1B-482B-AFC9-4849B0140622"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9.9:*:*:*:*:*:*:*", "cpeNameId": "D1ADF9CE-CF40-44B5-A7D1-82EEAA8FCBB9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9.10:*:*:*:*:*:*:*", "cpeNameId": "73EAE99F-3F30-429A-8C6D-22AB052D61AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9.11:*:*:*:*:*:*:*", "cpeNameId": "58920DA7-409B-42BB-932E-76F0BE199BD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10:*:*:*:*:*:*:*", "cpeNameId": "627457F8-5AC8-4B56-90A8-F5817CEA1A02"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10:-:*:*:*:*:*:*", "cpeNameId": "B5D985BC-815C-4878-890F-A3CACB0B2C04"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10:rc1:*:*:*:*:*:*", "cpeNameId": "2B6DFE57-F18D-4466-8009-E56C1322A73B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10:rc2:*:*:*:*:*:*", "cpeNameId": "76E6C370-1859-4C7D-B9C3-C461D4932777"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10:rc3:*:*:*:*:*:*", "cpeNameId": "15784D14-3246-468A-8294-6B24FF62FDA8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10:rc4:*:*:*:*:*:*", "cpeNameId": "EB4B221D-C82B-4A7B-9143-25F7EA059041"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10:rc5:*:*:*:*:*:*", "cpeNameId": "A0635D56-7D89-4FE8-94DC-5E62E64EF17D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10:rc6:*:*:*:*:*:*", "cpeNameId": "CC3F67C3-CA69-4A13-8ACF-FC21990D5FAA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10:rc7:*:*:*:*:*:*", "cpeNameId": "5D39315F-8D24-4FCF-90B9-6E9369644DBE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.1:*:*:*:*:*:*:*", "cpeNameId": "36E0C37B-1059-4ECE-A8A8-4E7085ECB47E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.2:*:*:*:*:*:*:*", "cpeNameId": "36540352-DC52-4A5E-8E8C-9D05136A05BA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.3:*:*:*:*:*:*:*", "cpeNameId": "42630BB7-77F6-4E7E-8C9F-10D082BE9C86"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.4:*:*:*:*:*:*:*", "cpeNameId": "E35AB549-17AC-49BF-8ED9-15669310F079"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.5:*:*:*:*:*:*:*", "cpeNameId": "BDBF9D93-EFD8-4A4E-81C9-0F0C75FC16A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.6:*:*:*:*:*:*:*", "cpeNameId": "610F682A-AF20-4B5D-AA11-4F42C35B76D6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.7:*:*:*:*:*:*:*", "cpeNameId": "ADD79206-8D78-4BE9-B026-B1F822CDE556"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.8:*:*:*:*:*:*:*", "cpeNameId": "6F974AC6-0755-4F37-8412-02C361FEFB12"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.9:*:*:*:*:*:*:*", "cpeNameId": "890670E2-6785-47F4-86DE-93B58D48B91E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.10:*:*:*:*:*:*:*", "cpeNameId": "CE332AF0-A825-4216-B40B-930150C5CDF6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.11:*:*:*:*:*:*:*", "cpeNameId": "3E14F0B1-F85F-470B-B3DC-348B4784E611"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.12:*:*:*:*:*:*:*", "cpeNameId": "8D5DC9C4-BC9C-408F-AB6E-B71546668696"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.13:*:*:*:*:*:*:*", "cpeNameId": "25D38678-6147-4568-8FCC-CC82359417D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.14:*:*:*:*:*:*:*", "cpeNameId": "4EB118D0-AE6E-44C9-9969-CF2294698B06"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.15:*:*:*:*:*:*:*", "cpeNameId": "0A0706BE-9D8C-4781-B317-F73AFB379711"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.16:*:*:*:*:*:*:*", "cpeNameId": "64EE6331-F08C-4AD1-96F8-AB203BD22BFA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.17:*:*:*:*:*:*:*", "cpeNameId": "815A07AB-2704-473B-8438-AE69C1068040"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.18:*:*:*:*:*:*:*", "cpeNameId": "DBD88C4C-3287-43EE-ACB7-E5048E733D9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.19:*:*:*:*:*:*:*", "cpeNameId": "85991037-0786-4EED-81E7-6891E7A8DC2D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.20:*:*:*:*:*:*:*", "cpeNameId": "1403FE7F-53BC-4C3A-A0A6-0F284E097303"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.21:*:*:*:*:*:*:*", "cpeNameId": "7625E253-3F26-4923-9690-002AC4F18351"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.22:*:*:*:*:*:*:*", "cpeNameId": "55C8CD03-5BC7-48AE-AEF8-491EC0CCFBE8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.23:*:*:*:*:*:*:*", "cpeNameId": "DDBF32C8-F3C1-4FDD-94EC-2CB12DDD301A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.24:*:*:*:*:*:*:*", "cpeNameId": "F71917E6-D98D-4017-9410-E250F98E5150"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.25:*:*:*:*:*:*:*", "cpeNameId": "D1DB0CB7-8777-4FFA-BDA7-0E905821248D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.26:*:*:*:*:*:*:*", "cpeNameId": "5C216138-ADC4-4B4B-832A-0D5F45CB8601"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.27:*:*:*:*:*:*:*", "cpeNameId": "C0842F91-5527-418E-893E-2815B0B25B12"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.28:*:*:*:*:*:*:*", "cpeNameId": "455FB880-6681-4F6E-B7EE-DAB35E68ED00"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.29:*:*:*:*:*:*:*", "cpeNameId": "7ECF8E96-BB6C-48A1-A939-CAF7EEF01DAA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.30:*:*:*:*:*:*:*", "cpeNameId": "431061A4-8B29-44AC-8B5A-B00B492AF919"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.31:*:*:*:*:*:*:*", "cpeNameId": "C7A2D5DC-2AB9-4CB0-85B6-E9E3D52ECAE7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.32:*:*:*:*:*:*:*", "cpeNameId": "C9B41E65-9F6F-409B-AE9A-82BB1AE405AF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.33:*:*:*:*:*:*:*", "cpeNameId": "84FA7866-7446-4F3E-AFE7-B678A77F7678"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.34:*:*:*:*:*:*:*", "cpeNameId": "B37F635D-70D3-4A0F-BC7A-F724A00597EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.35:*:*:*:*:*:*:*", "cpeNameId": "6C02AEA8-E18E-4CE2-983F-FD54F170D970"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.36:*:*:*:*:*:*:*", "cpeNameId": "58D3B0A5-3DD9-46A6-AF11-FDC7670F9A5E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.37:*:*:*:*:*:*:*", "cpeNameId": "705AAD20-057F-4E96-8054-5ABFA09DEC45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.38:*:*:*:*:*:*:*", "cpeNameId": "59548517-C5F0-4917-ADF8-4C33A8590526"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.39:*:*:*:*:*:*:*", "cpeNameId": "27F7B769-9A4C-4AB9-9D07-18AAD41D0EEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.40:*:*:*:*:*:*:*", "cpeNameId": "9AAB506F-9A8F-40DD-ADD8-800C9EF8158F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.41:*:*:*:*:*:*:*", "cpeNameId": "92E1E10B-853E-4B5D-965A-EC219484816B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.42:*:*:*:*:*:*:*", "cpeNameId": "3E99C617-2C7C-49FB-A83C-8D425936A8EC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.43:*:*:*:*:*:*:*", "cpeNameId": "D6410957-5E95-48A0-BCA9-2235FAED1FE8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.44:*:*:*:*:*:*:*", "cpeNameId": "93A1603D-5749-4D3E-AEC4-2EA665A4682B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.45:*:*:*:*:*:*:*", "cpeNameId": "B739CA1D-E0B1-4D30-B7CE-E66FA1FFDBBC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.46:*:*:*:*:*:*:*", "cpeNameId": "E3725D22-0894-4887-A626-825BEB339578"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.47:*:*:*:*:*:*:*", "cpeNameId": "39640B61-C244-43C9-AB0C-6A220A1A5A56"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.48:*:*:*:*:*:*:*", "cpeNameId": "E6788528-AE41-473C-949B-710669D2D819"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.49:*:*:*:*:*:*:*", "cpeNameId": "D26658AF-CBE6-4E04-BF1A-F72C6E324B13"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.50:*:*:*:*:*:*:*", "cpeNameId": "524F7BF2-2CE3-4AF7-B2CE-27BDE272F5CE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.51:*:*:*:*:*:*:*", "cpeNameId": "5A46A50B-BE7A-422E-B5A5-85C4E7A9086B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.52:*:*:*:*:*:*:*", "cpeNameId": "BC501D66-6C4E-4287-B6B1-AF31DB34E6DE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.53:*:*:*:*:*:*:*", "cpeNameId": "A7F6AE2D-5239-42A4-BE47-B8405AFE4F15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.54:*:*:*:*:*:*:*", "cpeNameId": "FCAF15A4-5502-4988-972D-03C4FC1C8006"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.55:*:*:*:*:*:*:*", "cpeNameId": "6068E853-E361-413E-A374-6140BA7E3AEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.56:*:*:*:*:*:*:*", "cpeNameId": "4FC2A2C4-F834-43B1-8C2F-55BB48AD6576"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.57:*:*:*:*:*:*:*", "cpeNameId": "9EA2D1E4-4425-45AF-9C93-193BB49EA83A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.58:*:*:*:*:*:*:*", "cpeNameId": "74FD8119-9DCC-4CF1-BF22-CC9B0975F993"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.59:*:*:*:*:*:*:*", "cpeNameId": "97034175-79EB-4975-AEED-2C504169DAD3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.60:*:*:*:*:*:*:*", "cpeNameId": "F2AD8245-8B96-45BF-9E5D-0B24A3CE878D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.61:*:*:*:*:*:*:*", "cpeNameId": "2338CE12-153B-40A1-9200-757DE8EE2B31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.62:*:*:*:*:*:*:*", "cpeNameId": "BFA482D2-DAFA-43D9-BAD5-454D33FC986E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.63:*:*:*:*:*:*:*", "cpeNameId": "DE75E0A4-72AF-42DD-9A60-28DD82E24567"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.64:*:*:*:*:*:*:*", "cpeNameId": "57E7B27B-9D49-425A-AD27-D1FC5F1F5007"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.65:*:*:*:*:*:*:*", "cpeNameId": "FC5F79AC-A9F4-46F9-8390-21319C190DE2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.66:*:*:*:*:*:*:*", "cpeNameId": "267199FD-8267-4026-B0D5-8120C74CA81C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.67:*:*:*:*:*:*:*", "cpeNameId": "2FB70320-422D-41C6-9BE6-A90DA6C50C45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.68:*:*:*:*:*:*:*", "cpeNameId": "990F0E4A-3D05-4A24-93B9-821C5FA89E61"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.69:*:*:*:*:*:*:*", "cpeNameId": "86B87B65-18E8-46B1-BA2D-818DA2A97589"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.70:*:*:*:*:*:*:*", "cpeNameId": "14F9E78A-8939-4871-8C3A-176553FCE3F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.71:*:*:*:*:*:*:*", "cpeNameId": "AD18BF6A-8E8A-4F49-A685-7C52C567A804"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.72:*:*:*:*:*:*:*", "cpeNameId": "FBA9034E-BB55-4749-90A9-98D200B4655A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.73:*:*:*:*:*:*:*", "cpeNameId": "B7587B68-C990-47CF-BD9F-FC8A8AAAB01D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.74:*:*:*:*:*:*:*", "cpeNameId": "1EABE4F9-0363-4FE7-B6CE-415714E38C9E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.75:*:*:*:*:*:*:*", "cpeNameId": "2244EA46-B3EA-4AA6-A739-DC99BA897D8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.76:*:*:*:*:*:*:*", "cpeNameId": "54446C18-F95D-4767-9E2A-BBB520D1578B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.77:*:*:*:*:*:*:*", "cpeNameId": "8B94B3BD-37A2-46C8-B443-C69BAE2A93D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.78:*:*:*:*:*:*:*", "cpeNameId": "4B0A2778-F0C7-4932-9B59-5DBAC0E56BC1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.79:*:*:*:*:*:*:*", "cpeNameId": "E60581E5-899D-4C89-AB6F-CB591072FC40"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.80:*:*:*:*:*:*:*", "cpeNameId": "B264E855-88CD-4497-AD61-BAD605BDADB3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.81:*:*:*:*:*:*:*", "cpeNameId": "DF2C4C4B-9057-4E0E-9AB3-CFAEBB2B3FC4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.82:*:*:*:*:*:*:*", "cpeNameId": "FCD95819-4985-4986-836B-C60A6A7603A0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.83:*:*:*:*:*:*:*", "cpeNameId": "7857A3A2-6650-4E55-B69A-36A1C220AE69"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.84:*:*:*:*:*:*:*", "cpeNameId": "58854616-0E47-43CA-8F84-2820A63B578A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.85:*:*:*:*:*:*:*", "cpeNameId": "DED66AEB-55F2-4E73-9E63-A2A351B7C4A5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.86:*:*:*:*:*:*:*", "cpeNameId": "9AD4F8F7-DD35-4753-B28D-89AF3A118AE4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.87:*:*:*:*:*:*:*", "cpeNameId": "5DB0B4F9-191A-4190-B894-133F8D8D69D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.88:*:*:*:*:*:*:*", "cpeNameId": "4C7015DD-D345-46D2-BEDB-6C2371BA4CCB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.89:*:*:*:*:*:*:*", "cpeNameId": "4AB80BF4-4DA6-4A21-9170-271328D4BE10"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.90:*:*:*:*:*:*:*", "cpeNameId": "4DDE1841-2392-477A-AC6A-05EE08C442AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.91:*:*:*:*:*:*:*", "cpeNameId": "866D88DB-8640-4219-A519-C9D1DFE75A0A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.92:*:*:*:*:*:*:*", "cpeNameId": "CCF4FE02-E968-4718-B0C1-E34611B4A678"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.93:*:*:*:*:*:*:*", "cpeNameId": "3466DEC0-18B6-4CCC-9035-699DB58A08DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.94:*:*:*:*:*:*:*", "cpeNameId": "E2E267A5-F455-4F4B-B0DC-32695915F1F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.95:*:*:*:*:*:*:*", "cpeNameId": "1A09E587-339A-4653-897D-90351A1B1025"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.96:*:*:*:*:*:*:*", "cpeNameId": "C1173A8A-4845-4811-B351-EC99088D9CC2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.97:*:*:*:*:*:*:*", "cpeNameId": "164972DF-5261-4E50-AA72-0D593A06093E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.98:*:*:*:*:*:*:*", "cpeNameId": "959D88A5-1F60-4CC0-AA2A-FE4CA946B52C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.99:*:*:*:*:*:*:*", "cpeNameId": "83FA5052-1126-43B6-B154-9693B0DC5D68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.100:*:*:*:*:*:*:*", "cpeNameId": "FE74990F-736C-40A6-B9A6-5DB0862A3598"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.101:*:*:*:*:*:*:*", "cpeNameId": "65A3F087-7FDD-464B-B5E8-11A123B6FED0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.102:*:*:*:*:*:*:*", "cpeNameId": "4361D9D4-566F-48FA-A9B5-9DF5F480F87D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.103:*:*:*:*:*:*:*", "cpeNameId": "96462486-A899-4D91-AE51-05076698C747"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.104:*:*:*:*:*:*:*", "cpeNameId": "68B1A24A-226E-4C33-B506-68A97B8EB668"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.105:*:*:*:*:*:*:*", "cpeNameId": "DEDE9948-C1FC-49B3-8506-3D2951BFBB59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.106:*:*:*:*:*:*:*", "cpeNameId": "A4F41E53-E5A7-48F9-98A4-AD0AC46B29E5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.107:*:*:*:*:*:*:*", "cpeNameId": "D381BFF6-927D-4DCA-BB4F-4F42E77DEF75"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.108:*:*:*:*:*:*:*", "cpeNameId": "3398626D-D51A-4F5B-A24A-F23C0D2CB910"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11:*:*:*:*:*:*:*", "cpeNameId": "F75AFEC9-47FA-4037-90F6-A48AA82289C9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11:rc1:*:*:*:*:*:*", "cpeNameId": "5BEAC0E5-F63C-4AC6-95FC-CF80E30AA77E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11:rc2:*:*:*:*:*:*", "cpeNameId": "E5BBF478-F0EE-487A-B822-0C3E66912C59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11:rc3:*:*:*:*:*:*", "cpeNameId": "88CE34B4-9D9A-4AC8-B6F3-79A4DFA9D46A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11:rc4:*:*:*:*:*:*", "cpeNameId": "9C7C660C-5CB3-49CB-A94E-E772F275C30F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11:rc5:*:*:*:*:*:*", "cpeNameId": "91C8A273-5AF6-4E43-B09C-880A80B8CE77"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11:rc6:*:*:*:*:*:*", "cpeNameId": "B6A758CD-437D-4073-87A1-259DCE2BB31B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11:rc7:*:*:*:*:*:*", "cpeNameId": "B599BCFA-E2F9-4870-B34B-223562EA4FFC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11.1:*:*:*:*:*:*:*", "cpeNameId": "8D482F9D-E3F6-4C32-A00C-415D1326F573"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11.2:*:*:*:*:*:*:*", "cpeNameId": "952A504C-0AED-46A3-A44F-2804AC428A64"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11.3:*:*:*:*:*:*:*", "cpeNameId": "07351A9F-CF21-4D89-ABC4-595BA4B6117E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11.4:*:*:*:*:*:*:*", "cpeNameId": "D864C50A-53DD-4BFA-B846-4CB6EB1F718C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11.5:*:*:*:*:*:*:*", "cpeNameId": "2FB9015E-80F3-48F4-AF87-1A0308E755BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11.6:*:*:*:*:*:*:*", "cpeNameId": "2E8F4459-22C0-4006-8760-2A3DF30E1EBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11.7:*:*:*:*:*:*:*", "cpeNameId": "04ED3CC1-93AA-46B8-81B8-2A1EBF958C5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11.8:*:*:*:*:*:*:*", "cpeNameId": "E46B14D2-5050-4359-992A-E025238FB60E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11.9:*:*:*:*:*:*:*", "cpeNameId": "8F22E34B-3CBD-4F71-9C93-10511FEC2ECE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11.10:*:*:*:*:*:*:*", "cpeNameId": "53E5A537-6C5E-463B-8BBA-F29456EC0728"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12:*:*:*:*:*:*:*", "cpeNameId": "64B896A7-E835-4D8C-BA75-179A4A1C5A21"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.1:*:*:*:*:*:*:*", "cpeNameId": "A5798E8B-25FE-4B2F-8425-ADA099CB6469"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.2:*:*:*:*:*:*:*", "cpeNameId": "00133E45-0260-47F0-93EB-50C9DA890A91"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.3:*:*:*:*:*:*:*", "cpeNameId": "905F7914-1CF3-47AE-8017-2577783E2B1D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.4:*:*:*:*:*:*:*", "cpeNameId": "3C6255BD-73CA-4B3B-BA1A-2B0C6B21C127"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.5:*:*:*:*:*:*:*", "cpeNameId": "5AB5DA1C-54FE-4065-9A6C-CF4292F5C766"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.6:*:*:*:*:*:*:*", "cpeNameId": "F94EAD8F-C9AF-4A71-8833-BEBB089C650B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.7:*:*:*:*:*:*:*", "cpeNameId": "65DC5222-0DF1-4F28-B48D-1B6987E4A250"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.8:*:*:*:*:*:*:*", "cpeNameId": "501F73DF-5349-4A18-AEC2-2DDA0FE61C2C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.9:*:*:*:*:*:*:*", "cpeNameId": "614BF4FA-00CF-48BB-AB0B-24268FD8116B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.10:*:*:*:*:*:*:*", "cpeNameId": "EE2F0BFF-481B-4403-85E8-CD3BEF29C49F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.11:*:*:*:*:*:*:*", "cpeNameId": "9EED81CF-D6C3-4521-8AA7-1057F00F4A84"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.12:*:*:*:*:*:*:*", "cpeNameId": "07A81603-5E43-4FAF-950A-8E9C84F2A7EE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.13:*:*:*:*:*:*:*", "cpeNameId": "BE3BAA85-6B7B-4893-9B06-0743B846FAF4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.14:*:*:*:*:*:*:*", "cpeNameId": "5CA9D680-CF72-4880-A263-7B5053CCC57D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.15:*:*:*:*:*:*:*", "cpeNameId": "52A55F4F-315E-4768-B2E3-13E044CC2598"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.16:*:*:*:*:*:*:*", "cpeNameId": "6DD80A01-AF1D-451B-B71E-6C35D01D3582"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.17:*:*:*:*:*:*:*", "cpeNameId": "677145FC-D4B5-46BC-B20B-2E89A95A75C7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.18:*:*:*:*:*:*:*", "cpeNameId": "0AEA1E6B-EDCC-4C8B-B8BD-49EF072F9662"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.19:*:*:*:*:*:*:*", "cpeNameId": "67D3A852-7617-495D-90B6-F9162A2DA19B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.20:*:*:*:*:*:*:*", "cpeNameId": "A50A0202-7561-46CE-BB13-70B1C30B44F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.21:*:*:*:*:*:*:*", "cpeNameId": "D0C55472-843A-4E56-883B-FC8286BDA3D7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.22:*:*:*:*:*:*:*", "cpeNameId": "43C97962-E307-4C33-9E7B-67C5B93CC4B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.23:*:*:*:*:*:*:*", "cpeNameId": "987EFE31-3789-47AF-99E0-48473B4B4A50"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.24:*:*:*:*:*:*:*", "cpeNameId": "C4697F43-ADAD-45A8-BC55-DEF93AF196A7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.25:*:*:*:*:*:*:*", "cpeNameId": "8879CA5B-DB0D-4589-9CDE-DBD94EF6FBE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.26:*:*:*:*:*:*:*", "cpeNameId": "329DD992-7C17-47BA-B421-8CD73D49D6EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.27:*:*:*:*:*:*:*", "cpeNameId": "41303B07-D3D7-40F8-93F1-85CD3343490C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.28:*:*:*:*:*:*:*", "cpeNameId": "035C87B6-8568-4673-B414-7E2BC872AE43"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.29:*:*:*:*:*:*:*", "cpeNameId": "14E4850D-2E72-49C1-9977-072FFAFF85EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.30:*:*:*:*:*:*:*", "cpeNameId": "FDFE0F89-D3F8-4D4D-9CE1-0E88C232EFE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.31:*:*:*:*:*:*:*", "cpeNameId": "778A3B9C-55D6-43B6-A5F8-6EB19EB7516D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.32:*:*:*:*:*:*:*", "cpeNameId": "F0E31FB4-CC29-4E44-9497-00FA47A8E9BE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.33:*:*:*:*:*:*:*", "cpeNameId": "EBD62036-9111-43E7-A5F8-EACF7BCB75FA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.34:*:*:*:*:*:*:*", "cpeNameId": "BE875471-EB8B-4187-A218-79BF0160106F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.35:*:*:*:*:*:*:*", "cpeNameId": "A1D08608-8242-4271-ABA8-24F53563796A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.36:*:*:*:*:*:*:*", "cpeNameId": "87BAFA75-3062-4330-B30E-BB3379D61996"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.37:*:*:*:*:*:*:*", "cpeNameId": "DFD328E2-C1A1-443F-B9B2-61E154FEC308"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.38:*:*:*:*:*:*:*", "cpeNameId": "A0C6DBCC-E339-44A2-BF07-C4BFA0A75218"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.39:*:*:*:*:*:*:*", "cpeNameId": "B8A25CCA-C76A-4C4A-A287-4263E9F193F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.40:*:*:*:*:*:*:*", "cpeNameId": "F7FC78A4-49B1-4BD5-A239-2913792F0D38"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.41:*:*:*:*:*:*:*", "cpeNameId": "E61ADF4E-64CA-44F9-BB10-8E05E4F9A49E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.42:*:*:*:*:*:*:*", "cpeNameId": "DF51174B-8193-49A6-AA5F-A88E55B5689C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.43:*:*:*:*:*:*:*", "cpeNameId": "660F6036-C153-4C4D-9C1C-8251780FD091"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.44:*:*:*:*:*:*:*", "cpeNameId": "AC5B232F-9000-4773-ACC7-A089BD2D1F95"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.45:*:*:*:*:*:*:*", "cpeNameId": "61441944-DB00-4959-9CF1-2FB0ABA9BD3C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.46:*:*:*:*:*:*:*", "cpeNameId": "49C78690-FF34-46C0-90E0-C8364AB6302C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.47:*:*:*:*:*:*:*", "cpeNameId": "25525F05-9701-4C5F-A520-5CE5D3F098F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.48:*:*:*:*:*:*:*", "cpeNameId": "9E751725-7306-4149-8716-76DF78D28E0D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.49:*:*:*:*:*:*:*", "cpeNameId": "26C4C2E6-B873-4617-839A-CEB90C44DEB8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.50:*:*:*:*:*:*:*", "cpeNameId": "25B9F5A0-597A-4CDB-BAD2-7EFDED049ADB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.51:*:*:*:*:*:*:*", "cpeNameId": "23960434-54B9-4CD3-8259-27E868FAD8F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.52:*:*:*:*:*:*:*", "cpeNameId": "CDD83033-874F-48F5-87AA-954427858E93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.53:*:*:*:*:*:*:*", "cpeNameId": "DE70E58D-E54C-4EBF-AF80-073F06F48E96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.54:*:*:*:*:*:*:*", "cpeNameId": "A55F66D7-EFCC-4B69-A1DF-E079988DE459"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.55:*:*:*:*:*:*:*", "cpeNameId": "992B91FA-ED2E-472B-A540-8EDDDAB546DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.56:*:*:*:*:*:*:*", "cpeNameId": "C3E5ED56-2BFD-4B5B-A868-64FE8F556673"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.57:*:*:*:*:*:*:*", "cpeNameId": "5EB333E2-620D-4F48-9162-3A2A7269A5FA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.58:*:*:*:*:*:*:*", "cpeNameId": "91C923D0-3C2B-491F-BE0E-5283907AE153"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.59:*:*:*:*:*:*:*", "cpeNameId": "809D9A62-1091-437F-828C-E08C6DDA03D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.60:*:*:*:*:*:*:*", "cpeNameId": "402B78BE-A405-4665-9836-AD6043AD7D70"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.61:*:*:*:*:*:*:*", "cpeNameId": "A331CC45-D7C5-4930-8DA9-0FD2976C829B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.62:*:*:*:*:*:*:*", "cpeNameId": "B4FF0AA0-3B07-45DC-949B-053D7F53CC6B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.63:*:*:*:*:*:*:*", "cpeNameId": "B0B58B50-8AEA-449F-9AEF-89713152EAE3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.64:*:*:*:*:*:*:*", "cpeNameId": "0C9BB368-F2ED-4C3B-8E8A-295D5EA7B6D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.65:*:*:*:*:*:*:*", "cpeNameId": "2614B472-06A6-4DB5-99FE-6D6DB58EE9F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.66:*:*:*:*:*:*:*", "cpeNameId": "46C58247-7B77-4957-8C6C-256801A1BD7C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.67:*:*:*:*:*:*:*", "cpeNameId": "E79A8ECB-6A3E-458B-874A-246BF02438F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.68:*:*:*:*:*:*:*", "cpeNameId": "A66131F6-5BD1-4DE0-BD71-24B8F8E8A0E7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.69:*:*:*:*:*:*:*", "cpeNameId": "747F4A0A-795F-4764-84EA-F1E4B3C0AFA3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.70:*:*:*:*:*:*:*", "cpeNameId": "2BD55A5D-F95E-4980-838F-3D2C95475702"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.71:*:*:*:*:*:*:*", "cpeNameId": "D1DCC046-F7A5-4700-9F36-C18E6B97E247"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.72:*:*:*:*:*:*:*", "cpeNameId": "6418388D-4EA9-4676-B750-23B1E05EDB03"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.73:*:*:*:*:*:*:*", "cpeNameId": "2E62C9EE-C007-44BA-B1EE-B6F56AABFD62"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.74:*:*:*:*:*:*:*", "cpeNameId": "61D92C4C-6A59-45EA-B16A-A877DBF5267F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.13:*:*:*:*:*:*:*", "cpeNameId": "7675C9E5-D99B-4559-813B-08F5409902B8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.13:rc1:*:*:*:*:*:*", "cpeNameId": "704510E8-D773-421C-B4B8-F1B71978C66A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.13.1:*:*:*:*:*:*:*", "cpeNameId": "7179867B-6349-4785-A0E8-F5F482F45ED0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.13.2:*:*:*:*:*:*:*", "cpeNameId": "7C5BFB48-EF90-4264-BC04-7F16B6FED2A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.13.3:*:*:*:*:*:*:*", "cpeNameId": "FE5C9534-292E-4E03-8F5E-58B54CE6E1BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.13.4:*:*:*:*:*:*:*", "cpeNameId": "9B186AFD-8409-43C0-A7BE-FD3922148612"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.13.5:*:*:*:*:*:*:*", "cpeNameId": "0BB9D21D-FEA0-4AD0-B648-28D885F21C32"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.13.6:*:*:*:*:*:*:*", "cpeNameId": "1D6D97DE-0481-4C82-BB8A-832867572022"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.13.7:*:*:*:*:*:*:*", "cpeNameId": "7CA0A0D0-0BFB-4F04-B3C6-7E4392BBFF31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.13.8:*:*:*:*:*:*:*", "cpeNameId": "098C278A-3A8A-4510-9EAC-C3341B334B88"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.13.9:*:*:*:*:*:*:*", "cpeNameId": "BD4E7777-D71C-4C8F-891F-A0571D2B9107"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.13.10:*:*:*:*:*:*:*", "cpeNameId": "C6AEDFDC-DBD6-4D00-AE8C-45230E3B90C7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.13.11:*:*:*:*:*:*:*", "cpeNameId": "1D513E96-5147-4AC0-B88E-39D255397849"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14:-:*:*:*:*:*:*", "cpeNameId": "1D9BAB2A-ACD5-4894-ACF3-BB019C0D9DAE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14:rc1:*:*:*:*:*:*", "cpeNameId": "275C31DB-1803-404A-B330-5C8BDA278F3E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14:rc2:*:*:*:*:*:*", "cpeNameId": "F3F198B6-5F96-4DAA-AD09-6239B6A86D74"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14:rc3:*:*:*:*:*:*", "cpeNameId": "69BAE2C9-57F4-4215-8AFC-A08082F91F89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14:rc4:*:*:*:*:*:*", "cpeNameId": "EDD65366-2557-44F5-B9BA-DD37AE036110"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14:rc5:*:*:*:*:*:*", "cpeNameId": "E044E8FA-940A-4293-83C0-4F42F00E30B8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14:rc6:*:*:*:*:*:*", "cpeNameId": "D98D7A2C-5208-41E2-8E41-2EF23273F91C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14:rc7:*:*:*:*:*:*", "cpeNameId": "1CFADBD3-9088-42D7-AD96-2B90F566D83E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14:rc8:*:*:*:*:*:*", "cpeNameId": "C353F80F-94CD-4CE0-8B55-EFADABD82F01"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.1:*:*:*:*:*:*:*", "cpeNameId": "EFAAC9F0-0CBF-41F8-BFAA-792B68ACC080"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.2:*:*:*:*:*:*:*", "cpeNameId": "7C11DBE5-5367-4A8C-8892-1845187B0DAF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.3:*:*:*:*:*:*:*", "cpeNameId": "31D44284-BB44-4E6E-837C-3ACB4B6D3B98"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.4:*:*:*:*:*:*:*", "cpeNameId": "E0BEF371-B9BB-47D0-A565-4A5235548473"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.5:*:*:*:*:*:*:*", "cpeNameId": "3D16437E-1E60-4921-8A0D-D7A9D92B8765"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.6:*:*:*:*:*:*:*", "cpeNameId": "2F640FC6-6044-448F-8821-0CEED7B2FA99"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.7:*:*:*:*:*:*:*", "cpeNameId": "32195292-ACC9-4769-B0F5-B4A1556413D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.8:*:*:*:*:*:*:*", "cpeNameId": "F58DCB69-AF8A-46D0-908D-C46050B56588"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.9:*:*:*:*:*:*:*", "cpeNameId": "8A9A99A1-8548-4708-B249-945CAB4E0BDE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.10:*:*:*:*:*:*:*", "cpeNameId": "310204CE-EB36-4207-BE51-01B4EFA21612"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.11:*:*:*:*:*:*:*", "cpeNameId": "5EFDD809-F451-448D-BCA3-D8F1423877E3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.12:*:*:*:*:*:*:*", "cpeNameId": "5B4BD86F-D2A6-4800-8D5E-1F27F58F683F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.13:*:*:*:*:*:*:*", "cpeNameId": "1C190740-B2F4-4F2E-B6A0-98D96316968B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.14:*:*:*:*:*:*:*", "cpeNameId": "F655EE2A-0907-4AC1-969D-75421AA873BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.15:*:*:*:*:*:*:*", "cpeNameId": "CF8F0970-8DD7-4AFC-8BB3-CDDD4C0CCFCE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.16:*:*:*:*:*:*:*", "cpeNameId": "6E51D89B-7B3C-4B01-98F6-9EE63EECF0C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.17:*:*:*:*:*:*:*", "cpeNameId": "8C60A84F-4C1E-4745-8479-2DAB0F2AFA85"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.18:*:*:*:*:*:*:*", "cpeNameId": "7E2BED9C-EA21-4C51-924B-226BBFCED950"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.19:*:*:*:*:*:*:*", "cpeNameId": "EE4C5E0E-CE83-4E30-A6ED-F00D310F1007"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.20:*:*:*:*:*:*:*", "cpeNameId": "613E1F2F-51D2-47FB-9BEC-1500252E750F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.21:*:*:*:*:*:*:*", "cpeNameId": "46C29139-C9A6-4F18-922A-7B6B84739E19"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.22:*:*:*:*:*:*:*", "cpeNameId": "E3884214-BF14-43D5-AD47-28C63E8F2549"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.23:*:*:*:*:*:*:*", "cpeNameId": "1E15C7AB-DB2A-4383-9307-9ECDB67459D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.24:*:*:*:*:*:*:*", "cpeNameId": "3D260DE8-01A1-46E9-BA73-FC19FB9909E4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.25:*:*:*:*:*:*:*", "cpeNameId": "BE686202-3204-4E6D-94A1-DFBF267BE150"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.26:*:*:*:*:*:*:*", "cpeNameId": "0D6CB817-59F8-4416-95A7-0187B315FC43"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.27:*:*:*:*:*:*:*", "cpeNameId": "CDA9DAD3-11EE-4616-B437-8E5A016D2663"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.28:*:*:*:*:*:*:*", "cpeNameId": "87E8D5EC-7107-4A8B-90C6-EED05AC9F068"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.29:*:*:*:*:*:*:*", "cpeNameId": "477180AC-6496-43B7-BD33-B88FA9DF1BD8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.30:*:*:*:*:*:*:*", "cpeNameId": "69E9067D-3CDF-4A22-AF5F-64F8262A08A3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.31:*:*:*:*:*:*:*", "cpeNameId": "3197F63D-4282-4176-B9F0-3C9ED1852338"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.32:*:*:*:*:*:*:*", "cpeNameId": "BD3E1C90-E84E-4240-B5DB-EE0A640428D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.33:*:*:*:*:*:*:*", "cpeNameId": "D7DDB6E3-CAA5-4CDA-BC12-1051EB8A4915"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.34:*:*:*:*:*:*:*", "cpeNameId": "B4D681EA-C675-4F30-BA58-C00E1A1BF0C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.35:*:*:*:*:*:*:*", "cpeNameId": "10D5F3CC-5CE4-433A-8EE2-6C26D0B0F104"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.36:*:*:*:*:*:*:*", "cpeNameId": "2C87858B-A357-4109-8F4A-43F30D955337"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.37:*:*:*:*:*:*:*", "cpeNameId": "438D314D-81C9-46E2-A074-D3CDC8150A31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.38:*:*:*:*:*:*:*", "cpeNameId": "56FF2B04-ACFB-4CB5-B622-2500B7EBCF9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.39:*:*:*:*:*:*:*", "cpeNameId": "F188A8FC-42B2-484D-92F3-9820A0AFB215"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.40:*:*:*:*:*:*:*", "cpeNameId": "1C91D5D4-7E7C-4DE2-8485-580F7BC1DA94"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.41:*:*:*:*:*:*:*", "cpeNameId": "4FA8915E-F7A0-4EB2-B56B-A91F138153FF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.42:*:*:*:*:*:*:*", "cpeNameId": "CDE8EDFB-FA30-425F-AD32-F8BB598FE9DE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.43:*:*:*:*:*:*:*", "cpeNameId": "329775D3-608C-469E-9BF0-27B5743333B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.44:*:*:*:*:*:*:*", "cpeNameId": "5FCF03F5-EC66-466B-95F0-DCD0F290D8B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.45:*:*:*:*:*:*:*", "cpeNameId": "E46E69E4-EFEE-439E-9C2F-456ABD7FFFFC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.46:*:*:*:*:*:*:*", "cpeNameId": "AAE75E9F-C997-4361-85ED-01A12A505971"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.47:*:*:*:*:*:*:*", "cpeNameId": "4DCD068C-F3EC-4D35-909D-E00796FDF9D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.48:*:*:*:*:*:*:*", "cpeNameId": "072DDFA0-91FD-48BE-AC5C-B580C6CB6640"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.49:*:*:*:*:*:*:*", "cpeNameId": "5ABF4B87-D1FF-468F-BE3E-F00B44DD2DA8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.50:*:*:*:*:*:*:*", "cpeNameId": "6F239227-0791-4643-B831-84C1A08668CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.51:*:*:*:*:*:*:*", "cpeNameId": "D9D7B3F3-0FAD-4727-82ED-D1B01BEA5CAE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.52:*:*:*:*:*:*:*", "cpeNameId": "FA995237-C4AE-4356-AFCB-3ACFC2F06435"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.53:*:*:*:*:*:*:*", "cpeNameId": "97407565-A5B7-46B0-878B-76A598FD0DC4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.54:*:*:*:*:*:*:*", "cpeNameId": "73ED7AF3-B159-47BD-A2D7-3D2099B9549F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.55:*:*:*:*:*:*:*", "cpeNameId": "1C7DC9FB-31E4-4495-914C-BDF430224F2A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.56:*:*:*:*:*:*:*", "cpeNameId": "2B87E36E-C9C7-4287-B88E-B58CCDBEE8CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.57:*:*:*:*:*:*:*", "cpeNameId": "89CDF3D4-923A-42EB-B4F1-396752130549"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.58:*:*:*:*:*:*:*", "cpeNameId": "50F34BAE-FD72-4BA7-BDF3-2F063E263FE3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.59:*:*:*:*:*:*:*", "cpeNameId": "C17D896B-B112-4147-8B4E-D6809500DD0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.60:*:*:*:*:*:*:*", "cpeNameId": "CB0E701E-6E22-4C6B-ADC4-F7C9FED3490A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.61:*:*:*:*:*:*:*", "cpeNameId": "D5EC3A9F-488B-459B-B671-3CFF36C5264E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.62:*:*:*:*:*:*:*", "cpeNameId": "AAB9B2FA-7944-4BC7-9A19-C851CA4CA046"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.63:*:*:*:*:*:*:*", "cpeNameId": "7C8CFA70-2A89-4466-BF4E-58399541737F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.64:*:*:*:*:*:*:*", "cpeNameId": "2A0CBD6F-B950-4E1E-A538-EAC32B0F8D04"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.65:*:*:*:*:*:*:*", "cpeNameId": "302F00DB-6B4E-4974-9504-734827154FB8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.66:*:*:*:*:*:*:*", "cpeNameId": "D99E638B-B0EC-4DF7-8DFB-AA72926214AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.67:*:*:*:*:*:*:*", "cpeNameId": "2D123B44-2856-465B-BD85-533B959BB396"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.68:*:*:*:*:*:*:*", "cpeNameId": "6F411166-BE23-4D70-BAA4-2C37BCCCA795"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.69:*:*:*:*:*:*:*", "cpeNameId": "0DCE2177-093F-482E-8271-5BE75B5C4316"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.70:*:*:*:*:*:*:*", "cpeNameId": "829DAB82-FBA0-4C3D-852F-AF4920CE367B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.71:*:*:*:*:*:*:*", "cpeNameId": "8B763B63-7E89-4D31-B562-617198EB7A38"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.72:*:*:*:*:*:*:*", "cpeNameId": "DDEAEE70-1BEB-4C35-938A-7A2F0D5FF364"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.73:*:*:*:*:*:*:*", "cpeNameId": "5FBBDAD5-3210-49BC-B74C-1A3A59E38BD0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.74:*:*:*:*:*:*:*", "cpeNameId": "19C0B93D-C2D2-455F-BB51-70561B410251"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.75:*:*:*:*:*:*:*", "cpeNameId": "07647DB4-686E-4102-8A4B-FB7F7F4815D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.76:*:*:*:*:*:*:*", "cpeNameId": "225864D5-2AA2-4307-9AE4-36E4AE04110A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.77:*:*:*:*:*:*:*", "cpeNameId": "22C497DB-E1E3-4DFD-8E34-49796EAC1A3E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.78:*:*:*:*:*:*:*", "cpeNameId": "426F0C47-6D01-4224-92EF-986D75736A21"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.79:*:*:*:*:*:*:*", "cpeNameId": "D1756F76-C011-4755-82E3-997A11C5E1BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15:*:*:*:*:*:*:*", "cpeNameId": "F0E9A4B8-14FC-4869-AD9F-6246C6547675"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15:-:*:*:*:*:*:*", "cpeNameId": "E641A360-B4B9-4DF0-8F2E-7D5595E4CB00"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15:rc1:*:*:*:*:*:*", "cpeNameId": "118BFA5A-5522-46F1-8AE9-B68045907253"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15:rc2:*:*:*:*:*:*", "cpeNameId": "EC2F3273-918F-4CA8-8E3E-B0CBAE13039F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15:rc3:*:*:*:*:*:*", "cpeNameId": "85138DF9-2827-446B-B366-B0A20F1CAC4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15:rc4:*:*:*:*:*:*", "cpeNameId": "9EDCB3A7-36AC-4876-899D-C730BFBD51C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15:rc6:*:*:*:*:*:*", "cpeNameId": "513428B6-9ED7-429F-8EFA-414B66BB9A0A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15:rc7:*:*:*:*:*:*", "cpeNameId": "8C4E9BE9-AD91-4485-BE20-EBB81C5855B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15:rc8:*:*:*:*:*:*", "cpeNameId": "8706AA2E-64B2-412F-8C3C-C71110DE9BC9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15.1:*:*:*:*:*:*:*", "cpeNameId": "A0C9E4D7-B2A7-483B-98B7-A2CA6D9E0C7B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15.2:*:*:*:*:*:*:*", "cpeNameId": "D3F1222D-3C96-4F9A-B451-BA8C6AB11559"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15.3:*:*:*:*:*:*:*", "cpeNameId": "6D3E9B6B-73D6-47CD-83DF-D15B7FAE0B54"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15.4:*:*:*:*:*:*:*", "cpeNameId": "D09D6559-426F-401C-AAEA-50AA0131727F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15.5:*:*:*:*:*:*:*", "cpeNameId": "4576C52F-F54C-4DAF-99E7-64A078AFC64F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15.6:*:*:*:*:*:*:*", "cpeNameId": "F8ACD41C-8286-4481-AB2B-251455CA1DFF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15.7:*:*:*:*:*:*:*", "cpeNameId": "514EE5B7-BC9B-4A33-BFE3-F58F36176143"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15.8:*:*:*:*:*:*:*", "cpeNameId": "D7988546-C2DA-43EF-A366-BA433414B2BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15.9:*:*:*:*:*:*:*", "cpeNameId": "4A4616C1-AC52-4DAB-8A9E-EFF2995ACC3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15.10:*:*:*:*:*:*:*", "cpeNameId": "404717ED-8092-4310-B1D7-09DBE376FE7F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16:*:*:*:*:*:*:*", "cpeNameId": "0D147325-751C-4432-8659-4B28F342226C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.0:*:*:*:*:*:*:*", "cpeNameId": "978149A6-9A39-4896-AE9F-AE62071FF0B6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.1:*:*:*:*:*:*:*", "cpeNameId": "62B44D66-3148-4898-8789-85C8A7B27A40"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.2:*:*:*:*:*:*:*", "cpeNameId": "C76FB5C0-1C39-4E68-8F46-31FE00C018CC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.3:*:*:*:*:*:*:*", "cpeNameId": "88CCC2DD-0D9D-410C-8C24-92C5FC988B82"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.4:*:*:*:*:*:*:*", "cpeNameId": "033756ED-A578-42B2-93F2-36560EDDA0B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.5:*:*:*:*:*:*:*", "cpeNameId": "CAA952A3-3352-40F3-AD85-1764E26C6931"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.6:*:*:*:*:*:*:*", "cpeNameId": "EAF67B7C-FC7F-43DF-8238-C00AB67C30F7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.7:*:*:*:*:*:*:*", "cpeNameId": "2CC42649-1736-4748-8194-179E2F0576BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.35:*:*:*:*:*:*:*", "cpeNameId": "04FCF80C-585D-4A46-B874-49F9672541BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.36:*:*:*:*:*:*:*", "cpeNameId": "087658D7-B58E-49B5-AAF6-8268B05E6801"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.37:*:*:*:*:*:*:*", "cpeNameId": "01DE314D-2401-4FC2-8A9A-2D73356FDC23"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.38:*:*:*:*:*:*:*", "cpeNameId": "FCB85B1F-907F-4B32-B4D7-37B6BD2355F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.39:*:*:*:*:*:*:*", "cpeNameId": "1D6982FB-0E82-41B7-A209-5B5CF756BD9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.40:*:*:*:*:*:*:*", "cpeNameId": "B0B9A3E3-4FEC-413C-A97B-99E3FDDA1602"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.41:*:*:*:*:*:*:*", "cpeNameId": "65CBCBE3-A3F8-4CF6-BC30-24E77EBDE2A0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.42:*:*:*:*:*:*:*", "cpeNameId": "08CBF40F-1294-44E1-95AA-51B23466AD26"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.43:*:*:*:*:*:*:*", "cpeNameId": "68A8F4F3-A708-4BC7-B7FD-DCB35047847F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.44:*:*:*:*:*:*:*", "cpeNameId": "61DC1733-CCD9-47CD-8CA1-44C38CBFCC4F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.45:*:*:*:*:*:*:*", "cpeNameId": "ABB4790F-1BAE-4D38-BFAA-06F009031F1B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.46:*:*:*:*:*:*:*", "cpeNameId": "E9B9FB14-2860-4B64-AF08-18BA9BE7489B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.47:*:*:*:*:*:*:*", "cpeNameId": "26E01A49-3E16-4ED9-9681-62B3030AB68A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.48:*:*:*:*:*:*:*", "cpeNameId": "69C3C6D6-E1FA-4EC4-80C1-C02F61938549"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.49:*:*:*:*:*:*:*", "cpeNameId": "416FEB34-45F8-4398-8D94-3805E8C7F3DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.50:*:*:*:*:*:*:*", "cpeNameId": "BF545EBF-5A06-4463-A52C-939143C580E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.51:*:*:*:*:*:*:*", "cpeNameId": "5BD775DA-9D01-4314-96F7-743320925FA0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.52:*:*:*:*:*:*:*", "cpeNameId": "D0476FA4-F223-4687-AB62-A1AE985BF592"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.53:*:*:*:*:*:*:*", "cpeNameId": "B2F445F5-D0DA-4817-B4D5-137180AD5EE2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.54:*:*:*:*:*:*:*", "cpeNameId": "0C7A45E6-72C3-4478-BEFF-7BF02CB07848"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.55:*:*:*:*:*:*:*", "cpeNameId": "52C0AE2C-F11A-4174-ACBB-506C1945AB0C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.56:*:*:*:*:*:*:*", "cpeNameId": "C24A3322-D73A-4F67-9340-8EA61B5A9913"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.57:*:*:*:*:*:*:*", "cpeNameId": "5F55BFFB-BC77-4271-9D63-FBFC6DE367B2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.58:*:*:*:*:*:*:*", "cpeNameId": "09BE3ADC-1C8E-4BCC-A2D7-CCB66F4CE9B6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.59:*:*:*:*:*:*:*", "cpeNameId": "25C6AB87-321E-4ADB-9F0F-3F606FBDC85A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.60:*:*:*:*:*:*:*", "cpeNameId": "ADD78C70-C158-4BCE-950E-EDF40A095E89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.61:*:*:*:*:*:*:*", "cpeNameId": "F123EECC-8D3D-4E62-9071-7C1A6BCF61C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.62:*:*:*:*:*:*:*", "cpeNameId": "1DC81E13-D26C-4C7B-8932-91A5073057F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.63:*:*:*:*:*:*:*", "cpeNameId": "B3E66409-84A3-4541-9768-86B8A51FB328"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.64:*:*:*:*:*:*:*", "cpeNameId": "B0AEA29E-085F-407C-B0F3-20D641DBD474"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.65:*:*:*:*:*:*:*", "cpeNameId": "A025E699-97C5-4D0B-8082-84811E504EEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.66:*:*:*:*:*:*:*", "cpeNameId": "FF4394B2-3DAD-482E-9DB2-444FA72C90F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.67:*:*:*:*:*:*:*", "cpeNameId": "6ED98836-A7F3-43B9-838B-FF7C8C794A1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.68:*:*:*:*:*:*:*", "cpeNameId": "71C1BFAF-7826-4AB7-BE91-1AF3A92AC920"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.69:*:*:*:*:*:*:*", "cpeNameId": "9024E2C0-9705-46EE-BD72-1DC5C1D5D785"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.70:*:*:*:*:*:*:*", "cpeNameId": "97A1310D-F625-405E-8439-0B6C54C8F011"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.71:*:*:*:*:*:*:*", "cpeNameId": "BF4D80F6-8CAA-4B90-B41A-0BD714A4ED93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.72:*:*:*:*:*:*:*", "cpeNameId": "E54CF846-FAD0-4CF6-8A14-764972F7D25C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.73:*:*:*:*:*:*:*", "cpeNameId": "E31B871E-95F6-4B60-A6DA-3B354BC4EF44"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.74:*:*:*:*:*:*:*", "cpeNameId": "7920F5D1-2B11-49FF-B408-C65F37D88BA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.75:*:*:*:*:*:*:*", "cpeNameId": "A47B8AA9-37AC-49E5-B070-EE3DCE8C8677"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.76:*:*:*:*:*:*:*", "cpeNameId": "959BDC84-98A1-40BC-9D43-4D2EEF86C8EE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.77:*:*:*:*:*:*:*", "cpeNameId": "DEFA7CAA-BE16-492B-9870-4923CE650385"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.78:*:*:*:*:*:*:*", "cpeNameId": "55234DEE-0470-4F77-8FD7-B2DB8B6368B6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.79:*:*:*:*:*:*:*", "cpeNameId": "9824EA76-6C32-4A7B-B006-82D91D850B89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.80:*:*:*:*:*:*:*", "cpeNameId": "312A9A1F-D081-4587-A76D-C887235B4C72"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.81:*:*:*:*:*:*:*", "cpeNameId": "6B15290F-5938-4189-91FF-0B4C031D83C2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.82:*:*:*:*:*:*:*", "cpeNameId": "1EECAED3-55C7-4248-B820-CCCD7AC5E773"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.83:*:*:*:*:*:*:*", "cpeNameId": "CC455596-4F37-4CDE-9744-CC84AB6C0E0E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.84:*:*:*:*:*:*:*", "cpeNameId": "1BF22FC0-A0DE-4998-9596-36F1A60919B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.85:*:*:*:*:*:*:*", "cpeNameId": "8AA6F9DE-FBD3-4565-9C90-428D82F9E14C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.17:*:*:*:*:*:*:*", "cpeNameId": "1C3AFAF2-7B60-4F0C-B03C-5FB23A17280C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.17.1:*:*:*:*:*:*:*", "cpeNameId": "4CFBD0A5-3336-4C03-B114-6F24B3EDE0C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.17.2:*:*:*:*:*:*:*", "cpeNameId": "1A9A9411-A41C-4B05-AF63-0D77398E4BE4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.17.3:*:*:*:*:*:*:*", "cpeNameId": "3B1A96B9-0491-421C-A330-FC4942D56074"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.17.4:*:*:*:*:*:*:*", "cpeNameId": "8DA7D44B-1C84-4608-ADB0-36FEB71F4E44"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.17.5:*:*:*:*:*:*:*", "cpeNameId": "D706D66E-EEB4-431D-A085-7EB09F42E0F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.17.6:*:*:*:*:*:*:*", "cpeNameId": "74FB6A46-0FBA-4D8B-B54C-906EACFF73E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.17.7:*:*:*:*:*:*:*", "cpeNameId": "C5487351-49B5-43D6-8449-75C42F235EAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.17.8:*:*:*:*:*:*:*", "cpeNameId": "32C73375-6506-47D5-8DE9-749A737042B1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18:*:*:*:*:*:*:*", "cpeNameId": "F9D4BE1A-3B0A-4CDE-9B48-B4C0DD148C1C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18:rc1:*:*:*:*:*:*", "cpeNameId": "2C08DAAC-1B87-402B-B67D-A2E19BF96F72"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18:rc2:*:*:*:*:*:*", "cpeNameId": "B98E56E8-4D53-441B-A181-19DCB300435A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18:rc3:*:*:*:*:*:*", "cpeNameId": "EC696823-660D-4297-BA88-C66382298ABF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18:rc4:*:*:*:*:*:*", "cpeNameId": "8750CEAE-92CD-4BC5-991C-DF76F763EAB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18:rc5:*:*:*:*:*:*", "cpeNameId": "5D8CBF93-33A1-44E6-B546-246AAE0C400B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.0:*:*:*:*:*:*:*", "cpeNameId": "DDFDD9DC-91E2-469C-A81D-EF131DD78832"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.1:*:*:*:*:*:*:*", "cpeNameId": "915A4DF7-BFBB-4377-8FF5-F12B469805B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.2:*:*:*:*:*:*:*", "cpeNameId": "61EA132A-8D2F-4400-87BD-98DEB73C2F58"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.3:*:*:*:*:*:*:*", "cpeNameId": "B313C760-856E-4DBF-890C-240E2AA6BC95"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.4:*:*:*:*:*:*:*", "cpeNameId": "3591FD85-8FD0-46CE-9251-9C43339298A7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.5:*:*:*:*:*:*:*", "cpeNameId": "F31FEA15-EAFE-4BF4-8E2B-A8FC4A3367FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.6:*:*:*:*:*:*:*", "cpeNameId": "CB32ACB7-6117-4707-86A5-F913CA60E374"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.7:*:*:*:*:*:*:*", "cpeNameId": "D343B89B-7DEF-4D67-B107-05E6A2BD28C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.8:*:*:*:*:*:*:*", "cpeNameId": "7378B9B1-73C9-407B-AA9D-73E1F260005E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.9:*:*:*:*:*:*:*", "cpeNameId": "00178340-62AA-43C8-B841-7FAFFC043F5A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.10:*:*:*:*:*:*:*", "cpeNameId": "1863E12C-9335-4CA7-8903-1C678070902D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.11:*:*:*:*:*:*:*", "cpeNameId": "6EA68AAA-65DA-4CFE-9632-3B2A44EB40A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.12:*:*:*:*:*:*:*", "cpeNameId": "40E473C0-2FAB-413A-9682-D9D72FA7CCAF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.13:*:*:*:*:*:*:*", "cpeNameId": "CDC0061A-C366-48D4-950F-C46826707BE4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.14:*:*:*:*:*:*:*", "cpeNameId": "B233D49C-12C6-4F7E-B156-C7DCE793C029"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.15:*:*:*:*:*:*:*", "cpeNameId": "592E4CB0-FA15-40A8-9A88-1D2C798ED507"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.16:*:*:*:*:*:*:*", "cpeNameId": "E6EC955E-AD15-47A5-A573-7E9079D8B459"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.17:*:*:*:*:*:*:*", "cpeNameId": "99986C05-5DA3-45DF-8230-37B83B60F6DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.18:*:*:*:*:*:*:*", "cpeNameId": "FB1B3A35-091B-4474-A8F4-25C08D786F5E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.19:*:*:*:*:*:*:*", "cpeNameId": "1CAA99E1-8AC0-4AFA-8747-B4489B51AC66"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.20:*:*:*:*:*:*:*", "cpeNameId": "7DACC3BC-2976-4332-A117-7DF50B773BC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.21:*:*:*:*:*:*:*", "cpeNameId": "3F39EDFF-F17E-4502-90A7-4DA1F138372A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.22:*:*:*:*:*:*:*", "cpeNameId": "2FDAE819-7A17-4557-AD19-642879E1182F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.23:*:*:*:*:*:*:*", "cpeNameId": "FE2290B4-A963-40C6-AD68-34370800D2B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.24:*:*:*:*:*:*:*", "cpeNameId": "235EBC6D-7552-4A73-8E08-3AE548DBD5AF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.25:*:*:*:*:*:*:*", "cpeNameId": "336B63E1-2FB7-448D-A788-054BFEE89DD6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.26:*:*:*:*:*:*:*", "cpeNameId": "61F6061B-A43C-4C37-B595-B91E1F8B7105"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.27:*:*:*:*:*:*:*", "cpeNameId": "3C2E31EE-06B3-4846-9B90-489E8FB853F7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.28:*:*:*:*:*:*:*", "cpeNameId": "55CB6B1F-6698-47C6-8F29-E879975094F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.29:*:*:*:*:*:*:*", "cpeNameId": "89400C79-96C2-464F-B2A3-ADE57C4216BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.30:*:*:*:*:*:*:*", "cpeNameId": "9864D7F0-5414-4C5E-A30C-46A67178CB89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.31:*:*:*:*:*:*:*", "cpeNameId": "E54C1BE3-616D-40E5-B3E4-7FEF1926F641"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.32:*:*:*:*:*:*:*", "cpeNameId": "540C8FCB-ED21-42C2-AF0C-4FFDDC9EA949"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.33:*:*:*:*:*:*:*", "cpeNameId": "BF29E394-3C1F-48CA-89D7-F19C7D606EEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.34:*:*:*:*:*:*:*", "cpeNameId": "A898F0CF-0EF4-4314-A0E4-ACCA5888C8D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.35:*:*:*:*:*:*:*", "cpeNameId": "C823F021-BE62-47FD-B2A6-2B717AF21A49"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.36:*:*:*:*:*:*:*", "cpeNameId": "6F9F7FDA-3741-4D39-A0AB-A5378A54CAED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.37:*:*:*:*:*:*:*", "cpeNameId": "B12E94B9-0ACD-42A6-806F-C0F956BE7D0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.38:*:*:*:*:*:*:*", "cpeNameId": "046E1F1D-D2D5-4D3B-B02D-E509E52DC8F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.39:*:*:*:*:*:*:*", "cpeNameId": "F79826FA-BE26-40EF-8B58-992A444A016F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.40:*:*:*:*:*:*:*", "cpeNameId": "9E7E1DFB-6312-4620-8FD6-1678E7C0A930"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.41:*:*:*:*:*:*:*", "cpeNameId": "28D7776C-D60C-4278-88CF-3CD71BC7139B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.42:*:*:*:*:*:*:*", "cpeNameId": "2A963EE0-93C9-43DC-9ACC-E5609EC4CC59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.43:*:*:*:*:*:*:*", "cpeNameId": "73701687-A705-4A48-9984-996B82994F8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.44:*:*:*:*:*:*:*", "cpeNameId": "CDC11CC8-AA61-47D7-8AD0-B375F643AF6C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.45:*:*:*:*:*:*:*", "cpeNameId": "27D85C73-E2E1-4221-BA98-F5EF49839996"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.46:*:*:*:*:*:*:*", "cpeNameId": "08B323A1-7FC2-4B2E-8C08-71303053B4C4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.47:*:*:*:*:*:*:*", "cpeNameId": "46D96B0A-80FE-4FFD-A6E9-142BF845C350"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.48:*:*:*:*:*:*:*", "cpeNameId": "18D2D332-851F-4D9A-B3DD-E82627FC1A9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.49:*:*:*:*:*:*:*", "cpeNameId": "DE88F0D2-93F3-4A2B-BA54-E3A4BD34DECA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.50:*:*:*:*:*:*:*", "cpeNameId": "EEFB2967-F096-4CAE-9B1F-DD5AE90B7610"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.51:*:*:*:*:*:*:*", "cpeNameId": "B816BFFA-7439-479C-84DF-669697E09FEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.52:*:*:*:*:*:*:*", "cpeNameId": "E53F2A26-9D36-4950-85C8-39E4658EB9F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.53:*:*:*:*:*:*:*", "cpeNameId": "6729A6C7-F654-42CE-BF65-FF6D721D43E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.54:*:*:*:*:*:*:*", "cpeNameId": "26482DBA-47E0-4708-8F5E-C5FF92E44C33"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.55:*:*:*:*:*:*:*", "cpeNameId": "B39A27A3-C88B-4BF0-AADA-961257B1373E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.56:*:*:*:*:*:*:*", "cpeNameId": "FC7D4FF8-F7FE-4330-BADD-64738DA5954D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.57:*:*:*:*:*:*:*", "cpeNameId": "862F472A-9630-49AE-99CA-F03460E0FD2B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.58:*:*:*:*:*:*:*", "cpeNameId": "82FC879F-8E36-4045-89D9-2C2FE5EB03C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.59:*:*:*:*:*:*:*", "cpeNameId": "5E17937E-582B-4B6B-A9B1-004578BBD4E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.60:*:*:*:*:*:*:*", "cpeNameId": "40A3973B-6C46-4BEE-A0F2-B94ABD55B3A9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.61:*:*:*:*:*:*:*", "cpeNameId": "8F7DA9D6-8FD1-417B-92B2-342F88AAF757"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.62:*:*:*:*:*:*:*", "cpeNameId": "9FC70B62-2EF8-480C-B87F-B2538C2C92C5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.63:*:*:*:*:*:*:*", "cpeNameId": "65C52AE5-5F34-4C11-BAC5-BD8A2ECD5DA3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.64:*:*:*:*:*:*:*", "cpeNameId": "34401E8C-8EFA-44EF-8380-957152BE7BD8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.65:*:*:*:*:*:*:*", "cpeNameId": "BF906FA5-AAF6-4789-A72B-53210F4BA0E7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.66:*:*:*:*:*:*:*", "cpeNameId": "C303E030-6DC3-49CC-887D-A2E85FC91824"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.67:*:*:*:*:*:*:*", "cpeNameId": "2D980A8B-240A-44A1-A024-4A195F62DA46"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.68:*:*:*:*:*:*:*", "cpeNameId": "9B10FF41-0412-47D6-94A3-9FB0414972E5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.69:*:*:*:*:*:*:*", "cpeNameId": "BAD998E6-FBAB-4547-9812-C97362922FE3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.70:*:*:*:*:*:*:*", "cpeNameId": "FE042B21-3E19-4A1F-BC7B-5F412999C8D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.71:*:*:*:*:*:*:*", "cpeNameId": "8E589A57-9EEA-43A8-B751-65AEDCBA5EBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.72:*:*:*:*:*:*:*", "cpeNameId": "C0708F75-A272-461D-AC54-610C880B05FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.73:*:*:*:*:*:*:*", "cpeNameId": "9309A9A1-CCD2-4E14-ACCF-37CA3881E474"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.74:*:*:*:*:*:*:*", "cpeNameId": "C2B9924E-E542-4ED9-BF3B-6AA15288A545"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.75:*:*:*:*:*:*:*", "cpeNameId": "B4C12350-C8FC-45C9-A4E1-49EBAB0EABDF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.76:*:*:*:*:*:*:*", "cpeNameId": "9111BF49-BD08-43DC-A12A-DEBDA76D9639"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.77:*:*:*:*:*:*:*", "cpeNameId": "DB4ABECE-0600-4A46-A19C-CA856235940D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.78:*:*:*:*:*:*:*", "cpeNameId": "53BA34DD-CA76-4E31-9623-EEF2D80003E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.79:*:*:*:*:*:*:*", "cpeNameId": "0D20FC52-2D8E-4C84-9ED9-B9B67C41980F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.80:*:*:*:*:*:*:*", "cpeNameId": "B8CFFD61-70A0-40B9-8F6B-79DE799AFB34"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.81:*:*:*:*:*:*:*", "cpeNameId": "E87C6B62-BFE1-4E7F-8A08-BE3096DA3704"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.82:*:*:*:*:*:*:*", "cpeNameId": "A073A26A-0CD7-4859-BDCF-07C873E50EE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.83:*:*:*:*:*:*:*", "cpeNameId": "5D88F978-B18D-46CC-9CCA-63A39EEE0EE9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.84:*:*:*:*:*:*:*", "cpeNameId": "02B47410-42B7-4C91-B780-D4324FFE1BB5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.85:*:*:*:*:*:*:*", "cpeNameId": "9AE73ACC-86F0-4918-956F-81D6F33038B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.86:*:*:*:*:*:*:*", "cpeNameId": "5283AAAD-5F4D-46AA-9048-18103B049B8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.87:*:*:*:*:*:*:*", "cpeNameId": "A019755C-3B46-4FD3-BFAB-82CF5EAC84F7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.88:*:*:*:*:*:*:*", "cpeNameId": "54DCA64B-7B9C-4A8E-BC6C-B9D3D27FC058"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.89:*:*:*:*:*:*:*", "cpeNameId": "69894EDF-EFC1-41A2-BA9F-4E970B91B5C5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.90:*:*:*:*:*:*:*", "cpeNameId": "04FA57A5-0325-43E2-8FB8-96EBFDD3491D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.91:*:*:*:*:*:*:*", "cpeNameId": "1F4835B9-5B62-44D9-AACE-40C44269670C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.92:*:*:*:*:*:*:*", "cpeNameId": "955DE0A3-75D7-462A-9377-74292FBC6341"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.93:*:*:*:*:*:*:*", "cpeNameId": "D6E12C7F-315A-4EE0-B4FA-AD2AFB607360"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.94:*:*:*:*:*:*:*", "cpeNameId": "0934723A-985A-493A-A2D9-6D8C2229566F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.95:*:*:*:*:*:*:*", "cpeNameId": "20D1EC52-AAF2-4905-A653-EC8B98927F1B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.96:*:*:*:*:*:*:*", "cpeNameId": "666B8EDB-B957-4DE2-89E1-432393D0F4FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.97:*:*:*:*:*:*:*", "cpeNameId": "E60FE8A1-6A5D-4B84-9ADE-6ED50E56B3D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.98:*:*:*:*:*:*:*", "cpeNameId": "69DCB9B5-ECD8-4821-8301-657BC0EB5936"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.99:*:*:*:*:*:*:*", "cpeNameId": "A4BFD292-1CCF-49CE-BEF6-CCD2AD23BCBE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.100:*:*:*:*:*:*:*", "cpeNameId": "E2CC6E4F-2430-4053-B02A-E8D7BFB6D3AF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.101:*:*:*:*:*:*:*", "cpeNameId": "875D85CF-01D3-42D0-9F68-54F211512EA5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.102:*:*:*:*:*:*:*", "cpeNameId": "4015E4BA-544E-4034-A09D-0F26A37DC7DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.103:*:*:*:*:*:*:*", "cpeNameId": "9FF57CE8-73E2-4F25-8D82-B1D17024F4CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.104:*:*:*:*:*:*:*", "cpeNameId": "D3CB4966-9F15-459A-A1CA-DEFCDEF9CC2A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.105:*:*:*:*:*:*:*", "cpeNameId": "68DF0A6E-3B27-43B4-9FAE-EA4275B9F373"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.106:*:*:*:*:*:*:*", "cpeNameId": "B42541D4-595C-4FFE-839D-100EACCA6240"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.107:*:*:*:*:*:*:*", "cpeNameId": "A40753B8-610A-4157-AFA6-E5D4478B0336"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.108:*:*:*:*:*:*:*", "cpeNameId": "02084D31-1A6E-400E-AE2A-93E8D94F0E37"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.109:*:*:*:*:*:*:*", "cpeNameId": "E40A4E2C-FC77-4E2B-B9A2-948463D3BDAB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.110:*:*:*:*:*:*:*", "cpeNameId": "14CFFFE9-7DE0-4990-947F-07BFDD13FD96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.111:*:*:*:*:*:*:*", "cpeNameId": "2BF0E1DA-1756-4B18-BE30-EDEE9C61E1C2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.112:*:*:*:*:*:*:*", "cpeNameId": "C74C49FA-F24A-476C-BD5F-07458987BA4D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.113:*:*:*:*:*:*:*", "cpeNameId": "E298C83E-B3CB-407E-8552-50EBADDE68E4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.114:*:*:*:*:*:*:*", "cpeNameId": "D2EB3FF5-D7BF-4BD0-A7F6-3634CA03461A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.115:*:*:*:*:*:*:*", "cpeNameId": "752A887F-74E6-43F3-9A9F-70DC0CEF2054"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.116:*:*:*:*:*:*:*", "cpeNameId": "9E1D6133-AE78-4FA5-AE62-AB3A673D609E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.117:*:*:*:*:*:*:*", "cpeNameId": "8C4F542A-02E8-4044-B2E9-58394393AB14"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.118:*:*:*:*:*:*:*", "cpeNameId": "0065E5C1-1EE8-4646-8FD5-24F9BF694D6B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.119:*:*:*:*:*:*:*", "cpeNameId": "AFFDE9D3-AD3A-4F1A-B71F-F74505EBB108"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.120:*:*:*:*:*:*:*", "cpeNameId": "6A5FE4B4-896F-4A7E-9FAF-FDAD3DA8EED6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.121:*:*:*:*:*:*:*", "cpeNameId": "8534B956-8D0F-413D-8FAE-DCFD2044F8BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.122:*:*:*:*:*:*:*", "cpeNameId": "0EBA8A3C-CA75-41CA-AFAF-F51498E015BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.123:*:*:*:*:*:*:*", "cpeNameId": "AC45DD79-E0AA-4B4E-84F5-C98169C29661"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.124:*:*:*:*:*:*:*", "cpeNameId": "D2521793-534C-46AF-A53F-46FACB8CD23A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.125:*:*:*:*:*:*:*", "cpeNameId": "12CD0E92-5675-4FF0-9F98-427365913FC0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.126:*:*:*:*:*:*:*", "cpeNameId": "5AD835DC-8470-4BDC-8A50-0BF470B522A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.127:*:*:*:*:*:*:*", "cpeNameId": "FCC0AB74-D519-4931-8C2A-2E19ABD8CFE4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.128:*:*:*:*:*:*:*", "cpeNameId": "51C5B7F1-FBC7-472A-B1D2-FE0107EFED40"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.129:*:*:*:*:*:*:*", "cpeNameId": "EBC1F65E-5B87-48AA-84ED-EB4FF45F6CC5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.130:*:*:*:*:*:*:*", "cpeNameId": "0EE70948-23B6-42AD-8240-9E3C647B4AEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.131:*:*:*:*:*:*:*", "cpeNameId": "313E460E-3FF5-4346-BAF7-D4E40F2725BF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.132:*:*:*:*:*:*:*", "cpeNameId": "91FAE139-A381-4CB6-AD5C-BA097F8CA0F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.133:*:*:*:*:*:*:*", "cpeNameId": "11D0AF26-BA8B-48F4-83CB-564FBF3505F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.134:*:*:*:*:*:*:*", "cpeNameId": "EE94A171-F631-4BEC-B4D6-5DA5FE518A90"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.135:*:*:*:*:*:*:*", "cpeNameId": "99A0517F-6E2A-4257-8E0B-ABE31ED203D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.136:*:*:*:*:*:*:*", "cpeNameId": "353234F0-3D4F-4097-A9CE-19AFD3AC1141"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.137:*:*:*:*:*:*:*", "cpeNameId": "6CBCB4EB-B43A-456F-8347-78B6A0C77D9A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.138:*:*:*:*:*:*:*", "cpeNameId": "DAEAE81D-810E-470B-8771-C6D10318283C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.139:*:*:*:*:*:*:*", "cpeNameId": "09E363F2-7B35-494F-AB64-BC12A8F927F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.140:*:*:*:*:*:*:*", "cpeNameId": "B4CEB136-3486-42D6-BE13-A28F0130DFDC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.19:*:*:*:*:*:*:*", "cpeNameId": "C973645C-6420-4074-B349-D0258E3D194B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.19.1:*:*:*:*:*:*:*", "cpeNameId": "0615B00B-01C8-4962-B618-0F0077C902EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.19.2:*:*:*:*:*:*:*", "cpeNameId": "A989C578-40B5-4142-83F4-09DBB6C1D6C7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.19.3:*:*:*:*:*:*:*", "cpeNameId": "A00F6B4F-6EE2-4BE2-BDCF-D2B45F757BC9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.19.4:*:*:*:*:*:*:*", "cpeNameId": "B662D9C1-3A06-4D21-BE69-6C4CDD94904A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.19.5:*:*:*:*:*:*:*", "cpeNameId": "D52D426F-6E8E-4596-8A1C-3314BC96D9D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.19.6:*:*:*:*:*:*:*", "cpeNameId": "3AD744FD-0BEB-483F-815F-C6E51AFCF27E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.19.7:*:*:*:*:*:*:*", "cpeNameId": "7F6B22A7-0360-4212-B359-F3BB4407AE1A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.19.8:*:*:*:*:*:*:*", "cpeNameId": "743B104B-252C-4AFB-B236-9A67EB0AC44B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4:*:*:*:*:*:*:*", "cpeNameId": "D2B71FFC-740C-4263-B936-A3C1B18E5F9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0:*:*:*:*:*:*:*", "cpeNameId": "2467EFC2-0000-4EE5-AD91-D4EDD1009228"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0:-:*:*:*:*:*:*", "cpeNameId": "5738F26A-6508-4BF6-9CE4-A275613579B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0:rc1:*:*:*:*:*:*", "cpeNameId": "32082640-7AF2-43DC-861C-F7FDA79B77DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0:rc2:*:*:*:*:*:*", "cpeNameId": "F242212B-DE46-4CFF-B235-0B7C7ABAD0DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0:rc3:*:*:*:*:*:*", "cpeNameId": "A2FD0ED3-319A-4B99-A2B0-525C9A5EEAE0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0:rc4:*:*:*:*:*:*", "cpeNameId": "2837FE21-53FD-48DF-884C-B1D3118F280A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0:rc5:*:*:*:*:*:*", "cpeNameId": "05739160-269D-481A-BFB6-81FE05B65C37"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0:rc6:*:*:*:*:*:*", "cpeNameId": "8719C069-AD38-4A89-91A1-8029796ECD84"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0:rc7:*:*:*:*:*:*", "cpeNameId": "5CE65CCE-AFF6-4487-8CE9-8B45B2060D90"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0.0:*:*:*:*:*:*:*", "cpeNameId": "C74E8950-0E12-4101-95D1-E4ABEC24652B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0.1:*:*:*:*:*:*:*", "cpeNameId": "1405D246-2EB0-436A-88E3-C03CA8E8E3D7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0.2:*:*:*:*:*:*:*", "cpeNameId": "A0754CD9-F6FC-4BD9-A2AC-B00BD276E947"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0.3:*:*:*:*:*:*:*", "cpeNameId": "6A16B7AF-DE24-4294-9E0C-9B402E8A089D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0.4:*:*:*:*:*:*:*", "cpeNameId": "DC4F99B3-78CC-451C-A8B5-105EB9667877"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0.5:*:*:*:*:*:*:*", "cpeNameId": "0B384EE6-AE66-46B5-BBC4-30BF3DB7A9DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0.6:*:*:*:*:*:*:*", "cpeNameId": "EE0CD574-1AB5-4573-A704-B9CAF5530988"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0.7:*:*:*:*:*:*:*", "cpeNameId": "638DED59-9BB4-4E64-93F3-C949D3CF5A2D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0.8:*:*:*:*:*:*:*", "cpeNameId": "AF6AE96F-7CCD-461C-9355-98057BEC1163"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0.9:*:*:*:*:*:*:*", "cpeNameId": "4686AB63-EA79-4CFD-AFFF-25B474BD744B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1:*:*:*:*:*:*:*", "cpeNameId": "1FD3A881-A85E-46E6-9F04-0C314F91A869"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1:-:*:*:*:*:*:*", "cpeNameId": "C6DDBD3E-D424-41BB-B833-75F7C2F0C29D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1:rc1:*:*:*:*:*:*", "cpeNameId": "6B1B5862-39FF-4533-A6F8-59DB9CB0D48D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1:rc2:*:*:*:*:*:*", "cpeNameId": "3F509385-C4B5-4E24-90C5-EE164AFF3168"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1:rc3:*:*:*:*:*:*", "cpeNameId": "1CA1E37C-026B-4EF1-9E1A-4EDE68FD1DD2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1:rc4:*:*:*:*:*:*", "cpeNameId": "11740404-17D1-4BAA-8744-153C7F8FA01D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1:rc5:*:*:*:*:*:*", "cpeNameId": "806EB383-7517-4BB0-8942-BBBB362C0745"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1:rc6:*:*:*:*:*:*", "cpeNameId": "6353B931-84FF-4DD3-AB70-3019EDE9CBBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1:rc7:*:*:*:*:*:*", "cpeNameId": "225B922C-F2C3-4DCF-A5C6-D66E365CEA33"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1:rc8:*:*:*:*:*:*", "cpeNameId": "9695C06A-6BF6-4E18-9A6C-1469B44753DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.0:*:*:*:*:*:*:*", "cpeNameId": "EA6178D9-E4A5-4DFF-8D43-5AB0131EB529"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.1:*:*:*:*:*:*:*", "cpeNameId": "A38CD077-9F8E-4572-B614-18D8DA41CE25"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.2:*:*:*:*:*:*:*", "cpeNameId": "F0D170E2-6B84-4760-B53F-830D6160C302"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.3:*:*:*:*:*:*:*", "cpeNameId": "C13A70C1-8523-44FE-B12D-B9035AAA5E6F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.4:*:*:*:*:*:*:*", "cpeNameId": "1FFB4199-8707-4CAD-8070-7E3066F8C868"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.5:*:*:*:*:*:*:*", "cpeNameId": "4418AD31-4638-4D43-BB32-AFF4C9B8C430"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.6:*:*:*:*:*:*:*", "cpeNameId": "C4F667A2-5EEB-4749-8EE1-C095E9EF5EB8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.7:*:*:*:*:*:*:*", "cpeNameId": "23ED7B6D-AC5F-4D76-8232-EB87EB162D91"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.8:*:*:*:*:*:*:*", "cpeNameId": "17C5A2CC-1906-46F6-982C-BDC57416938F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.9:*:*:*:*:*:*:*", "cpeNameId": "5EA18DB4-A8D4-4A3B-9BA9-35A529203034"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.10:*:*:*:*:*:*:*", "cpeNameId": "14FD8473-B0D4-4769-B4F1-B8C02974B0C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.11:*:*:*:*:*:*:*", "cpeNameId": "B08A1A95-E122-4BFC-9D4E-968E285140AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.12:*:*:*:*:*:*:*", "cpeNameId": "6F2E15B4-A02A-4DCC-AD8F-C32754D76BE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.13:*:*:*:*:*:*:*", "cpeNameId": "B44A7452-7F4C-4256-A6BA-92386941F1F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.14:*:*:*:*:*:*:*", "cpeNameId": "89A0B4D3-D197-4ACF-AABB-235B577E8835"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.15:*:*:*:*:*:*:*", "cpeNameId": "3F9E4481-B888-43A6-900E-6D059E24F4DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.16:*:*:*:*:*:*:*", "cpeNameId": "F376E601-5D90-4101-9249-D18FB4F379AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.17:*:*:*:*:*:*:*", "cpeNameId": "951AD518-B4DB-407A-A06A-6DF0E89752BA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.18:*:*:*:*:*:*:*", "cpeNameId": "AE6C698F-784D-4841-9352-B1A0F17613FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.19:*:*:*:*:*:*:*", "cpeNameId": "2BB57DCF-EAFB-4662-BE1F-0878957F6D71"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.20:*:*:*:*:*:*:*", "cpeNameId": "FDDD9390-36CC-48A2-BB78-32670780CC92"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.21:*:*:*:*:*:*:*", "cpeNameId": "48BC0496-DEEC-4779-BE64-E5E48C91AA6E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.22:*:*:*:*:*:*:*", "cpeNameId": "D2B401B4-792A-4339-9798-C1FC1EB14397"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.23:*:*:*:*:*:*:*", "cpeNameId": "1604FFD1-E146-4F99-BDA2-5B214E88FFF7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.24:*:*:*:*:*:*:*", "cpeNameId": "4F575F6F-792C-4930-B91B-ED38EA9DA5EE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.25:*:*:*:*:*:*:*", "cpeNameId": "1118DD03-426F-4352-875B-57BDA42AF9C5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.26:*:*:*:*:*:*:*", "cpeNameId": "F8E3B08B-72FE-4D6C-8D4E-04887E5E219E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.27:*:*:*:*:*:*:*", "cpeNameId": "1CB06853-22B6-40EA-ADBA-E429E2F967E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.28:*:*:*:*:*:*:*", "cpeNameId": "7D4A498E-31B1-4840-BE23-5AA268DA7CAE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.29:*:*:*:*:*:*:*", "cpeNameId": "CC42303B-B170-4BD6-A178-EC4B45171DA6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.30:*:*:*:*:*:*:*", "cpeNameId": "A9DF6117-615B-44EC-A8CF-63531F4F8B96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.31:*:*:*:*:*:*:*", "cpeNameId": "B25FC13E-EF58-4754-8035-6DF270313557"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.32:*:*:*:*:*:*:*", "cpeNameId": "1AD020F9-7A83-4BD3-A2E0-2AA1621A5FDE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.33:*:*:*:*:*:*:*", "cpeNameId": "E8C8975E-91CB-4038-8B7E-D36B9F3B6FAC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.34:*:*:*:*:*:*:*", "cpeNameId": "ABF7E934-AAF2-4335-A0B1-99BB16D3F751"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.35:*:*:*:*:*:*:*", "cpeNameId": "799F3962-5C6C-499B-B281-D38FDDDDFA05"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.36:*:*:*:*:*:*:*", "cpeNameId": "2D3FECAF-623C-4B31-B72B-04AB4D4007D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.37:*:*:*:*:*:*:*", "cpeNameId": "C89EE90D-595D-4E01-9574-4168BE770CBD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.38:*:*:*:*:*:*:*", "cpeNameId": "F65CB61E-C061-4406-BB74-A274E0F13AC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.39:*:*:*:*:*:*:*", "cpeNameId": "193A927C-9887-4A27-9759-44EB6E639C37"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.40:*:*:*:*:*:*:*", "cpeNameId": "1BC48C28-CC5A-47C7-9BA5-80E19916D9FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.41:*:*:*:*:*:*:*", "cpeNameId": "D465391D-62E6-4FF3-893B-1CBCCB1B5AEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.42:*:*:*:*:*:*:*", "cpeNameId": "9554D22C-0782-46F4-86CD-E321E7BCDA3C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.43:*:*:*:*:*:*:*", "cpeNameId": "ED423577-D69F-4F39-9D75-87F23173AD7A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.44:*:*:*:*:*:*:*", "cpeNameId": "044011D5-1E1C-4714-9B25-DAE9851DDFD8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.45:*:*:*:*:*:*:*", "cpeNameId": "22EF791D-7C93-4259-963D-9B874F241973"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.46:*:*:*:*:*:*:*", "cpeNameId": "DEFA34B6-5C67-453A-9BCF-92468BC0AF3C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.47:*:*:*:*:*:*:*", "cpeNameId": "7429D270-4092-44FF-B09B-01982EEDBA7A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.48:*:*:*:*:*:*:*", "cpeNameId": "B52A9A77-1E36-4973-BF17-27C7809BC6A6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.49:*:*:*:*:*:*:*", "cpeNameId": "FA0B3866-E1F1-49FE-AFE1-50C763DE1577"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.50:*:*:*:*:*:*:*", "cpeNameId": "99E2646C-4911-4586-B948-35F31C67FF12"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.51:*:*:*:*:*:*:*", "cpeNameId": "83DD1B25-C576-4C00-8B5E-DE5C5E0F9BFB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.52:*:*:*:*:*:*:*", "cpeNameId": "432CA14E-8ED4-4D41-9A1A-FA2EDE5DB5BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2:*:*:*:*:*:*:*", "cpeNameId": "8CEC5C41-7D54-46C5-B51A-C5B7000A261F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2:-:*:*:*:*:*:*", "cpeNameId": "404233EA-3A42-4415-807C-2795535D8FBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2:rc1:*:*:*:*:*:*", "cpeNameId": "01F7FC99-0732-43C2-8441-6075EF18BB1F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2:rc2:*:*:*:*:*:*", "cpeNameId": "C762486A-6A4C-423C-A02C-6ADFD08E43BA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2:rc3:*:*:*:*:*:*", "cpeNameId": "90E588AC-AB0B-48E5-A4EC-9961E9446253"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2:rc4:*:*:*:*:*:*", "cpeNameId": "C00F12B9-3630-403F-BD9F-ECEE434557B6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2:rc5:*:*:*:*:*:*", "cpeNameId": "D9578F1C-2720-4A5A-ADA6-BECCFC1A06B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2:rc6:*:*:*:*:*:*", "cpeNameId": "E6A0149C-F476-4468-8E02-E086BA1ED75C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2:rc7:*:*:*:*:*:*", "cpeNameId": "6EC892D2-6A54-4C68-A736-41A37FAB43DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2:rc8:*:*:*:*:*:*", "cpeNameId": "B3C3E05F-1E32-4C9F-9985-7861C068651A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2.0:*:*:*:*:*:*:*", "cpeNameId": "E7F7C907-29DD-4C0A-B62F-238D64F9CA52"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2.1:*:*:*:*:*:*:*", "cpeNameId": "BD114713-34F2-4BB0-B53A-EDFE8CC646C7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2.2:*:*:*:*:*:*:*", "cpeNameId": "BD0AD63F-B1DF-45C3-98B9-29E84D6847F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2.3:*:*:*:*:*:*:*", "cpeNameId": "AF52399D-722B-4373-AEB0-048D636AC2D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2.4:*:*:*:*:*:*:*", "cpeNameId": "F7C3C103-F75A-4C0C-8360-F8E059CFFE6E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2.5:*:*:*:*:*:*:*", "cpeNameId": "B1A5B3B7-86C0-4DF5-AF49-AEE88B639819"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2.6:*:*:*:*:*:*:*", "cpeNameId": "8CEA01FC-7DCC-4A1B-A083-9628EF0C034C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2.7:*:*:*:*:*:*:*", "cpeNameId": "8C8CB29B-5E42-4AB5-ABDF-380C0B00A9C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2.8:*:*:*:*:*:*:*", "cpeNameId": "2019892E-BCC2-4F18-A09D-0C09DBB0B787"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3:*:*:*:*:*:*:*", "cpeNameId": "9C6EAC12-A07A-4F5F-B78B-EB96D2D331B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3:-:*:*:*:*:*:*", "cpeNameId": "73A7EEE5-C389-4C3B-BC22-FD0CDEC18F45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3:rc1:*:*:*:*:*:*", "cpeNameId": "69D84DB0-013C-4357-85CB-AB0756FAF083"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3:rc2:*:*:*:*:*:*", "cpeNameId": "20D634C6-571A-4D59-B99F-806C7C7548B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3:rc3:*:*:*:*:*:*", "cpeNameId": "ED000931-A13B-4853-B3D4-48D4DB46514D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3:rc4:*:*:*:*:*:*", "cpeNameId": "86DE3CD3-8810-4414-9AE9-230B9E548F43"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3:rc5:*:*:*:*:*:*", "cpeNameId": "9B329FAB-EC7B-4C85-A23B-F56E55260B89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3:rc6:*:*:*:*:*:*", "cpeNameId": "19AB03B2-6B8E-48A6-8D90-AD40402612EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3:rc7:*:*:*:*:*:*", "cpeNameId": "3A65D171-7A9B-43D9-BD44-4BD4AFCD61BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3.0:*:*:*:*:*:*:*", "cpeNameId": "554AE6B2-BA69-4DD7-A0E2-05897523452F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3.1:*:*:*:*:*:*:*", "cpeNameId": "AC05011D-579A-4D7B-9A9B-39BFE3CE1E00"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3.2:*:*:*:*:*:*:*", "cpeNameId": "0DCE2CF9-7D6A-4032-B153-628BB91676FA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3.3:*:*:*:*:*:*:*", "cpeNameId": "40C7AB11-ABD7-49EE-98A7-8E3E957B197B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3.4:*:*:*:*:*:*:*", "cpeNameId": "7A430ED7-4026-4E2C-967E-BCA3B17D9E39"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3.5:*:*:*:*:*:*:*", "cpeNameId": "B741D92F-7E21-4E6D-A751-19851AD4D07E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3.6:*:*:*:*:*:*:*", "cpeNameId": "75E10032-3935-488F-B062-EA74AD1C6F42"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4:*:*:*:*:*:*:*", "cpeNameId": "0CC82592-969E-42E2-995A-77254AC2858C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4:-:*:*:*:*:*:*", "cpeNameId": "DCDA1601-B9CC-4CAB-9045-7E418185A857"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4:rc1:*:*:*:*:*:*", "cpeNameId": "D57BA72B-FFA4-4EDD-8609-41604BD7A8FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4:rc2:*:*:*:*:*:*", "cpeNameId": "428C4926-D233-44E4-9B15-420D7DF499BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4:rc3:*:*:*:*:*:*", "cpeNameId": "B3340F47-0DC7-497C-A2C4-0A2ACCC36821"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4:rc4:*:*:*:*:*:*", "cpeNameId": "C349F878-71AE-4CB6-95C2-A0E2D2869BDB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4:rc5:*:*:*:*:*:*", "cpeNameId": "E13E25C1-84C9-4A2B-AB57-E2860569C7B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4:rc6:*:*:*:*:*:*", "cpeNameId": "8EC67A5C-56D4-48A6-9A12-290C0BAF8BB7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4:rc7:*:*:*:*:*:*", "cpeNameId": "72A4C1AB-870E-43CE-B616-36F9036E8040"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4:rc8:*:*:*:*:*:*", "cpeNameId": "0D491AC8-EF6D-49D2-ABE3-14C900AEDC84"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.0:*:*:*:*:*:*:*", "cpeNameId": "F76C4499-1C1F-40BB-B72D-3CCBE24F9983"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.0-96.119:*:*:*:*:*:*:*", "cpeNameId": "FA8FC4BC-B432-45F3-BA3A-36629C2FB2BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.1:*:*:*:*:*:*:*", "cpeNameId": "7FE8FBE3-1F3E-4E59-971E-80D2291E9F04"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.2:*:*:*:*:*:*:*", "cpeNameId": "933EC82A-7117-4C3B-BAC3-B730E8177D68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.3:*:*:*:*:*:*:*", "cpeNameId": "4E8A4278-3F30-4F35-9A7D-E4ACB320AB90"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.4:*:*:*:*:*:*:*", "cpeNameId": "EFCC9662-D66A-4E22-BCF6-D92D4FC3C9BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.5:*:*:*:*:*:*:*", "cpeNameId": "5E5D47B0-7380-4061-ACA1-07FA5F5EE3F7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.6:*:*:*:*:*:*:*", "cpeNameId": "5AAADD86-5C57-4D1C-BAF8-A41D33BA47B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.7:*:*:*:*:*:*:*", "cpeNameId": "C3A6FFE6-7A8C-4F45-9950-821FEDE12755"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.8:*:*:*:*:*:*:*", "cpeNameId": "CD6D9EA8-5907-480D-826A-CFD853176989"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.9:*:*:*:*:*:*:*", "cpeNameId": "697729A2-369A-4485-A6D2-9128FBDEF13D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.10:*:*:*:*:*:*:*", "cpeNameId": "9C401888-D849-494A-8807-0F4A1B7F3B90"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.11:*:*:*:*:*:*:*", "cpeNameId": "41ADE2D0-F20F-4609-BE2E-2A52D8B77B4C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.12:*:*:*:*:*:*:*", "cpeNameId": "4624CFD6-9443-42DD-BF38-1E4C0F85942A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.13:*:*:*:*:*:*:*", "cpeNameId": "BFC70B7E-E345-473D-B885-17CB43DEFDE5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.14:*:*:*:*:*:*:*", "cpeNameId": "BC242831-9967-4C30-81DC-DF10A52E8A9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.15:*:*:*:*:*:*:*", "cpeNameId": "68D73D19-ABB3-4703-8D3D-006872776B09"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.16:*:*:*:*:*:*:*", "cpeNameId": "3BBB71CE-8252-4DAF-B2E0-9D4895CFAFF4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.17:*:*:*:*:*:*:*", "cpeNameId": "61C83B74-8A5A-482F-B7CB-DFF85EE2A312"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.18:*:*:*:*:*:*:*", "cpeNameId": "87EF4F10-A5FA-4EA9-BB2C-B7AE2D0E2731"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.19:*:*:*:*:*:*:*", "cpeNameId": "6A3F3026-8C21-4CCB-A985-C93A889BEFF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.20:*:*:*:*:*:*:*", "cpeNameId": "156A1C57-B0CC-403A-9A99-F087A22AB63E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.21:*:*:*:*:*:*:*", "cpeNameId": "5B9FCBCD-BDA2-45BF-BF11-2DB2990B0E8F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.22:*:*:*:*:*:*:*", "cpeNameId": "FEB1E36A-8777-49D3-B7AD-75F2D75C9AFF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.23:*:*:*:*:*:*:*", "cpeNameId": "A5F83DF2-1CE5-4789-806F-A232112BDE55"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.24:*:*:*:*:*:*:*", "cpeNameId": "9812732F-FD5D-4295-ADE7-D9F6E4126590"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.25:*:*:*:*:*:*:*", "cpeNameId": "1EDD6CD5-A9B7-4969-BCA1-18A7E453F27F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.26:*:*:*:*:*:*:*", "cpeNameId": "5A3C3EA9-B55D-4700-82DA-253D22CD1099"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.27:*:*:*:*:*:*:*", "cpeNameId": "D6AC0EFD-9C1B-45F5-BAEB-B18D8B02AAF3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.28:*:*:*:*:*:*:*", "cpeNameId": "B31EBB97-91D1-4EAB-BB83-DBB22040DDB6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.29:*:*:*:*:*:*:*", "cpeNameId": "D3C8008A-8BFC-4A96-887F-416BE9E64691"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.30:*:*:*:*:*:*:*", "cpeNameId": "889B12BB-2EDF-4EA0-8A84-62F616E4053D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.31:*:*:*:*:*:*:*", "cpeNameId": "1FECAF9A-B388-429C-8ACA-9CD4E510E0B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.32:*:*:*:*:*:*:*", "cpeNameId": "FC81D3C5-1E0B-47F7-BB37-585C75FE67AD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.33:*:*:*:*:*:*:*", "cpeNameId": "F823ED2B-606F-4195-997D-331C64592007"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.34:*:*:*:*:*:*:*", "cpeNameId": "B45CC685-7AF6-45F4-8D75-1FCE15D97A6B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.35:*:*:*:*:*:*:*", "cpeNameId": "C850B81D-E6A8-4FCB-B155-B63AFC9A4832"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.36:*:*:*:*:*:*:*", "cpeNameId": "C61E381E-000B-4731-AF8D-90BF59F11A85"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.37:*:*:*:*:*:*:*", "cpeNameId": "24FED760-B194-43AE-9B94-115470E988D6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.38:*:*:*:*:*:*:*", "cpeNameId": "878B3AEA-B1D0-4A02-BC68-376A6286D5DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.39:*:*:*:*:*:*:*", "cpeNameId": "9774A99C-3F08-496D-AAF3-A830DB1E5717"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.40:*:*:*:*:*:*:*", "cpeNameId": "C179136B-E80A-4B7C-A763-39BA95DD48D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.41:*:*:*:*:*:*:*", "cpeNameId": "44E2FCC4-8347-446A-9CBD-BE5CCABCB0E4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.42:*:*:*:*:*:*:*", "cpeNameId": "451A60BC-B7FE-43C5-9F7D-99F56719B263"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.43:*:*:*:*:*:*:*", "cpeNameId": "05E45126-5143-4405-B7D6-679436FF23E9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.44:*:*:*:*:*:*:*", "cpeNameId": "F6BDB13D-4380-4230-A021-51155E9CD1B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.45:*:*:*:*:*:*:*", "cpeNameId": "356F009A-A387-4214-A12D-68F7FE52D6C9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.46:*:*:*:*:*:*:*", "cpeNameId": "CCAF1CFF-7B49-4A7C-ADFB-8EB68042F3D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.47:*:*:*:*:*:*:*", "cpeNameId": "8FDA50AF-A48C-496F-8BAA-1D39488F88B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.48:*:*:*:*:*:*:*", "cpeNameId": "9CCE40F5-05B5-44AA-BDA0-6268E8E16F89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.49:*:*:*:*:*:*:*", "cpeNameId": "47151518-D679-4658-8B7D-77F977FC6B20"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.50:*:*:*:*:*:*:*", "cpeNameId": "F2BEC0AE-3B47-4DC7-BBF2-FF7AFD9744AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.51:*:*:*:*:*:*:*", "cpeNameId": "03CF782E-4825-46C5-92C6-1F9958428D4E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.52:*:*:*:*:*:*:*", "cpeNameId": "CE25CEF9-6DE1-4CB6-8685-9ECE06228051"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.53:*:*:*:*:*:*:*", "cpeNameId": "44AD121F-711F-44FC-A42D-EEE3B49EF09B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.54:*:*:*:*:*:*:*", "cpeNameId": "D8545A61-0DE7-4887-A656-6AC1F6D99FA4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.55:*:*:*:*:*:*:*", "cpeNameId": "812EE9D9-8B2A-4184-B2A3-1AE01523E622"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.56:*:*:*:*:*:*:*", "cpeNameId": "8D293DF8-3B9F-4930-8F77-29BE00E2A3FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.57:*:*:*:*:*:*:*", "cpeNameId": "38589104-9F4F-4999-8D51-B1E5D6CE806B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.58:*:*:*:*:*:*:*", "cpeNameId": "E394318F-A063-476A-89D0-696A69816F05"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.59:*:*:*:*:*:*:*", "cpeNameId": "9942A355-2E0F-445D-914A-ABF78CCBC64F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.60:*:*:*:*:*:*:*", "cpeNameId": "4616A735-3236-4490-9E4A-CF13C9198115"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.61:*:*:*:*:*:*:*", "cpeNameId": "300906FB-8359-4D31-9C79-B8B654D390F4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.62:*:*:*:*:*:*:*", "cpeNameId": "2323C950-541C-42D2-AD38-2ED9A3870714"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.63:*:*:*:*:*:*:*", "cpeNameId": "9138BACD-3DB4-4D5B-A566-F9BCF825B1FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.64:*:*:*:*:*:*:*", "cpeNameId": "D4B84632-21BF-41F4-BE43-63DF430DD2DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.65:*:*:*:*:*:*:*", "cpeNameId": "7A6C5D5A-5258-4AF9-8102-E570944A3E58"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.66:*:*:*:*:*:*:*", "cpeNameId": "C9AF7B6B-F888-4211-AD00-F9B56C34D41C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.67:*:*:*:*:*:*:*", "cpeNameId": "EC917E6E-35A5-45BB-AE1E-1079402EA052"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.68:*:*:*:*:*:*:*", "cpeNameId": "ECE8EEAA-08BD-43F9-A8ED-CB46263E4373"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.69:*:*:*:*:*:*:*", "cpeNameId": "8C9C110C-0041-4B82-BDD7-F54A5030D278"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.70:*:*:*:*:*:*:*", "cpeNameId": "F751372D-061C-47E2-B8C5-CB32070152B1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.71:*:*:*:*:*:*:*", "cpeNameId": "B3729C0E-0348-4130-B789-2CE7EA174E4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.72:*:*:*:*:*:*:*", "cpeNameId": "CB32A8F5-4963-457B-AFA2-426B4EDB82AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.73:*:*:*:*:*:*:*", "cpeNameId": "D84BE462-BD26-4182-8BA9-0B9EAB4650D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.74:*:*:*:*:*:*:*", "cpeNameId": "D5ED1938-4B1C-4997-8083-C7E1CD229E72"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.75:*:*:*:*:*:*:*", "cpeNameId": "38E49F41-BA58-4A52-8420-6A2FF96516D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.76:*:*:*:*:*:*:*", "cpeNameId": "20077160-E24C-47C3-B452-81625E2B87BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.77:*:*:*:*:*:*:*", "cpeNameId": "1C995C66-DCAD-450A-8DEC-5480C57765E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.78:*:*:*:*:*:*:*", "cpeNameId": "06EA7B0F-FE44-439E-8B6E-DA05D4ACD725"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.79:*:*:*:*:*:*:*", "cpeNameId": "5185E87B-AE55-427C-A0E4-8E016F945043"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.80:*:*:*:*:*:*:*", "cpeNameId": "B145CA1C-23F8-46A4-97FC-57471354BC07"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.81:*:*:*:*:*:*:*", "cpeNameId": "B46BADB5-A906-4989-A597-BB056C289302"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.82:*:*:*:*:*:*:*", "cpeNameId": "395C2214-5D0D-4E6E-821C-93B4BA0B3D7E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.83:*:*:*:*:*:*:*", "cpeNameId": "C7F9481A-F00C-4A7D-A28C-52A2F0FA0DAF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.84:*:*:*:*:*:*:*", "cpeNameId": "E350E11E-1917-4413-BB8F-5D9EAEB49411"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.85:*:*:*:*:*:*:*", "cpeNameId": "0D076280-76F9-4824-A0C8-B5F6C086DCE6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.86:*:*:*:*:*:*:*", "cpeNameId": "2ABB7C71-884C-4E5D-85F3-4AC8FA166985"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.87:*:*:*:*:*:*:*", "cpeNameId": "DD6C21E4-7565-4317-B325-96EA55C92F33"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.88:*:*:*:*:*:*:*", "cpeNameId": "608B4295-455B-4572-A5A8-03BEB29D75CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.89:*:*:*:*:*:*:*", "cpeNameId": "88644B26-E539-4D71-91F5-9B2749B8706D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.90:*:*:*:*:*:*:*", "cpeNameId": "2997B73D-574C-45C1-88FA-7AD9B7C963F4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.91:*:*:*:*:*:*:*", "cpeNameId": "D55C911B-0765-456B-9985-8CBFFB0954AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.92:*:*:*:*:*:*:*", "cpeNameId": "4C8AF219-5201-49E9-94A4-1BE15403A27D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.93:*:*:*:*:*:*:*", "cpeNameId": "164A1A90-B36C-4454-B89D-6719CA368178"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.94:*:*:*:*:*:*:*", "cpeNameId": "31D8CD9C-DADC-46D8-B8CA-77FCD24C8691"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.95:*:*:*:*:*:*:*", "cpeNameId": "8CD707EB-3889-4DC9-839B-EB9F5CDD4587"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.96:*:*:*:*:*:*:*", "cpeNameId": "0CB79FE3-A3D1-4F1D-9A44-88FD75CE1C13"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.97:*:*:*:*:*:*:*", "cpeNameId": "F3990863-8D9C-4374-B274-E62B91534FC2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.98:*:*:*:*:*:*:*", "cpeNameId": "0726D23D-8D13-4988-8654-D33A1386B6FA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.99:*:*:*:*:*:*:*", "cpeNameId": "C3D8AB2A-6DEC-40D8-AD3E-7447A9736092"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.100:*:*:*:*:*:*:*", "cpeNameId": "F903471F-7DC5-4168-BAF1-AE02C3E43321"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.101:*:*:*:*:*:*:*", "cpeNameId": "C94D5AD3-E24B-4D44-AF5F-09128A434F3F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.102:*:*:*:*:*:*:*", "cpeNameId": "DBBDB1E6-0160-417F-8EBA-E4A143CA41D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.103:*:*:*:*:*:*:*", "cpeNameId": "18570476-ABFC-4A8C-BBEF-AED9E53F6C34"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.104:*:*:*:*:*:*:*", "cpeNameId": "1B28A2BA-810E-4B40-83E9-4BED770D72EC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.105:*:*:*:*:*:*:*", "cpeNameId": "C25BB8A0-D93C-4071-BBED-99386B18DAE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.106:*:*:*:*:*:*:*", "cpeNameId": "2B75F5E1-5335-4AD7-9441-F3CBA98EF747"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.107:*:*:*:*:*:*:*", "cpeNameId": "449985A4-B44D-4C2A-9413-1BDA709D9E01"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.108:*:*:*:*:*:*:*", "cpeNameId": "E04D3E71-E5C0-40B4-AC12-FFE336978A74"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.109:*:*:*:*:*:*:*", "cpeNameId": "F3940127-6BEE-4F2E-B44A-FAACA6BFF9F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.110:*:*:*:*:*:*:*", "cpeNameId": "7F88E543-8723-481B-BBE2-757F82EA8100"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.111:*:*:*:*:*:*:*", "cpeNameId": "ED95CF08-486A-43C7-9DFE-966644DCC377"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.112:*:*:*:*:*:*:*", "cpeNameId": "11F03D25-057A-4661-9D80-0287A9FC3E46"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.113:*:*:*:*:*:*:*", "cpeNameId": "B6607762-D34E-4781-B5FB-A0663816E6BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.114:*:*:*:*:*:*:*", "cpeNameId": "0543C55A-12A4-4B28-BA66-452EFFAC7098"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.115:*:*:*:*:*:*:*", "cpeNameId": "C8AFB8B7-895F-4DFE-A789-B5B8891EF694"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.116:*:*:*:*:*:*:*", "cpeNameId": "4C78171E-3ADE-4991-8A87-86C1CAB609EC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.117:*:*:*:*:*:*:*", "cpeNameId": "A52DAAA6-AEDB-4A29-AB9A-B6F61101C486"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.118:*:*:*:*:*:*:*", "cpeNameId": "5C8DB1F1-2B65-41C5-AAC5-4B49BB90F6F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.119:*:*:*:*:*:*:*", "cpeNameId": "7636EB46-4587-49F1-A3DE-E99CD375F5D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.120:*:*:*:*:*:*:*", "cpeNameId": "FFBA4ECA-45CC-480D-A349-474A02528A5F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.121:*:*:*:*:*:*:*", "cpeNameId": "53674370-5B99-49DE-B239-324189EB5699"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.122:*:*:*:*:*:*:*", "cpeNameId": "E2DD9DE8-2CB7-487E-846A-56FAD08E199A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.123:*:*:*:*:*:*:*", "cpeNameId": "C15400AA-A918-43A6-90B9-9C7975A9D308"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.124:*:*:*:*:*:*:*", "cpeNameId": "BBB6E83C-5BA4-4226-9E3B-C23F3FCE248D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.125:*:*:*:*:*:*:*", "cpeNameId": "58B7AA16-617E-40FE-B192-6ABD6C1E05C4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.126:*:*:*:*:*:*:*", "cpeNameId": "C4C1F614-3186-456E-BD0F-3715273D010F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.127:*:*:*:*:*:*:*", "cpeNameId": "5E2E2078-968E-4730-8CAA-59B48CC007CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.128:*:*:*:*:*:*:*", "cpeNameId": "19D36CCE-3249-41DA-926C-42ED9DAF91C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.129:*:*:*:*:*:*:*", "cpeNameId": "DEE1AE91-0A90-461F-962A-F92EDA0DEA6F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.130:*:*:*:*:*:*:*", "cpeNameId": "60B9BFCA-ADCF-466E-B401-8BE4E2D4F6A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.131:*:*:*:*:*:*:*", "cpeNameId": "246A3AC9-CCED-4A3B-B82F-F26E6A79E3F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.132:*:*:*:*:*:*:*", "cpeNameId": "EBDB64FC-B4F1-4680-B1B0-1C848129B1B1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.133:*:*:*:*:*:*:*", "cpeNameId": "246F341D-A30B-4398-9F47-E6007ADD9411"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.134:*:*:*:*:*:*:*", "cpeNameId": "7AA07554-42F7-481E-849B-AEA632431934"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.135:*:*:*:*:*:*:*", "cpeNameId": "90C944B1-DB85-4B52-BD32-DDEB7A2A549E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.136:*:*:*:*:*:*:*", "cpeNameId": "7B06530D-A42B-4037-9FDB-7193ADC8697B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.137:*:*:*:*:*:*:*", "cpeNameId": "2329C964-A06C-46AB-A09B-16FCD04225BF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.138:*:*:*:*:*:*:*", "cpeNameId": "C459456B-DAC6-4628-AD4D-07FEC30EDC0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.139:*:*:*:*:*:*:*", "cpeNameId": "E896A785-A21A-4E37-8FD7-6F648D85C73D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.140:*:*:*:*:*:*:*", "cpeNameId": "5B870D55-093B-4A4E-A4BA-92ADF186D4AA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.141:*:*:*:*:*:*:*", "cpeNameId": "EAF9150A-686D-46A2-9388-47A1A60D263D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.142:*:*:*:*:*:*:*", "cpeNameId": "2AAE9D72-ECB4-4C43-BE20-5AC5FAAAD7EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.143:*:*:*:*:*:*:*", "cpeNameId": "A929B4C2-CED9-48D3-BE7A-A06751C50A82"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.144:*:*:*:*:*:*:*", "cpeNameId": "D52CB870-E71C-4ED1-9575-89C55E22371F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.145:*:*:*:*:*:*:*", "cpeNameId": "07CAE2BD-3C40-4DB7-B7F4-7F3F188C288B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.146:*:*:*:*:*:*:*", "cpeNameId": "F66FDF27-78C6-4AE8-BFFF-74FD08E25D2B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.147:*:*:*:*:*:*:*", "cpeNameId": "6EF3FCC0-FBD5-4575-ACDC-14A6CBD4C33C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.148:*:*:*:*:*:*:*", "cpeNameId": "5E07F013-A8BD-4FAC-93E4-99A687FAC737"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.149:*:*:*:*:*:*:*", "cpeNameId": "A304D006-C083-43DB-814C-92AD93A16406"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.150:*:*:*:*:*:*:*", "cpeNameId": "FE1937F5-7F68-4712-A42B-352F98DBCB73"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.151:*:*:*:*:*:*:*", "cpeNameId": "302DB07A-BCEB-473E-B83D-7144D60975C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.152:*:*:*:*:*:*:*", "cpeNameId": "AF045BDA-D8EE-480F-B055-2C8F1F6BB441"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.153:*:*:*:*:*:*:*", "cpeNameId": "7E53F5F7-2160-4D23-A389-6C177EB97920"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.154:*:*:*:*:*:*:*", "cpeNameId": "A352CE2F-3599-42AA-A999-8D2A8AE77385"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.155:*:*:*:*:*:*:*", "cpeNameId": "68E34650-597F-4BB5-B655-AAF63A824DFC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.156:*:*:*:*:*:*:*", "cpeNameId": "A9B206FB-6ED1-43D6-93B6-E5D295B69BFA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.157:*:*:*:*:*:*:*", "cpeNameId": "83CB40AA-9524-4C0B-BB83-7DDCCE05A165"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.158:*:*:*:*:*:*:*", "cpeNameId": "98E50A5B-D1F8-4A2E-BFFA-DFD9318A4C0C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.159:*:*:*:*:*:*:*", "cpeNameId": "A68C2E01-EAD7-4504-AC51-B6895536A2A7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.160:*:*:*:*:*:*:*", "cpeNameId": "265719AB-6D6A-4AE3-A264-8998A6B51417"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.161:*:*:*:*:*:*:*", "cpeNameId": "29283AA7-C999-41CF-B9EA-AF62EBAE25AA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.162:*:*:*:*:*:*:*", "cpeNameId": "026D8844-B72E-449A-AD9D-6DA20D6B2461"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.163:*:*:*:*:*:*:*", "cpeNameId": "CF2684AA-9D52-4D0C-B9C0-EA458DBA0275"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.164:*:*:*:*:*:*:*", "cpeNameId": "CF99A96E-B230-41AD-8BC4-5870661F4FE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.165:*:*:*:*:*:*:*", "cpeNameId": "382060D4-41AC-4E8F-B469-5012B74CA970"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.166:*:*:*:*:*:*:*", "cpeNameId": "7C529480-7A93-4F29-B9B6-DC8415C2C224"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.167:*:*:*:*:*:*:*", "cpeNameId": "DF37EDB8-03D5-48A1-825C-6AF1031DAADF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.168:*:*:*:*:*:*:*", "cpeNameId": "6D13EE22-1FB2-4497-BD34-EE71D20FB8BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.169:*:*:*:*:*:*:*", "cpeNameId": "BC302B8B-8B9A-4824-97CE-7E6433BF32B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.170:*:*:*:*:*:*:*", "cpeNameId": "7CFD9E7B-FE01-4B66-A9A6-1368D013765A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.171:*:*:*:*:*:*:*", "cpeNameId": "DED1A683-EBE7-497B-929A-313AB2AC0925"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.172:*:*:*:*:*:*:*", "cpeNameId": "A0C2E3CD-4225-4F59-9399-141ECB64DCCA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.173:*:*:*:*:*:*:*", "cpeNameId": "64951069-6F32-4B2C-876D-F2768FAB072F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.174:*:*:*:*:*:*:*", "cpeNameId": "EBB28714-885F-44E1-A0F8-51679623F675"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.175:*:*:*:*:*:*:*", "cpeNameId": "1BA05B10-74CC-41CC-AC4B-5F983EB9EF6A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.176:*:*:*:*:*:*:*", "cpeNameId": "207CE836-9B16-4D97-A92E-937EA92B2454"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.177:*:*:*:*:*:*:*", "cpeNameId": "900CD12E-534F-4104-9453-98073C4B9FE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.178:*:*:*:*:*:*:*", "cpeNameId": "662D17D5-0313-498C-BE52-48C9C2164929"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.179:*:*:*:*:*:*:*", "cpeNameId": "FDA8B29F-BFF6-4550-832D-9E76E48FA652"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.180:*:*:*:*:*:*:*", "cpeNameId": "0E55779B-C14D-49B2-AAD3-9E02A0612FA0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.181:*:*:*:*:*:*:*", "cpeNameId": "08726DAC-BA17-4EC2-BADB-177D34704C1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.182:*:*:*:*:*:*:*", "cpeNameId": "00DADA74-AD7D-4030-81F7-B8024E9EDD39"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.183:*:*:*:*:*:*:*", "cpeNameId": "41DA6AEA-5407-416C-8E04-738A6BFD2AFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.184:*:*:*:*:*:*:*", "cpeNameId": "CB0669FC-A028-4A45-873B-C1E5B60A153F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.185:*:*:*:*:*:*:*", "cpeNameId": "EA578486-31F1-4809-81A3-09B130EFF1EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.186:*:*:*:*:*:*:*", "cpeNameId": "5A48466E-5175-48F2-AB12-20FF8FD39A91"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.187:*:*:*:*:*:*:*", "cpeNameId": "A0AF33BB-CCA4-4EF3-AD37-A6BDA592201E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.188:*:*:*:*:*:*:*", "cpeNameId": "C55F2CFE-9058-4F93-9D1A-9959655533E3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.189:*:*:*:*:*:*:*", "cpeNameId": "1923663A-BA21-4246-9A05-53EEB987A59F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.190:*:*:*:*:*:*:*", "cpeNameId": "3D3E3AC9-B829-41A9-A4BF-E0D25EE83CB3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.191:*:*:*:*:*:*:*", "cpeNameId": "0209D8A9-58CB-464D-98E9-C55849C5EFBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.192:*:*:*:*:*:*:*", "cpeNameId": "E5ADF739-9681-4488-91EF-1DEB057300AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.193:*:*:*:*:*:*:*", "cpeNameId": "7611677A-A4AF-496B-89BD-AD6FEE729557"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.194:*:*:*:*:*:*:*", "cpeNameId": "C4697BBB-B20E-4481-9CB1-47705D6B0A64"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.195:*:*:*:*:*:*:*", "cpeNameId": "58471B55-C8F3-462E-A365-CDE52A6BCBA9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.196:*:*:*:*:*:*:*", "cpeNameId": "7DE3F30B-22F8-4308-A4DD-69346EFAEC9C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.197:*:*:*:*:*:*:*", "cpeNameId": "0D16F9C5-E2D5-4A37-904F-9B882AD86309"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.198:*:*:*:*:*:*:*", "cpeNameId": "91BB87DE-E086-4D53-AB3A-69224410D542"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.199:*:*:*:*:*:*:*", "cpeNameId": "281A834B-F437-4D42-A128-2F404AD98C03"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.200:*:*:*:*:*:*:*", "cpeNameId": "CFDE6A44-7410-45AA-B03F-518BB2E3D029"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.201:*:*:*:*:*:*:*", "cpeNameId": "2F3696BC-9946-43EC-A5BE-FBF103B914C2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.202:*:*:*:*:*:*:*", "cpeNameId": "49E286A6-8D86-4F0C-AE46-70CE364D4D34"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.203:*:*:*:*:*:*:*", "cpeNameId": "F05F8B59-C598-4A9D-8598-95E486F03912"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.204:*:*:*:*:*:*:*", "cpeNameId": "9574762D-2B80-4DA6-B5C0-13BA8574BDF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.205:*:*:*:*:*:*:*", "cpeNameId": "E1592B19-0EBB-40A5-8E26-09D333620E42"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.206:*:*:*:*:*:*:*", "cpeNameId": "7A00E289-C1AF-4892-888E-FE2B71F9192B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.207:*:*:*:*:*:*:*", "cpeNameId": "66F586E3-6EA7-427E-B2A1-04C72BB3C0F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.208:*:*:*:*:*:*:*", "cpeNameId": "35D69FF2-A15F-4DEF-9042-8068FB161134"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.209:*:*:*:*:*:*:*", "cpeNameId": "494CAA62-F904-40B5-B57F-DD740D2CA896"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.210:*:*:*:*:*:*:*", "cpeNameId": "196CBDC8-9C64-42C8-ADA4-7D4BEA554878"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.211:*:*:*:*:*:*:*", "cpeNameId": "013EBDF8-3C0F-4215-931D-C3C29B435E0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.212:*:*:*:*:*:*:*", "cpeNameId": "7D6E2DB9-8680-4AEF-AD1A-3D69754035F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.213:*:*:*:*:*:*:*", "cpeNameId": "D49FC2AF-E5DA-418C-BE69-F7C7B25ECD30"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.214:*:*:*:*:*:*:*", "cpeNameId": "630B3919-9504-4EA4-82BF-3352DAE4FFAB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.215:*:*:*:*:*:*:*", "cpeNameId": "BFF8FD48-648F-4E98-BDDA-AF7832422E08"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.216:*:*:*:*:*:*:*", "cpeNameId": "44AD0235-927F-4286-AE7C-34E60481DCD2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.217:*:*:*:*:*:*:*", "cpeNameId": "D726E465-CB14-4F50-A3A5-05F5BEB544FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.218:*:*:*:*:*:*:*", "cpeNameId": "3BEA4D9C-4899-4E3F-AA4F-86AC93C26841"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.219:*:*:*:*:*:*:*", "cpeNameId": "155548FF-67CC-4BA7-BE08-2810EA12A181"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.220:*:*:*:*:*:*:*", "cpeNameId": "20FB805F-D821-49EF-969C-21CD8232CC97"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.221:*:*:*:*:*:*:*", "cpeNameId": "48B45DEA-86BB-4242-8F6E-CFF9BB37B19C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.222:*:*:*:*:*:*:*", "cpeNameId": "6C5D7A67-FB42-44EA-A569-7274E9F06E40"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.223:*:*:*:*:*:*:*", "cpeNameId": "B91D2396-F745-44E4-9794-8A7B191D0EBE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.224:*:*:*:*:*:*:*", "cpeNameId": "BFBEE827-A91F-455B-8C59-14CAF80BAC0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.225:*:*:*:*:*:*:*", "cpeNameId": "C905A295-285D-4D2C-A0F3-454FD5ED6071"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.226:*:*:*:*:*:*:*", "cpeNameId": "A9B06703-D925-4E2A-9FA0-2A6863A17CF0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.227:*:*:*:*:*:*:*", "cpeNameId": "6FAB2103-943D-4DA6-B967-00AEA85D70F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.228:*:*:*:*:*:*:*", "cpeNameId": "64D4B432-E3DD-4D99-85EE-7287EA5003D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.229:*:*:*:*:*:*:*", "cpeNameId": "94C0C578-4D2D-4BA0-9614-C5EFE5FAC97E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.230:*:*:*:*:*:*:*", "cpeNameId": "3C588990-79E8-4296-82F6-EECDADEC4FBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.231:*:*:*:*:*:*:*", "cpeNameId": "6CCFCFAC-B519-4B1C-BA37-C254526BFC5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.232:*:*:*:*:*:*:*", "cpeNameId": "852B8329-D924-4265-86D5-F92FDD268B05"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.233:*:*:*:*:*:*:*", "cpeNameId": "0C14D107-1D46-490A-9C9C-973325B77873"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.234:*:*:*:*:*:*:*", "cpeNameId": "355C0CE7-0FD8-47FE-A7A3-D0B4487DF610"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.235:*:*:*:*:*:*:*", "cpeNameId": "B0CEDF08-FDE9-4A9F-84D5-C73C341FB515"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.236:*:*:*:*:*:*:*", "cpeNameId": "0DCBF98D-881B-43B9-90C7-FCB4B493F70C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.237:*:*:*:*:*:*:*", "cpeNameId": "F97BF049-4C8A-4CBF-8848-6D8DDD81D75B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.238:*:*:*:*:*:*:*", "cpeNameId": "988EC493-0C82-46C8-8A4D-AF1501B35670"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.239:*:*:*:*:*:*:*", "cpeNameId": "4158AFE2-D4E1-4334-B313-F9CA5C7B0CB7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.240:*:*:*:*:*:*:*", "cpeNameId": "8B1E737A-F8D6-4FCF-A8B2-D8B9F4EC07F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.241:*:*:*:*:*:*:*", "cpeNameId": "81BB3A2B-0C6A-47B9-AB54-3763CE6314B8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.242:*:*:*:*:*:*:*", "cpeNameId": "21206177-2704-4E74-BDA1-1510124628DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.243:*:*:*:*:*:*:*", "cpeNameId": "10CD8A76-15D2-4B01-896E-086AB6DBB68F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.244:*:*:*:*:*:*:*", "cpeNameId": "1F928940-DFB6-4916-8382-A1C774194832"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.245:*:*:*:*:*:*:*", "cpeNameId": "0CC09134-0AD5-4091-BE00-0FDCE6C1B5AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.246:*:*:*:*:*:*:*", "cpeNameId": "7F445E26-C26F-4398-BA55-3903FC3AB3ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.247:*:*:*:*:*:*:*", "cpeNameId": "68E8E3E3-D2CB-4354-A0E4-AEE63E9AF94E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.248:*:*:*:*:*:*:*", "cpeNameId": "3949F9FD-1182-47FB-A635-AD39280555BE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.249:*:*:*:*:*:*:*", "cpeNameId": "4C7951C3-5951-4525-99F1-483B3B397CE3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.250:*:*:*:*:*:*:*", "cpeNameId": "7C354C5F-E5EF-4D0B-8854-3D5C163E59D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.251:*:*:*:*:*:*:*", "cpeNameId": "440E5A5E-E0D6-424A-A978-F34DEADDFA17"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.252:*:*:*:*:*:*:*", "cpeNameId": "551FE389-86EA-492D-A22F-C6D2C6BCDB2E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.253:*:*:*:*:*:*:*", "cpeNameId": "BB12F4A9-AE2A-4CDB-958F-5AF3C262067E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.254:*:*:*:*:*:*:*", "cpeNameId": "007D7060-D12B-46BD-B005-897B3E5290CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.255:*:*:*:*:*:*:*", "cpeNameId": "2FB1583A-1D2E-4B82-AFA4-81D623D681D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.256:*:*:*:*:*:*:*", "cpeNameId": "450021EA-3409-4C4F-9B49-97579C89E534"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.257:*:*:*:*:*:*:*", "cpeNameId": "28876801-3DD9-4992-B0CF-3160C9822D9C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.258:*:*:*:*:*:*:*", "cpeNameId": "133ED5C3-38BC-47CA-97C9-ACC9D33D93C9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.259:*:*:*:*:*:*:*", "cpeNameId": "2FC947E5-32F4-413E-864D-1F7BEE684504"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.260:*:*:*:*:*:*:*", "cpeNameId": "3727E506-D975-46B1-BA82-9E9DBF60864D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.261:*:*:*:*:*:*:*", "cpeNameId": "B7D5C3F2-7F88-4FF7-9D56-EBB35C7FA687"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.262:*:*:*:*:*:*:*", "cpeNameId": "FA3F037B-3AA8-4DC7-ABF8-37D4E7F72987"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.263:*:*:*:*:*:*:*", "cpeNameId": "B629674A-274B-4A00-B972-8E6AC7A125C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.264:*:*:*:*:*:*:*", "cpeNameId": "CCE21890-0782-4EA7-8C50-C16BA210EBEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.265:*:*:*:*:*:*:*", "cpeNameId": "61DC4A5D-8023-4703-9B5F-CF38623D5F4B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.266:*:*:*:*:*:*:*", "cpeNameId": "E7953AF3-4293-4FDC-9E2A-791F15CDBC96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.267:*:*:*:*:*:*:*", "cpeNameId": "A0A7C20B-1669-492F-8E45-B94457D9BA5B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.268:*:*:*:*:*:*:*", "cpeNameId": "74A43E1F-F22F-421F-BB43-6D313E186447"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.269:*:*:*:*:*:*:*", "cpeNameId": "F87C845A-E4F5-48C5-8BE7-A32DC9765770"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.270:*:*:*:*:*:*:*", "cpeNameId": "C9E3E563-0877-41A4-B911-9C1D96FC083D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.271:*:*:*:*:*:*:*", "cpeNameId": "AF7989DF-3745-43BE-BE62-C89975857EC0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.272:*:*:*:*:*:*:*", "cpeNameId": "9BEE5DF7-1F70-4B14-91E8-A6C4C75A6A15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.273:*:*:*:*:*:*:*", "cpeNameId": "D33F4F6B-4412-41B0-A647-71C2F3DEA100"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.274:*:*:*:*:*:*:*", "cpeNameId": "E414EB92-7254-44A9-A831-3739EC2C0339"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.275:*:*:*:*:*:*:*", "cpeNameId": "2E6BFFD9-5144-428A-B3B4-9D39DC57928F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.276:*:*:*:*:*:*:*", "cpeNameId": "8BB682EF-48EA-4014-8C3A-372DBBEDBDDB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.277:*:*:*:*:*:*:*", "cpeNameId": "57B18195-1374-4A01-A7BC-62CAB96836BF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.278:*:*:*:*:*:*:*", "cpeNameId": "B3439ABE-6A03-4C6E-8C65-5F340D3408CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.279:*:*:*:*:*:*:*", "cpeNameId": "3E65E40A-EBF1-4E15-BB6E-3F33C0607213"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.280:*:*:*:*:*:*:*", "cpeNameId": "158B02C6-BE88-4AAA-8D98-A2928FF494E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.281:*:*:*:*:*:*:*", "cpeNameId": "46960B28-AA2F-49A0-BD2A-B70031BAFE17"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.282:*:*:*:*:*:*:*", "cpeNameId": "6C488375-5CBF-4B6A-B5DE-4EE9D0D78D6A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.283:*:*:*:*:*:*:*", "cpeNameId": "89C004F6-5808-4140-8CA9-94B1BDFFFC08"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.284:*:*:*:*:*:*:*", "cpeNameId": "87E0D14B-2305-46E4-A1FF-56DF608C1795"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.285:*:*:*:*:*:*:*", "cpeNameId": "44F8F5F9-4842-4765-A551-2D2078DFC684"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.286:*:*:*:*:*:*:*", "cpeNameId": "1E4F8F79-CF58-424B-8884-424A00B283C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.287:*:*:*:*:*:*:*", "cpeNameId": "AFEC2AD9-E3ED-4ECE-BA80-1FD76248D514"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.288:*:*:*:*:*:*:*", "cpeNameId": "EEDEF216-9D62-4DF6-BD89-3EED6906292F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.289:*:*:*:*:*:*:*", "cpeNameId": "A02EA509-DF45-4CE8-90B1-C8BD7B8BAFD6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.290:*:*:*:*:*:*:*", "cpeNameId": "A2C66CF4-D5D7-4897-8E3F-5E47FED898A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.291:*:*:*:*:*:*:*", "cpeNameId": "9C4FE524-6E1E-4FB5-BC3C-9731F9F78E6A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.292:*:*:*:*:*:*:*", "cpeNameId": "35C28419-F80A-4875-88CE-4D4B6F00C8DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.293:*:*:*:*:*:*:*", "cpeNameId": "58BE8244-391B-4CF2-A805-E299B82C61D7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.294:*:*:*:*:*:*:*", "cpeNameId": "3B2A2979-293A-4DE2-8EEC-030AB3096C30"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.295:*:*:*:*:*:*:*", "cpeNameId": "15FA5BB0-94CE-4689-B8A6-EB344F983EC9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.296:*:*:*:*:*:*:*", "cpeNameId": "5DA05C25-355D-4C96-8D88-1E207C726AAF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.297:*:*:*:*:*:*:*", "cpeNameId": "36F176DB-DCF3-4FC2-88DD-A94222633A21"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.298:*:*:*:*:*:*:*", "cpeNameId": "459887C6-2292-4B2A-87AD-DD7714A00949"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.299:*:*:*:*:*:*:*", "cpeNameId": "181DBB6F-D9C2-4189-9F54-7B9CDDB80BD7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.300:*:*:*:*:*:*:*", "cpeNameId": "8BB51592-1D30-4CD6-863D-818A48FF2AE4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.301:*:*:*:*:*:*:*", "cpeNameId": "48216E63-EB92-4B3B-9CBD-E2A1D46EC013"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.302:*:*:*:*:*:*:*", "cpeNameId": "C5FA6C11-FE27-44EC-A4A6-25120C4848CE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5:*:*:*:*:*:*:*", "cpeNameId": "6752716B-480D-47F4-B011-9496A572E34A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5:-:*:*:*:*:*:*", "cpeNameId": "64E8469C-7D92-46CE-953D-C228C6751E3E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5:rc1:*:*:*:*:*:*", "cpeNameId": "2CCF74F9-BC2F-461A-98E6-DC98E271FCEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5:rc2:*:*:*:*:*:*", "cpeNameId": "55517ACC-4334-44E0-AD3D-0E1FF4E013DE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5:rc3:*:*:*:*:*:*", "cpeNameId": "BC105030-814B-4359-85B8-AB322E105737"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5:rc4:*:*:*:*:*:*", "cpeNameId": "DD78112E-F11E-46C2-AE52-9B48C7F0B03D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5:rc5:*:*:*:*:*:*", "cpeNameId": "599B6EE9-2C07-43A2-BC41-C96DE7502A8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5:rc6:*:*:*:*:*:*", "cpeNameId": "884AB775-5BA8-47A6-8556-CA9FBD4B3366"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5:rc7:*:*:*:*:*:*", "cpeNameId": "0C4F78B2-4531-4480-A171-1BAF9C8ED2FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5.0:*:*:*:*:*:*:*", "cpeNameId": "89D51C4A-2038-4CC3-BC96-B4B99709BB84"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5.0:rc1:*:*:*:*:*:*", "cpeNameId": "9479CFA4-0CFC-4DB3-9EFF-EAEA98B51CA3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5.0:rc2:*:*:*:*:*:*", "cpeNameId": "482E248D-31FE-428A-A427-D0E6692D0D6A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5.0:rc3:*:*:*:*:*:*", "cpeNameId": "BA2A8624-AAF8-4BFF-9B51-9E2B21104D1F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5.0:rc7:*:*:*:*:*:*", "cpeNameId": "A24295A6-C621-4249-B273-4EE57AD074BF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5.1:*:*:*:*:*:*:*", "cpeNameId": "4F48C1CE-B56D-4E32-8D36-CFA5CE37F833"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5.2:*:*:*:*:*:*:*", "cpeNameId": "3090C977-4C87-4DE7-B635-65DE0C95F1AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5.3:*:*:*:*:*:*:*", "cpeNameId": "E78188B1-4DD4-40F0-82A8-66F5CAB33C6C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5.4:*:*:*:*:*:*:*", "cpeNameId": "0D1A4F8C-D753-40D8-9EF6-E7D9E95E0CC6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5.5:*:*:*:*:*:*:*", "cpeNameId": "450C515D-9EB0-4F37-B3C1-EE55E128466E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5.6:*:*:*:*:*:*:*", "cpeNameId": "D171B92A-B9F2-4CF4-A51D-25DE12B1DAB7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5.7:*:*:*:*:*:*:*", "cpeNameId": "DDB68C52-02FF-4514-A37A-FAE660ECFAEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.6:*:*:*:*:*:*:*", "cpeNameId": "513E9C7E-9CD0-453D-8044-1DCF043ABFC5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.6.1:*:*:*:*:*:*:*", "cpeNameId": "4282AD9E-F4CF-406C-82C6-E9C9C374341F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.6.2:*:*:*:*:*:*:*", "cpeNameId": "79BFAA05-E0AE-4B27-ADD2-043A5F1765DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.6.3:*:*:*:*:*:*:*", "cpeNameId": "3E22E014-6635-4FF5-AA51-0DFED4F7E4CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.6.4:*:*:*:*:*:*:*", "cpeNameId": "8D6F4072-8DBE-4637-AEBD-4E9123A6C9FA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.6.5:*:*:*:*:*:*:*", "cpeNameId": "FCCB037F-6B5B-4B3D-AB98-DBD4A72D60B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.6.6:*:*:*:*:*:*:*", "cpeNameId": "8D7C846C-1336-4777-8B52-9F75E281AFA3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.6.7:*:*:*:*:*:*:*", "cpeNameId": "55DA9CF3-9708-4520-AAA8-49B56B5BE4EE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7:*:*:*:*:*:*:*", "cpeNameId": "496F7DCA-CD17-40FF-A146-993EACB85937"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7:-:*:*:*:*:*:*", "cpeNameId": "7071E45E-8875-403E-900D-B18B78B2CFEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7:rc1:*:*:*:*:*:*", "cpeNameId": "8C21D0B7-9E71-4213-9146-7A85711840A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7:rc2:*:*:*:*:*:*", "cpeNameId": "1FD38972-2F84-4D2B-9C4D-B2A9B6F87BD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7:rc3:*:*:*:*:*:*", "cpeNameId": "CED8F0FE-B0EC-4F8C-B1B3-9690A5B2C427"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7:rc4:*:*:*:*:*:*", "cpeNameId": "805AF26E-C23B-45A2-8D72-F90A1FA0EC45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7:rc5:*:*:*:*:*:*", "cpeNameId": "FD8D5C3C-1EB6-454A-9CE8-51593EFE60B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7:rc6:*:*:*:*:*:*", "cpeNameId": "BF98A71F-D556-470F-9ECA-BA0D03919E44"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7:rc7:*:*:*:*:*:*", "cpeNameId": "3EA4A517-42BA-47DE-9435-3B2EE041B824"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7.1:*:*:*:*:*:*:*", "cpeNameId": "CB86EA69-EE70-45B2-B01F-5C3056895ADA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7.2:*:*:*:*:*:*:*", "cpeNameId": "85FB5454-E1F2-46B8-9CC7-ED28B950CC79"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7.3:*:*:*:*:*:*:*", "cpeNameId": "700591B1-5F5E-406D-AFD2-C171814E1762"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7.4:*:*:*:*:*:*:*", "cpeNameId": "5BCFD5D4-7494-49AA-B48C-E7C0B8D1881E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7.5:*:*:*:*:*:*:*", "cpeNameId": "446BC346-E811-407B-A029-1E5B1D6AF131"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7.6:*:*:*:*:*:*:*", "cpeNameId": "27FBC7AE-CBC8-417E-87F2-1FCBA47FFED2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7.7:*:*:*:*:*:*:*", "cpeNameId": "A9D96B8D-35D8-4E1E-A12B-EBDC81FF5F3C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7.8:*:*:*:*:*:*:*", "cpeNameId": "9CB7C2A8-EF23-4612-94CE-F37623A35CE5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7.9:*:*:*:*:*:*:*", "cpeNameId": "C38910BF-3CEA-4EAD-B391-942E990DB44D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7.10:*:*:*:*:*:*:*", "cpeNameId": "CD211D99-AE1B-4259-9D88-978BF4BBE266"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8:*:*:*:*:*:*:*", "cpeNameId": "7FCAC593-0734-4D3F-AD38-55AA21A05DD0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8:-:*:*:*:*:*:*", "cpeNameId": "A4B6A9C4-8211-4E88-A2C7-C36BBBE48E24"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8:rc1:*:*:*:*:*:*", "cpeNameId": "AEC7ED2E-5B13-4144-9ED7-A60EDE512955"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8:rc2:*:*:*:*:*:*", "cpeNameId": "7463D464-9817-44F7-BCCA-16947B5F7348"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8:rc3:*:*:*:*:*:*", "cpeNameId": "75C6B48C-182A-42B6-8BA1-53057660DA89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8:rc4:*:*:*:*:*:*", "cpeNameId": "958A88C5-9246-464A-9E6E-4340B03A6C1A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8:rc5:*:*:*:*:*:*", "cpeNameId": "3412A731-F526-44FA-9E1C-42A77C9B1E29"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8:rc6:*:*:*:*:*:*", "cpeNameId": "293C40EC-887D-42A6-92E8-CDF12F0E0BAA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.1:*:*:*:*:*:*:*", "cpeNameId": "C08959E8-EC01-42E8-AA0C-9BD6621B5FE8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.2:*:*:*:*:*:*:*", "cpeNameId": "FCCE5C13-84F1-456D-8172-79A4B66D4563"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.3:*:*:*:*:*:*:*", "cpeNameId": "8DD556A5-950A-4386-B290-3BA23F8FAE74"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.4:*:*:*:*:*:*:*", "cpeNameId": "11C5676D-8CC7-4CD7-B0DA-E6266DD066AD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.5:*:*:*:*:*:*:*", "cpeNameId": "F2B231B1-804A-4ADF-A8A6-9A2DB05DDF48"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.6:*:*:*:*:*:*:*", "cpeNameId": "2DCDBE9F-80D3-4A9A-8ABD-89872C2BF47F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.7:*:*:*:*:*:*:*", "cpeNameId": "C673A048-7856-4547-8E56-BC3557D9FD38"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.8:*:*:*:*:*:*:*", "cpeNameId": "398EDB8C-C735-4B41-994E-C207F198D072"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.9:*:*:*:*:*:*:*", "cpeNameId": "8256347C-D1FF-4A19-BD31-F78F0085A475"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.10:*:*:*:*:*:*:*", "cpeNameId": "A63AAEE8-FEEB-4399-8FD5-F0A90A5C4363"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.11:*:*:*:*:*:*:*", "cpeNameId": "0F6E054C-2FB7-4F32-A653-87E436E30BFE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.12:*:*:*:*:*:*:*", "cpeNameId": "7CE8E210-4DFE-4E5D-A6D9-BD991AC6F8BF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.13:*:*:*:*:*:*:*", "cpeNameId": "744AC014-50ED-4FB4-B8AD-D5C7CF3C7CC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.14:*:*:*:*:*:*:*", "cpeNameId": "498DABA6-7087-4364-8C81-5346BE483975"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.15:*:*:*:*:*:*:*", "cpeNameId": "37255C42-4B93-475E-9935-1F0446011768"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.16:*:*:*:*:*:*:*", "cpeNameId": "A8695620-4D6E-44B4-9FE8-95C9960C240E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.17:*:*:*:*:*:*:*", "cpeNameId": "96D4758C-FE52-4DA8-87E1-577A3FCEF236"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:*:*:*:*:*:*:*", "cpeNameId": "72D7C54B-6ED2-4DCE-A67F-C71FB93A5823"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:-:*:*:*:*:*:*", "cpeNameId": "12D10173-3DCE-40E4-9B99-B6C7A7454106"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:rc1:*:*:*:*:*:*", "cpeNameId": "DBD96821-B70D-475C-A38B-8416AC3576D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:rc2:*:*:*:*:*:*", "cpeNameId": "221A17CE-03D4-4662-924E-23E6426BB693"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:rc3:*:*:*:*:*:*", "cpeNameId": "5B3F2BE9-697B-4E5D-93D6-2127CE19550C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:rc4:*:*:*:*:*:*", "cpeNameId": "AD35E83C-A016-47F3-8D62-9C4A0306FAD4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:rc5:*:*:*:*:*:*", "cpeNameId": "E166DE00-D241-44A0-B75B-F067310B6FEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:rc6:*:*:*:*:*:*", "cpeNameId": "65CAACB6-7E01-48F5-98DF-E1923A3F01C5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:rc7:*:*:*:*:*:*", "cpeNameId": "F12E246D-AC32-42AB-A20F-5B54C2FFC059"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:rc8:*:*:*:*:*:*", "cpeNameId": "9896B1C6-0127-4248-A9D1-ABB07588F87A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.0:*:*:*:*:*:*:*", "cpeNameId": "C477CC26-17BE-46DA-8B9D-218D8AA51AD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.1:*:*:*:*:*:*:*", "cpeNameId": "8AF8815B-4FEF-483D-9CF9-C8BDDD29308D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.2:*:*:*:*:*:*:*", "cpeNameId": "A36A1BD4-0C74-4284-99A4-A53FEE3C8D65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.3:*:*:*:*:*:*:*", "cpeNameId": "AF59D9D7-96F7-41F7-8125-50592CE96BFF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.4:*:*:*:*:*:*:*", "cpeNameId": "CDB03998-BA6F-4F00-83F7-B54515BA4725"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.5:*:*:*:*:*:*:*", "cpeNameId": "0F83014C-CE37-47EA-9906-94AA2FED7DD9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.6:*:*:*:*:*:*:*", "cpeNameId": "2DACA082-8E91-493D-890B-FF9A78EEBC9A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.7:*:*:*:*:*:*:*", "cpeNameId": "8823DC1A-2E25-4E13-9F8F-E347154A7F72"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.8:*:*:*:*:*:*:*", "cpeNameId": "60679951-3906-4497-8CBC-8891BEE953B6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.9:*:*:*:*:*:*:*", "cpeNameId": "76030A2F-567A-493B-BD6C-09DB84455253"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.10:*:*:*:*:*:*:*", "cpeNameId": "527F6E5F-FDE0-4BEF-AB6F-9EAC1F6F6978"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.11:*:*:*:*:*:*:*", "cpeNameId": "CE3D179E-83C1-4BAE-8CB1-DE413B7901D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.12:*:*:*:*:*:*:*", "cpeNameId": "BD502B1D-8E7D-4AD4-9011-E616315740C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.13:*:*:*:*:*:*:*", "cpeNameId": "4A96891C-E4D8-4BBD-8C3A-8BEC1EDD6DF7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.14:*:*:*:*:*:*:*", "cpeNameId": "049B9559-3317-43D0-BB9E-2008182328D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.15:*:*:*:*:*:*:*", "cpeNameId": "3BAD5668-2640-4602-9837-07D764990011"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.16:*:*:*:*:*:*:*", "cpeNameId": "B76E758C-F23C-4E81-8D89-6B3C331DF70A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.17:*:*:*:*:*:*:*", "cpeNameId": "558B0C0A-04D6-41D1-AED9-4D16159FAA64"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.18:*:*:*:*:*:*:*", "cpeNameId": "BC3F9201-BBD4-48C1-9254-14DDCC7A6B7E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.19:*:*:*:*:*:*:*", "cpeNameId": "E8A01AF1-8E23-40E5-A956-AF00A7A47BA0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.20:*:*:*:*:*:*:*", "cpeNameId": "2CAF46F1-2D12-41FC-ABF2-C6F56A9CE410"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.21:*:*:*:*:*:*:*", "cpeNameId": "7A2DC702-A782-4D15-9435-ACC0778F3FB3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.22:*:*:*:*:*:*:*", "cpeNameId": "D2916473-F575-4728-B2EC-60EE62AB8BF7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.23:*:*:*:*:*:*:*", "cpeNameId": "B6409273-5794-4B9E-BDD5-7FCFCF339511"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.24:*:*:*:*:*:*:*", "cpeNameId": "2893EFED-04F5-42B0-96B4-FB29EEFAA9EE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.25:*:*:*:*:*:*:*", "cpeNameId": "F1EC5B2F-8765-464D-A5A2-DEF282D3576A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.26:*:*:*:*:*:*:*", "cpeNameId": "CE231956-F740-4AA4-9750-A9F1E16C7429"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.27:*:*:*:*:*:*:*", "cpeNameId": "B08B4A4D-A673-49B9-9809-6C8EB2D8CCFA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.28:*:*:*:*:*:*:*", "cpeNameId": "25127A10-99C3-4B29-9037-752644FEDAA3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.29:*:*:*:*:*:*:*", "cpeNameId": "7C9B9FDE-13EC-442C-A753-05D753AF7F2F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.30:*:*:*:*:*:*:*", "cpeNameId": "60DFABB9-1C9B-4A43-8A5D-4B51C46D6CF2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.31:*:*:*:*:*:*:*", "cpeNameId": "55547C90-57BE-4B48-80BC-5248CF85A54D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.32:*:*:*:*:*:*:*", "cpeNameId": "4FEC2A07-6C9E-4B57-9F1D-A8C7A2531042"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.33:*:*:*:*:*:*:*", "cpeNameId": "3A3CC360-6DB0-4058-A637-BEA9F10F3ECC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.34:*:*:*:*:*:*:*", "cpeNameId": "74A4841B-22B2-45B0-A608-52579D2983E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.35:*:*:*:*:*:*:*", "cpeNameId": "F5D48DE7-BCE0-4195-B8E2-E3A8C9884647"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.36:*:*:*:*:*:*:*", "cpeNameId": "15A99A35-647E-4AFF-B6E2-0652FE1F9FFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.37:*:*:*:*:*:*:*", "cpeNameId": "51FDBF94-6126-4C97-9650-6902E77C1811"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.38:*:*:*:*:*:*:*", "cpeNameId": "9A7EA0F2-DFB9-4CF2-82D8-F5C569BA5CD7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.39:*:*:*:*:*:*:*", "cpeNameId": "6C245624-3821-4A71-8682-AB66074B82B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.40:*:*:*:*:*:*:*", "cpeNameId": "DD0E98E7-27A5-4BDD-8907-53DA5C31F7A0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.41:*:*:*:*:*:*:*", "cpeNameId": "C879D912-54D4-4C73-91B2-500D49230B7A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.42:*:*:*:*:*:*:*", "cpeNameId": "85E02B17-E410-42FE-A83B-B8B4E7EBB532"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.43:*:*:*:*:*:*:*", "cpeNameId": "56E7B421-D6F4-45BB-A4A7-37AA444554F7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.44:*:*:*:*:*:*:*", "cpeNameId": "146F13C7-D0C9-4829-99CB-36C12B673BF9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.45:*:*:*:*:*:*:*", "cpeNameId": "1BC5E0A8-84C0-44E1-9DFD-5C633FD66E42"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.46:*:*:*:*:*:*:*", "cpeNameId": "965C07B8-7491-41D5-BFFF-C2DC61675475"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.47:*:*:*:*:*:*:*", "cpeNameId": "6F99B518-6BC7-4B89-8C2F-2A61C8F1A66C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.48:*:*:*:*:*:*:*", "cpeNameId": "1654578E-2D00-498E-9EF1-D64BBBBA7070"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.49:*:*:*:*:*:*:*", "cpeNameId": "BC5CCADF-5DEA-4540-8D2F-478F3175DA62"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.50:*:*:*:*:*:*:*", "cpeNameId": "67B5EA2D-9D68-4247-8C79-6F92FD8D39F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.51:*:*:*:*:*:*:*", "cpeNameId": "62B20DEB-030A-4CED-93BC-3F6F4D5AD54B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.52:*:*:*:*:*:*:*", "cpeNameId": "66BDA9E0-B507-4116-9FFC-6DBFE79A3CD4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.53:*:*:*:*:*:*:*", "cpeNameId": "76AB10DC-B6FD-4E05-A1E6-09C04A8A1B13"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.54:*:*:*:*:*:*:*", "cpeNameId": "6461BBE3-2AAA-4975-A75F-F561D3C1B753"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.55:*:*:*:*:*:*:*", "cpeNameId": "957D4BA7-C0CC-482D-8844-03AEBFE9F966"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.56:*:*:*:*:*:*:*", "cpeNameId": "4B6981FD-9D76-418C-BC72-EC1900EA9C04"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.57:*:*:*:*:*:*:*", "cpeNameId": "22E939B7-D460-4BE9-9529-0E26B53304B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.58:*:*:*:*:*:*:*", "cpeNameId": "CC981857-5731-4095-92A2-D10F6F27F85E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.59:*:*:*:*:*:*:*", "cpeNameId": "EB3A0428-3B0E-4608-9D96-AC0687921B92"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.60:*:*:*:*:*:*:*", "cpeNameId": "F1134646-1E83-459B-9E11-B1893162D4B6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.61:*:*:*:*:*:*:*", "cpeNameId": "01F91BC8-9830-49E4-AFCA-5910983AFA96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.62:*:*:*:*:*:*:*", "cpeNameId": "C5611992-8FA6-489D-B4C7-9871472702C4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.63:*:*:*:*:*:*:*", "cpeNameId": "B7E52E14-5B55-4458-9BB8-5A1718BAD459"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.64:*:*:*:*:*:*:*", "cpeNameId": "8407449D-67A3-4594-9340-03C4A009828C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.65:*:*:*:*:*:*:*", "cpeNameId": "0B393B17-93FA-4A1F-AF33-86AFA723BC6C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.66:*:*:*:*:*:*:*", "cpeNameId": "3F002BC4-16F2-44FB-842E-7F1CDBA7D2D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.67:*:*:*:*:*:*:*", "cpeNameId": "AD88F263-F5B8-4027-A433-B33EB293F8C7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.68:*:*:*:*:*:*:*", "cpeNameId": "998A1D28-491B-49AF-BEBA-0B7C55016EDB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.69:*:*:*:*:*:*:*", "cpeNameId": "C00A621D-4F1D-4AD8-BE42-3E584F545757"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.70:*:*:*:*:*:*:*", "cpeNameId": "4A8C8214-FDDA-4A1B-9520-756DE05E1C8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.71:*:*:*:*:*:*:*", "cpeNameId": "69E6FBB1-D0B6-486C-B905-54D292ED0BBF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.72:*:*:*:*:*:*:*", "cpeNameId": "04D7688B-E9C8-4CA0-9564-06136BD00399"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.73:*:*:*:*:*:*:*", "cpeNameId": "A11B2E7E-F239-49F6-9B0A-EB897B935734"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.74:*:*:*:*:*:*:*", "cpeNameId": "09B990BA-BB96-40E6-936B-A42138DA410E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.75:*:*:*:*:*:*:*", "cpeNameId": "EE93F1AB-E1B2-4D42-8482-FC0D5232EDCF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.76:*:*:*:*:*:*:*", "cpeNameId": "E094CC04-C34E-45D2-B7BD-8344494F2AF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.77:*:*:*:*:*:*:*", "cpeNameId": "A7AD03A1-2D39-498C-B6FC-6288DFE6A0B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.78:*:*:*:*:*:*:*", "cpeNameId": "C7332F79-76CA-466E-974C-6D94B2028E83"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.79:*:*:*:*:*:*:*", "cpeNameId": "4C7E0132-E639-4C9E-ACD4-E68A1D16EE27"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.80:*:*:*:*:*:*:*", "cpeNameId": "0BA2A075-D652-4220-80D3-765F2E0F1248"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.81:*:*:*:*:*:*:*", "cpeNameId": "6D6C7CFE-7944-44FE-B8D0-13A87E781C59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.82:*:*:*:*:*:*:*", "cpeNameId": "BD198E06-E1B2-48AD-8236-1026D62FF668"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.83:*:*:*:*:*:*:*", "cpeNameId": "9E1B704D-FA55-4EE9-93AE-345D9CEC178C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.84:*:*:*:*:*:*:*", "cpeNameId": "2AD133E5-08E3-4456-9D3E-E2E42247222A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.85:*:*:*:*:*:*:*", "cpeNameId": "A038FF7C-6591-418B-89B7-AA36E91E4693"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.86:*:*:*:*:*:*:*", "cpeNameId": "17A55453-113E-4F83-9477-C3B94C21751D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.87:*:*:*:*:*:*:*", "cpeNameId": "64DA4194-F0DF-4AC6-A84F-00718C1D262B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.88:*:*:*:*:*:*:*", "cpeNameId": "19541D86-197B-4F32-9541-1ED6128DD8D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.89:*:*:*:*:*:*:*", "cpeNameId": "08118401-AEBB-4CE7-B76D-3017139D0153"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.90:*:*:*:*:*:*:*", "cpeNameId": "DEC38CAA-D49A-4D73-9E8B-92DD13268405"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.91:*:*:*:*:*:*:*", "cpeNameId": "B8923DAF-E99E-4721-B537-489F9195A78E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.92:*:*:*:*:*:*:*", "cpeNameId": "6979C8A1-9270-4687-9A67-0EDF32FB5003"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.93:*:*:*:*:*:*:*", "cpeNameId": "B30A094A-C263-431D-89B2-B54478A622BA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.94:*:*:*:*:*:*:*", "cpeNameId": "DC1C8AC1-972B-4950-AFAE-B2D68A94E1B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.95:*:*:*:*:*:*:*", "cpeNameId": "62FF165D-2752-4AB8-B3B9-CD8FBFABD3DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.96:*:*:*:*:*:*:*", "cpeNameId": "A0B93A29-FEE2-4EA3-87E8-DF6419F51030"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.97:*:*:*:*:*:*:*", "cpeNameId": "3C34F07E-8DBA-4D82-B8FE-1AFEEF9B2BF9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.98:*:*:*:*:*:*:*", "cpeNameId": "AAB29E6F-C210-4EA2-B2F8-5E1B2041B0B2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.99:*:*:*:*:*:*:*", "cpeNameId": "75652929-F44D-4DF1-8757-F7A8C10D9793"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.100:*:*:*:*:*:*:*", "cpeNameId": "C1AB8FB2-09C2-4A4F-B4EE-E581035E270E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.101:*:*:*:*:*:*:*", "cpeNameId": "0FCB52E4-4EA8-4555-B9A1-EEB1056DC5B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.102:*:*:*:*:*:*:*", "cpeNameId": "57C00F3F-2CEE-4A7F-947F-7A53CA00E52A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.103:*:*:*:*:*:*:*", "cpeNameId": "16CB7735-79B7-4335-8184-6D29A5C85840"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.104:*:*:*:*:*:*:*", "cpeNameId": "8ED9B3BD-8DDA-4465-BF33-9291986917AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.105:*:*:*:*:*:*:*", "cpeNameId": "3400C155-68D5-4DD8-807C-1EF4A4E1BB32"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.106:*:*:*:*:*:*:*", "cpeNameId": "A8B564E7-8A6F-466F-BC53-1B839D9FD3DE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.107:*:*:*:*:*:*:*", "cpeNameId": "F648ABD4-CD53-42CE-9C51-DFBD245FACB4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.108:*:*:*:*:*:*:*", "cpeNameId": "23D39FA8-42FB-43B7-92C7-D831548A0935"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.109:*:*:*:*:*:*:*", "cpeNameId": "5B96FEF9-EE49-4B1F-A218-B141E954CFD2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.110:*:*:*:*:*:*:*", "cpeNameId": "5A3CA9E6-CACE-4937-96F4-B8D45D43AAD2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.111:*:*:*:*:*:*:*", "cpeNameId": "B7084F8D-AD91-4EF1-9901-21AB7E8239CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.112:*:*:*:*:*:*:*", "cpeNameId": "3E544363-B63B-44C1-9F2E-597BE9EF2E65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.113:*:*:*:*:*:*:*", "cpeNameId": "B1C84F8A-2DA9-41BE-872B-B00A297AEA2D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.114:*:*:*:*:*:*:*", "cpeNameId": "6F69AA79-57C2-4B8E-9F8D-5AAFACAD0248"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.115:*:*:*:*:*:*:*", "cpeNameId": "FD6D4727-C95F-4515-8D4A-9D6FDC28C793"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.116:*:*:*:*:*:*:*", "cpeNameId": "01BC52F7-3028-480F-8E37-52A7715AC90A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.117:*:*:*:*:*:*:*", "cpeNameId": "60A7B794-E16E-477D-A4C1-ECA62111DC18"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.118:*:*:*:*:*:*:*", "cpeNameId": "F663FEC6-B040-4A0E-A396-83008CF0ABAB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.119:*:*:*:*:*:*:*", "cpeNameId": "BEFDB30B-BCC5-47F0-B733-2E581725D18A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.120:*:*:*:*:*:*:*", "cpeNameId": "4C86DF14-070B-4C3D-A141-31F7FCA61C34"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.121:*:*:*:*:*:*:*", "cpeNameId": "E3406F7B-D836-49DD-8EFE-AE315BBB19FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.122:*:*:*:*:*:*:*", "cpeNameId": "DB62435E-44D2-471D-BA63-8E6FAE8D278F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.123:*:*:*:*:*:*:*", "cpeNameId": "C28E5075-1E51-43C2-BC69-1E248F152A9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.124:*:*:*:*:*:*:*", "cpeNameId": "76B2228F-19B1-4B9B-9F0F-9DC7CE0DDEFB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.125:*:*:*:*:*:*:*", "cpeNameId": "0B3C0A1E-4727-4E70-8AB9-240A38FA2C5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.126:*:*:*:*:*:*:*", "cpeNameId": "78A85D5F-28F1-456B-A1F2-F73FCDCD8442"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.127:*:*:*:*:*:*:*", "cpeNameId": "07FFD4BD-5B60-41C7-818B-C3AB067ABCF8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.128:*:*:*:*:*:*:*", "cpeNameId": "B2882FB9-CA5D-4C93-BB74-931D3EC95036"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.129:*:*:*:*:*:*:*", "cpeNameId": "1CBF16B6-7148-41A0-8BDF-BAD70ECB2360"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.130:*:*:*:*:*:*:*", "cpeNameId": "F106F4F0-7318-4685-A521-D45D280E0BF8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.131:*:*:*:*:*:*:*", "cpeNameId": "81304DDD-B706-4473-9635-1659080883DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.132:*:*:*:*:*:*:*", "cpeNameId": "EB41A9BB-D88D-49F1-83CD-523699801BF2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.133:*:*:*:*:*:*:*", "cpeNameId": "F8E3204C-6023-4133-9A7F-43F9D2AB144D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.134:*:*:*:*:*:*:*", "cpeNameId": "2A36AD35-A964-4C7A-B1D8-0F78188EE2DE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.135:*:*:*:*:*:*:*", "cpeNameId": "8FAABE9A-8B07-4930-85A9-6616D502F568"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.136:*:*:*:*:*:*:*", "cpeNameId": "9D0664AA-A1FB-4ED3-913B-8390C5192A5A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.137:*:*:*:*:*:*:*", "cpeNameId": "668A5320-81CD-4C09-AE34-9EAAB732DBBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.138:*:*:*:*:*:*:*", "cpeNameId": "3FB2B6F3-F840-47ED-A6BD-2BCA441B6108"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.139:*:*:*:*:*:*:*", "cpeNameId": "9F422368-B0CB-4DD5-BC42-60E4BECD4404"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.140:*:*:*:*:*:*:*", "cpeNameId": "3D3E1A1F-0BED-4FE6-9E2F-745C782AFCB5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.141:*:*:*:*:*:*:*", "cpeNameId": "DACB210F-4E23-4FFE-B706-5889289531D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.142:*:*:*:*:*:*:*", "cpeNameId": "781F8D80-4176-4FC3-9B77-A1BB0C88AC65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.143:*:*:*:*:*:*:*", "cpeNameId": "1F4415C4-3002-4A32-A992-54DC73CAF533"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.144:*:*:*:*:*:*:*", "cpeNameId": "7089C196-FD3C-4675-9BE6-2666C406C5D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.145:*:*:*:*:*:*:*", "cpeNameId": "9590F0EF-8260-4B9F-B66C-3E184AC93E63"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.146:*:*:*:*:*:*:*", "cpeNameId": "4FA1CA12-EB95-48B5-98F3-953859E43ED5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.147:*:*:*:*:*:*:*", "cpeNameId": "ED73D0A6-55DA-4D5B-BA38-9BCD74613827"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.148:*:*:*:*:*:*:*", "cpeNameId": "BD154522-4E63-4FB9-ABC2-77F7850B502B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.149:*:*:*:*:*:*:*", "cpeNameId": "E765B3E4-E2B5-42A5-94AD-5E3D3283B7B2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.150:*:*:*:*:*:*:*", "cpeNameId": "AAC26F5B-06AE-49E2-8FE8-17D01ABD1BEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.151:*:*:*:*:*:*:*", "cpeNameId": "91B291A8-CD84-4201-93AD-4B7981CEBDBC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.152:*:*:*:*:*:*:*", "cpeNameId": "A13E73C3-8219-4909-B7FB-312605EFE682"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.153:*:*:*:*:*:*:*", "cpeNameId": "3439519B-F130-44DB-8EF6-C65A2EF5AF5C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.154:*:*:*:*:*:*:*", "cpeNameId": "B93C5FAB-C686-4B8C-B0D5-20C03F3847DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.155:*:*:*:*:*:*:*", "cpeNameId": "F241AC0B-B446-45F4-9A2E-B4B259F4F173"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.156:*:*:*:*:*:*:*", "cpeNameId": "93A18F08-8AD4-4FD2-9A02-E58939D514FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.157:*:*:*:*:*:*:*", "cpeNameId": "334BC1BD-BCDE-4017-930B-8E2E3685773A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.158:*:*:*:*:*:*:*", "cpeNameId": "27100D3E-E3D1-4917-959E-CF6C9CB4838A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.159:*:*:*:*:*:*:*", "cpeNameId": "E9B9F90B-EDBF-452D-9EED-5906465EC142"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.160:*:*:*:*:*:*:*", "cpeNameId": "4B9782F4-75EF-407A-A270-6B9F10B3AB61"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.161:*:*:*:*:*:*:*", "cpeNameId": "4E536BAB-E89A-4298-A620-65E2EA131D54"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.162:*:*:*:*:*:*:*", "cpeNameId": "0234E459-D46E-4FF6-97A0-78C8D0C1413F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.163:*:*:*:*:*:*:*", "cpeNameId": "5672A718-38DA-42BD-8D94-C44CB7EB5B0D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.164:*:*:*:*:*:*:*", "cpeNameId": "7F359B5A-FC0F-4AC9-B676-EE99B7ACF987"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.165:*:*:*:*:*:*:*", "cpeNameId": "C12A4D9B-491F-4FCD-8F98-ACE8680C3DB9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.166:*:*:*:*:*:*:*", "cpeNameId": "A616B27B-8D52-4876-B9DA-49AE47E47B14"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.167:*:*:*:*:*:*:*", "cpeNameId": "A9FB1FBC-3EAC-4068-95C6-A8449AA30236"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.168:*:*:*:*:*:*:*", "cpeNameId": "56F2978B-DD10-4874-9226-22B3EF53C34A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.169:*:*:*:*:*:*:*", "cpeNameId": "77DCE15B-B6AA-4BFA-9B0E-2A4AA9751AA5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.170:*:*:*:*:*:*:*", "cpeNameId": "5B59BFDD-BD40-46BB-BA2E-0AAD30C6906C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.171:*:*:*:*:*:*:*", "cpeNameId": "2BE79BFF-5683-4CA6-B2C9-6001FD77BC99"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.172:*:*:*:*:*:*:*", "cpeNameId": "50BE4FDF-F0EE-4CC4-837F-576E3E212A2F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.173:*:*:*:*:*:*:*", "cpeNameId": "96A6E180-7005-48FA-A98B-DC22F7815B81"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.174:*:*:*:*:*:*:*", "cpeNameId": "F6CD2092-770F-4F3E-9661-06699D965D76"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.175:*:*:*:*:*:*:*", "cpeNameId": "EBF1E1E4-AD08-4B18-9F12-B4EEE194638D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.176:*:*:*:*:*:*:*", "cpeNameId": "6A0486A1-F99F-4E4B-AC39-C12F5D674339"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.177:*:*:*:*:*:*:*", "cpeNameId": "DF9B41BC-B6C2-48AC-9AEE-67A846D344A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.178:*:*:*:*:*:*:*", "cpeNameId": "C2E8FEC6-59E1-4AF4-94EE-7A676B5A2C82"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.179:*:*:*:*:*:*:*", "cpeNameId": "60FF0BF4-4505-484E-8152-B3514FCF95F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.180:*:*:*:*:*:*:*", "cpeNameId": "5DAFDB50-AB4D-4F94-B465-07D40DA4AFE9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.181:*:*:*:*:*:*:*", "cpeNameId": "4CBFF0C0-9773-47CF-AD66-EE00279272C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.182:*:*:*:*:*:*:*", "cpeNameId": "BB407A40-747A-4CF3-8A14-8296DBB7BF38"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.183:*:*:*:*:*:*:*", "cpeNameId": "1386612C-94AB-4DD6-90F9-23D697BD76FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.184:*:*:*:*:*:*:*", "cpeNameId": "0476CD76-2D3E-45FA-88DB-83DA9330CD85"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.185:*:*:*:*:*:*:*", "cpeNameId": "5964859C-6BA3-4286-B050-83960EF7EF71"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.186:*:*:*:*:*:*:*", "cpeNameId": "CC9E8E7E-93FE-4DB7-AF1B-8F7E63CBA37F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.187:*:*:*:*:*:*:*", "cpeNameId": "223FEF84-695D-44FF-9C33-47F8CBFDD953"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.188:*:*:*:*:*:*:*", "cpeNameId": "0CE412FB-E60A-4DFB-8094-EFBE693FF4A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.189:*:*:*:*:*:*:*", "cpeNameId": "501D8AD1-97D7-49C1-B512-061538B8F73F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.190:*:*:*:*:*:*:*", "cpeNameId": "0A2332E6-CC09-486E-A662-9766D623BF34"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.191:*:*:*:*:*:*:*", "cpeNameId": "EDEFF704-F4A6-4282-9428-DEFEFEB4A93A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.192:*:*:*:*:*:*:*", "cpeNameId": "1181DE8F-7EE2-4EC3-8F84-8B313F65047A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.193:*:*:*:*:*:*:*", "cpeNameId": "78EF3A83-66F1-40F3-9C3C-25AFF40BE88C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.194:*:*:*:*:*:*:*", "cpeNameId": "8D611766-BB3A-4528-B1CE-74CB0EAE4467"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.195:*:*:*:*:*:*:*", "cpeNameId": "0C729423-E12A-4F19-9753-94CE465C6283"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.196:*:*:*:*:*:*:*", "cpeNameId": "8F11E143-CE43-4B63-BE73-0A33CD99110D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.197:*:*:*:*:*:*:*", "cpeNameId": "FEB027DD-E13F-4A38-876F-9AFB1E0BE409"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.198:*:*:*:*:*:*:*", "cpeNameId": "6737850B-DE08-4472-B2C7-F60DCDB95CBE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.199:*:*:*:*:*:*:*", "cpeNameId": "C6EA9B80-7284-47CF-954F-EEA349A002FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.200:*:*:*:*:*:*:*", "cpeNameId": "C33F1CE0-023E-4BD6-A32C-2AD5847A9797"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.201:*:*:*:*:*:*:*", "cpeNameId": "FE090B8A-1060-42D0-BB85-D17C7A299D65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.202:*:*:*:*:*:*:*", "cpeNameId": "7F50D385-2E96-471F-B48A-36C222DED1F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.203:*:*:*:*:*:*:*", "cpeNameId": "243CF5E0-1BA3-4C09-830B-F3E5CAE77985"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.204:*:*:*:*:*:*:*", "cpeNameId": "571B9EE4-5DD5-4B3C-842F-B230D4577C98"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.205:*:*:*:*:*:*:*", "cpeNameId": "55A5490D-D0D4-4F11-80E6-6CF300B18FF8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.206:*:*:*:*:*:*:*", "cpeNameId": "97286FA5-0BCE-42D1-A0D7-1B4AD3F78A31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.207:*:*:*:*:*:*:*", "cpeNameId": "C54631BB-ABC0-4711-A5EE-CCFA9870260F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.208:*:*:*:*:*:*:*", "cpeNameId": "0939F707-4609-42F2-B906-3FC03BBAC7A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.209:*:*:*:*:*:*:*", "cpeNameId": "257E4F1B-512E-4A55-9819-3A0A0EFC431F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.210:*:*:*:*:*:*:*", "cpeNameId": "6214CC75-234D-4219-9F50-28E5D54F6661"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.210-1:*:*:*:*:*:*:*", "cpeNameId": "11E87954-7E16-41C9-A673-08D5FD40B194"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.211:*:*:*:*:*:*:*", "cpeNameId": "F95B5FE1-6964-4158-9066-9B148AA7C8AD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.212:*:*:*:*:*:*:*", "cpeNameId": "E0268D70-A7DC-4B52-AE6F-C459A59F0CF9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.213:*:*:*:*:*:*:*", "cpeNameId": "51275AB0-D417-4CE6-8847-B338B340E913"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.214:*:*:*:*:*:*:*", "cpeNameId": "50D2F1EA-0B29-4FDB-8221-BD3C1A800B1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.215:*:*:*:*:*:*:*", "cpeNameId": "12A80615-D31E-44C9-A367-355599328039"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.216:*:*:*:*:*:*:*", "cpeNameId": "A38157E4-F68B-4E60-AF7E-FD7BF9F0E6A0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.217:*:*:*:*:*:*:*", "cpeNameId": "BC328F65-1554-4FF9-A440-C6A6DC08971F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.218:*:*:*:*:*:*:*", "cpeNameId": "E7E67420-ABB7-4AB3-8A93-EF6DEFFB08CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.219:*:*:*:*:*:*:*", "cpeNameId": "0176C290-5F23-4D25-90E0-CFC2FD39785E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.220:*:*:*:*:*:*:*", "cpeNameId": "D89672F3-3069-4FA7-876C-5486351A4210"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.221:*:*:*:*:*:*:*", "cpeNameId": "1C4FC865-E82F-4AAA-BDB2-48CBAF2CEDDB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.222:*:*:*:*:*:*:*", "cpeNameId": "E9641D38-4E53-4C16-9DCB-1ABEAB859051"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.223:*:*:*:*:*:*:*", "cpeNameId": "7D0DB446-81CF-48A4-8FDF-82DB13F9EEFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.224:*:*:*:*:*:*:*", "cpeNameId": "A36C68E0-7DAF-47AE-84CE-355D19D2A184"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.225:*:*:*:*:*:*:*", "cpeNameId": "1A4AF8D7-ABBC-406D-8A9B-6064D1C0FB3A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.226:*:*:*:*:*:*:*", "cpeNameId": "DB3D137C-BAFE-4A08-A5F6-CF9CE3ECF4BA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.227:*:*:*:*:*:*:*", "cpeNameId": "AE161CD5-8D27-4A12-B17B-D329F43349D6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.228:*:*:*:*:*:*:*", "cpeNameId": "0723CFAE-5DBC-4043-AF8F-0C597B0CEAB3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.229:*:*:*:*:*:*:*", "cpeNameId": "D47DB171-26CB-4971-9D2A-7E6B574DCB33"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.230:*:*:*:*:*:*:*", "cpeNameId": "5FFE79E1-68FA-45D6-81A7-DC9AEA1554EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.231:*:*:*:*:*:*:*", "cpeNameId": "2CF57430-4909-48C5-967D-3DB6853FAAFC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.232:*:*:*:*:*:*:*", "cpeNameId": "6BFB7AAB-A1B4-403E-A26B-F14B8FD509C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.233:*:*:*:*:*:*:*", "cpeNameId": "31E31C3B-F769-4B65-AC62-A281A99ECA2D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.234:*:*:*:*:*:*:*", "cpeNameId": "6CFE18B9-2BF3-4BDA-9A19-9A8F945F039F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.235:*:*:*:*:*:*:*", "cpeNameId": "3EF2F123-9B38-401A-81CD-DCDF786F1FBC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.236:*:*:*:*:*:*:*", "cpeNameId": "0B4E0DD4-C051-4F64-B333-B896B86813D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.237:*:*:*:*:*:*:*", "cpeNameId": "57C1E65F-0E87-4296-B131-25A82A0A9667"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.238:*:*:*:*:*:*:*", "cpeNameId": "2BD9177D-1F32-4B5A-A11F-F779CC665C49"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.239:*:*:*:*:*:*:*", "cpeNameId": "737F1344-63A8-42A5-BD48-891A8E17769A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.240:*:*:*:*:*:*:*", "cpeNameId": "E1BAD9D3-D0F2-42CC-93A3-F5B6A1CEC9D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.241:*:*:*:*:*:*:*", "cpeNameId": "CA99B95F-7BBC-40BE-AA68-6A10CE2C8D4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.242:*:*:*:*:*:*:*", "cpeNameId": "A93EB856-783D-4DF9-8387-0BD4C09F9AD0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.243:*:*:*:*:*:*:*", "cpeNameId": "48503212-F9A6-4AB5-8DE9-374622582C15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.244:*:*:*:*:*:*:*", "cpeNameId": "C8F1F3B2-9299-403A-8118-461511F3F50B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.245:*:*:*:*:*:*:*", "cpeNameId": "197B1275-A4E8-4582-ACE2-4C5C5C8C5474"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.246:*:*:*:*:*:*:*", "cpeNameId": "9B64D972-8C44-4B79-9E76-8ECDEBCEBC0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.247:*:*:*:*:*:*:*", "cpeNameId": "5754042A-B1DB-4AD4-B388-76DE9263DC67"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.248:*:*:*:*:*:*:*", "cpeNameId": "2E8BDAA4-D539-42BA-B41E-4EF7C8979B48"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.249:*:*:*:*:*:*:*", "cpeNameId": "03C647CD-10CD-446B-BE6E-3D76C120F364"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.250:*:*:*:*:*:*:*", "cpeNameId": "2F217035-1A6D-43B9-A24D-6F8990190B31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.251:*:*:*:*:*:*:*", "cpeNameId": "4B197B49-5F9B-4B96-B12A-2B471778F13C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.252:*:*:*:*:*:*:*", "cpeNameId": "2481C266-83AA-4815-8405-7C2734A77FB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.253:*:*:*:*:*:*:*", "cpeNameId": "93A07E06-FA31-4E3F-9DAB-CB3846386198"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.254:*:*:*:*:*:*:*", "cpeNameId": "A1AF307F-312C-4040-8F95-9ED0230288F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.255:*:*:*:*:*:*:*", "cpeNameId": "38C39A6F-9AE7-4CB6-B524-1E1F10665007"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.256:*:*:*:*:*:*:*", "cpeNameId": "97AFE000-934E-495E-90DA-C6B13B3C2585"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.257:*:*:*:*:*:*:*", "cpeNameId": "9A1B0076-9309-4165-84AB-3C627316F802"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.258:*:*:*:*:*:*:*", "cpeNameId": "02108CDE-7848-47AA-AC02-43FF6B596975"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.259:*:*:*:*:*:*:*", "cpeNameId": "1C0EC444-2A66-4716-AC4A-4660ECFC5619"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.260:*:*:*:*:*:*:*", "cpeNameId": "FEE507B5-A54C-4EBD-BD63-4CC37CE9C472"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.261:*:*:*:*:*:*:*", "cpeNameId": "D30AE27B-C292-40B5-9296-B58140B669F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.262:*:*:*:*:*:*:*", "cpeNameId": "381C2F4E-4F46-4C12-9112-0A0F60A2F50E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.263:*:*:*:*:*:*:*", "cpeNameId": "D3492ED4-57AE-495F-9627-20898D0BB155"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.264:*:*:*:*:*:*:*", "cpeNameId": "BC81C283-32BE-483A-8017-C90388AE2515"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.265:*:*:*:*:*:*:*", "cpeNameId": "47C4B68F-6562-41A2-B6BA-1E3C60FA2FA1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.266:*:*:*:*:*:*:*", "cpeNameId": "7DE0121E-5AD4-4D6C-8406-2FB7D997F256"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.267:*:*:*:*:*:*:*", "cpeNameId": "6A265E87-7736-450B-8A3C-93FC8AA776C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.268:*:*:*:*:*:*:*", "cpeNameId": "2640A395-FEBD-4AD6-9FC8-4D8D1A906F80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.269:*:*:*:*:*:*:*", "cpeNameId": "64CF3CC1-31A9-467A-847E-F03C704256C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.270:*:*:*:*:*:*:*", "cpeNameId": "6030D6B8-14B2-476D-9275-AF6F52DD4DD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.271:*:*:*:*:*:*:*", "cpeNameId": "BD41D072-F5AF-42E0-9922-B331CB051449"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.272:*:*:*:*:*:*:*", "cpeNameId": "E0212CDC-E613-4B2A-9B60-16D962136AFF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.273:*:*:*:*:*:*:*", "cpeNameId": "452DD917-1B22-4F9B-A9AA-5FD1F9F2C442"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.274:*:*:*:*:*:*:*", "cpeNameId": "6AD4B227-D8D4-42C9-B310-ADA3F37B72BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.275:*:*:*:*:*:*:*", "cpeNameId": "EFE5E55E-9BCB-44E1-BC58-3DF14B515429"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.276:*:*:*:*:*:*:*", "cpeNameId": "10D3145D-E10C-4590-833C-0AE554FF7897"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.277:*:*:*:*:*:*:*", "cpeNameId": "B01C199E-6C8B-4BFA-9DA9-7B1905680626"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.278:*:*:*:*:*:*:*", "cpeNameId": "762C856E-6757-4DFB-A512-B6F03DDC8929"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.279:*:*:*:*:*:*:*", "cpeNameId": "169A9512-5C6F-478E-B16E-82D181C58A97"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.280:*:*:*:*:*:*:*", "cpeNameId": "F8BC9746-521D-4801-AC1D-66A84A780A65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.281:*:*:*:*:*:*:*", "cpeNameId": "1B8D8A00-4E6C-4CD0-8BC5-6EB8BE73B529"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.282:*:*:*:*:*:*:*", "cpeNameId": "5B93AA93-ABD4-45F5-B571-4CAE3CEC6AF9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.283:*:*:*:*:*:*:*", "cpeNameId": "E46991B0-6A28-4411-AF4A-EAF75291B8A5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.284:*:*:*:*:*:*:*", "cpeNameId": "21984D32-DD5B-488B-83DB-77BD0A122405"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.285:*:*:*:*:*:*:*", "cpeNameId": "D0B6234C-571C-42EE-8FD1-334921F4F502"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.286:*:*:*:*:*:*:*", "cpeNameId": "C969671F-1264-4233-B73B-570A481B64CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.287:*:*:*:*:*:*:*", "cpeNameId": "2053D2FF-B750-4B7E-BDFA-2A0F276F15C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.288:*:*:*:*:*:*:*", "cpeNameId": "B221B69F-8204-49BA-8AF4-AFF146D46FB8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.289:*:*:*:*:*:*:*", "cpeNameId": "C8142E09-6E61-4652-A9DA-38072F891A96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.290:*:*:*:*:*:*:*", "cpeNameId": "A534AF2A-A909-45A6-B7E3-A4B2F782CC92"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.291:*:*:*:*:*:*:*", "cpeNameId": "53B57317-723A-4E6B-AAB3-71676106E4CC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.292:*:*:*:*:*:*:*", "cpeNameId": "15CCD6EA-C7F2-47C2-82F4-52F075759660"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.293:*:*:*:*:*:*:*", "cpeNameId": "F1E6DE51-B3AA-4790-A531-9AE7F458DEB1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.294:*:*:*:*:*:*:*", "cpeNameId": "DAEAC0AB-0B68-4970-987B-C7670A6BD22E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.295:*:*:*:*:*:*:*", "cpeNameId": "3187B482-8D58-434C-8E34-EF7AF68AB006"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.296:*:*:*:*:*:*:*", "cpeNameId": "FDE4B426-ED64-449F-9B09-0CD8EA2FFD26"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.297:*:*:*:*:*:*:*", "cpeNameId": "998E67F4-C650-4407-9C7C-339B164FCD92"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.298:*:*:*:*:*:*:*", "cpeNameId": "60CE826D-94F2-441E-A37E-85C4FCD86554"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.299:*:*:*:*:*:*:*", "cpeNameId": "3D327ABE-B8D3-4496-9A9C-62C030CC90D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.300:*:*:*:*:*:*:*", "cpeNameId": "51E9D896-6DD7-4163-81B4-3F44CAD9A2C2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.301:*:*:*:*:*:*:*", "cpeNameId": "D1D112AB-4F07-4CD9-94D4-185B7830316F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.302:*:*:*:*:*:*:*", "cpeNameId": "9BBA920A-1DC4-48A6-B0B6-E31D342537FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.303:*:*:*:*:*:*:*", "cpeNameId": "B039FA99-E67A-409B-A18E-E6BD888E7439"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.304:*:*:*:*:*:*:*", "cpeNameId": "55859E55-03E7-4B8A-BDF6-31710F02863F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.305:*:*:*:*:*:*:*", "cpeNameId": "5ECFC1EA-4DCB-4381-8066-52D9EF210ED7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.306:*:*:*:*:*:*:*", "cpeNameId": "F85A14FE-ADE4-44AB-9DB7-E2D9BE784326"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.307:*:*:*:*:*:*:*", "cpeNameId": "31BE7E06-85C8-422D-945A-0699DDCDD577"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.308:*:*:*:*:*:*:*", "cpeNameId": "394979DD-B2FE-4F43-A635-4BA1953944CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.309:*:*:*:*:*:*:*", "cpeNameId": "079C35C6-0C73-475F-B35D-BAA4318FAB25"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.310:*:*:*:*:*:*:*", "cpeNameId": "85C1B276-0232-4F9E-BCB1-271209082177"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.311:*:*:*:*:*:*:*", "cpeNameId": "5DE9B94E-2F63-48F3-9EE3-29F97357808B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.312:*:*:*:*:*:*:*", "cpeNameId": "472662F2-3E14-450F-A806-E44B1B6C57C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.313:*:*:*:*:*:*:*", "cpeNameId": "4151B004-BFC1-434B-8DD7-7D6857831591"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.314:*:*:*:*:*:*:*", "cpeNameId": "5EB1843D-66B2-4766-B25D-291A2DD4B43F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.315:*:*:*:*:*:*:*", "cpeNameId": "5AC67AE7-DE1E-4329-9E98-1266CDFDCD3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.316:*:*:*:*:*:*:*", "cpeNameId": "665EDCA8-FBE2-48C3-B2A2-E44620F9321A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.317:*:*:*:*:*:*:*", "cpeNameId": "53E4605F-2DAF-436F-9B66-5C9483E4B0F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.318:*:*:*:*:*:*:*", "cpeNameId": "19FF749F-D1B2-4608-A238-B6FD9202A31E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.319:*:*:*:*:*:*:*", "cpeNameId": "D160B5B1-B754-4FD1-ABBE-5CF8AC941935"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.320:*:*:*:*:*:*:*", "cpeNameId": "442FB5A9-9102-48F4-B63A-684FAFCEEF6C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.321:*:*:*:*:*:*:*", "cpeNameId": "34EB7DA8-8A3B-4710-B39F-268F72709105"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.322:*:*:*:*:*:*:*", "cpeNameId": "EC519279-B76A-42BE-B6CB-8C0418032372"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.323:*:*:*:*:*:*:*", "cpeNameId": "3F56BE42-4A5B-4EED-B538-EB93D1692BD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.324:*:*:*:*:*:*:*", "cpeNameId": "CD51D183-BC77-4CA5-B961-ED0F3C008967"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.325:*:*:*:*:*:*:*", "cpeNameId": "F160C172-25E9-49B4-A253-58D8E6AE0914"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.326:*:*:*:*:*:*:*", "cpeNameId": "7B3900FD-154B-4A5B-9A6B-5609E9113274"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.327:*:*:*:*:*:*:*", "cpeNameId": "EA753912-D612-4583-9A1A-3DAA2466D1D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.328:*:*:*:*:*:*:*", "cpeNameId": "8F78B7BB-07DA-4FD5-97CB-2A1C3B38ADA9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.329:*:*:*:*:*:*:*", "cpeNameId": "5D01F5BD-260A-45C9-A220-1B1F1ED05BAC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.330:*:*:*:*:*:*:*", "cpeNameId": "4757B741-0579-4F0D-93B6-4152C0ACEDE7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.331:*:*:*:*:*:*:*", "cpeNameId": "49CB08ED-A588-4C13-AF4E-B76BA560B121"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.332:*:*:*:*:*:*:*", "cpeNameId": "B235999E-D6AC-40F3-84C5-8CB6F78213C9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.333:*:*:*:*:*:*:*", "cpeNameId": "A1FD2FA3-E019-47DA-B601-7CF78944A798"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.334:*:*:*:*:*:*:*", "cpeNameId": "EB3381CD-67DB-4D53-BDEE-811E30F95A1A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.335:*:*:*:*:*:*:*", "cpeNameId": "4E77A679-0C67-4691-B514-917657B01A5A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.336:*:*:*:*:*:*:*", "cpeNameId": "16E4641A-47F6-442F-AE88-17E4B987E3CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.337:*:*:*:*:*:*:*", "cpeNameId": "641CDB5F-54CC-425A-B656-9A9B58A08FBF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10:*:*:*:*:*:*:*", "cpeNameId": "801F7D56-009B-4A66-A380-891D1C09EC0E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10:-:*:*:*:*:*:*", "cpeNameId": "737F8B22-35BD-4355-8726-CAB10284B0F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10:rc1:*:*:*:*:*:*", "cpeNameId": "378C4500-0CC7-4110-8E02-B8B89064CB59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10:rc2:*:*:*:*:*:*", "cpeNameId": "C3B39C83-E8E1-4DA7-8251-F2092C6B05D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10:rc3:*:*:*:*:*:*", "cpeNameId": "78D16190-2359-4F43-9816-2080B1827AC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10:rc4:*:*:*:*:*:*", "cpeNameId": "B8C99710-34D3-4AB2-B2D2-09F4B84AE4E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10:rc5:*:*:*:*:*:*", "cpeNameId": "4322E527-2823-41C7-85A2-7B41C74EAC58"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.1:*:*:*:*:*:*:*", "cpeNameId": "9C33CAE9-C906-493D-AE83-630F775358ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.2:*:*:*:*:*:*:*", "cpeNameId": "8F61A3BF-4522-4622-947D-00D359B55176"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.3:*:*:*:*:*:*:*", "cpeNameId": "1EB67AD1-84CA-4A13-838D-BCCA096F8A43"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.4:*:*:*:*:*:*:*", "cpeNameId": "F0EF9085-D82D-451F-B3AF-70E38633405F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.5:*:*:*:*:*:*:*", "cpeNameId": "13FE2FB3-6377-4579-8372-ED7D7601F139"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.6:*:*:*:*:*:*:*", "cpeNameId": "CAD06591-0516-4D81-B575-F6C582AFFDEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.7:*:*:*:*:*:*:*", "cpeNameId": "02EB240A-C24B-44BD-86EA-60D23F353699"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.8:*:*:*:*:*:*:*", "cpeNameId": "7F10C5D0-46D5-462D-8ADC-2E4E5916E34D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.9:*:*:*:*:*:*:*", "cpeNameId": "2FAAEF0C-02F6-4CB5-8452-2ADB5F96602C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.10:*:*:*:*:*:*:*", "cpeNameId": "597FA1BA-E530-477E-8B32-7A767ABD9779"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.11:*:*:*:*:*:*:*", "cpeNameId": "BB2F91B5-234B-4006-B083-4DCB240C7735"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.12:*:*:*:*:*:*:*", "cpeNameId": "86A9E5EB-A7B2-4551-96C3-D2F96B8807EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.13:*:*:*:*:*:*:*", "cpeNameId": "07E25F8D-B2C9-4E32-8DB7-B0B700EF87B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.14:*:*:*:*:*:*:*", "cpeNameId": "B72B8BC5-A491-423C-B3B3-49C3878062F4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.15:*:*:*:*:*:*:*", "cpeNameId": "92F730C1-4118-47C8-8077-34E9367D198C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.16:*:*:*:*:*:*:*", "cpeNameId": "340A6F80-AECA-45F2-A8C0-E75A51ADEB17"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.17:*:*:*:*:*:*:*", "cpeNameId": "5245DF5B-3563-44B6-B5AD-9E7AC85D8CE9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:*:*:*:*:*:*:*", "cpeNameId": "7DAEC1AA-D9DB-4969-8835-19DE5562750C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:-:*:*:*:*:*:*", "cpeNameId": "53233DB2-D8A4-4392-B5B9-43F109778BC0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:rc1:*:*:*:*:*:*", "cpeNameId": "F67207B1-581C-4560-A1BA-FBCC51A59367"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:rc2:*:*:*:*:*:*", "cpeNameId": "FBAE195B-6447-49D4-AAAA-D595A811677F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:rc3:*:*:*:*:*:*", "cpeNameId": "0491309A-660F-444C-89A9-FFE1FA1A9B79"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:rc4:*:*:*:*:*:*", "cpeNameId": "35274394-863C-4A7D-9EFB-B49A5900A33C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:rc5:*:*:*:*:*:*", "cpeNameId": "5779025A-A7C7-40BE-840B-EE69D3D1BE62"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:rc6:*:*:*:*:*:*", "cpeNameId": "0E052BC2-1D38-4E80-9D23-889E827E597C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:rc7:*:*:*:*:*:*", "cpeNameId": "DF4B5805-B18E-4733-9A8B-135508008D0A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.1:*:*:*:*:*:*:*", "cpeNameId": "0A040921-C942-4FE5-A49A-A55F24A8D54C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.2:*:*:*:*:*:*:*", "cpeNameId": "97AF733F-A86E-41A1-832C-CC20306F11FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.3:*:*:*:*:*:*:*", "cpeNameId": "5CC1CF35-345D-45F8-BF5C-6B9C6B9696B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.4:*:*:*:*:*:*:*", "cpeNameId": "137C1EF2-A31B-431E-8F29-546D88139D13"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.5:*:*:*:*:*:*:*", "cpeNameId": "BD008082-6870-4CE0-BC04-1001F619E011"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.6:*:*:*:*:*:*:*", "cpeNameId": "E4F8E539-321B-4263-BB4B-20AAF31088D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.7:*:*:*:*:*:*:*", "cpeNameId": "A93CF5C7-A951-446B-ADFD-4A099F87A003"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.8:*:*:*:*:*:*:*", "cpeNameId": "32373BAD-CD72-44AE-883B-2AAD48A81497"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.9:*:*:*:*:*:*:*", "cpeNameId": "D22968FC-60EE-4D07-B61E-8216515FDA3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.10:*:*:*:*:*:*:*", "cpeNameId": "278604F1-EE00-4BCD-8B4F-D52B1E83CC03"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.11:*:*:*:*:*:*:*", "cpeNameId": "C182B41E-1285-49CD-8537-F2B2BE11E5A6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.12:*:*:*:*:*:*:*", "cpeNameId": "AEDE877D-D8A5-4365-9354-355C5BDBF8D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12:*:*:*:*:*:*:*", "cpeNameId": "0975E1F0-0E5F-445B-BBAC-66294DC99443"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12:-:*:*:*:*:*:*", "cpeNameId": "DF7473CD-B405-4E90-9185-B9E682AB2EA8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12:rc1:*:*:*:*:*:*", "cpeNameId": "3704C17E-765C-494D-ABF4-6687AD9DCA2B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12:rc2:*:*:*:*:*:*", "cpeNameId": "576FB04F-8AE6-459C-B9B7-4B161AA533C9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12:rc3:*:*:*:*:*:*", "cpeNameId": "D1CC9AD0-BCFB-47FF-A991-F2D8D4241D7A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12:rc4:*:*:*:*:*:*", "cpeNameId": "5B131271-8353-4F4D-A802-6231F77D62F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12:rc5:*:*:*:*:*:*", "cpeNameId": "3871B8EE-EE4B-43DD-9B39-DAE15494AEF2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12:rc6:*:*:*:*:*:*", "cpeNameId": "2F22DBF5-138B-4E06-97A9-D48EE51DAD9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.1:*:*:*:*:*:*:*", "cpeNameId": "69B0A1AF-BDD2-4852-B63D-E4BF55573CAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.2:*:*:*:*:*:*:*", "cpeNameId": "654BD99C-D40D-4573-A72F-D135048F0BD6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.3:*:*:*:*:*:*:*", "cpeNameId": "2DFD73EB-B731-43EF-A6D9-0777823AA9ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.4:*:*:*:*:*:*:*", "cpeNameId": "50296B03-0A9B-497E-85CE-EDBABB8603B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.5:*:*:*:*:*:*:*", "cpeNameId": "184D3B86-723B-43AE-9B33-91CAD47275F7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.6:*:*:*:*:*:*:*", "cpeNameId": "2538F421-8C36-4DA8-8D4A-20811D6843BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.7:*:*:*:*:*:*:*", "cpeNameId": "E8D1E4A0-A0B2-4B0B-988F-984BF74D3B99"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.8:*:*:*:*:*:*:*", "cpeNameId": "43B25D3D-1D5D-4E14-A5CE-69FB57B0230D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.9:*:*:*:*:*:*:*", "cpeNameId": "BD4E83AA-561D-49FA-9703-CFF03AA235A3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.10:*:*:*:*:*:*:*", "cpeNameId": "109315CC-209F-40BF-A5E1-C307A1F780DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.11:*:*:*:*:*:*:*", "cpeNameId": "69494478-22B3-4371-B7C7-0558CDD786C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.12:*:*:*:*:*:*:*", "cpeNameId": "56632064-D578-4D87-9DF8-C06F096ABDFC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.13:*:*:*:*:*:*:*", "cpeNameId": "97C936CC-FC5C-4A0B-9F4A-BC253561E90D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.14:*:*:*:*:*:*:*", "cpeNameId": "0C13DFDE-0149-4EB6-9BA0-F62AC6FE5586"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13:*:*:*:*:*:*:*", "cpeNameId": "63D7AE43-6B91-47A7-9E3E-58B08ACEE5CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13:-:*:*:*:*:*:*", "cpeNameId": "94A3FF49-65AE-46A5-AF47-00094F5AF3E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13:rc1:*:*:*:*:*:*", "cpeNameId": "C5C9AA2D-4C67-496E-AE87-863FA0E9B8CE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13:rc2:*:*:*:*:*:*", "cpeNameId": "25E5D931-E147-4A6A-AD81-9AF12D4DCAB6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13:rc3:*:*:*:*:*:*", "cpeNameId": "853B280B-EC80-4D50-8494-0D3FBEF98F78"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13:rc4:*:*:*:*:*:*", "cpeNameId": "823B55ED-26FF-4111-A479-E477AAE70FF1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13:rc5:*:*:*:*:*:*", "cpeNameId": "8B7F3844-CA39-422C-8449-06CF8AD6672B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13:rc6:*:*:*:*:*:*", "cpeNameId": "9ECB08C7-B61F-415B-8091-4F5B47F8085F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.1:*:*:*:*:*:*:*", "cpeNameId": "226B0AC1-B943-40C0-8426-4BB9B25A2FBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.2:*:*:*:*:*:*:*", "cpeNameId": "101CC84F-1E9F-4945-AC58-F1A89AC868FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.3:*:*:*:*:*:*:*", "cpeNameId": "943EB2FE-E2B5-4056-8432-2E21A07AAE5A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.4:*:*:*:*:*:*:*", "cpeNameId": "30F2FA91-0299-4CF0-904F-CEB63D8421F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.5:*:*:*:*:*:*:*", "cpeNameId": "8A5862FC-697A-49B3-B018-683F56E40C33"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.6:*:*:*:*:*:*:*", "cpeNameId": "9907DA49-FBB8-4EA6-A3D3-D395343A6635"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.7:*:*:*:*:*:*:*", "cpeNameId": "2928EAC1-58D0-4D06-9080-D744192ED843"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.8:*:*:*:*:*:*:*", "cpeNameId": "69790995-A09C-4859-B6AF-6FD626D2F615"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.9:*:*:*:*:*:*:*", "cpeNameId": "AD833379-4556-4DFD-A670-98EE76636A5B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.10:*:*:*:*:*:*:*", "cpeNameId": "1D010FB8-D849-4388-8D10-74F4D6F59D3C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.11:*:*:*:*:*:*:*", "cpeNameId": "F659B20D-E773-4DEA-86E5-9914230B1A15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.12:*:*:*:*:*:*:*", "cpeNameId": "B779CDC3-8957-4B5C-8D66-00A277A1B3F4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.13:*:*:*:*:*:*:*", "cpeNameId": "EAC315D4-E0E0-41C8-A95B-AB5E895BFBBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.14:*:*:*:*:*:*:*", "cpeNameId": "1819E47A-069B-419A-8EF6-C9313A397178"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.15:*:*:*:*:*:*:*", "cpeNameId": "027145FE-2731-49DA-86A8-1D2FBC9FB086"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.16:*:*:*:*:*:*:*", "cpeNameId": "ECD3B257-E717-4928-B0C1-A784E553B3E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14:*:*:*:*:*:*:*", "cpeNameId": "A931E9A5-97C5-409C-A3BA-5FEC11A2C622"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.1:*:*:*:*:*:*:*", "cpeNameId": "C5A24D81-DC61-4E8E-A883-70A89D049530"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.2:*:*:*:*:*:*:*", "cpeNameId": "4E26113D-F6B7-453F-9387-E01F3FB22E21"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.3:*:*:*:*:*:*:*", "cpeNameId": "814EF758-607B-40CC-BE23-CE70074F76CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.4:*:*:*:*:*:*:*", "cpeNameId": "6720BFE9-C0EE-48BF-9DF5-EF2216114FA3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.5:*:*:*:*:*:*:*", "cpeNameId": "6AF9B2CB-A700-4D4B-99BD-68F8B1B60D27"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.6:*:*:*:*:*:*:*", "cpeNameId": "9FB8CFED-3C93-41CD-AA03-2B6383630B83"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.7:*:*:*:*:*:*:*", "cpeNameId": "2A024E18-8E2D-43F7-953C-15A11490F277"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.8:*:*:*:*:*:*:*", "cpeNameId": "B316EADE-3506-4B78-84D7-59222A7EA27C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.9:*:*:*:*:*:*:*", "cpeNameId": "22C19B12-730A-4C18-9414-277A199CDB44"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.10:*:*:*:*:*:*:*", "cpeNameId": "1C9ACEF0-E248-4B66-AF0C-F323FF758671"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.11:*:*:*:*:*:*:*", "cpeNameId": "CFE32D5E-B63B-4BBD-AF35-835F694D1946"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.12:*:*:*:*:*:*:*", "cpeNameId": "51A5C92D-0CAD-4718-8BD9-70AD3BF3ED1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.13:*:*:*:*:*:*:*", "cpeNameId": "70614E00-337E-4E52-9FD8-20E1C106B5DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.14:*:*:*:*:*:*:*", "cpeNameId": "6930B9C7-4CC9-4DCA-B201-2D9E690BFE80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.15:*:*:*:*:*:*:*", "cpeNameId": "9B2631F3-F6FE-4791-823F-695BE2F12D47"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.16:*:*:*:*:*:*:*", "cpeNameId": "092E3E03-A335-4443-8BED-47DDB83C5FA0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.17:*:*:*:*:*:*:*", "cpeNameId": "36D93C96-FC7E-4D4F-883E-3AF5A2FA3000"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.18:*:*:*:*:*:*:*", "cpeNameId": "7A290C14-ED57-4B9F-91FF-0FC4AAC9A1F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.19:*:*:*:*:*:*:*", "cpeNameId": "A8688970-830A-43D1-B07D-6013A971EC79"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.20:*:*:*:*:*:*:*", "cpeNameId": "17B788D0-A567-43B8-82A9-8FF9366015A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.21:*:*:*:*:*:*:*", "cpeNameId": "78A2B7F8-B9DE-4C98-A44D-EF1B61256567"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.22:*:*:*:*:*:*:*", "cpeNameId": "72C09BB8-DCC8-45E8-B7B5-993CFE154338"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.23:*:*:*:*:*:*:*", "cpeNameId": "D4585EAB-400F-4EDF-9DED-1F8CBD5B744F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.24:*:*:*:*:*:*:*", "cpeNameId": "FEFD7885-1EE8-416D-B7FE-8E11083ED450"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.25:*:*:*:*:*:*:*", "cpeNameId": "62184EBD-8376-48E6-BDA6-33DA7DA4DE55"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.26:*:*:*:*:*:*:*", "cpeNameId": "4E0A62E4-D6E6-472F-B7EB-0863D2CB2043"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.27:*:*:*:*:*:*:*", "cpeNameId": "B36914F3-9F0C-48F1-B721-8451FA606F40"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.28:*:*:*:*:*:*:*", "cpeNameId": "5406494D-C3A0-424C-A739-DF138E8457FA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.29:*:*:*:*:*:*:*", "cpeNameId": "2E069436-B02E-4F1D-BBFF-7C67DCBB1978"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.30:*:*:*:*:*:*:*", "cpeNameId": "0C8564AC-CE4D-4B8F-8588-CB6F8162FC34"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.31:*:*:*:*:*:*:*", "cpeNameId": "08176301-EEF5-439E-99BF-EB6055095F3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.32:*:*:*:*:*:*:*", "cpeNameId": "5050DE72-C59B-428C-B676-CD6A69950413"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.33:*:*:*:*:*:*:*", "cpeNameId": "6EF37D93-2185-4C48-932B-64AE54920BF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.34:*:*:*:*:*:*:*", "cpeNameId": "CD6EEA39-F27B-4E2F-ABF7-B979F9A60D16"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.35:*:*:*:*:*:*:*", "cpeNameId": "9601934D-422D-478C-932B-0B723ECF1AC8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.36:*:*:*:*:*:*:*", "cpeNameId": "117B9343-7A2A-4CF2-A3FC-5CF339397B49"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.37:*:*:*:*:*:*:*", "cpeNameId": "3DAF6A51-D407-4CAF-A800-E8C601AF7A88"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.38:*:*:*:*:*:*:*", "cpeNameId": "D818B0AA-263A-4AD4-8F30-D01F9F103771"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.39:*:*:*:*:*:*:*", "cpeNameId": "19410F95-E22A-4EA0-A64F-7334B338C559"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.40:*:*:*:*:*:*:*", "cpeNameId": "4C39B4AE-1893-4D41-A20B-E4DA4F05B12E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.41:*:*:*:*:*:*:*", "cpeNameId": "9E6243E5-7BAA-4061-BA98-AE3335BA90DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.42:*:*:*:*:*:*:*", "cpeNameId": "5289A6EE-1D01-4F96-806C-1843A14FDEF2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.43:*:*:*:*:*:*:*", "cpeNameId": "9ABCDB72-25A8-46CD-A422-35ADA558EF68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.44:*:*:*:*:*:*:*", "cpeNameId": "574EC3B6-21A3-47E9-9858-3CA9EF533E67"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.45:*:*:*:*:*:*:*", "cpeNameId": "38485FA4-4F72-4663-A066-8D01D3863321"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.46:*:*:*:*:*:*:*", "cpeNameId": "764D933F-58C1-48E3-9907-B0DDE1A4F8AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.47:*:*:*:*:*:*:*", "cpeNameId": "AE54A178-E51B-452A-9C64-DA3A3CC946AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.48:*:*:*:*:*:*:*", "cpeNameId": "B535E7F9-6273-497C-8D1E-27FC9FAECD72"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.49:*:*:*:*:*:*:*", "cpeNameId": "83203827-63F4-47AE-A1CA-217858D53769"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.50:*:*:*:*:*:*:*", "cpeNameId": "194931EE-DDB3-420C-9AF7-EC5AFD5D6E28"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.51:*:*:*:*:*:*:*", "cpeNameId": "6DBC9273-6F1D-497F-9664-184028BD6B4D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.52:*:*:*:*:*:*:*", "cpeNameId": "214855D8-7634-45D4-B464-65EDD37AF850"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.53:*:*:*:*:*:*:*", "cpeNameId": "67B2569B-44C2-4049-BDA4-2E773A4E29F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.54:*:*:*:*:*:*:*", "cpeNameId": "9EBDE6FE-5FF2-4F2D-B58A-25094E85BFB1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.55:*:*:*:*:*:*:*", "cpeNameId": "D0B5F04E-862B-490F-8305-60B811F4E6F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.56:*:*:*:*:*:*:*", "cpeNameId": "B668AD3F-F0E8-4A26-879B-046F18DD8A36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.57:*:*:*:*:*:*:*", "cpeNameId": "E16FC742-4DBD-4DB4-B969-9C064D464FE5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.58:*:*:*:*:*:*:*", "cpeNameId": "8B062B81-0F55-4FF6-B94C-C877DFA0E50B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.59:*:*:*:*:*:*:*", "cpeNameId": "3CEEC1DF-CF5C-4C9D-ADB4-671659A81424"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.60:*:*:*:*:*:*:*", "cpeNameId": "25D77D6D-411A-415B-9B4C-71C7DA916873"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.61:*:*:*:*:*:*:*", "cpeNameId": "65E712DB-951C-492B-A315-827459B80E5E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.62:*:*:*:*:*:*:*", "cpeNameId": "F11F0C93-C51B-4199-B8B7-D7B81A103E8C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.63:*:*:*:*:*:*:*", "cpeNameId": "35923443-2E09-4624-9DEE-9ACF12EAB448"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.64:*:*:*:*:*:*:*", "cpeNameId": "205E064B-A0B3-4DC9-A4F9-FA48BB6D7666"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.65:*:*:*:*:*:*:*", "cpeNameId": "B0E66BBD-FF9B-4FE2-955E-363B2426AAA4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.66:*:*:*:*:*:*:*", "cpeNameId": "65FADA8B-3BAE-4B74-805D-40121FF01EAF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.67:*:*:*:*:*:*:*", "cpeNameId": "8796300B-8BBD-4767-B13C-A04AA0BB6FEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.68:*:*:*:*:*:*:*", "cpeNameId": "EA1F0EFF-1D54-4D41-8791-38459690E25B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.69:*:*:*:*:*:*:*", "cpeNameId": "609603AF-3EA9-4959-BF95-65681DD73429"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.70:*:*:*:*:*:*:*", "cpeNameId": "626D150A-609E-46A3-9B99-2B5517D68FCF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.71:*:*:*:*:*:*:*", "cpeNameId": "54045011-3CF7-4D72-B47A-67352BD27C9B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.72:*:*:*:*:*:*:*", "cpeNameId": "A4A18A3C-C9E0-4640-A815-B4F19017E986"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.73:*:*:*:*:*:*:*", "cpeNameId": "101552E2-98D5-490C-8507-D8F3CD5E74CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.74:*:*:*:*:*:*:*", "cpeNameId": "306A3E6C-2907-416C-966D-810515DBCCCB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.75:*:*:*:*:*:*:*", "cpeNameId": "BAAF7099-2145-41D0-8529-A6065254637F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.76:*:*:*:*:*:*:*", "cpeNameId": "DDCDF175-DC63-49EC-A7AD-9BFEFE5527E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.77:*:*:*:*:*:*:*", "cpeNameId": "38B40852-28A0-490F-B4DC-3980A9C5B421"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.78:*:*:*:*:*:*:*", "cpeNameId": "6E17FF7C-84D2-4931-992C-A5E7ED78834F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.79:*:*:*:*:*:*:*", "cpeNameId": "BB0E9999-4D82-493C-98BB-FE9D9A569DED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.80:*:*:*:*:*:*:*", "cpeNameId": "4AC211FC-04A6-4405-9635-D73ECD955418"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.81:*:*:*:*:*:*:*", "cpeNameId": "92E16615-DDD7-4E66-8BF6-BAA740D2F0C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.82:*:*:*:*:*:*:*", "cpeNameId": "F7A93940-0210-4AD1-B8DD-329E01CF07C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.83:*:*:*:*:*:*:*", "cpeNameId": "31B6D10B-87F4-4EDC-B7B1-FD01674BF26E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.84:*:*:*:*:*:*:*", "cpeNameId": "4275466A-03C1-421C-A4B0-21B518067550"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.85:*:*:*:*:*:*:*", "cpeNameId": "CA858139-E95A-4FEE-B89B-63F8951AC6C5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.86:*:*:*:*:*:*:*", "cpeNameId": "E4F4C982-7F3B-45B2-84AB-3A0EA7B17608"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.87:*:*:*:*:*:*:*", "cpeNameId": "2343FBFC-440A-404C-BFBA-0C17D3A7A7DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.88:*:*:*:*:*:*:*", "cpeNameId": "D7E1A205-815C-4D28-8BA2-9BC9500AD4A7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.89:*:*:*:*:*:*:*", "cpeNameId": "39F2F19A-FB5E-4866-BAE2-356D068B45BA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.90:*:*:*:*:*:*:*", "cpeNameId": "50AD92DB-6E21-4AA8-9E00-052B90A9965E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.91:*:*:*:*:*:*:*", "cpeNameId": "F8DE7403-3DFA-4DEE-8780-A0DA10BF9528"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.92:*:*:*:*:*:*:*", "cpeNameId": "39EF80A8-F19C-4BE8-8D66-7C5CD424B4D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.93:*:*:*:*:*:*:*", "cpeNameId": "E5500E0F-C99A-4502-99E6-7981CA795BF2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.94:*:*:*:*:*:*:*", "cpeNameId": "74932CAC-8FBF-4367-9392-6D00F8FFFB99"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.95:*:*:*:*:*:*:*", "cpeNameId": "8101D71E-8866-4E44-879C-0C5B12D7EBE7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.96:*:*:*:*:*:*:*", "cpeNameId": "E3C79F48-C929-4535-A410-136A4CC98F26"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.97:*:*:*:*:*:*:*", "cpeNameId": "1BD7D338-728B-43EB-91A4-6827CD29192C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.98:*:*:*:*:*:*:*", "cpeNameId": "86B2C93A-A003-4AAA-AE7C-CD209F2063B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.99:*:*:*:*:*:*:*", "cpeNameId": "6A43476F-D00F-4E25-8FAC-647EEE0EDFF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.100:*:*:*:*:*:*:*", "cpeNameId": "4E019C3A-D2DB-457F-A70E-5E03CCA91476"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.101:*:*:*:*:*:*:*", "cpeNameId": "A73A2FC0-DC50-499F-A148-78FA51F8D760"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.102:*:*:*:*:*:*:*", "cpeNameId": "127E7A89-5961-457D-8BF7-4164707E025E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.103:*:*:*:*:*:*:*", "cpeNameId": "388373C0-5D21-45F9-BF7E-5E60B4E7318F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.104:*:*:*:*:*:*:*", "cpeNameId": "3B19EA98-6B97-4A3A-B3B0-DC182A51617F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.105:*:*:*:*:*:*:*", "cpeNameId": "EAF98B09-69E7-48C1-8B69-3AD3E29E5A2E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.106:*:*:*:*:*:*:*", "cpeNameId": "A2582828-CCCE-4D12-85D5-3A1F343C7E00"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.107:*:*:*:*:*:*:*", "cpeNameId": "AD5EA444-4A0C-4A51-A8BE-F15FE36EE0C5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.108:*:*:*:*:*:*:*", "cpeNameId": "F94B9FE0-697B-41B7-B791-B9A0C4D86168"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.109:*:*:*:*:*:*:*", "cpeNameId": "4F0FBDC5-4177-425F-ADF6-C57C3DCA5D4D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.110:*:*:*:*:*:*:*", "cpeNameId": "2D6859E3-FCB4-477E-845A-80388AC62521"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.111:*:*:*:*:*:*:*", "cpeNameId": "E63E0425-D6C3-4773-A69C-D9033B050A0E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.112:*:*:*:*:*:*:*", "cpeNameId": "B5B44EDD-66B1-47B4-BAAE-38DE4AECC0A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.113:*:*:*:*:*:*:*", "cpeNameId": "2F7F63C6-E1D8-40B9-A3BE-99A553814F5A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.114:*:*:*:*:*:*:*", "cpeNameId": "A3653829-0B32-4838-90F0-B2CCC32580DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.115:*:*:*:*:*:*:*", "cpeNameId": "758316DC-FEB4-4F05-994B-AE0A555D7AEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.116:*:*:*:*:*:*:*", "cpeNameId": "CEA596C8-E6AD-4C8C-BF8F-FEBF1BF73E80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.117:*:*:*:*:*:*:*", "cpeNameId": "D09DC33D-889B-4BA3-8311-057DCB5EB7D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.118:*:*:*:*:*:*:*", "cpeNameId": "446206CE-87D2-402D-8451-4F63D75B6CB6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.119:*:*:*:*:*:*:*", "cpeNameId": "CF788798-2DF1-4253-AA76-8B021DB84887"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.120:*:*:*:*:*:*:*", "cpeNameId": "7A8CE9D2-54CD-4BDA-AF50-12C170DC6E2E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.121:*:*:*:*:*:*:*", "cpeNameId": "08EAEBAF-0EC2-48A1-9B20-586269492003"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.122:*:*:*:*:*:*:*", "cpeNameId": "7E12FC79-A932-4613-A0E6-6E78D0916FC4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.123:*:*:*:*:*:*:*", "cpeNameId": "CEC4835E-515C-49EA-93A4-45ED21306EC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.124:*:*:*:*:*:*:*", "cpeNameId": "B8B08C25-A0CC-4BCB-BCC8-DF667EE56E09"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.125:*:*:*:*:*:*:*", "cpeNameId": "9FE63906-4FDE-46B8-A606-E814C0F6F44B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.126:*:*:*:*:*:*:*", "cpeNameId": "18D0E785-E281-4C1B-AAAB-1941B6652595"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.127:*:*:*:*:*:*:*", "cpeNameId": "F885AC80-EECE-4DD5-8FFB-6F71501CF7A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.128:*:*:*:*:*:*:*", "cpeNameId": "E98D93BF-9F5C-4817-B9A4-1EC01D911361"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.129:*:*:*:*:*:*:*", "cpeNameId": "0381E0F9-379F-4991-8218-0D49695A485C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.130:*:*:*:*:*:*:*", "cpeNameId": "70367F10-ACD6-4508-ACB5-DAC961B2DAD6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.131:*:*:*:*:*:*:*", "cpeNameId": "98C623C6-03CD-485B-BF39-D31296742AEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.132:*:*:*:*:*:*:*", "cpeNameId": "1E482272-30CF-4AC1-8D89-2594468F7D4B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.133:*:*:*:*:*:*:*", "cpeNameId": "111B8E60-2201-4175-8DF6-9254703F20FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.134:*:*:*:*:*:*:*", "cpeNameId": "E359DA12-908D-4DCE-863E-3FF8641CC7C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.135:*:*:*:*:*:*:*", "cpeNameId": "27A8264E-B347-4F33-8DB6-D654A8DF7008"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.136:*:*:*:*:*:*:*", "cpeNameId": "DFC17EF5-FF88-4BBE-AD7A-B6EF53741144"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.137:*:*:*:*:*:*:*", "cpeNameId": "DE9E6429-1CD7-4FA0-A2BB-9F73CFFA4AE6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.138:*:*:*:*:*:*:*", "cpeNameId": "3E2F69CE-601A-4558-820F-4D2101BC6DAA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.139:*:*:*:*:*:*:*", "cpeNameId": "AED13A18-393D-4413-80E6-5C8C1912C64C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.140:*:*:*:*:*:*:*", "cpeNameId": "DCCD3A03-0FA0-497E-938A-D4877C862C7D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.141:*:*:*:*:*:*:*", "cpeNameId": "A984AB3D-A744-45E7-B863-AFCE9F3BCA8D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.142:*:*:*:*:*:*:*", "cpeNameId": "8BA42A60-B968-4658-A593-5D6D1CDC2DD7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.143:*:*:*:*:*:*:*", "cpeNameId": "F1883261-CF7A-4133-BA12-E5A3648FFCD2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.144:*:*:*:*:*:*:*", "cpeNameId": "2ECB0A40-9134-477D-A33D-D1A21FD1D853"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.145:*:*:*:*:*:*:*", "cpeNameId": "37AD964D-982C-4491-9DD8-9BBEFB703649"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.146:*:*:*:*:*:*:*", "cpeNameId": "60D01110-32CE-4174-8305-9CC98A7954A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.147:*:*:*:*:*:*:*", "cpeNameId": "3C59A1B8-E591-4781-87FE-6652A4B865BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.148:*:*:*:*:*:*:*", "cpeNameId": "E3589E83-AB61-4638-83A5-4FCCDCF12939"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.149:*:*:*:*:*:*:*", "cpeNameId": "43561658-86C5-4F33-9BA9-959238156461"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.150:*:*:*:*:*:*:*", "cpeNameId": "65A8F7B6-A62D-4F12-BE5C-81E2C46F2C39"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.151:*:*:*:*:*:*:*", "cpeNameId": "359D1CB2-7092-4050-8BDE-EA9B90C2A4A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.152:*:*:*:*:*:*:*", "cpeNameId": "DCBA08B5-D75B-4EA4-8EB2-976C5EE5208C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.153:*:*:*:*:*:*:*", "cpeNameId": "AEF73713-2A2E-4202-9FAF-35F9007DC67F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.154:*:*:*:*:*:*:*", "cpeNameId": "F56CAAD2-0A98-4C49-948C-A58C81AF2136"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.155:*:*:*:*:*:*:*", "cpeNameId": "7293A6A3-0953-4BC3-8754-E3521CDDC181"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.156:*:*:*:*:*:*:*", "cpeNameId": "040458A8-9C8A-4F54-8667-DF55833A9D9B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.157:*:*:*:*:*:*:*", "cpeNameId": "47EEEBD8-F966-4731-84CE-95B543D1E665"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.158:*:*:*:*:*:*:*", "cpeNameId": "D8DD8154-1F2C-4E1F-8425-674EA9F33061"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.159:*:*:*:*:*:*:*", "cpeNameId": "23573A67-0200-408D-A6D3-92BB482B239E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.160:*:*:*:*:*:*:*", "cpeNameId": "DB501200-6B09-4237-92DA-8410374E41AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.161:*:*:*:*:*:*:*", "cpeNameId": "1654CFEE-4797-444C-BF7B-36E36EEFB3FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.162:*:*:*:*:*:*:*", "cpeNameId": "F7A73AFA-30D2-4C43-9A25-E516BB6077BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.163:*:*:*:*:*:*:*", "cpeNameId": "152842F1-FD0B-41B7-8361-62DC24194B9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.164:*:*:*:*:*:*:*", "cpeNameId": "1FB6E4A7-E49F-4CB2-B797-CDA9A3EE41F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.165:*:*:*:*:*:*:*", "cpeNameId": "86C98595-98AD-4914-BA7E-7D2EEEBDEEEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.166:*:*:*:*:*:*:*", "cpeNameId": "3A749A85-B1AF-45E0-952F-F07A3315F2B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.167:*:*:*:*:*:*:*", "cpeNameId": "F739A8BA-2722-4D43-8EE3-F0940D5C9962"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.168:*:*:*:*:*:*:*", "cpeNameId": "BA729078-2FD8-494D-80A0-A21A9C8A780C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.169:*:*:*:*:*:*:*", "cpeNameId": "B09E3BA3-FAE1-417D-802E-9FF6A63314CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.170:*:*:*:*:*:*:*", "cpeNameId": "A6354C45-5002-4677-94F6-2585EA37B4A0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.171:*:*:*:*:*:*:*", "cpeNameId": "E3DC59EC-5BDD-4E67-979E-ACF532D0AA0F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.172:*:*:*:*:*:*:*", "cpeNameId": "2915DD1D-0036-4591-921F-4ED4D6E543BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.173:*:*:*:*:*:*:*", "cpeNameId": "6AAAB0B0-C78E-4876-9C2D-5CF3FC83C87B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.174:*:*:*:*:*:*:*", "cpeNameId": "7F586C21-5084-4F3B-A5E2-20ABD2E73301"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.175:*:*:*:*:*:*:*", "cpeNameId": "31C57C02-B17B-45AC-BD33-BA14F2D2F960"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.176:*:*:*:*:*:*:*", "cpeNameId": "495DC903-2104-4E7A-ABDD-044701BEC0AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.177:*:*:*:*:*:*:*", "cpeNameId": "54ECE57B-46D2-4B43-88BA-72DFCC784626"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.178:*:*:*:*:*:*:*", "cpeNameId": "DF1994DB-64D8-449F-AB63-959905FDBED5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.179:*:*:*:*:*:*:*", "cpeNameId": "E998A6CB-5B6B-4698-93F8-60ADA5915CED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.180:*:*:*:*:*:*:*", "cpeNameId": "5780A3A7-D6D2-4597-8E20-64CAEBB9BEC5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.181:*:*:*:*:*:*:*", "cpeNameId": "943B03F2-38B3-48CF-AB60-B0CDCD3232D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.182:*:*:*:*:*:*:*", "cpeNameId": "DE1702E0-9C72-4E22-AD85-B4FF3F08BF12"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.183:*:*:*:*:*:*:*", "cpeNameId": "B448350B-6E82-4C55-BF6C-3416AA6DD09D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.184:*:*:*:*:*:*:*", "cpeNameId": "93D45017-75AC-4F34-B44B-BD725073C783"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.185:*:*:*:*:*:*:*", "cpeNameId": "17EE5023-DA86-42AA-80B8-0E03A8786DBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.186:*:*:*:*:*:*:*", "cpeNameId": "5083CC39-913E-47F4-8D17-DA2A4B3BDB38"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.187:*:*:*:*:*:*:*", "cpeNameId": "A9B26E5E-5D06-4AEE-B95C-BCCCF71E3C2A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.188:*:*:*:*:*:*:*", "cpeNameId": "F61DC571-CA27-43B5-B92E-FF49B2FA5128"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.189:*:*:*:*:*:*:*", "cpeNameId": "39A82CEC-EA57-4F55-AE22-EA9FF7F22411"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.190:*:*:*:*:*:*:*", "cpeNameId": "5C08BEA0-0968-4A2C-90A7-FBBC18870CB4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.191:*:*:*:*:*:*:*", "cpeNameId": "27C0FEC1-829C-410C-B37C-44CBE22D2714"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.192:*:*:*:*:*:*:*", "cpeNameId": "AAE8B6F5-BBF2-4EE5-BFF8-D3E64F6C7544"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.193:*:*:*:*:*:*:*", "cpeNameId": "B75C3C61-1456-4A7E-8175-FEBFECBD8887"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.194:*:*:*:*:*:*:*", "cpeNameId": "64CFCF85-0DB0-4BC3-9BAF-7752E969C6FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.195:*:*:*:*:*:*:*", "cpeNameId": "07D6C56C-CBC4-4E2B-BF3C-298D326A2515"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.196:*:*:*:*:*:*:*", "cpeNameId": "617F7A9C-A4AF-46E1-9B60-654F691A1ACA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.197:*:*:*:*:*:*:*", "cpeNameId": "D1BB57B0-9ED1-49CA-BAF9-9F32E751C423"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.198:*:*:*:*:*:*:*", "cpeNameId": "DFF76FFC-A6CE-4BCA-8BDA-A708D8CA524F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.199:*:*:*:*:*:*:*", "cpeNameId": "8D62E5E5-B08E-4B46-AFA9-9C11A8F2088C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.200:*:*:*:*:*:*:*", "cpeNameId": "4C6DC033-8105-45EB-8B7C-8AD380243F77"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.201:*:*:*:*:*:*:*", "cpeNameId": "02618C38-B7E6-468C-A240-77183CD793ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.202:*:*:*:*:*:*:*", "cpeNameId": "B133CCC3-3525-44C9-9BA6-07731081AF3B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.203:*:*:*:*:*:*:*", "cpeNameId": "2040E6FD-3C1D-4922-8A3E-D93B2024A64F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.204:*:*:*:*:*:*:*", "cpeNameId": "FC48B609-0A74-4ADF-BE7A-8E5A929FF9B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.205:*:*:*:*:*:*:*", "cpeNameId": "2D66C248-5CA3-46AF-819D-8EDC819E5DEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.206:*:*:*:*:*:*:*", "cpeNameId": "0EC2FE2D-3784-41D9-AD97-154F8E9D485A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.207:*:*:*:*:*:*:*", "cpeNameId": "890C3442-53E3-4F78-A62B-2A3DF161993D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.208:*:*:*:*:*:*:*", "cpeNameId": "3CFC3FF9-ABA7-4471-B42B-31B08DB57404"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.209:*:*:*:*:*:*:*", "cpeNameId": "62582930-FD26-41A5-A063-51CCE542611E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.210:*:*:*:*:*:*:*", "cpeNameId": "F0B251D3-1C8A-4EE4-BC8C-798633A46547"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.211:*:*:*:*:*:*:*", "cpeNameId": "6D317823-F155-4FD8-B745-D6A2CA0DCF4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.212:*:*:*:*:*:*:*", "cpeNameId": "93A1BCA4-151B-4C62-9321-C36060232635"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.213:*:*:*:*:*:*:*", "cpeNameId": "2A1F44F0-ED1D-4627-AFDD-52246F44FCA8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.214:*:*:*:*:*:*:*", "cpeNameId": "630134DA-8836-4D64-A8DB-C952FD0879B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.215:*:*:*:*:*:*:*", "cpeNameId": "F647FD73-A1BD-4519-96EF-BC5962B49049"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.216:*:*:*:*:*:*:*", "cpeNameId": "84F052BA-7078-4E5C-AF40-2E298CEBAA0D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.217:*:*:*:*:*:*:*", "cpeNameId": "8586BB5B-5356-497E-8039-D4718A8D233E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.218:*:*:*:*:*:*:*", "cpeNameId": "A7103A90-E7B5-46AC-B508-F3888B37524D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.219:*:*:*:*:*:*:*", "cpeNameId": "AAEF1C1C-6618-417A-A3EE-8BB6EB63F1C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.220:*:*:*:*:*:*:*", "cpeNameId": "00A3991D-98AC-4422-9B19-3B2515EF7B06"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.221:*:*:*:*:*:*:*", "cpeNameId": "CC8EF11A-F131-442A-B0F4-0810D38EB89E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.222:*:*:*:*:*:*:*", "cpeNameId": "E9CDB672-F2E0-42B9-8F20-B3BCAF324A36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.223:*:*:*:*:*:*:*", "cpeNameId": "1AC50DA1-BA05-43A5-A50F-8EF350DD96D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.224:*:*:*:*:*:*:*", "cpeNameId": "42E73115-25A7-4EDF-9402-81BA0AC8B470"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.225:*:*:*:*:*:*:*", "cpeNameId": "85B8548F-576C-442E-A2EA-30CFF43407AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.226:*:*:*:*:*:*:*", "cpeNameId": "3794F34E-4B0D-487C-890D-884AA41EF6D7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.227:*:*:*:*:*:*:*", "cpeNameId": "29337989-0DC4-4B35-BA5F-E157DAAD1557"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.228:*:*:*:*:*:*:*", "cpeNameId": "7F43F714-4550-416B-B228-EEF6FC8B1716"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.229:*:*:*:*:*:*:*", "cpeNameId": "9AC44F08-C276-4E15-811B-8CC5010672D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.230:*:*:*:*:*:*:*", "cpeNameId": "8EEDFC00-6778-4242-87AA-1BF8B788A7AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.231:*:*:*:*:*:*:*", "cpeNameId": "4F7C7BF1-9231-4FA0-A31F-A8A21DF8388E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.232:*:*:*:*:*:*:*", "cpeNameId": "B76B39F5-A59B-4C38-9381-5BCB6A78AC30"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.233:*:*:*:*:*:*:*", "cpeNameId": "97DA7801-C4EB-49B8-BCB6-B53FB848E2A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.234:*:*:*:*:*:*:*", "cpeNameId": "B249D0C2-FF7F-48DC-AF81-4B69D6844B27"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.235:*:*:*:*:*:*:*", "cpeNameId": "6B01EB29-4E04-41BD-BC2A-10619B7D39E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.236:*:*:*:*:*:*:*", "cpeNameId": "C81712BA-4FF9-4DD1-AD12-BABC49E8A004"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.237:*:*:*:*:*:*:*", "cpeNameId": "2EA256E4-3D89-4EEB-91B7-FFF529E84CAA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.238:*:*:*:*:*:*:*", "cpeNameId": "A0E92899-D97F-498F-8124-94BF18838682"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.239:*:*:*:*:*:*:*", "cpeNameId": "E4088748-A84D-4D3C-A8F9-479DB4DFEAAF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.240:*:*:*:*:*:*:*", "cpeNameId": "EBEBA8E4-803E-4EF0-A3EA-295960568227"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.241:*:*:*:*:*:*:*", "cpeNameId": "07C3F8E4-4820-447B-8D85-5297B73BD561"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.242:*:*:*:*:*:*:*", "cpeNameId": "EE853DB7-F2DA-4461-926E-E8586C8B9769"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.243:*:*:*:*:*:*:*", "cpeNameId": "EFB0DC56-2543-4A76-B959-03F1D12AFF46"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.244:*:*:*:*:*:*:*", "cpeNameId": "F491B8F2-2AEC-4382-9095-6C6C933316B2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.245:*:*:*:*:*:*:*", "cpeNameId": "EA198FA8-3EC5-458B-8210-D4176F4D2991"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.246:*:*:*:*:*:*:*", "cpeNameId": "45949E40-A94B-4C31-8110-9EB5F16CFA74"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.247:*:*:*:*:*:*:*", "cpeNameId": "D6CA348F-100D-4CB7-884C-05BCD92C93AD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.248:*:*:*:*:*:*:*", "cpeNameId": "774EFE10-D2D0-4C23-ACFC-AD61E9765BA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.249:*:*:*:*:*:*:*", "cpeNameId": "1B531DDE-03EC-4C95-B0DD-C316CE378AD8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.250:*:*:*:*:*:*:*", "cpeNameId": "7105F9F5-3435-481E-B46A-BE6F3AA78446"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.251:*:*:*:*:*:*:*", "cpeNameId": "CCB75783-8321-4164-9877-0AF392D531FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.252:*:*:*:*:*:*:*", "cpeNameId": "14D27D39-5785-461D-A4F7-46F07A67342D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.253:*:*:*:*:*:*:*", "cpeNameId": "3F9F5FE6-B76D-4F70-9F2D-0C647C026561"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.254:*:*:*:*:*:*:*", "cpeNameId": "0C15C6BC-2A46-4556-B847-17B7CA0F4DE3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.255:*:*:*:*:*:*:*", "cpeNameId": "F4FA95EA-4D16-4C6E-86D9-1D0E95E8AD42"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.256:*:*:*:*:*:*:*", "cpeNameId": "41A5A246-0D51-4C1E-A781-DA73D49C53B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.257:*:*:*:*:*:*:*", "cpeNameId": "339FB596-B009-493F-8DA9-19A69E175ED5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.258:*:*:*:*:*:*:*", "cpeNameId": "CCF5717D-F04D-4048-94EA-C4E7A4C45F95"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.259:*:*:*:*:*:*:*", "cpeNameId": "2A03EFB0-FD68-478A-B718-5D411878D8BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.260:*:*:*:*:*:*:*", "cpeNameId": "DA6AC544-7494-4683-83E9-D59AF89B5401"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.261:*:*:*:*:*:*:*", "cpeNameId": "5C4BFBA7-A9B0-425B-AE4F-0C6ED6E21759"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.262:*:*:*:*:*:*:*", "cpeNameId": "345ED523-FD6D-489D-ADBE-FC738A8816C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.263:*:*:*:*:*:*:*", "cpeNameId": "99653F61-52E2-4A51-80F3-C48F7059918B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.264:*:*:*:*:*:*:*", "cpeNameId": "424A4C5C-FB0F-4FCD-8D64-4EF4B44C04DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.265:*:*:*:*:*:*:*", "cpeNameId": "8C58D077-E378-4DA8-8AEA-9B41A26CCF78"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.266:*:*:*:*:*:*:*", "cpeNameId": "FF1979DA-6280-4D83-87A2-76F9B51A484B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.267:*:*:*:*:*:*:*", "cpeNameId": "9316876F-BD99-4370-B45A-622A21A1C234"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.268:*:*:*:*:*:*:*", "cpeNameId": "7364C13D-4E86-45D4-93CE-F8A77D11245E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.269:*:*:*:*:*:*:*", "cpeNameId": "A91EF74E-716D-4D53-B818-CE1FFA90561B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.270:*:*:*:*:*:*:*", "cpeNameId": "9F8B9A50-D4BF-455B-ACAE-9773F80690D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.271:*:*:*:*:*:*:*", "cpeNameId": "14B3F541-9955-4712-A8B1-4394A3D11DAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.272:*:*:*:*:*:*:*", "cpeNameId": "994323DF-37C1-48B8-BF6D-CF726E6ADED2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.273:*:*:*:*:*:*:*", "cpeNameId": "5794FF97-3D47-47A1-9934-DF5587AD915B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.274:*:*:*:*:*:*:*", "cpeNameId": "C853072E-5EC8-483D-A2CA-4AD2297E51FF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.275:*:*:*:*:*:*:*", "cpeNameId": "98009745-52F2-4846-B454-E90321008CFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.276:*:*:*:*:*:*:*", "cpeNameId": "9A192DE3-8954-4CE7-A200-FBCAE1BFF0D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.277:*:*:*:*:*:*:*", "cpeNameId": "651E5F82-D722-4636-B41C-17ECB9F614AD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.278:*:*:*:*:*:*:*", "cpeNameId": "8A8873EE-B55C-4EFF-8885-329450882E8B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.279:*:*:*:*:*:*:*", "cpeNameId": "CEC23D4D-DCBC-4269-904F-EB1829C48B4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.280:*:*:*:*:*:*:*", "cpeNameId": "6670595A-51D0-4860-A97D-CEF230135DCF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.281:*:*:*:*:*:*:*", "cpeNameId": "C6198A8B-6286-4E96-8629-D7C35E60DB89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.282:*:*:*:*:*:*:*", "cpeNameId": "E3D67109-1796-404D-8308-A39BF1338C3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.283:*:*:*:*:*:*:*", "cpeNameId": "D630C6EC-A2AB-480D-AA68-544966BFD6AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.284:*:*:*:*:*:*:*", "cpeNameId": "6BD57B4C-7ECD-41B1-9631-C1BFBBD6B049"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.285:*:*:*:*:*:*:*", "cpeNameId": "C8FCDB6A-75F8-4B62-A698-D9943A805CBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.286:*:*:*:*:*:*:*", "cpeNameId": "BA369E82-203F-4291-9419-56F1E4A53D15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.287:*:*:*:*:*:*:*", "cpeNameId": "A544C41E-F4FC-4293-A3D6-B5F91E5EF1A7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.288:*:*:*:*:*:*:*", "cpeNameId": "A0BDF59E-7C92-443B-B035-B250F80E4DC9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.289:*:*:*:*:*:*:*", "cpeNameId": "73D2125C-A474-417B-B135-1903D427F538"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.290:*:*:*:*:*:*:*", "cpeNameId": "477BA94B-EB37-4234-BA72-469682042745"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.291:*:*:*:*:*:*:*", "cpeNameId": "F1E29F38-68F3-4CEE-8AD5-828E7C63ED7A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.292:*:*:*:*:*:*:*", "cpeNameId": "6829F830-B295-4BEA-9037-EAE6C6D83D45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.293:*:*:*:*:*:*:*", "cpeNameId": "22CF6A05-5745-4A7F-8559-702E9C3C8830"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.294:*:*:*:*:*:*:*", "cpeNameId": "A36397CA-8253-443A-BEB3-EB7F21F084D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.295:*:*:*:*:*:*:*", "cpeNameId": "9597112C-DEE5-4DE7-A87B-A8CA716B2212"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.296:*:*:*:*:*:*:*", "cpeNameId": "98F92400-37C0-40CA-A0A7-AE36BA845F6B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.297:*:*:*:*:*:*:*", "cpeNameId": "48BF44DC-C00D-4964-B152-341BACB0F556"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.298:*:*:*:*:*:*:*", "cpeNameId": "0E913D3C-18EF-4895-98ED-42C69A1C76B2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.299:*:*:*:*:*:*:*", "cpeNameId": "B8D13EF3-4ECA-4429-8BE2-175CA0247B11"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.300:*:*:*:*:*:*:*", "cpeNameId": "4D091AD8-D0D7-4EBA-814C-88E1BA8374F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.301:*:*:*:*:*:*:*", "cpeNameId": "B1830564-E39A-448F-950A-1B20281BB3B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.302:*:*:*:*:*:*:*", "cpeNameId": "8EA0AAA8-D9AB-47A4-84B1-733B8A5685BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.303:*:*:*:*:*:*:*", "cpeNameId": "8271E5F1-FC03-47FC-9102-A0491D04E4A6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.304:*:*:*:*:*:*:*", "cpeNameId": "8A6B6167-7ED8-4001-BBE1-60520A1507D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.305:*:*:*:*:*:*:*", "cpeNameId": "D314E91D-4DB8-4F05-A3E9-D0AD324F2B40"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.306:*:*:*:*:*:*:*", "cpeNameId": "5DE889B3-0BAD-4FA8-9450-7ADAEA53BCB6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.307:*:*:*:*:*:*:*", "cpeNameId": "0A1ACC8A-123F-4239-8F9D-9DBB85D19A60"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.308:*:*:*:*:*:*:*", "cpeNameId": "2C104BF2-78BD-46F5-A42B-8A7737F08831"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.309:*:*:*:*:*:*:*", "cpeNameId": "3AB452D7-1B5C-4AEC-BA48-88EAE679521A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.310:*:*:*:*:*:*:*", "cpeNameId": "A2B6D891-8756-47AC-BB50-74EED68F5348"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.311:*:*:*:*:*:*:*", "cpeNameId": "CD98624C-BF2D-4AD5-8DC6-23C0376ADEDE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.312:*:*:*:*:*:*:*", "cpeNameId": "A353C4E5-BCD5-404E-BA32-E44D42939E26"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.313:*:*:*:*:*:*:*", "cpeNameId": "EA493CF9-9392-46DA-B897-F85D4EF3B00E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.314:*:*:*:*:*:*:*", "cpeNameId": "50DDF9BB-6311-4505-AA6A-6240E950DD68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.315:*:*:*:*:*:*:*", "cpeNameId": "6929ED83-8C13-41A6-9C4A-CA1F36116442"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.316:*:*:*:*:*:*:*", "cpeNameId": "41B4751B-1E9E-493B-AE0D-BF29E6317911"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.317:*:*:*:*:*:*:*", "cpeNameId": "8DAAD8CA-4620-48BE-95E9-9623F7AACD63"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.318:*:*:*:*:*:*:*", "cpeNameId": "2C0D3085-6703-41F9-81D9-28EA3A593F9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.319:*:*:*:*:*:*:*", "cpeNameId": "A439957C-0CFF-4BDF-A644-00A2602DF673"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.320:*:*:*:*:*:*:*", "cpeNameId": "3EDC01DA-28BA-4672-A0BE-8B3346F51F19"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.321:*:*:*:*:*:*:*", "cpeNameId": "77BA70B4-3A94-4325-BDC1-22564AF064F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.322:*:*:*:*:*:*:*", "cpeNameId": "0743F164-F7F4-485E-AFB7-35D7DC7455E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.323:*:*:*:*:*:*:*", "cpeNameId": "5FDB4BD5-157B-43B7-BA06-8C5FF941542F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.324:*:*:*:*:*:*:*", "cpeNameId": "DE4432A7-318F-4B7B-8CEB-9FA31468CC36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.325:*:*:*:*:*:*:*", "cpeNameId": "80F87AA1-DAEE-4931-ADF7-4183B893D8F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.326:*:*:*:*:*:*:*", "cpeNameId": "5C25C636-C95F-4E94-AC85-5E684E14069F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.327:*:*:*:*:*:*:*", "cpeNameId": "ED6E0851-1828-44F8-BF12-233B8E28DBC8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.328:*:*:*:*:*:*:*", "cpeNameId": "976DF29A-943C-4C28-A071-DA2911DEDECE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.329:*:*:*:*:*:*:*", "cpeNameId": "3EE5D34F-9BBA-4FBA-9157-A4A9FA953C68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.330:*:*:*:*:*:*:*", "cpeNameId": "27711BD8-D761-4F4F-8330-FB1150982CCD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.331:*:*:*:*:*:*:*", "cpeNameId": "CBD4F61B-627B-4ACC-B743-57C302AB29F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.332:*:*:*:*:*:*:*", "cpeNameId": "E5247303-B19B-42F3-B1F1-DED50AB8E3CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.333:*:*:*:*:*:*:*", "cpeNameId": "F7C8E776-3213-4F39-9637-25902C283906"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.334:*:*:*:*:*:*:*", "cpeNameId": "D9008EE6-5CED-451D-8E36-07626739C582"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.335:*:*:*:*:*:*:*", "cpeNameId": "3F094A53-6652-4404-AE4C-3CCA8BE6BAC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.336:*:*:*:*:*:*:*", "cpeNameId": "8540A828-6A7F-499A-9F47-861E278F7001"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:*:*:*:*:*:*:*", "cpeNameId": "D44D12DF-CC78-4ADD-AA64-D1FF33FCFC11"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:-:*:*:*:*:*:*", "cpeNameId": "82324BC8-B6FA-4FD7-B301-3CAA806DF77D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:rc1:*:*:*:*:*:*", "cpeNameId": "710D7761-A5EC-4338-BBC6-1EA829347DD9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:rc2:*:*:*:*:*:*", "cpeNameId": "A9B4765F-04DB-41A9-9BDC-D9EBC8A916CE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:rc3:*:*:*:*:*:*", "cpeNameId": "6D023E11-92E4-4DC4-A704-A653569DEF7E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:rc4:*:*:*:*:*:*", "cpeNameId": "BE180D29-2D25-4945-85F5-4FF1B61A755F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:rc5:*:*:*:*:*:*", "cpeNameId": "B550A739-A864-4C04-8B4F-DB875CCE5876"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:rc6:*:*:*:*:*:*", "cpeNameId": "EE7802F2-4421-4A8F-A5E7-10ABA30BB95D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:rc7:*:*:*:*:*:*", "cpeNameId": "913B33F6-C76A-415E-978B-DFE69DD12443"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.1:*:*:*:*:*:*:*", "cpeNameId": "885FF46B-AF78-41E0-9992-134FC5483062"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.2:*:*:*:*:*:*:*", "cpeNameId": "417EF125-85BE-4436-8270-385A03FBF5DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.3:*:*:*:*:*:*:*", "cpeNameId": "A60F0159-BE82-4549-A156-D0C420BCD669"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.4:*:*:*:*:*:*:*", "cpeNameId": "205719B0-36E0-490F-A726-DBF0A18C7B6D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.5:*:*:*:*:*:*:*", "cpeNameId": "F6FC9B68-7A46-413B-B2F2-B96FC679293B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.6:*:*:*:*:*:*:*", "cpeNameId": "860DB2BE-F0BD-4E93-ACAF-73AB5A4287EC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.7:*:*:*:*:*:*:*", "cpeNameId": "72F15093-84F6-4F64-AD90-9C0B8534002F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.8:*:*:*:*:*:*:*", "cpeNameId": "1241D778-09B7-41CF-A7F0-3F33365EAEEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.9:*:*:*:*:*:*:*", "cpeNameId": "85AF8455-0705-4C7B-A8D7-C827098D3CBC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.10:*:*:*:*:*:*:*", "cpeNameId": "59B6BDD9-9094-469D-B556-347EAFFAC84A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.11:*:*:*:*:*:*:*", "cpeNameId": "195BB390-1666-4C78-8E5E-E8BB8F7CD6C7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.12:*:*:*:*:*:*:*", "cpeNameId": "4611F4AE-C544-40B2-BAB0-4D75918253B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.13:*:*:*:*:*:*:*", "cpeNameId": "174828D2-1D1F-4A0F-9D4A-3D6CEEB670A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.14:*:*:*:*:*:*:*", "cpeNameId": "4A9AF5EF-2143-422E-9406-12394AE6F056"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.15:*:*:*:*:*:*:*", "cpeNameId": "0ED2B63D-794A-436E-98B2-8BB1746F8E37"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.16:*:*:*:*:*:*:*", "cpeNameId": "A3EE611D-A161-44D4-B8BC-3D77C35AC1DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.17:*:*:*:*:*:*:*", "cpeNameId": "77C22DEA-C18D-4F57-A5B2-D9432480F6F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.18:*:*:*:*:*:*:*", "cpeNameId": "98BC40B2-34EE-44D0-AD07-D41DA8D98FEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:*:*:*:*:*:*:*", "cpeNameId": "CE47DAE6-002F-46BE-8496-FC478C0B0928"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:-:*:*:*:*:*:*", "cpeNameId": "96F106B5-E746-4DE6-BCEB-07F1F572960D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:rc:*:*:*:*:*:*", "cpeNameId": "C0F0B475-896B-4239-8475-5B90B74BE05E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:rc1:*:*:*:*:*:*", "cpeNameId": "206EC973-ED2E-49E1-A4AC-54F7D30DD628"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:rc2:*:*:*:*:*:*", "cpeNameId": "AAD4C356-7CE1-4A45-96FE-6D75643AB293"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:rc3:*:*:*:*:*:*", "cpeNameId": "4BFA1B60-7E55-4547-8B4B-AFC1256015D6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:rc4:*:*:*:*:*:*", "cpeNameId": "78E3876E-D2C3-49BA-BE26-2066849638AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:rc5:*:*:*:*:*:*", "cpeNameId": "B9536FB8-C7B1-4C28-82CD-8D8150E7BCCB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:rc6:*:*:*:*:*:*", "cpeNameId": "BEC1B244-1D7B-47BC-A1BB-6F95945EA2C7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:rc7:*:*:*:*:*:*", "cpeNameId": "1D3A9DBB-AF78-4A75-A55E-C851D1277498"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.1:*:*:*:*:*:*:*", "cpeNameId": "C1BE1F09-D07F-4AE4-9764-73721620F745"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.2:*:*:*:*:*:*:*", "cpeNameId": "563DD6A5-BEDD-437A-BAD5-981FD66FAA1A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.3:*:*:*:*:*:*:*", "cpeNameId": "6DC9ED49-7975-48B1-B630-06680709899F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.4:*:*:*:*:*:*:*", "cpeNameId": "39F925A0-630B-4CBF-9BFC-C40C0E81BFA8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.5:*:*:*:*:*:*:*", "cpeNameId": "A0E5D15C-E27F-4B55-9668-078BA5CCD7AA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.6:*:*:*:*:*:*:*", "cpeNameId": "6DE6DECA-3142-43DA-B930-A48EAFF9CED3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.7:*:*:*:*:*:*:*", "cpeNameId": "0438E224-2F8A-4089-BF5E-D7763A431E39"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.8:*:*:*:*:*:*:*", "cpeNameId": "0814DBD3-2193-40B5-8CE1-5C992D4C59C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.9:*:*:*:*:*:*:*", "cpeNameId": "C75890A0-5944-4BB6-B44B-83FDDA55308A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.10:*:*:*:*:*:*:*", "cpeNameId": "50932CE7-4BA6-4944-839E-800831391197"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.11:*:*:*:*:*:*:*", "cpeNameId": "21B4D5C0-665E-4B96-8A71-F84E2731725A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.12:*:*:*:*:*:*:*", "cpeNameId": "26861D80-6855-42B4-A2C5-5A5314C63454"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.13:*:*:*:*:*:*:*", "cpeNameId": "161AE6FB-AF4F-4A02-A235-9BA4D3A8BFE7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.14:*:*:*:*:*:*:*", "cpeNameId": "04DDF552-0DBA-4D2D-97A9-05F348E45E2D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.15:*:*:*:*:*:*:*", "cpeNameId": "8D8D509C-F3B3-4D99-AE7B-85ACE6CDCE9A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.16:*:*:*:*:*:*:*", "cpeNameId": "F62EAE49-6093-4A2A-AEDC-DB4D450BCDCF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.17:*:*:*:*:*:*:*", "cpeNameId": "D4A046F1-9970-4BC2-A4F8-E58871919793"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.18:*:*:*:*:*:*:*", "cpeNameId": "9A7D44E8-1ABB-4FCA-900F-63CF5B432394"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:*:*:*:*:*:*:*", "cpeNameId": "3F9A62D1-EC46-4586-BF5B-075E503B34AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:-:*:*:*:*:*:*", "cpeNameId": "1355298F-E180-4ACE-BE37-E4671C6D87FA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:rc1:*:*:*:*:*:*", "cpeNameId": "869F2A88-8ECA-4277-8EF8-04722B6397F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:rc2:*:*:*:*:*:*", "cpeNameId": "E213D2C7-56A5-4CDB-9FFA-D562EBE66B32"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:rc3:*:*:*:*:*:*", "cpeNameId": "23DCE750-11FB-46DF-B936-8AEAE54EDCF1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:rc4:*:*:*:*:*:*", "cpeNameId": "95518E21-4F70-4E7F-8A5E-41A71733B838"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:rc5:*:*:*:*:*:*", "cpeNameId": "86A613D5-2EDD-46C6-BD54-6EE7E0BD677F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:rc6:*:*:*:*:*:*", "cpeNameId": "7ACCD69E-0ADE-4675-919A-6ADCADB4E243"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:rc7:*:*:*:*:*:*", "cpeNameId": "0CDA0188-9155-4355-B8E0-EC98BCA4D106"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.1:*:*:*:*:*:*:*", "cpeNameId": "8AFFDBAA-464C-4017-8E0B-80E70560BD9C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.2:*:*:*:*:*:*:*", "cpeNameId": "A00BC577-2BDB-4CB9-A918-5EFA87297409"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.3:*:*:*:*:*:*:*", "cpeNameId": "D03EB1B1-6645-4442-9A5B-084C2C086199"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.4:*:*:*:*:*:*:*", "cpeNameId": "4321A1DC-4069-4924-ADAF-060727BD410C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.5:*:*:*:*:*:*:*", "cpeNameId": "6E0A1034-4FFA-4B8B-BA2F-DDDF74911FD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.6:*:*:*:*:*:*:*", "cpeNameId": "0DA7186B-D3B7-4E95-B66E-8FF81C72BC75"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.7:*:*:*:*:*:*:*", "cpeNameId": "2F936CBB-766A-4DFB-A60A-72F1A37577EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.8:*:*:*:*:*:*:*", "cpeNameId": "CB3F392D-0A8A-4D3E-8E62-9E7FD830F988"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.9:*:*:*:*:*:*:*", "cpeNameId": "D1A962D5-849E-4799-B4E2-58BF062A8E35"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.10:*:*:*:*:*:*:*", "cpeNameId": "358D2C77-1EDB-44D7-914F-C1B93B184AE2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.11:*:*:*:*:*:*:*", "cpeNameId": "1B36CCD2-6734-4F62-887B-0B29DEAB8948"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.12:*:*:*:*:*:*:*", "cpeNameId": "939C2382-3F25-4D16-B047-662EF7362D14"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.13:*:*:*:*:*:*:*", "cpeNameId": "4787E970-6703-4A4A-8A25-2A6DF37E9115"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.14:*:*:*:*:*:*:*", "cpeNameId": "D9DE2C08-37BB-4B4E-9CC9-257FB5D0CC55"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.15:*:*:*:*:*:*:*", "cpeNameId": "56CA0D63-01A8-4C7D-9285-0FE01EE5A4CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.16:*:*:*:*:*:*:*", "cpeNameId": "0EB823BC-6F14-4123-AFE3-5BD35C06053B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.17:*:*:*:*:*:*:*", "cpeNameId": "8DB0A362-21DC-463F-8741-7983D7091926"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.18:*:*:*:*:*:*:*", "cpeNameId": "D52B62A2-3084-4DC4-A603-BCAC0CE52FEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.19:*:*:*:*:*:*:*", "cpeNameId": "A5AE9508-CB21-4232-B63E-532C504349B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:*:*:*:*:*:*:*", "cpeNameId": "817415B8-9A60-4887-9222-0D9F02CFB071"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:-:*:*:*:*:*:*", "cpeNameId": "8835D366-AAEA-40BE-A53D-C0C034420403"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:rc1:*:*:*:*:*:*", "cpeNameId": "2213E83B-F249-4DA4-A296-9AE97B5995D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:rc2:*:*:*:*:*:*", "cpeNameId": "48BFC151-DD12-4AA8-860C-CC88EC732BFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:rc3:*:*:*:*:*:*", "cpeNameId": "9FA2195C-1574-4F87-9EBF-C6C98F88BAFF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:rc4:*:*:*:*:*:*", "cpeNameId": "67BF2AB1-0C74-4B1F-8E1C-B1D82E89DDB4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:rc5:*:*:*:*:*:*", "cpeNameId": "AE91D0F4-8012-4BAC-A0C6-BB99AD9D2E46"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:rc6:*:*:*:*:*:*", "cpeNameId": "1766D430-184A-4072-B189-A1497C75D6BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:rc7:*:*:*:*:*:*", "cpeNameId": "CAA30654-34CD-4B4F-B233-29B87ED2FBB8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:rc8:*:*:*:*:*:*", "cpeNameId": "00096540-8FA8-46CA-BB68-93B1C5272D2D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.0:*:*:*:*:*:*:*", "cpeNameId": "A009147C-ACF6-4854-AAE6-3A23AE21C4CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.0-193.el8:*:*:*:*:*:*:*", "cpeNameId": "FCA98709-2F68-4E1B-9430-7D7166871698"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.1:*:*:*:*:*:*:*", "cpeNameId": "13793707-6FDB-4423-A8E6-2ADC8BD61C3A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.2:*:*:*:*:*:*:*", "cpeNameId": "EAB280BE-E42E-47BD-BC9B-9EE32D6C2A40"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.3:*:*:*:*:*:*:*", "cpeNameId": "587AE0EF-5106-4CEA-9358-2D066510D151"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.4:*:*:*:*:*:*:*", "cpeNameId": "A3318DEA-3BE2-4302-BC9B-A034934F9D1D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.5:*:*:*:*:*:*:*", "cpeNameId": "6DFCE771-61CC-4086-9ABA-D355FF8F3148"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.6:*:*:*:*:*:*:*", "cpeNameId": "445E159B-AA55-48BD-93C7-2B930AD4EB83"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.7:*:*:*:*:*:*:*", "cpeNameId": "B27A8950-AB89-4120-80DA-B349652A523D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.8:*:*:*:*:*:*:*", "cpeNameId": "8E631816-CFC2-4D77-AE17-D796C455F715"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.9:*:*:*:*:*:*:*", "cpeNameId": "8FD85D0C-385D-488A-A090-32B066B8C2EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.10:*:*:*:*:*:*:*", "cpeNameId": "FEEDBD99-9EB3-41AF-815C-571AF46B5D85"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.11:*:*:*:*:*:*:*", "cpeNameId": "7E7CBF51-E6C8-46E1-8DD3-CFBAB87EA47B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.12:*:*:*:*:*:*:*", "cpeNameId": "F965D923-D9D7-4EF1-B1FB-07EA2FEEBE31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.13:*:*:*:*:*:*:*", "cpeNameId": "E5834B3F-3734-4FEB-9440-7AE8BE96EBB5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.14:*:*:*:*:*:*:*", "cpeNameId": "09696490-5ABF-48D2-823F-C1822003B392"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.15:*:*:*:*:*:*:*", "cpeNameId": "E6911EAC-4DB4-41E9-9401-B4226373EE5A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.16:*:*:*:*:*:*:*", "cpeNameId": "AC125B64-72FD-4946-B3A7-663299025809"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.17:*:*:*:*:*:*:*", "cpeNameId": "EF3569D5-2C62-4458-974E-918A784BD62A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.18:*:*:*:*:*:*:*", "cpeNameId": "1FA907F8-0BCB-4507-8714-DC1D5781D42D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.19:*:*:*:*:*:*:*", "cpeNameId": "942860D3-A3FF-4932-A6FB-9459A59644BE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.20:*:*:*:*:*:*:*", "cpeNameId": "EC116A00-67FF-4F9B-9B3B-EFB39878E41F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:*:*:*:*:*:*:*", "cpeNameId": "A3163086-ED2B-4462-9265-6F1DCEAB4D54"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:-:*:*:*:*:*:*", "cpeNameId": "057CC752-CE29-466B-827D-3930C41F1C3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:rc1:*:*:*:*:*:*", "cpeNameId": "AFC357CC-56A5-4555-959A-34F88351D81B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:rc2:*:*:*:*:*:*", "cpeNameId": "ED61D354-4BB9-4D66-87FB-86662D7B6B12"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:rc3:*:*:*:*:*:*", "cpeNameId": "A84469B4-B1DD-4DED-AC99-EA9C2CA93CF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:rc4:*:*:*:*:*:*", "cpeNameId": "EE659E91-B594-49B5-BC25-C4BAB3BE192E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:rc5:*:*:*:*:*:*", "cpeNameId": "2B7349C1-F08A-44E5-8FB8-3F2804E5A07F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:rc6:*:*:*:*:*:*", "cpeNameId": "EB37BD16-E204-41BE-ADE4-01B875CBE896"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:rc7:*:*:*:*:*:*", "cpeNameId": "745C3308-0D37-4503-B9FD-1C7A675E7C3A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:rc8:*:*:*:*:*:*", "cpeNameId": "C09DBABE-8232-4196-8C42-2D4509AD02FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.1:*:*:*:*:*:*:*", "cpeNameId": "CBFE536A-5936-4037-A140-B381A09E0313"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.2:*:*:*:*:*:*:*", "cpeNameId": "E7375DDA-E673-4CB3-9A7A-751E0A34FC42"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.3:*:*:*:*:*:*:*", "cpeNameId": "99F55D5C-293A-4F8A-8C8C-D324BECF805D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.4:*:*:*:*:*:*:*", "cpeNameId": "C61FC074-FB83-48ED-8299-CF0565B28BF0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.5:*:*:*:*:*:*:*", "cpeNameId": "813A19FD-6C0F-442D-BD13-D924AAB177A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.6:*:*:*:*:*:*:*", "cpeNameId": "5387070B-08B1-4B14-ABD0-845D0DD8F84B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.7:*:*:*:*:*:*:*", "cpeNameId": "E39CE6E9-2A15-486F-881E-000CEB221CFC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.8:*:*:*:*:*:*:*", "cpeNameId": "3951D003-9ACB-4530-AD87-BA6495862F19"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.9:*:*:*:*:*:*:*", "cpeNameId": "16722D4A-04DC-40F0-B6BE-19B503E6F896"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.10:*:*:*:*:*:*:*", "cpeNameId": "1F88CB52-D7B5-4946-A367-45DE35034F51"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.11:*:*:*:*:*:*:*", "cpeNameId": "77B502BA-B846-4C9C-A8CE-3EF988CECC92"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.12:*:*:*:*:*:*:*", "cpeNameId": "23451725-61D8-4924-88FD-F296F0BB0BDD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.13:*:*:*:*:*:*:*", "cpeNameId": "2647DBE8-332D-4420-A7FE-971F97D450E5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.14:*:*:*:*:*:*:*", "cpeNameId": "EC80AF58-D2F3-439F-8A3D-0333C832805C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.15:*:*:*:*:*:*:*", "cpeNameId": "5FF48FD7-42B6-446C-9142-C46F87307A23"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.16:*:*:*:*:*:*:*", "cpeNameId": "27DD882E-6137-45D8-95CA-46E0A0E9D546"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.17:*:*:*:*:*:*:*", "cpeNameId": "3D79ECA3-B493-4422-B61B-F9D8725540BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.18:*:*:*:*:*:*:*", "cpeNameId": "D815E2B8-DD92-47E3-A1C3-E9B7859ED848"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.19:*:*:*:*:*:*:*", "cpeNameId": "3ED97E59-18F8-4970-8DCF-108DB66C0B64"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.20:*:*:*:*:*:*:*", "cpeNameId": "F5B56565-8277-4435-81A3-14A07CD1CFB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.21:*:*:*:*:*:*:*", "cpeNameId": "08DEF207-BE10-4D38-B198-E0E81A7D8DD8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.22:*:*:*:*:*:*:*", "cpeNameId": "6406E989-2DA9-4473-8A19-F34C0AA0A101"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.23:*:*:*:*:*:*:*", "cpeNameId": "BAB4A7B7-201A-49DD-8CEA-C8276A386DB5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.24:*:*:*:*:*:*:*", "cpeNameId": "C1807F8B-4224-4C20-A7E6-A1A37CFE804C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.25:*:*:*:*:*:*:*", "cpeNameId": "BC055247-93EC-4557-97C5-3F2476EE0F15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.26:*:*:*:*:*:*:*", "cpeNameId": "7D6369DC-902C-4BC1-A26D-C5C913143EB6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.26.1:*:*:*:*:*:*:*", "cpeNameId": "8C01371D-728D-41FF-8EDB-479FFEB181A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.27:*:*:*:*:*:*:*", "cpeNameId": "A32084B7-D6A4-4F74-B282-DDB6DEF0C5AA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.28:*:*:*:*:*:*:*", "cpeNameId": "E0A0C51F-ED33-48CF-927D-0CA8970B6D1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.29:*:*:*:*:*:*:*", "cpeNameId": "21FF2212-87CD-409F-8FA3-A36D8AA94607"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.30:*:*:*:*:*:*:*", "cpeNameId": "429E0577-DB63-4580-8B2F-9F00743EB4B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.31:*:*:*:*:*:*:*", "cpeNameId": "3371D4B5-E4D9-483E-AA24-B99A03C20991"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.32:*:*:*:*:*:*:*", "cpeNameId": "316A0495-6409-4E82-A2FF-2A3158DF6020"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.33:*:*:*:*:*:*:*", "cpeNameId": "2ADFFFEE-80CB-4EF8-8893-D1D2CDBF2687"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.34:*:*:*:*:*:*:*", "cpeNameId": "D3C47B41-3976-412A-877C-08C558B67F17"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.35:*:*:*:*:*:*:*", "cpeNameId": "C12B86A6-026B-4109-9E3B-5A334A73871F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.36:*:*:*:*:*:*:*", "cpeNameId": "855C5C5D-CC69-4629-9D55-4E25F1346965"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.37:*:*:*:*:*:*:*", "cpeNameId": "35B14A6C-CDA5-4E1F-B6C6-4E8305D32DFB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.38:*:*:*:*:*:*:*", "cpeNameId": "9CB2A48B-F8FC-47BE-9DF4-2B95585425F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.39:*:*:*:*:*:*:*", "cpeNameId": "E6A1D1E0-0373-4295-897D-C7E699C018E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.40:*:*:*:*:*:*:*", "cpeNameId": "970D15E0-EE86-4AAB-9840-3CD713AEF03B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.41:*:*:*:*:*:*:*", "cpeNameId": "0B47B7E6-5110-44D8-BDEA-4080A6A28FCF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.42:*:*:*:*:*:*:*", "cpeNameId": "2FF8D63B-85F6-43EC-B69F-231ECF7D0312"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.43:*:*:*:*:*:*:*", "cpeNameId": "935B8487-6BDD-4FFF-9F7E-00A86BB69CDD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.44:*:*:*:*:*:*:*", "cpeNameId": "48F99607-CA4F-4629-A68D-4349153DF423"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.45:*:*:*:*:*:*:*", "cpeNameId": "1CFB073B-B310-49DC-893B-B46DE6336F4E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.46:*:*:*:*:*:*:*", "cpeNameId": "8F2CA065-9492-44F8-9C69-B151B71803CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.47:*:*:*:*:*:*:*", "cpeNameId": "65D05643-4760-4FC5-97A3-BC5CCCA46CE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.48:*:*:*:*:*:*:*", "cpeNameId": "805F2CFA-C623-43A6-BA75-8A677011B7C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.49:*:*:*:*:*:*:*", "cpeNameId": "E9B45E20-6F1C-4909-95E4-17956AB05513"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.50:*:*:*:*:*:*:*", "cpeNameId": "02565DD0-1F69-44F5-9710-F4559686BCB5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.51:*:*:*:*:*:*:*", "cpeNameId": "4A2A0E35-E26F-470C-8293-E71B0D280E37"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.52:*:*:*:*:*:*:*", "cpeNameId": "E4259B27-55AA-4906-A88E-2F156833874F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.53:*:*:*:*:*:*:*", "cpeNameId": "2399AB59-0AAB-45C3-9359-778E0CEF66FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.54:*:*:*:*:*:*:*", "cpeNameId": "46C3AEDA-6F26-4416-BF76-1FEBBD354F3F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.55:*:*:*:*:*:*:*", "cpeNameId": "10F1A367-B071-4F9A-A2CB-0C7FF216A216"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.56:*:*:*:*:*:*:*", "cpeNameId": "DF3D3A29-EB49-483C-9737-67E18806F753"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.57:*:*:*:*:*:*:*", "cpeNameId": "D79FAF76-5403-4082-95B6-702810120DAA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.58:*:*:*:*:*:*:*", "cpeNameId": "93DF7061-A282-4290-9D97-63ACC7575826"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.59:*:*:*:*:*:*:*", "cpeNameId": "88CB7AC8-7CAA-4947-8578-AB8B5A9C7D8C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.60:*:*:*:*:*:*:*", "cpeNameId": "8B9A9641-54E1-40FE-AD41-551002220084"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.61:*:*:*:*:*:*:*", "cpeNameId": "04A60F34-73F7-49AB-AB09-1083721DE784"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.62:*:*:*:*:*:*:*", "cpeNameId": "D4A637B9-0057-4393-A19F-69879DA1CA8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.63:*:*:*:*:*:*:*", "cpeNameId": "AF1FE2CD-7236-4965-952B-6F172159373C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.64:*:*:*:*:*:*:*", "cpeNameId": "7D1F715A-1A92-4ECE-85BB-0CC907BEDD91"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.65:*:*:*:*:*:*:*", "cpeNameId": "4116C6D8-AF20-48AF-8ADA-0506911A3459"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.66:*:*:*:*:*:*:*", "cpeNameId": "4388B248-80C6-4086-B1E6-4CEE1BF7602F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.67:*:*:*:*:*:*:*", "cpeNameId": "50EF8BC5-16C3-4AD8-A2D1-1A2608CD7374"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.68:*:*:*:*:*:*:*", "cpeNameId": "5D10408F-E5C0-40B2-A497-3E71FB6DD431"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.69:*:*:*:*:*:*:*", "cpeNameId": "10504EA1-D9B1-44C8-A9EC-B8D32AAFCF5B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.70:*:*:*:*:*:*:*", "cpeNameId": "AA9003D3-8912-4A70-8B69-3F2F345FFD89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.71:*:*:*:*:*:*:*", "cpeNameId": "233CCC29-E4BB-4DAD-9F45-CEC77425C279"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.72:*:*:*:*:*:*:*", "cpeNameId": "B3336506-E63D-491E-B756-15C59D0B0EAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.73:*:*:*:*:*:*:*", "cpeNameId": "57449032-831C-45A0-9FE9-E630FB005BEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.74:*:*:*:*:*:*:*", "cpeNameId": "27086504-19AA-48F8-AAC3-FE71072F4AC6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.75:*:*:*:*:*:*:*", "cpeNameId": "858F7980-5197-42DE-B55C-CA706999F200"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.76:*:*:*:*:*:*:*", "cpeNameId": "31423569-8FBC-411E-9F95-9820746128BE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.77:*:*:*:*:*:*:*", "cpeNameId": "D3EB9447-CCF7-4803-ABBB-15477850C76B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.78:*:*:*:*:*:*:*", "cpeNameId": "68BD1635-2CE6-464F-B32D-D0AE25DEB9E5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.79:*:*:*:*:*:*:*", "cpeNameId": "8FFF3C74-22E6-4418-AD93-AA773E549428"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.80:*:*:*:*:*:*:*", "cpeNameId": "721DC148-9BCB-4B12-88AA-0BAF3A380C77"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.81:*:*:*:*:*:*:*", "cpeNameId": "9D3ED37A-08C8-4430-BB0A-EFA6D1AF1D5C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.82:*:*:*:*:*:*:*", "cpeNameId": "00536E1F-7C8D-4DDC-8629-ABE2B4EDA61B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.83:*:*:*:*:*:*:*", "cpeNameId": "6877CB77-34C0-4B45-BED7-7966B69D89F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.84:*:*:*:*:*:*:*", "cpeNameId": "614F4D67-484D-488A-8DB5-9FF8F939927B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.85:*:*:*:*:*:*:*", "cpeNameId": "C3D19825-51CE-43E1-904C-1344DB3775A9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.86:*:*:*:*:*:*:*", "cpeNameId": "2C509040-DF4B-4BD3-8428-4BB9ED4D3BEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.87:*:*:*:*:*:*:*", "cpeNameId": "4455DE42-A354-4EF5-A49A-345954CD65EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.88:*:*:*:*:*:*:*", "cpeNameId": "0F57DC5F-F143-44EE-9037-3BBF9BF3A1E7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.89:*:*:*:*:*:*:*", "cpeNameId": "D4475A2E-E667-4618-A347-10EC5EA6657D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.90:*:*:*:*:*:*:*", "cpeNameId": "2C94A5E1-6EC8-4F69-8C81-18BA6B3E22CC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.91:*:*:*:*:*:*:*", "cpeNameId": "31EE797A-51CC-46B2-B768-1FA25A37706D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.92:*:*:*:*:*:*:*", "cpeNameId": "4748A9ED-7812-4451-81CD-B75547B3C532"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.93:*:*:*:*:*:*:*", "cpeNameId": "119FC260-DEC1-4E63-AF81-2F3360E78EB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.94:*:*:*:*:*:*:*", "cpeNameId": "25A22D4C-1973-4287-B791-87F903F64B97"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.95:*:*:*:*:*:*:*", "cpeNameId": "ACD2D3C9-BA85-4EEE-9A65-FE83E3495315"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.96:*:*:*:*:*:*:*", "cpeNameId": "3B169D06-CA15-4A4A-980A-A056E6C81881"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.97:*:*:*:*:*:*:*", "cpeNameId": "A18ABB80-25F6-4328-B68F-A3B4B23763E4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.98:*:*:*:*:*:*:*", "cpeNameId": "F8BEC111-87BF-4B6C-BBF6-62EE9A763119"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.99:*:*:*:*:*:*:*", "cpeNameId": "2CE59324-24EA-46B0-939D-BA1815313EA7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.100:*:*:*:*:*:*:*", "cpeNameId": "86C29F08-DF43-426C-9E23-1E3416463DBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.101:*:*:*:*:*:*:*", "cpeNameId": "81DE128C-6A1B-4676-A99B-58B77482593A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.102:*:*:*:*:*:*:*", "cpeNameId": "FDA36DFA-EE0A-4DEE-B7C2-A2AF9F84E0CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.103:*:*:*:*:*:*:*", "cpeNameId": "FE71C8C4-8159-49DC-87F0-4A98BEA448C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.104:*:*:*:*:*:*:*", "cpeNameId": "35D6D06A-7705-4EA0-9209-55B7ED61E83A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.105:*:*:*:*:*:*:*", "cpeNameId": "B2DA3294-00F2-4509-A8B2-0F53D69F2B36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.106:*:*:*:*:*:*:*", "cpeNameId": "D337E554-D6A9-4CFC-9985-F670B7654434"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.107:*:*:*:*:*:*:*", "cpeNameId": "FE52DA4B-3ACB-4510-AA7A-9CCFE25E5B87"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.108:*:*:*:*:*:*:*", "cpeNameId": "82BED585-BBDF-41AE-B925-D4CA36F697BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.109:*:*:*:*:*:*:*", "cpeNameId": "C1526792-F597-4674-B998-9A4FF075956E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.110:*:*:*:*:*:*:*", "cpeNameId": "B48E2837-F8E0-42BA-A7D2-B9EA5A770E1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.111:*:*:*:*:*:*:*", "cpeNameId": "B52E1607-47C2-4AD5-95D0-F35A901E5D3F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.112:*:*:*:*:*:*:*", "cpeNameId": "0CDD6E73-775F-49CF-A3D6-E9054EB43D36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.113:*:*:*:*:*:*:*", "cpeNameId": "8A144377-4D4C-48F7-80AB-A8B50F86D132"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.114:*:*:*:*:*:*:*", "cpeNameId": "4B6DF9A7-218F-435C-A5AB-61A5575D9DBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.115:*:*:*:*:*:*:*", "cpeNameId": "8D64C2A7-DF73-481A-8A55-790CD5DABBC0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.116:*:*:*:*:*:*:*", "cpeNameId": "36E4D70D-9E0D-44AC-9CE9-168111BE078D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.117:*:*:*:*:*:*:*", "cpeNameId": "BFF2F68A-DA2E-4118-A4CB-E7FA7C719C97"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.118:*:*:*:*:*:*:*", "cpeNameId": "B8DEB967-1BA5-43BA-B659-5AC369F5527B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.118-2:*:*:*:*:*:*:*", "cpeNameId": "8BDE7B9C-7D49-4FB9-9095-89B0FD601AC4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.119:*:*:*:*:*:*:*", "cpeNameId": "1EBD0B5F-457A-4365-B3B0-45E4C0B21B93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.120:*:*:*:*:*:*:*", "cpeNameId": "0C712977-921D-4FD3-BCBB-6F4A86AA7594"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.121:*:*:*:*:*:*:*", "cpeNameId": "0D8947E0-FBE1-424F-BA96-F5A83CF87A3E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.122:*:*:*:*:*:*:*", "cpeNameId": "A79D9A4E-58CD-4825-9EC3-0B0499C90BF3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.123:*:*:*:*:*:*:*", "cpeNameId": "A61315CE-EC4F-4734-8B07-9670C7DAF959"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.124:*:*:*:*:*:*:*", "cpeNameId": "8B2AB2CC-ED8F-40C0-A027-7A93B70D0ABF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.125:*:*:*:*:*:*:*", "cpeNameId": "DF0EBF12-4078-42F7-A92B-5D54056AE5EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.126:*:*:*:*:*:*:*", "cpeNameId": "A2A07202-24D9-4929-93CE-AD808F353C60"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.127:*:*:*:*:*:*:*", "cpeNameId": "1AB674F5-1B69-4DE7-AF61-50787A69A5D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.128:*:*:*:*:*:*:*", "cpeNameId": "3D2F68B8-736E-4899-9B1B-ED6E8DE6CF3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.129:*:*:*:*:*:*:*", "cpeNameId": "76CD5FC7-448D-4F20-864B-3567B07D1B56"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.130:*:*:*:*:*:*:*", "cpeNameId": "C61BEEDC-1AA7-4453-9C1F-1B61D1EA024F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.131:*:*:*:*:*:*:*", "cpeNameId": "418276D9-F035-4B0B-BCCB-D5FB488D5B31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.132:*:*:*:*:*:*:*", "cpeNameId": "C5D35F68-0A1C-44A4-952A-DDDF21BC09EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.133:*:*:*:*:*:*:*", "cpeNameId": "1F548D92-C48B-4886-A2B3-6E74E8E0F55B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.134:*:*:*:*:*:*:*", "cpeNameId": "F20B9429-FA58-466C-9DFA-9E806AF804B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.135:*:*:*:*:*:*:*", "cpeNameId": "36A1C0D1-63B5-4817-8BA5-C60D3D6B6B38"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.136:*:*:*:*:*:*:*", "cpeNameId": "33C1E0F9-16D2-4829-A3BE-88C14FF70938"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.137:*:*:*:*:*:*:*", "cpeNameId": "C7C55512-FBE6-47D5-8A7A-BBD5577D17E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.138:*:*:*:*:*:*:*", "cpeNameId": "769005B9-5005-411C-B4EE-CF0C62490EF8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.139:*:*:*:*:*:*:*", "cpeNameId": "06D197F7-661E-4C49-B099-4545C422C7A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.140:*:*:*:*:*:*:*", "cpeNameId": "776A104E-F94D-406D-BF76-9B11C3365D7A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.141:*:*:*:*:*:*:*", "cpeNameId": "5035E747-DEF4-4DA3-83CF-5BD2A6A9A54A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.142:*:*:*:*:*:*:*", "cpeNameId": "D4080EBB-DEB7-4E16-BE55-BEFAFB7E93E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.143:*:*:*:*:*:*:*", "cpeNameId": "853BB9C3-4467-4FD8-9A46-E2009C5F4357"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.144:*:*:*:*:*:*:*", "cpeNameId": "2AEB23BA-8389-4940-B626-9E7DAF29822D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.145:*:*:*:*:*:*:*", "cpeNameId": "84991F4A-4107-48A6-8D6E-D85F2EF55EBF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.146:*:*:*:*:*:*:*", "cpeNameId": "7A9370E6-CF76-4989-9368-76B2E434A857"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.147:*:*:*:*:*:*:*", "cpeNameId": "DEE46645-5E8C-4F37-BCD0-322E77397F59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.148:*:*:*:*:*:*:*", "cpeNameId": "2093C809-0485-44CC-B0ED-5C2B7DBFEA99"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.149:*:*:*:*:*:*:*", "cpeNameId": "98DAC7B2-8F21-49EF-B53B-23B8A22A8975"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.150:*:*:*:*:*:*:*", "cpeNameId": "E28A93DC-B824-4692-A0F3-B5CAB77B3A48"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.151:*:*:*:*:*:*:*", "cpeNameId": "365D8293-E1BC-4F24-A5FF-B7E12943EE70"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.152:*:*:*:*:*:*:*", "cpeNameId": "FFEFA6D6-3D07-4911-A0D8-3C7A27A95143"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.153:*:*:*:*:*:*:*", "cpeNameId": "051C7A5C-25A0-408C-AFFA-19DB17B0DFE2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.154:*:*:*:*:*:*:*", "cpeNameId": "34798860-1C32-431D-8095-4D25E900D047"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.155:*:*:*:*:*:*:*", "cpeNameId": "BCB220C7-6880-4054-B512-91A8A5F683CE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.156:*:*:*:*:*:*:*", "cpeNameId": "3DDC9F23-49BA-42AE-9251-D0DE0DEF8DD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.157:*:*:*:*:*:*:*", "cpeNameId": "B65EAD3A-8DA1-40A2-B14F-C3D61E19D592"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.158:*:*:*:*:*:*:*", "cpeNameId": "D8A0F47B-9F15-4DC9-9134-C2410BF8E55E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.159:*:*:*:*:*:*:*", "cpeNameId": "FD07FFAC-9B06-43E9-A1AE-F085B99D2A65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.160:*:*:*:*:*:*:*", "cpeNameId": "B6133234-102E-4B8C-A0F0-E9E1538BD098"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.161:*:*:*:*:*:*:*", "cpeNameId": "E03ADD0A-1D87-4772-BE21-A5ED5FC96BE8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.162:*:*:*:*:*:*:*", "cpeNameId": "39EDA362-7B7A-4D97-B8FB-B7B9696B05E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.163:*:*:*:*:*:*:*", "cpeNameId": "6D54CD36-C5A1-437B-85B6-B59A45D1E007"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.164:*:*:*:*:*:*:*", "cpeNameId": "00F1FD43-244A-4CC2-B16C-BC98C99FBB27"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.165:*:*:*:*:*:*:*", "cpeNameId": "D34CA2D9-09FB-473B-9C0F-0C392B3132F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.166:*:*:*:*:*:*:*", "cpeNameId": "4AE874DA-0375-4E7E-84DC-BCAB385B5C30"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.167:*:*:*:*:*:*:*", "cpeNameId": "DD93F0EB-9B9D-4F5B-BDE0-F0F251381EB2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.168:*:*:*:*:*:*:*", "cpeNameId": "D28DA286-D5D2-40D2-82CA-FC8C79CC5F23"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.169:*:*:*:*:*:*:*", "cpeNameId": "8A84A955-ECC0-4B19-B09D-5BB422561099"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.170:*:*:*:*:*:*:*", "cpeNameId": "79343991-197E-4074-A17D-DA9A050EED4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.171:*:*:*:*:*:*:*", "cpeNameId": "BD8EBDB7-7226-4A65-8E8E-74D5A3F671B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.172:*:*:*:*:*:*:*", "cpeNameId": "0CA2E704-2400-4391-9D42-637DC8C25BED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.173:*:*:*:*:*:*:*", "cpeNameId": "8A6A2923-E6F6-4B77-9F0E-BA6FD58DE8D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.174:*:*:*:*:*:*:*", "cpeNameId": "18805724-EB20-4960-8D96-D7D17DDBDE30"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.175:*:*:*:*:*:*:*", "cpeNameId": "5BD11FEB-E163-4734-823A-A784C4C6FE9A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.176:*:*:*:*:*:*:*", "cpeNameId": "960EB99C-0D42-4892-9989-4473683490E4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.177:*:*:*:*:*:*:*", "cpeNameId": "5A04EB31-D67D-4DF0-81D6-D2EB42FCDCD2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.178:*:*:*:*:*:*:*", "cpeNameId": "B2F1908E-4EA9-490A-A154-8B4621189CAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.179:*:*:*:*:*:*:*", "cpeNameId": "66E97557-5D46-4DEB-B1DE-C668E5B8B3FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.180:*:*:*:*:*:*:*", "cpeNameId": "9979A105-8BA0-4AE2-BDFB-7D79DE2FBBFB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.181:*:*:*:*:*:*:*", "cpeNameId": "90E6E2D5-7A6D-4E95-9A52-FF7B9A8A2441"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.182:*:*:*:*:*:*:*", "cpeNameId": "69A2955B-EC3D-41AF-978F-CBFBC556F92D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.183:*:*:*:*:*:*:*", "cpeNameId": "D3F33DDF-A839-49B6-B3B8-EEACA952A9E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.184:*:*:*:*:*:*:*", "cpeNameId": "19F1F05C-A087-44E8-983E-2EB143DC1D8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.185:*:*:*:*:*:*:*", "cpeNameId": "F145BE0F-E7F0-442E-BDA7-C63C7E168E2B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.186:*:*:*:*:*:*:*", "cpeNameId": "B4D0C3FD-6476-413B-BF42-8C2641E289AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.187:*:*:*:*:*:*:*", "cpeNameId": "8D0F70F4-570E-4C9E-B51B-42BB544A72EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.188:*:*:*:*:*:*:*", "cpeNameId": "780D6AF4-4E15-4413-832E-0F50248A4B0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.189:*:*:*:*:*:*:*", "cpeNameId": "20F1C4AC-ECCF-4001-8CEA-457D8E6BDE3E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.190:*:*:*:*:*:*:*", "cpeNameId": "2CCC5886-AA10-470F-B2E9-B38438848CD2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.191:*:*:*:*:*:*:*", "cpeNameId": "0E0DFF46-8703-4A82-B4CB-DD923D09ACA8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.192:*:*:*:*:*:*:*", "cpeNameId": "3456DA2C-41BD-4021-B3F4-C0C7EFBA35B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.193:*:*:*:*:*:*:*", "cpeNameId": "44D8482E-577B-4B3E-A84D-A1FA11CE744D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.194:*:*:*:*:*:*:*", "cpeNameId": "278C5BBE-D4E2-43AC-B338-0B4C819B16FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.195:*:*:*:*:*:*:*", "cpeNameId": "30A50973-7C58-419D-8FED-111FD1615CD3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.196:*:*:*:*:*:*:*", "cpeNameId": "68839FE1-F3CD-49BF-902D-28A47A024FC8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.197:*:*:*:*:*:*:*", "cpeNameId": "8C685C52-5BE6-4D58-BBE3-AE69FF1B758C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.198:*:*:*:*:*:*:*", "cpeNameId": "2F461C57-E447-4647-BFFC-C44767B5CDEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.199:*:*:*:*:*:*:*", "cpeNameId": "65EF0724-0838-446F-85BC-A51CDD060978"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.200:*:*:*:*:*:*:*", "cpeNameId": "16752BB9-187D-48B0-8E87-D676FF91C631"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.201:*:*:*:*:*:*:*", "cpeNameId": "2BDCFC6A-E39A-4AD7-ABFA-5F15BDB22286"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.202:*:*:*:*:*:*:*", "cpeNameId": "CD1E47CB-CE3F-4154-8131-133CE38302D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.203:*:*:*:*:*:*:*", "cpeNameId": "73D48406-40CE-4D07-B08C-6C6ED58D13A3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.204:*:*:*:*:*:*:*", "cpeNameId": "6231157D-84BB-46D9-B0CF-AAF2FD31D3C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.205:*:*:*:*:*:*:*", "cpeNameId": "253E528A-1462-4B93-9978-C23C7DD14FF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.206:*:*:*:*:*:*:*", "cpeNameId": "2233D818-CCDB-4166-901F-29D032F730AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.207:*:*:*:*:*:*:*", "cpeNameId": "25D133DF-5D1B-46EA-9019-C81A1623C74D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.208:*:*:*:*:*:*:*", "cpeNameId": "1172736D-6A80-4AD1-B861-43797791A6F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.209:*:*:*:*:*:*:*", "cpeNameId": "FD71CF2C-F734-4E31-AAB7-41AC133EBFDA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.210:*:*:*:*:*:*:*", "cpeNameId": "2BA3CAE2-A53E-4516-9E32-DCF40D28A710"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.211:*:*:*:*:*:*:*", "cpeNameId": "50B9C1D0-7B42-43CC-9103-A96EA1B8D3B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.212:*:*:*:*:*:*:*", "cpeNameId": "D12B8C79-B286-47EA-86E0-4C415154600F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.213:*:*:*:*:*:*:*", "cpeNameId": "C90B250E-D388-459F-91FF-19CF7A6292AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.214:*:*:*:*:*:*:*", "cpeNameId": "EE578B4A-6420-46EA-8C33-994379131EB6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.215:*:*:*:*:*:*:*", "cpeNameId": "5581DCBE-D268-477A-AA1F-B4204F1CE309"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.216:*:*:*:*:*:*:*", "cpeNameId": "4633CDC1-D620-43BD-A59B-1CCE17C70740"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.217:*:*:*:*:*:*:*", "cpeNameId": "62DDB6C3-A7A1-466E-A101-6FE1AA552C94"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.218:*:*:*:*:*:*:*", "cpeNameId": "F6798282-7FF8-43E0-8B9D-1A9BDB0E3E48"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.219:*:*:*:*:*:*:*", "cpeNameId": "57D287C6-0EF3-4B47-A893-F3712CC12478"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.220:*:*:*:*:*:*:*", "cpeNameId": "A0B09A4E-2318-48CE-810F-84F2E721D722"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.221:*:*:*:*:*:*:*", "cpeNameId": "0F3D6297-A92E-479B-91F3-4162BFDC9184"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.222:*:*:*:*:*:*:*", "cpeNameId": "14FFED1D-629A-428E-A473-8327DB224D64"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.223:*:*:*:*:*:*:*", "cpeNameId": "9625BCC9-FBBE-42C7-82C2-F7D75F866E53"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.224:*:*:*:*:*:*:*", "cpeNameId": "D5BC9FF8-1337-4A3B-A66C-CC31C701B22C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.225:*:*:*:*:*:*:*", "cpeNameId": "2ED5BE75-F496-47BA-B521-36F6844FFE01"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.226:*:*:*:*:*:*:*", "cpeNameId": "02E6B2D5-DA63-4574-90D7-15F7EAA70DA1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.227:*:*:*:*:*:*:*", "cpeNameId": "EB84BCF0-8987-46AC-9E6F-D9E17DEFD1D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.228:*:*:*:*:*:*:*", "cpeNameId": "7ACE67A9-9EAD-4AB0-A99D-F37993392E37"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.229:*:*:*:*:*:*:*", "cpeNameId": "ED71AA15-673C-416E-9CAF-3440D41A1E22"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.230:*:*:*:*:*:*:*", "cpeNameId": "CB9E000D-CEAE-488E-B9F7-756EF13ECBE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.231:*:*:*:*:*:*:*", "cpeNameId": "F79CB637-6B2C-46DC-BD81-8B0583AAC33C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.232:*:*:*:*:*:*:*", "cpeNameId": "6CDDD19B-7E18-4A0E-AC09-B86E9401F516"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.233:*:*:*:*:*:*:*", "cpeNameId": "3EF64EBF-557B-4AB2-B2E5-0D03035197DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.234:*:*:*:*:*:*:*", "cpeNameId": "9E2D001E-2282-4A78-AB00-B37189C8CD59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.235:*:*:*:*:*:*:*", "cpeNameId": "31A795CF-5B8E-4B6C-94DC-3B37A8423823"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.236:*:*:*:*:*:*:*", "cpeNameId": "813866EF-11A3-41D9-9735-ECFEFCDBA1AD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.237:*:*:*:*:*:*:*", "cpeNameId": "C0F81506-A565-4F17-BEC9-1B54FAD059CC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.238:*:*:*:*:*:*:*", "cpeNameId": "1509FEA6-FA47-46C8-A117-8913CCFDB5AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.239:*:*:*:*:*:*:*", "cpeNameId": "C05A4F03-15E3-4C08-8958-6A057F7911B8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.240:*:*:*:*:*:*:*", "cpeNameId": "4EAF2417-3F1E-446A-AD33-77B21AE04E06"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.241:*:*:*:*:*:*:*", "cpeNameId": "8FFB9F0D-3B6F-494F-89AC-EAC4438C0B1C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.242:*:*:*:*:*:*:*", "cpeNameId": "A27EEF03-9001-4C7D-B063-C1FE8FC05EE0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.243:*:*:*:*:*:*:*", "cpeNameId": "529CAB2E-5F5C-4699-BC48-E93341EE6B67"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.244:*:*:*:*:*:*:*", "cpeNameId": "9FF0D590-EAB2-4B36-BBE2-008A4E800722"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.245:*:*:*:*:*:*:*", "cpeNameId": "590BFECB-A2B4-4C3F-9017-6D565899E1F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.246:*:*:*:*:*:*:*", "cpeNameId": "CB0BB20C-811F-4B9B-B827-3A42CA5539D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.247:*:*:*:*:*:*:*", "cpeNameId": "B532E91C-FEBE-4C29-B9C7-E899AF134D48"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.248:*:*:*:*:*:*:*", "cpeNameId": "8222442A-C4EC-45CD-9A4C-76E562756CBE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.249:*:*:*:*:*:*:*", "cpeNameId": "444D84A8-CE8F-4BE2-A463-B4E693104BA6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.250:*:*:*:*:*:*:*", "cpeNameId": "7243A073-0900-4470-98B8-FE5839442E3F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.251:*:*:*:*:*:*:*", "cpeNameId": "B4EAB6D9-28E2-45CD-BE10-5EF905373AF3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.252:*:*:*:*:*:*:*", "cpeNameId": "CF09CCB5-9276-41A3-8330-8037A633B793"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.253:*:*:*:*:*:*:*", "cpeNameId": "9BB592D7-81CC-4DE7-9256-FAE66467FFD7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.254:*:*:*:*:*:*:*", "cpeNameId": "C78BD176-2DFC-4BAE-95C1-3A495252A65A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.255:*:*:*:*:*:*:*", "cpeNameId": "2AF01112-197B-43DE-9BF8-940F1114DC73"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.256:*:*:*:*:*:*:*", "cpeNameId": "220C4EBF-9B86-4AB1-AD37-100994B4606D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.257:*:*:*:*:*:*:*", "cpeNameId": "34F7CCEF-8221-4005-A144-93D314E39C81"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.258:*:*:*:*:*:*:*", "cpeNameId": "19A0EB8D-1846-4C52-BEEA-F6CC1691C50C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.259:*:*:*:*:*:*:*", "cpeNameId": "B6F4132F-B9B0-4168-98D7-23FCCBDD4034"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.260:*:*:*:*:*:*:*", "cpeNameId": "E7F6FAE1-DF95-48E5-94D9-C505AF592766"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.261:*:*:*:*:*:*:*", "cpeNameId": "3BCD7AF9-57AB-41EC-99D4-59DD6DCA3703"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.262:*:*:*:*:*:*:*", "cpeNameId": "64A647E0-3291-4C17-9D9A-2BC6DDF24E90"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.263:*:*:*:*:*:*:*", "cpeNameId": "1BCAE71C-8745-49B7-BE6F-5CB2A8D517AF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.264:*:*:*:*:*:*:*", "cpeNameId": "7C4D53E7-3844-4706-815D-BD08282AF4B8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.265:*:*:*:*:*:*:*", "cpeNameId": "F18EF476-4996-436A-B878-1F7704C4BA6B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.266:*:*:*:*:*:*:*", "cpeNameId": "6318BBB0-A46C-48AE-9E42-7F578BCE43DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.267:*:*:*:*:*:*:*", "cpeNameId": "70B14EE0-CF5D-4C62-9890-766155C47DAE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.268:*:*:*:*:*:*:*", "cpeNameId": "ABF8E5BF-203F-406C-9375-6A59B113BBD9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.269:*:*:*:*:*:*:*", "cpeNameId": "B09A3D45-168E-4202-99BC-79DFB2B525C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.270:*:*:*:*:*:*:*", "cpeNameId": "145FF0A9-3D06-4565-8889-49C01832E864"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.271:*:*:*:*:*:*:*", "cpeNameId": "5433BF7F-2B40-4A88-BD8A-74EBE7EAE74C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.272:*:*:*:*:*:*:*", "cpeNameId": "28BF7326-B002-4098-96DB-D8FADE599CA5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.273:*:*:*:*:*:*:*", "cpeNameId": "94E36506-E573-4DEA-888B-744D1C8405D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.274:*:*:*:*:*:*:*", "cpeNameId": "2A72354A-578E-4F14-93EB-43F27D1576A9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.275:*:*:*:*:*:*:*", "cpeNameId": "426D0CBB-8FB3-41BC-A8A9-A736E70DAC53"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.276:*:*:*:*:*:*:*", "cpeNameId": "25BF6B74-B708-44E5-9B77-A5D761C23F46"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.277:*:*:*:*:*:*:*", "cpeNameId": "DAAAE94E-0CB1-45F6-B0C3-F635B18E632E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.278:*:*:*:*:*:*:*", "cpeNameId": "7B05EE50-A29E-4B6E-A5EE-9BCAA71189B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.279:*:*:*:*:*:*:*", "cpeNameId": "499DEB1C-5D4D-4BE5-8C11-6FD0625F2C36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.280:*:*:*:*:*:*:*", "cpeNameId": "82BC603A-39C9-4AF9-825C-D60073FD89E9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.281:*:*:*:*:*:*:*", "cpeNameId": "AA26E4CE-A2EC-4364-B383-EE0D9C01E0FF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.282:*:*:*:*:*:*:*", "cpeNameId": "A71BD6DD-9C99-4280-9CE6-2317277093B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.283:*:*:*:*:*:*:*", "cpeNameId": "96B8EF49-D308-498E-9453-CCDEDFD6F1CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.284:*:*:*:*:*:*:*", "cpeNameId": "635FD61D-F2A4-4489-AD75-12D1139945DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.285:*:*:*:*:*:*:*", "cpeNameId": "8211CA20-56DB-414D-A7EB-61321EA0634F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.286:*:*:*:*:*:*:*", "cpeNameId": "186F5E6F-D0A3-4136-9F39-956426280FC1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.287:*:*:*:*:*:*:*", "cpeNameId": "236744C4-C218-40C5-8C9E-9072697D85E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.288:*:*:*:*:*:*:*", "cpeNameId": "971D0042-FFBE-4691-ABAD-B3165231CA50"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.289:*:*:*:*:*:*:*", "cpeNameId": "6FAF8454-2869-4D87-979E-9A4D4DD049B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.290:*:*:*:*:*:*:*", "cpeNameId": "5EEE72A7-AE8B-416E-86F4-C879A022DD84"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.291:*:*:*:*:*:*:*", "cpeNameId": "178F9E75-B366-4C4F-9935-07403284159E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.292:*:*:*:*:*:*:*", "cpeNameId": "BFB882D2-DC9B-4211-9265-594F1FEE3D8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.293:*:*:*:*:*:*:*", "cpeNameId": "F181ED04-D2A3-4E9C-B80D-F57C0617297B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.294:*:*:*:*:*:*:*", "cpeNameId": "8AFA87B0-C839-4A7F-961B-ABE5CA349819"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.295:*:*:*:*:*:*:*", "cpeNameId": "9BFFCA5D-A751-449A-B8AB-2D26A90AFBE3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.296:*:*:*:*:*:*:*", "cpeNameId": "7247CC3C-3671-4C0D-AD87-559BEDAAEBC5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.297:*:*:*:*:*:*:*", "cpeNameId": "498B3288-2A00-4DB0-8426-A5FD866506EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.298:*:*:*:*:*:*:*", "cpeNameId": "D6251071-E7F2-4748-9DF7-27FCA27BD552"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.299:*:*:*:*:*:*:*", "cpeNameId": "03440F15-FEB8-42BC-BD63-6E954F0750DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.300:*:*:*:*:*:*:*", "cpeNameId": "E4568623-9282-496E-AA3F-E3E790BDFC1F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.301:*:*:*:*:*:*:*", "cpeNameId": "7CB5DA04-B4B0-4349-85B2-1342A953EED9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.302:*:*:*:*:*:*:*", "cpeNameId": "A3F297C6-A6AB-4C5F-9821-76E8E3411796"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.303:*:*:*:*:*:*:*", "cpeNameId": "8B892759-81F1-45AE-A7F5-2D0641A039E4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.304:*:*:*:*:*:*:*", "cpeNameId": "0936A133-FA0A-44C7-AE7F-5C4C1B16DDD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.305:*:*:*:*:*:*:*", "cpeNameId": "FC874434-AC4D-41A1-8B43-757808B2C957"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.306:*:*:*:*:*:*:*", "cpeNameId": "49CE5CB3-4BA8-41AF-B5EB-9C17E66E0423"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.307:*:*:*:*:*:*:*", "cpeNameId": "A8607B67-F6D3-4684-ADDC-CBACCC6DA92C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.308:*:*:*:*:*:*:*", "cpeNameId": "A4130D9C-E192-4437-A85F-6D04F21F2922"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.309:*:*:*:*:*:*:*", "cpeNameId": "B5E4DA49-77F3-4693-90B0-FC8C2C38F402"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.310:*:*:*:*:*:*:*", "cpeNameId": "2E6D4833-8E6A-45E4-A620-2BE985362CF2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.311:*:*:*:*:*:*:*", "cpeNameId": "79DA4B1F-6BE0-40B0-8496-6499C590D8F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.312:*:*:*:*:*:*:*", "cpeNameId": "0268D7D3-1545-4DC8-A418-AA77BC04C9E7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.313:*:*:*:*:*:*:*", "cpeNameId": "3B30BB14-4B29-4EC6-A810-DC776B5C6E34"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.314:*:*:*:*:*:*:*", "cpeNameId": "369CEBAF-43F1-4E56-B6B9-C0057CF18CB9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.315:*:*:*:*:*:*:*", "cpeNameId": "D1C8EC15-FFB1-440F-9EEA-2F306393A1EE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.316:*:*:*:*:*:*:*", "cpeNameId": "7D65AEC1-209F-4CE2-A5FA-4D3FB56FD265"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.317:*:*:*:*:*:*:*", "cpeNameId": "E9C2D84D-3412-4889-868B-AEA2AD1982C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.318:*:*:*:*:*:*:*", "cpeNameId": "BFC397A0-62B9-4BCF-8907-501A3CDF1CD6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.319:*:*:*:*:*:*:*", "cpeNameId": "ACE5B4F6-6FB3-41D2-AA6D-E2586039CC21"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.320:*:*:*:*:*:*:*", "cpeNameId": "3FDC48E9-0721-483D-A020-FEF09F03EA18"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.321:*:*:*:*:*:*:*", "cpeNameId": "8D6E7C06-CA6C-4909-90F2-2FC40A514CF9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.322:*:*:*:*:*:*:*", "cpeNameId": "D7FA71FA-20D6-4321-80E4-B25B40B76038"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.323:*:*:*:*:*:*:*", "cpeNameId": "B72EE284-1EC1-4237-813A-3E67D1F179F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.324:*:*:*:*:*:*:*", "cpeNameId": "43FA688C-7739-40FD-976B-5FACDDE03C7F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.325:*:*:*:*:*:*:*", "cpeNameId": "1EC6A2D9-C8EB-4DAE-8A58-A9B47A8DA4B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20:*:*:*:*:*:*:*", "cpeNameId": "8C67D194-B1D7-4051-AA33-92C51027DFD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20:-:*:*:*:*:*:*", "cpeNameId": "FD6751D9-F3BF-44A1-96E9-14200EFB10F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20:rc1:*:*:*:*:*:*", "cpeNameId": "2E165BBB-7ACE-4705-A561-4148FDEA5546"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20:rc2:*:*:*:*:*:*", "cpeNameId": "F1D314A9-1DF2-4F05-A2AC-A4E19C87344D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20:rc3:*:*:*:*:*:*", "cpeNameId": "62C17388-85F5-4B5C-8B00-C7E8FD35347D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20:rc4:*:*:*:*:*:*", "cpeNameId": "6CC936D0-B763-4020-BC02-D86893FAEDA5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20:rc5:*:*:*:*:*:*", "cpeNameId": "5502C362-1E75-45CF-A175-41ADAD728EC1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.1:*:*:*:*:*:*:*", "cpeNameId": "30D0FBCC-5241-4766-BF83-F895B210AEFF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.2:*:*:*:*:*:*:*", "cpeNameId": "19FD564F-6544-473E-AE92-E9F3A34A3915"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.3:*:*:*:*:*:*:*", "cpeNameId": "440CABC7-91B1-45F6-A7D0-7D651E83E4C4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.4:*:*:*:*:*:*:*", "cpeNameId": "687316F0-7676-4930-B35C-65F5785ACDB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.5:*:*:*:*:*:*:*", "cpeNameId": "08A1755A-6A9C-46E0-AF0D-114FBF5AD672"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.6:*:*:*:*:*:*:*", "cpeNameId": "E20224EA-90C0-488A-A112-50B24770FB18"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.7:*:*:*:*:*:*:*", "cpeNameId": "C7DC8B10-AA07-4A31-B69D-1F80B66B87A5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.8:*:*:*:*:*:*:*", "cpeNameId": "8308368B-FBD0-47FF-BBB5-31B3F2137230"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.9:*:*:*:*:*:*:*", "cpeNameId": "C6D9451D-8272-441F-BE73-D603AD128A54"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.10:*:*:*:*:*:*:*", "cpeNameId": "1A7CEC42-FD0B-42FC-8535-425F343C800B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.11:*:*:*:*:*:*:*", "cpeNameId": "24C953F7-E916-4832-8B61-7E38B4DC8D3E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.12:*:*:*:*:*:*:*", "cpeNameId": "5C414ABD-B2DB-462C-8158-C8BBD94F140B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.13:*:*:*:*:*:*:*", "cpeNameId": "585B3F97-9003-4712-BA9E-79321E91B741"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.14:*:*:*:*:*:*:*", "cpeNameId": "53CB87AA-41C1-46DC-9856-CA45D75B0014"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.15:*:*:*:*:*:*:*", "cpeNameId": "A15CF5B3-5D88-4D8E-AD1F-7713BEB5C30F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.16:*:*:*:*:*:*:*", "cpeNameId": "C046C34D-86F8-4C72-9ADC-FA20CEE3F445"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.17:*:*:*:*:*:*:*", "cpeNameId": "4F253460-0D25-4B15-BEFB-2C9D38696714"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:*:*:*:*:*:*:*", "cpeNameId": "F1A9DC6E-F2B2-49B8-967F-B40F23FAFB7E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:-:*:*:*:*:*:*", "cpeNameId": "68861FE5-8011-45EC-81E6-CAD841D55D3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:rc1:*:*:*:*:*:*", "cpeNameId": "C4BD32F7-499E-4227-AF6D-59072E60F157"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:rc2:*:*:*:*:*:*", "cpeNameId": "DD1A0E3E-284D-4F8D-BF08-4AE49A833CC9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:rc3:*:*:*:*:*:*", "cpeNameId": "2445098F-589D-4D79-8677-4B95F63C151A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:rc4:*:*:*:*:*:*", "cpeNameId": "2D923219-DCF7-4DC8-AE44-20988AA062A0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:rc5:*:*:*:*:*:*", "cpeNameId": "02886709-FD0A-4947-8146-A318E301776F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:rc6:*:*:*:*:*:*", "cpeNameId": "03288CF7-0A3E-48CB-BBA7-F9EE8ABBC436"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:rc7:*:*:*:*:*:*", "cpeNameId": "7FDFAB88-77F1-48D7-ADBF-0E44ECE86EBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.1:*:*:*:*:*:*:*", "cpeNameId": "D72D410B-8C2E-4851-99A3-F77FBECB7192"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.2:*:*:*:*:*:*:*", "cpeNameId": "985EBB6A-4987-4667-B8DE-311EBD874180"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.3:*:*:*:*:*:*:*", "cpeNameId": "DC64E4B7-3DB1-4E70-8BCC-CDECB8D31362"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.4:*:*:*:*:*:*:*", "cpeNameId": "B277C12A-C8A3-4E99-B157-821EF02AAD43"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.5:*:*:*:*:*:*:*", "cpeNameId": "D7759414-6475-4870-B8D1-EC7CC9251787"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.6:*:*:*:*:*:*:*", "cpeNameId": "4FD20397-5105-42E9-A718-85812EC83A0C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.7:*:*:*:*:*:*:*", "cpeNameId": "3E7A5DCA-0363-44FE-B21B-17BD8D97542B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.8:*:*:*:*:*:*:*", "cpeNameId": "FD8EA77C-B293-4769-962F-F04BF5671CE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.9:*:*:*:*:*:*:*", "cpeNameId": "50FF6FD7-302E-4015-82D5-647A4C6330EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.10:*:*:*:*:*:*:*", "cpeNameId": "AF3FD6C7-DA7B-4070-92DE-6B670AD96588"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.11:*:*:*:*:*:*:*", "cpeNameId": "BDB9CFFC-3980-48D5-94A2-7B8BB9141797"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.12:*:*:*:*:*:*:*", "cpeNameId": "479AF2D1-C2BD-4C9A-A595-737A34153CA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.13:*:*:*:*:*:*:*", "cpeNameId": "567ACE3B-A900-44C1-8E1A-CED4090B1BE8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.14:*:*:*:*:*:*:*", "cpeNameId": "F3477A97-8034-4BB5-9E2D-1401A7346F7A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.15:*:*:*:*:*:*:*", "cpeNameId": "06CFCE19-7968-4803-BB10-B0FC75D8CD98"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.16:*:*:*:*:*:*:*", "cpeNameId": "75E407ED-7B92-420D-81F5-62766D1CB144"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.17:*:*:*:*:*:*:*", "cpeNameId": "F5B8EAB8-B0FA-4766-9008-A04B31F2A44B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.18:*:*:*:*:*:*:*", "cpeNameId": "E04C3C10-48FE-466C-A251-7862AF2EAE03"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.19:*:*:*:*:*:*:*", "cpeNameId": "2F0ADCFD-FCE8-4617-BEB1-7FA793BC11E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.20:*:*:*:*:*:*:*", "cpeNameId": "BDDC588A-C797-45AC-A0BB-DAD27E22B169"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.21:*:*:*:*:*:*:*", "cpeNameId": "ADFBAC21-4341-4D67-BA2C-832D6C60DAE0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:*:*:*:*:*:*:*", "cpeNameId": "54A3A8C8-F682-431C-B4CD-1F0A788869DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:-:*:*:*:*:*:*", "cpeNameId": "67CBC5E4-B5FE-477E-A138-EDED2966BE18"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:rc1:*:*:*:*:*:*", "cpeNameId": "F39A244D-E0F0-4DCC-AD7F-E15708AB2EC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:rc2:*:*:*:*:*:*", "cpeNameId": "77CA693C-812E-4A6E-A089-665FDADA5C0A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:rc3:*:*:*:*:*:*", "cpeNameId": "DFDA10B2-0129-4B2C-A521-15357B8A1915"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:rc4:*:*:*:*:*:*", "cpeNameId": "757115D8-A302-4C43-8E3D-147732BC8D76"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:rc5:*:*:*:*:*:*", "cpeNameId": "D945FFB9-09EC-432E-8ADC-8DD7BF1425D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:rc6:*:*:*:*:*:*", "cpeNameId": "D49F9C63-A58E-4B0D-BEF2-747DC11400DE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:rc7:*:*:*:*:*:*", "cpeNameId": "41B60E1E-725B-49BB-BAD2-49F4782B541B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.1:*:*:*:*:*:*:*", "cpeNameId": "9208299B-C868-470C-AB8C-3A30CC019E6E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.2:*:*:*:*:*:*:*", "cpeNameId": "2D16B549-05AC-4BA5-82C1-4427346FCCF4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.3:*:*:*:*:*:*:*", "cpeNameId": "5431B6CE-299C-491D-92AD-1A8D9072719B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.4:*:*:*:*:*:*:*", "cpeNameId": "F26D0108-392B-453D-9A12-FCF4079344BE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.5:*:*:*:*:*:*:*", "cpeNameId": "F897824B-28D1-4016-9917-A2A1797B62D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.6:*:*:*:*:*:*:*", "cpeNameId": "C9CA624B-39C9-4830-B160-05E7FCF09D31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.7:*:*:*:*:*:*:*", "cpeNameId": "994E581F-695C-4184-8A34-1E9FE8B84F93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.8:*:*:*:*:*:*:*", "cpeNameId": "D33D7A54-7ACE-438C-9ECC-1E06D0C93588"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.9:*:*:*:*:*:*:*", "cpeNameId": "48DFF9BD-88B8-48DB-950E-281038152F6F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.10:*:*:*:*:*:*:*", "cpeNameId": "12542ACC-E1CB-47D7-AFC8-0B24BB2F7DA4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.11:*:*:*:*:*:*:*", "cpeNameId": "CDDEA9C3-FB0A-4C54-AF83-BBE40DFE29A3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.12:*:*:*:*:*:*:*", "cpeNameId": "E4ACF724-E5E7-4B3E-9457-E52CF676CBB5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.13:*:*:*:*:*:*:*", "cpeNameId": "DB88B940-85D4-4644-8772-90F42B7DC544"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.14:*:*:*:*:*:*:*", "cpeNameId": "F60C9252-9886-478D-9343-2232B706DA06"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.15:*:*:*:*:*:*:*", "cpeNameId": "6868170C-EE5E-4A7F-A201-B854E66C0240"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.16:*:*:*:*:*:*:*", "cpeNameId": "42B36DEC-CDB3-4CA4-9DB4-24F1A6FD275E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.17:*:*:*:*:*:*:*", "cpeNameId": "878CFEA9-CB28-4BFA-8360-D439385AD5BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.18:*:*:*:*:*:*:*", "cpeNameId": "64D36E7C-F03D-4C82-A5FA-2884D5544CAC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.19:*:*:*:*:*:*:*", "cpeNameId": "30EEE361-F28F-4B03-ADEE-CF34BB6BE917"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.20:*:*:*:*:*:*:*", "cpeNameId": "C4D5E875-B03B-40D6-88EA-0F26A8C86E29"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.21:*:*:*:*:*:*:*", "cpeNameId": "E5EE3A38-80F6-4427-ADDD-DE8598A449C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2:*:*:*:*:*:*:*", "cpeNameId": "708DF5F1-3FC2-4692-8628-23A2BCD56CDC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2:-:*:*:*:*:*:*", "cpeNameId": "4A9A1D62-6315-4B91-BEC9-AF9EF6F6FDAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2:rc1:*:*:*:*:*:*", "cpeNameId": "84163FF3-5555-41C3-B321-35C2D89A6854"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2:rc2:*:*:*:*:*:*", "cpeNameId": "F7A55C0A-44F2-4CD3-8A0F-9CFECF21F0D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2:rc3:*:*:*:*:*:*", "cpeNameId": "A5798A8D-D141-4085-B19B-9D32403E837C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2:rc4:*:*:*:*:*:*", "cpeNameId": "6AD74851-D9E8-4C2D-9E0E-176FF60A600D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.1:*:*:*:*:*:*:*", "cpeNameId": "7E156392-773D-4495-A4CE-F5D843C5FEBF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.2:*:*:*:*:*:*:*", "cpeNameId": "A11D4292-91CC-4F12-AF01-769D20986BC1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.3:*:*:*:*:*:*:*", "cpeNameId": "DF31FE84-23CC-48CD-BACC-C2F5879023E9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.4:*:*:*:*:*:*:*", "cpeNameId": "CDF894F7-EB7A-4A0E-AC8F-F87B6AFE4311"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.5:*:*:*:*:*:*:*", "cpeNameId": "992ABD6A-693C-4DB3-B023-B37D66796BD0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.6:*:*:*:*:*:*:*", "cpeNameId": "D8674307-6283-4A09-BF4E-3FACDF808289"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.7:*:*:*:*:*:*:*", "cpeNameId": "12B6C6F1-32F2-4C0F-82EA-492CBC7185D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.8:*:*:*:*:*:*:*", "cpeNameId": "0541FF1A-3588-4B1B-971D-7EBAEBD703EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.9:*:*:*:*:*:*:*", "cpeNameId": "E3FD35AB-B680-4EED-BCAB-106AAC3E9E46"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.10:*:*:*:*:*:*:*", "cpeNameId": "0A60430B-1D1E-43B4-BEEA-190D558DD6E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.11:*:*:*:*:*:*:*", "cpeNameId": "E35007C9-A8F4-4E0B-B996-627F9F3CA3A9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.12:*:*:*:*:*:*:*", "cpeNameId": "EF4B624E-6F70-4C9B-A9DE-2C711C45053A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.13:*:*:*:*:*:*:*", "cpeNameId": "48762B71-2980-485A-843C-0566FDA8F7AD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.14:*:*:*:*:*:*:*", "cpeNameId": "25A6C343-6D24-43CB-966C-DD6A57DB8AD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.15:*:*:*:*:*:*:*", "cpeNameId": "A6E25845-65F8-4B58-8B1F-645850B981D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.16:*:*:*:*:*:*:*", "cpeNameId": "FD154B36-EEE2-45F4-B035-738854DB8463"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.17:*:*:*:*:*:*:*", "cpeNameId": "BD8F511F-9901-411A-A340-71B7A714411E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.18:*:*:*:*:*:*:*", "cpeNameId": "747B8381-BCB7-48A7-99E3-3660A9FBF3F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.19:*:*:*:*:*:*:*", "cpeNameId": "035E9DE8-63BA-4EC7-8425-1EE27BA8CE55"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.20:*:*:*:*:*:*:*", "cpeNameId": "1E4CDC34-80B7-4F05-BB90-6C2714A0FA8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.21:*:*:*:*:*:*:*", "cpeNameId": "68BFF46E-9B1A-4A4C-B03C-587844610AFB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3:*:*:*:*:*:*:*", "cpeNameId": "21F5CD7B-AC95-4D78-9757-99093ED2094B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3:-:*:*:*:*:*:*", "cpeNameId": "961A0592-0690-4383-AA0C-FF52F896EA74"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3:rc1:*:*:*:*:*:*", "cpeNameId": "C67AB208-B2AD-4B21-BB6B-C839E0874C9B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.1:*:*:*:*:*:*:*", "cpeNameId": "81E3B88A-DC72-457D-BCCE-F773A198FFFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.2:*:*:*:*:*:*:*", "cpeNameId": "E64FB740-133B-4AAA-A2DC-2198C0F58D1B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.3:*:*:*:*:*:*:*", "cpeNameId": "D5F4E9B2-BB7B-425C-80D9-06AFBED0D808"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.4:*:*:*:*:*:*:*", "cpeNameId": "49D5583E-E8A9-4897-A2C6-AE3481D580DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.5:*:*:*:*:*:*:*", "cpeNameId": "25187C15-1C36-41FB-A90F-2385F6A9C349"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.6:*:*:*:*:*:*:*", "cpeNameId": "8409B0CA-6F72-4643-8146-ABEF90EE2DB3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.7:*:*:*:*:*:*:*", "cpeNameId": "17F798CD-1EC1-40BC-B535-9A41768D5BA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.8:*:*:*:*:*:*:*", "cpeNameId": "9025DD8F-91D2-404E-969C-2BEF62B5FF8F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.9:*:*:*:*:*:*:*", "cpeNameId": "E66D9744-32E2-4BF8-84B0-8E0A85F62F53"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.10:*:*:*:*:*:*:*", "cpeNameId": "EA942BE3-366A-463B-8C3C-A4C36C894385"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.11:*:*:*:*:*:*:*", "cpeNameId": "69C576AC-72FD-4696-9426-3E2D8F97B7AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.12:*:*:*:*:*:*:*", "cpeNameId": "F20292FB-DDAA-4331-8CCC-E0339B6E309F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.13:*:*:*:*:*:*:*", "cpeNameId": "CF1EC873-6878-4EF3-B478-3A435984B295"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.14:*:*:*:*:*:*:*", "cpeNameId": "76ECB189-F757-45C4-AB63-BC7499A4E9D6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.15:*:*:*:*:*:*:*", "cpeNameId": "37721982-4E3D-40B1-AC6A-DBDA2DD9E489"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.16:*:*:*:*:*:*:*", "cpeNameId": "06812A7C-411D-4A39-9158-D4B8B43A8D7B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.17:*:*:*:*:*:*:*", "cpeNameId": "E8C9CCC6-3D5B-43E5-BE69-3BF8A3DFDE96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.18:*:*:*:*:*:*:*", "cpeNameId": "37BCD5D2-D0A2-44E6-8375-F98117F02B9B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:*:*:*:*:*:*:*", "cpeNameId": "30F8A912-AEBA-4E8E-A946-D5FF48283C90"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:-:*:*:*:*:*:*", "cpeNameId": "38597FA2-E6FA-4060-A67D-C2441E02BC11"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:rc1:*:*:*:*:*:*", "cpeNameId": "0381F214-3BC5-4D07-A22F-18E0C97C33D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:rc2:*:*:*:*:*:*", "cpeNameId": "7058D69E-78BC-4917-A2ED-2D9A20503F8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:rc3:*:*:*:*:*:*", "cpeNameId": "A581FE35-F56F-44A9-B6AD-3900F6C4E830"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:rc4:*:*:*:*:*:*", "cpeNameId": "09E1C6F8-674B-4766-9267-69F9D2584B2B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:rc5:*:*:*:*:*:*", "cpeNameId": "D8331CE4-CE6E-45D2-9267-688218C5FA66"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:rc6:*:*:*:*:*:*", "cpeNameId": "E25FA831-4D9A-43A0-8520-18B2B425CC89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:rc7:*:*:*:*:*:*", "cpeNameId": "B36308F6-FE14-40AE-836F-ADE4A02943B1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.0:rc1:*:*:*:*:*:*", "cpeNameId": "1AD9C3F6-3A0B-4AA0-8B15-3E5F14BF88CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.0:rc2:*:*:*:*:*:*", "cpeNameId": "02FEACE2-E424-4F2E-938B-464CBB64228B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.0:rc6:*:*:*:*:*:*", "cpeNameId": "9E511445-4E4D-44ED-A39F-BF79061A44B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.1:*:*:*:*:*:*:*", "cpeNameId": "1C281E83-7893-4458-9E7C-BC2E857281DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.2:*:*:*:*:*:*:*", "cpeNameId": "A3D762F0-7229-48BE-A593-90AF341A2B12"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.3:*:*:*:*:*:*:*", "cpeNameId": "FB304A30-43E2-4CB7-BDF6-D02968DE2769"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.4:*:*:*:*:*:*:*", "cpeNameId": "283FA41E-5A43-4BFF-B51A-D1FB18F8DE7D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.5:*:*:*:*:*:*:*", "cpeNameId": "02511C03-2EB5-4DDD-B4D5-F46566461307"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.6:*:*:*:*:*:*:*", "cpeNameId": "EE95F16F-BFE6-4880-80BE-0F30ED1E944A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.7:*:*:*:*:*:*:*", "cpeNameId": "FAEE1F59-C796-4E59-B6FB-5D16B39695BA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.8:*:*:*:*:*:*:*", "cpeNameId": "3D6FE7E7-6008-4B70-9614-B6F2C599131E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.9:*:*:*:*:*:*:*", "cpeNameId": "99B2EAA8-667C-487F-B0BF-3710995B951E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.10:*:*:*:*:*:*:*", "cpeNameId": "6FDA9090-C62C-4030-BB12-A0112FDCBF5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.11:*:*:*:*:*:*:*", "cpeNameId": "91DB3188-8E8C-4940-82C3-530F1FCF342A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.12:*:*:*:*:*:*:*", "cpeNameId": "4227319D-32DC-46E1-BB7E-9457C1F4F2C2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.13:*:*:*:*:*:*:*", "cpeNameId": "9E0E22BD-ED8B-4F4F-A0F1-402B94D84DD3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.14:*:*:*:*:*:*:*", "cpeNameId": "501029E0-B4D2-4145-8B1D-D1101340CBF1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.15:*:*:*:*:*:*:*", "cpeNameId": "7C3BE561-3C2B-4784-ACAE-960E3788F8A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.16:*:*:*:*:*:*:*", "cpeNameId": "01AC5F1D-CFD1-4B99-B90D-3A7F9E7C4F83"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.17:*:*:*:*:*:*:*", "cpeNameId": "3DAB053F-F9CF-47D5-BE1B-7C31F90B290F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.18:*:*:*:*:*:*:*", "cpeNameId": "73C26194-FDEA-45E7-80A8-65515A3AAF8F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.19:*:*:*:*:*:*:*", "cpeNameId": "7FC45267-94B3-49F5-B69F-5AE3AB28E1A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.20:*:*:*:*:*:*:*", "cpeNameId": "5ACE9C2C-D667-4936-BB37-72D8117CCBEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.21:*:*:*:*:*:*:*", "cpeNameId": "4CE3E880-139D-4507-BCFE-1624D74B0C80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.22:*:*:*:*:*:*:*", "cpeNameId": "DAC48916-1563-4077-A414-ADB689B1FDBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.23:*:*:*:*:*:*:*", "cpeNameId": "F322D1AA-8286-430D-B02A-5BDDB8C1122A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.24:*:*:*:*:*:*:*", "cpeNameId": "63EA159A-C722-4C17-A32E-20026026B727"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.25:*:*:*:*:*:*:*", "cpeNameId": "DF965E16-45D2-4E37-A24E-D362554D1F8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.26:*:*:*:*:*:*:*", "cpeNameId": "1066FD9A-2313-40A4-A0B2-9C0263C26982"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.27:*:*:*:*:*:*:*", "cpeNameId": "6EC9BCEC-2231-455C-B28D-0DF13CB13479"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.28:*:*:*:*:*:*:*", "cpeNameId": "64D65D7E-E68D-49A1-AA45-CEFE1DBC20D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.29:*:*:*:*:*:*:*", "cpeNameId": "1ADDA3E8-2C58-47CD-A70D-DA04F3A431F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.30:*:*:*:*:*:*:*", "cpeNameId": "EF04CFE2-5DF9-4DE0-8E8F-FB4786456345"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.31:*:*:*:*:*:*:*", "cpeNameId": "8000B946-CAAE-4883-9745-A61904A0247A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.32:*:*:*:*:*:*:*", "cpeNameId": "770B138D-EB04-4F3A-8FA6-3637A3683AEF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.33:*:*:*:*:*:*:*", "cpeNameId": "0B322150-1C25-4F57-844C-BF85420500E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.34:*:*:*:*:*:*:*", "cpeNameId": "DD3EDA18-4BBD-4AD7-9661-5D47B62F591E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.35:*:*:*:*:*:*:*", "cpeNameId": "9C73DBB9-FC61-4E93-B2B0-955791097636"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.36:*:*:*:*:*:*:*", "cpeNameId": "0289901E-E986-443D-A30B-ED22F06A7638"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.37:*:*:*:*:*:*:*", "cpeNameId": "4F5E4958-95CD-4C22-BD8B-3794C74CCD47"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.38:*:*:*:*:*:*:*", "cpeNameId": "EB2A8683-5741-4161-8109-B7788AD97247"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.39:*:*:*:*:*:*:*", "cpeNameId": "8EF7B26D-4943-4DCC-9D59-0AADBEDDAED8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.40:*:*:*:*:*:*:*", "cpeNameId": "E32CC068-8B1A-45C4-8AB0-278C5A74B61C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.41:*:*:*:*:*:*:*", "cpeNameId": "6916813D-E2BF-4D74-BE79-EACD1ED1AFAC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.42:*:*:*:*:*:*:*", "cpeNameId": "9CA95178-D4D4-44FD-AC62-CA6CC68A8D65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.43:*:*:*:*:*:*:*", "cpeNameId": "F95E6F47-0F75-41A3-B478-1F34A602D7EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.44:*:*:*:*:*:*:*", "cpeNameId": "09B818EE-5D8B-4728-8FBA-4C46A9233AEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.45:*:*:*:*:*:*:*", "cpeNameId": "C340CD96-6163-499E-960C-F8C77A190CA7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.46:*:*:*:*:*:*:*", "cpeNameId": "D56E537C-FBC5-4C9C-ACEB-0265AB8DA1BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.47:*:*:*:*:*:*:*", "cpeNameId": "4F62EACD-F957-4121-A129-5514BED8A209"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.48:*:*:*:*:*:*:*", "cpeNameId": "8A9A30F9-762F-496F-B154-FAA7F5B35201"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.49:*:*:*:*:*:*:*", "cpeNameId": "588B838C-6578-4616-850F-59E58692EB1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.50:*:*:*:*:*:*:*", "cpeNameId": "88925256-EBA9-4999-B534-02A3F1514E8B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.51:*:*:*:*:*:*:*", "cpeNameId": "CB3ED166-B1C8-458D-8D95-8D03C00A669E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.52:*:*:*:*:*:*:*", "cpeNameId": "5C242B7B-208A-43C7-BA04-79E1F6E1C5FF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.53:*:*:*:*:*:*:*", "cpeNameId": "D9F0FC36-D6FA-408D-8921-009B98466D10"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.54:*:*:*:*:*:*:*", "cpeNameId": "496B7A05-51DC-43DC-890F-86578ED35874"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.55:*:*:*:*:*:*:*", "cpeNameId": "D015DA7D-CDFF-4FC4-924C-541E663FCC4E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.56:*:*:*:*:*:*:*", "cpeNameId": "B853157A-8731-436A-979A-BA2871A3CF9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.57:*:*:*:*:*:*:*", "cpeNameId": "FF8B97BB-61A3-4CAB-BE7B-A6EA63D575F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.58:*:*:*:*:*:*:*", "cpeNameId": "58F8F42F-DE39-4963-BBCD-2AF4B13B8152"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.59:*:*:*:*:*:*:*", "cpeNameId": "D20CCD61-4FC1-4E23-A134-0B93A8099C3C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.60:*:*:*:*:*:*:*", "cpeNameId": "C66ED101-4E13-4838-901E-A73F76499BBD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.61:*:*:*:*:*:*:*", "cpeNameId": "F4125335-934B-4535-9983-3E2BA61E96F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.62:*:*:*:*:*:*:*", "cpeNameId": "A583E905-8A22-42B5-9D96-B51FFD0614FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.63:*:*:*:*:*:*:*", "cpeNameId": "6D54EE82-FEC8-449B-B648-C736D4E26388"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.64:*:*:*:*:*:*:*", "cpeNameId": "AD9F8955-6D21-4FE1-B814-B7B5B6E51C1D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.65:*:*:*:*:*:*:*", "cpeNameId": "AA1F4832-E754-48FF-90A7-C83B71865F79"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.66:*:*:*:*:*:*:*", "cpeNameId": "7FA63DB7-AF4D-4ADA-AA62-E7E780629C01"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.67:*:*:*:*:*:*:*", "cpeNameId": "68125684-9408-4FF0-9691-78CE2C43472D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.68:*:*:*:*:*:*:*", "cpeNameId": "887CCD5A-CC1E-4F61-9A22-33CD3DB9590E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.69:*:*:*:*:*:*:*", "cpeNameId": "79E482C6-C081-4307-920F-E0C4DA650C4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.70:*:*:*:*:*:*:*", "cpeNameId": "BDBD2808-2754-4C34-81D4-C944911306CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.71:*:*:*:*:*:*:*", "cpeNameId": "33A308BB-8E22-4AD8-BDA8-3711554B706D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.72:*:*:*:*:*:*:*", "cpeNameId": "DD3870C8-2652-4D75-AAE0-3CEF3CF665D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.73:*:*:*:*:*:*:*", "cpeNameId": "44142F88-98AA-4496-B640-6FA14C77CEC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.74:*:*:*:*:*:*:*", "cpeNameId": "AF5903C8-5637-45BD-9A92-AEAFA81D93BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.75:*:*:*:*:*:*:*", "cpeNameId": "DACFFC27-6EB1-4433-B9F3-E58F2C6FB2B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.76:*:*:*:*:*:*:*", "cpeNameId": "55971333-67C2-40F0-AA0C-3382C5622911"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.77:*:*:*:*:*:*:*", "cpeNameId": "3BEED01C-4CCB-4958-8E29-DCC951578EF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.78:*:*:*:*:*:*:*", "cpeNameId": "4F171F41-EFAC-4188-B720-4C6840AF4261"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.79:*:*:*:*:*:*:*", "cpeNameId": "284FEF7C-A0D0-4494-8F98-9129D6A58041"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.80:*:*:*:*:*:*:*", "cpeNameId": "DD648053-6D4E-41CB-9113-66151119FDA0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.81:*:*:*:*:*:*:*", "cpeNameId": "82E37ED2-64A7-4300-BF90-20AF181B6F97"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.82:*:*:*:*:*:*:*", "cpeNameId": "AF69E066-55C4-4A86-B15F-BA9549CEB5AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.83:*:*:*:*:*:*:*", "cpeNameId": "D1721424-8F46-4939-A665-4621D22D7279"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.84:*:*:*:*:*:*:*", "cpeNameId": "E27F0C29-711F-4838-8481-F932273C9034"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.85:*:*:*:*:*:*:*", "cpeNameId": "087A9FF9-13D3-4192-A81A-FD3D742FAAEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.86:*:*:*:*:*:*:*", "cpeNameId": "24FE8157-16DC-4670-81B5-B35131D0D3E3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.87:*:*:*:*:*:*:*", "cpeNameId": "FEA33B3F-6CB7-4138-A92A-AD3C8258FC74"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.88:*:*:*:*:*:*:*", "cpeNameId": "6D4674AC-D1BA-41F6-B9B7-E276352BEDA6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.89:*:*:*:*:*:*:*", "cpeNameId": "D416D23A-A4AE-4C6A-926A-202ED3167667"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.90:*:*:*:*:*:*:*", "cpeNameId": "5CE1A537-5A52-474B-AAF0-E0A7D2952B45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.91:*:*:*:*:*:*:*", "cpeNameId": "F5999482-9471-4351-B0B3-0DB7907B9CED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.92:*:*:*:*:*:*:*", "cpeNameId": "C97C06E4-2C93-436C-ABA6-15AA6599A35A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.93:*:*:*:*:*:*:*", "cpeNameId": "1031888B-A914-4DC7-A6E9-392CCC45A76E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.94:*:*:*:*:*:*:*", "cpeNameId": "404206E9-E734-42FC-900E-BD6E0A8A4461"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.95:*:*:*:*:*:*:*", "cpeNameId": "511842CB-909F-4861-8D7C-28B54497BF86"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.96:*:*:*:*:*:*:*", "cpeNameId": "A9657041-BEE6-4EE8-94AD-4447DDE7D048"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.97:*:*:*:*:*:*:*", "cpeNameId": "0A9E3B65-5FB8-4A6A-A2D8-CA2453AF07EC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.98:*:*:*:*:*:*:*", "cpeNameId": "22048CDC-DCAC-4609-95F0-929AEE830465"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.99:*:*:*:*:*:*:*", "cpeNameId": "627DBE54-010D-4F1C-9001-CC5E02BF3050"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.100:*:*:*:*:*:*:*", "cpeNameId": "938FECE2-6792-451E-8311-7E3E38A036FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.101:*:*:*:*:*:*:*", "cpeNameId": "5432BFDA-778D-4E2E-A1D3-CBED78826AD4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.102:*:*:*:*:*:*:*", "cpeNameId": "3AA63EBE-68D6-44E3-BAF2-581B3E42DA43"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.103:*:*:*:*:*:*:*", "cpeNameId": "82A4E722-C3C7-437B-97C7-010E4E7FB1F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.104:*:*:*:*:*:*:*", "cpeNameId": "FEF2BA89-9777-4690-A1E0-5A9539F19063"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.105:*:*:*:*:*:*:*", "cpeNameId": "0FEBCB84-25C5-4B8F-84AD-2840655A9CB7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.106:*:*:*:*:*:*:*", "cpeNameId": "CA4865C8-CD0B-4624-B878-C160F5793EBF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.107:*:*:*:*:*:*:*", "cpeNameId": "8CD6838F-3F26-49B5-9826-3481D09DD0FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.108:*:*:*:*:*:*:*", "cpeNameId": "F925DF95-F46A-41A4-A0D4-FF783FAAF1AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.109:*:*:*:*:*:*:*", "cpeNameId": "2CEDA5AF-C713-4643-B009-513BA2E3C74D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.110:*:*:*:*:*:*:*", "cpeNameId": "A53BF0C3-2C50-4301-8616-02277328F4BF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.111:*:*:*:*:*:*:*", "cpeNameId": "CC8637E1-FDE1-40A6-BE9A-64596A91042E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.112:*:*:*:*:*:*:*", "cpeNameId": "A29F5C22-296D-438A-A22F-7F59BD3C77A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.113:*:*:*:*:*:*:*", "cpeNameId": "42237EE2-4AF1-49D8-8C47-53936F3F6D15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.114:*:*:*:*:*:*:*", "cpeNameId": "DF5875E7-C829-41E7-B637-7C7FD45469B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.115:*:*:*:*:*:*:*", "cpeNameId": "9EEEB133-6D86-45B8-8F2E-4CD7E1677D4D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.116:*:*:*:*:*:*:*", "cpeNameId": "EFB125EB-E097-459C-BB6C-8CA683495E49"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.117:*:*:*:*:*:*:*", "cpeNameId": "8AB69237-A001-4D78-B1DC-05E19113CAEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.118:*:*:*:*:*:*:*", "cpeNameId": "F529F470-E283-4E30-A94D-9155B2F4D0E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.119:*:*:*:*:*:*:*", "cpeNameId": "E393B29E-8B63-4003-9C92-11923EDDF4FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.120:*:*:*:*:*:*:*", "cpeNameId": "9142B8C8-A1A2-4597-9736-08F85EA6DF0A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.121:*:*:*:*:*:*:*", "cpeNameId": "6ED37745-F2C8-4CAB-B848-E3F1D5B92D5A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.122:*:*:*:*:*:*:*", "cpeNameId": "73345EA5-BC19-481D-9E8D-BC43F1B2A009"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.123:*:*:*:*:*:*:*", "cpeNameId": "D1B464F3-C13B-4562-9A1D-9A52A83F8CE4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.124:*:*:*:*:*:*:*", "cpeNameId": "E7237F6D-DA3F-4755-97C0-72C41F937096"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.125:*:*:*:*:*:*:*", "cpeNameId": "EF179B39-F479-4FF0-9853-5C41F4138C80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.126:*:*:*:*:*:*:*", "cpeNameId": "D623E6BE-F45C-4E2D-83EB-883633218B57"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.127:*:*:*:*:*:*:*", "cpeNameId": "7634F69F-587C-4861-B1E1-2F144582DD36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.128:*:*:*:*:*:*:*", "cpeNameId": "23B07FF3-3EC0-487F-B76D-C86CBF6426EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.129:*:*:*:*:*:*:*", "cpeNameId": "E3AB773D-5743-4A09-AB6F-139D852B344E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.130:*:*:*:*:*:*:*", "cpeNameId": "1C0588B6-8690-46A5-AE2E-73E7BF0CACDB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.131:*:*:*:*:*:*:*", "cpeNameId": "AF351F54-8187-410D-86F1-B3F82AD2ED55"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.132:*:*:*:*:*:*:*", "cpeNameId": "067199B5-CFA0-4568-BA4D-6288A392D99C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.133:*:*:*:*:*:*:*", "cpeNameId": "CF1D7CCF-56EB-4D68-AED7-D187649BA593"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.134:*:*:*:*:*:*:*", "cpeNameId": "5446FBC8-EDD6-449D-B4FC-7C9C2679FDE4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.135:*:*:*:*:*:*:*", "cpeNameId": "3B8D2DC6-E618-4E03-ABF0-0BD7B4B8EB69"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.136:*:*:*:*:*:*:*", "cpeNameId": "94473DCF-880F-4134-9004-72FB278A583E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.137:*:*:*:*:*:*:*", "cpeNameId": "F3AE7B24-62E3-4995-B088-1484F2073EEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.138:*:*:*:*:*:*:*", "cpeNameId": "17D753C7-C945-4B66-AA44-7CA3F4512771"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.139:*:*:*:*:*:*:*", "cpeNameId": "60F84A69-CC41-4E35-BED3-8967F672C006"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.140:*:*:*:*:*:*:*", "cpeNameId": "704BA190-B269-4E2E-B176-2E609688075D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.141:*:*:*:*:*:*:*", "cpeNameId": "FEF922EA-398E-42BB-A3D4-617330FE8BA5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.142:*:*:*:*:*:*:*", "cpeNameId": "E13D9FC4-EA1C-4834-A8DD-9F8B32080526"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.143:*:*:*:*:*:*:*", "cpeNameId": "2749EF98-5412-46F6-8D49-0EDD6A58E528"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.144:*:*:*:*:*:*:*", "cpeNameId": "1CBA264D-9620-40D3-A6E9-BDD0378FBBE4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.145:*:*:*:*:*:*:*", "cpeNameId": "9753CAB1-3E31-4FB0-8901-B66F68248C4B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.146:*:*:*:*:*:*:*", "cpeNameId": "D6BBAA0A-DC53-4541-A7C9-02B7CC882C6F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.147:*:*:*:*:*:*:*", "cpeNameId": "75DD6B1D-A210-439C-BB15-5A9857869B4C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.148:*:*:*:*:*:*:*", "cpeNameId": "83C33FEE-E6EE-42A4-B71C-36B017ADA254"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.149:*:*:*:*:*:*:*", "cpeNameId": "7594839C-A015-437B-843D-443C74240AFC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.150:*:*:*:*:*:*:*", "cpeNameId": "85681E7B-7D21-4391-88BB-F24FCC85B69E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.151:*:*:*:*:*:*:*", "cpeNameId": "CAD0E871-57D4-4E39-B8BE-B48B56E383AD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.152:*:*:*:*:*:*:*", "cpeNameId": "8B9FBF3A-7807-4307-AA5A-AFB027788A0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.153:*:*:*:*:*:*:*", "cpeNameId": "45B35B38-1583-4FDE-A76C-F489FC1661B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.154:*:*:*:*:*:*:*", "cpeNameId": "B5CBD335-2006-441B-B668-D4C4E5361E92"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.155:*:*:*:*:*:*:*", "cpeNameId": "1BB865B8-A4BD-46DC-8C13-31A508A1C470"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.156:*:*:*:*:*:*:*", "cpeNameId": "020363CE-5C5B-427C-A15C-F5C1C1975467"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.157:*:*:*:*:*:*:*", "cpeNameId": "941EBBFB-C6F1-48D5-9B2B-CA5C89D87AAE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.158:*:*:*:*:*:*:*", "cpeNameId": "C6F4FAFB-B2D4-4C6A-A2FD-279349D1B6B8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.159:*:*:*:*:*:*:*", "cpeNameId": "D6E8DC84-DA54-45C7-A50D-CB982342FBA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.160:*:*:*:*:*:*:*", "cpeNameId": "B06561F9-9A69-45F5-8E38-E4ACD6603562"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.161:*:*:*:*:*:*:*", "cpeNameId": "387585D8-ED6F-4F42-B695-CBEE28059C70"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.162:*:*:*:*:*:*:*", "cpeNameId": "D3B66B2E-4E69-4FA5-8B87-289E005FDE04"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.163:*:*:*:*:*:*:*", "cpeNameId": "5EE4932A-8EC9-4F83-B39E-43949583A002"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.164:*:*:*:*:*:*:*", "cpeNameId": "23613ABA-9AF6-4994-BEA5-72EADE59E05D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.165:*:*:*:*:*:*:*", "cpeNameId": "274A8333-1FF8-4D90-9F8F-6ED87E4D38C2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.166:*:*:*:*:*:*:*", "cpeNameId": "D2E5BB0E-741E-4F29-A740-36E5944DA22E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.167:*:*:*:*:*:*:*", "cpeNameId": "A0D34177-A31C-4A31-95EC-FC51AAFDCCA4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.168:*:*:*:*:*:*:*", "cpeNameId": "91D62EB4-F2E8-490E-B95E-8795D3419321"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.169:*:*:*:*:*:*:*", "cpeNameId": "D07F44B5-8B12-4624-806B-3926EE9DFEC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.170:*:*:*:*:*:*:*", "cpeNameId": "F96D2A95-B029-4CF9-B156-05CF4447C703"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.171:*:*:*:*:*:*:*", "cpeNameId": "8ECD8767-3374-4B80-A15B-F5238068915B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.172:*:*:*:*:*:*:*", "cpeNameId": "360CFD8E-8542-4074-A12A-DBA9971EA65B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.173:*:*:*:*:*:*:*", "cpeNameId": "E8C8A6D8-B27B-4F5B-8E51-61E11B3F215F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.174:*:*:*:*:*:*:*", "cpeNameId": "15A35FE0-6FEE-41DC-8BF0-6915C879C270"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.175:*:*:*:*:*:*:*", "cpeNameId": "37C5FB0A-CA6D-4613-8A8B-A18D0FDA6F64"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.176:*:*:*:*:*:*:*", "cpeNameId": "FFE0EDBC-A325-48BA-ACB3-9F8D08670377"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.177:*:*:*:*:*:*:*", "cpeNameId": "E5195C74-6E40-48DB-B840-6064E935C3EE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.178:*:*:*:*:*:*:*", "cpeNameId": "12D64B6B-F676-44EF-9DC6-C177E27260EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.179:*:*:*:*:*:*:*", "cpeNameId": "A05ECB81-2B19-4D35-8D1F-4434137A84DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.180:*:*:*:*:*:*:*", "cpeNameId": "9C361490-6959-42D0-BCC4-83D577D132F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.181:*:*:*:*:*:*:*", "cpeNameId": "D0326F99-0B11-462B-8D94-064C0A3241B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.182:*:*:*:*:*:*:*", "cpeNameId": "D15195DE-63BF-4173-905B-E7D6FA91CA75"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.183:*:*:*:*:*:*:*", "cpeNameId": "68713BB8-A777-453A-A8DF-73D9D7BF2E85"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.184:*:*:*:*:*:*:*", "cpeNameId": "4CAD090F-0814-485B-8E21-4D47722887FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.185:*:*:*:*:*:*:*", "cpeNameId": "9959172B-D94C-4CB9-BF46-DD313AA048F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.186:*:*:*:*:*:*:*", "cpeNameId": "24962B43-D41C-4D08-B761-2DC8B7CA6266"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.187:*:*:*:*:*:*:*", "cpeNameId": "38C0DBA3-BE34-4386-9A2E-157382F3225A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.188:*:*:*:*:*:*:*", "cpeNameId": "7ACF7B19-A720-4BA7-BED3-568CC376C778"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.189:*:*:*:*:*:*:*", "cpeNameId": "B7B05048-9CFF-419B-86B0-EE2F56B47B83"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.190:*:*:*:*:*:*:*", "cpeNameId": "BAE9F693-4B6C-4E3E-A9A0-511AE8544242"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.191:*:*:*:*:*:*:*", "cpeNameId": "9D62345B-E1AE-4963-B5CF-35F5162E8801"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.192:*:*:*:*:*:*:*", "cpeNameId": "B355E118-131B-406B-B4BA-152ECC8A3BBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.193:*:*:*:*:*:*:*", "cpeNameId": "F03D2948-9154-4DBA-BACE-7C345323033A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.194:*:*:*:*:*:*:*", "cpeNameId": "FBCB3E35-2179-4C11-AB45-FF4ED4FDF319"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.195:*:*:*:*:*:*:*", "cpeNameId": "C3EE187D-F47C-4715-9DB8-E907435E01EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.196:*:*:*:*:*:*:*", "cpeNameId": "0C0A8C7F-62FD-4514-AA66-564CAADC6E45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.197:*:*:*:*:*:*:*", "cpeNameId": "B3CE9D05-5F55-4B0E-B305-0A3B005018DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.198:*:*:*:*:*:*:*", "cpeNameId": "2317D623-D839-407E-A14E-F5F852B84FEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.199:*:*:*:*:*:*:*", "cpeNameId": "EB66E33F-BA65-49D7-B9EA-4A98B64ACC4E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.200:*:*:*:*:*:*:*", "cpeNameId": "011BFD26-2596-4913-9424-0AECA7030C16"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.201:*:*:*:*:*:*:*", "cpeNameId": "D4ACDED5-7B2F-49A2-A926-D916CFDB0C63"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.202:*:*:*:*:*:*:*", "cpeNameId": "B7F9F37A-7A22-49AD-A0B1-F71767104083"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.203:*:*:*:*:*:*:*", "cpeNameId": "2AD7A4A5-2505-4B4D-8783-F0A51E6A046A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.204:*:*:*:*:*:*:*", "cpeNameId": "95FA5A9A-3EEF-40F7-A80B-F714544B33EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.205:*:*:*:*:*:*:*", "cpeNameId": "2E6CB57E-4C3F-42E5-B9FB-AB8280BE7A6F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.206:*:*:*:*:*:*:*", "cpeNameId": "7676F080-CF07-4DA1-AF8D-9EF7B716A3E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.207:*:*:*:*:*:*:*", "cpeNameId": "825F2314-2B15-4F76-B6CD-5C9DADC5BE95"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.208:*:*:*:*:*:*:*", "cpeNameId": "7B6DA918-9935-4683-A67B-08144DD82180"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.209:*:*:*:*:*:*:*", "cpeNameId": "95865082-502B-4EAF-BB46-FF14CB436ACA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.210:*:*:*:*:*:*:*", "cpeNameId": "E291ACF9-9E86-4E1E-BCB5-E208F959C0B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.211:*:*:*:*:*:*:*", "cpeNameId": "0A1A262D-D3CD-49B4-84ED-3064C2FED37A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.212:*:*:*:*:*:*:*", "cpeNameId": "57B76811-C4C0-4A91-A8EF-F37450F7F017"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.213:*:*:*:*:*:*:*", "cpeNameId": "205B4275-EF2F-4D30-9EC3-8E0571547292"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.214:*:*:*:*:*:*:*", "cpeNameId": "F5586B8B-CDBF-434C-A994-8D07A0DDB39C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.215:*:*:*:*:*:*:*", "cpeNameId": "D37B51B4-57EC-4373-9428-3C3D4A29208F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.216:*:*:*:*:*:*:*", "cpeNameId": "398941C0-8C2C-41F5-A1C9-9585DAC725E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.217:*:*:*:*:*:*:*", "cpeNameId": "7B403008-68BC-4E2D-9684-EA7D660D620C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.218:*:*:*:*:*:*:*", "cpeNameId": "FEE28F9A-4B9B-44F3-96E9-B98FB0AC8528"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.219:*:*:*:*:*:*:*", "cpeNameId": "2AF545DD-D84F-46B2-AA73-55A6B4659260"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.220:*:*:*:*:*:*:*", "cpeNameId": "A062E707-3089-4A1F-A78C-D2B8FF520A2B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.221:*:*:*:*:*:*:*", "cpeNameId": "CE524691-6654-439A-ACAC-6B617AF5AF1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.222:*:*:*:*:*:*:*", "cpeNameId": "7ACB644E-9AED-4BE0-AA14-66A4391EC095"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.223:*:*:*:*:*:*:*", "cpeNameId": "FF39B72D-B1B2-4DC2-B709-C6693BC9A5E7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.224:*:*:*:*:*:*:*", "cpeNameId": "517DC3B4-3906-44AE-8AA5-EF2587DBDC72"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.225:*:*:*:*:*:*:*", "cpeNameId": "BF5626A2-7798-4612-B4A5-BA04E42E0BED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.226:*:*:*:*:*:*:*", "cpeNameId": "F43E60E1-E9FB-44BC-BC12-DE00249731EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.227:*:*:*:*:*:*:*", "cpeNameId": "640CDE67-2025-448F-AA11-6B110B29D2A5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.228:*:*:*:*:*:*:*", "cpeNameId": "D2FA83FC-CF87-4E06-B474-4EEF45D68215"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.229:*:*:*:*:*:*:*", "cpeNameId": "66BF34B9-77D9-4194-A0B7-B4475B335F2E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.230:*:*:*:*:*:*:*", "cpeNameId": "299E37F1-CADB-4659-916C-6212694A18E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.231:*:*:*:*:*:*:*", "cpeNameId": "6485B4A3-B4A4-4051-BF33-D2CE21DA64EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.232:*:*:*:*:*:*:*", "cpeNameId": "B4F3A62A-C3EE-48BD-B70D-61471639DC9C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.233:*:*:*:*:*:*:*", "cpeNameId": "69E1C22D-523B-4340-A48B-2DB4BEB9248F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.234:*:*:*:*:*:*:*", "cpeNameId": "9F851704-26CF-4676-8855-D74AF799B382"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.235:*:*:*:*:*:*:*", "cpeNameId": "7C708908-5963-46DC-B508-3A5F7499055C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.236:*:*:*:*:*:*:*", "cpeNameId": "6C87ADCB-B88B-4DFA-992F-26B4947C3458"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.237:*:*:*:*:*:*:*", "cpeNameId": "6BB385D9-D9D8-470E-89CE-902222E39ADC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.238:*:*:*:*:*:*:*", "cpeNameId": "B4DAD459-71A8-44A5-861A-1BAF66749233"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.239:*:*:*:*:*:*:*", "cpeNameId": "1897BE2D-B7E6-4886-8CAC-C6AE563CBEE5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.240:*:*:*:*:*:*:*", "cpeNameId": "CE8BA9F0-78BC-4495-801A-2D41AC5B3187"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.241:*:*:*:*:*:*:*", "cpeNameId": "A5EC3DC7-E2C0-431A-A2EC-B6C3828C4BCA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.242:*:*:*:*:*:*:*", "cpeNameId": "E7DD7787-5F9A-4EB3-80D5-122199BE1430"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.243:*:*:*:*:*:*:*", "cpeNameId": "CEA6083C-45E3-459C-A5E7-04CABE3258FF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.244:*:*:*:*:*:*:*", "cpeNameId": "A046118E-2030-4FA1-AB54-FA3166B389EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.245:*:*:*:*:*:*:*", "cpeNameId": "798F9326-D8B4-47C7-A887-279D9837B680"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.246:*:*:*:*:*:*:*", "cpeNameId": "95624FFF-60D2-4964-9EBB-A6AFA64F213D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.247:*:*:*:*:*:*:*", "cpeNameId": "29DEE5F4-3ADD-4E88-9187-7135A238F9C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.248:*:*:*:*:*:*:*", "cpeNameId": "8E8D2C97-D48F-4BD9-BED5-88EE4813F6E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.249:*:*:*:*:*:*:*", "cpeNameId": "5A1E1612-3E81-4021-9A85-34B86AFBC77C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.250:*:*:*:*:*:*:*", "cpeNameId": "EA54F6F0-C64D-41B4-A582-92D43FDD3CB2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.251:*:*:*:*:*:*:*", "cpeNameId": "1B17D69F-3CC2-4B00-B2D5-A4434E4C2402"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.252:*:*:*:*:*:*:*", "cpeNameId": "AAC99975-FBC6-439C-B9E6-011CABDAE8F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.253:*:*:*:*:*:*:*", "cpeNameId": "5375B4A1-C18E-453D-9179-672CB459B0D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.254:*:*:*:*:*:*:*", "cpeNameId": "730B192E-0CAB-41AE-8EE8-57F381628032"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.255:*:*:*:*:*:*:*", "cpeNameId": "59A6D935-0EBF-4499-A8F9-5BB002FF5417"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.256:*:*:*:*:*:*:*", "cpeNameId": "60604FAE-6D70-4DF3-9A88-CC3F6A614F58"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.257:*:*:*:*:*:*:*", "cpeNameId": "28E9A455-1593-4AF5-9451-B313D622E813"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.258:*:*:*:*:*:*:*", "cpeNameId": "B5718D89-967C-42C8-AA82-C97D345B3B10"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.259:*:*:*:*:*:*:*", "cpeNameId": "87BB858F-8D92-452F-B51C-12ACE0798353"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.260:*:*:*:*:*:*:*", "cpeNameId": "AE07B665-D693-4561-A9B4-9932CD77333B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.261:*:*:*:*:*:*:*", "cpeNameId": "EF86313B-7F46-43B8-8338-AE692B75A0A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.262:*:*:*:*:*:*:*", "cpeNameId": "E1B563A5-0659-4D95-89A0-8FCC2A436214"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.263:*:*:*:*:*:*:*", "cpeNameId": "8D53F67C-F067-4BF8-AE22-78A1176571BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.264:*:*:*:*:*:*:*", "cpeNameId": "7111A17A-1784-4740-B976-38B722A838CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.265:*:*:*:*:*:*:*", "cpeNameId": "2D41AA24-795C-4C26-8A5A-D07B59EBD394"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.266:*:*:*:*:*:*:*", "cpeNameId": "A97784BF-DCF7-40A8-87DA-0CB401BEC707"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.267:*:*:*:*:*:*:*", "cpeNameId": "073D9BD8-4FBC-4DF6-8017-37FB83733D26"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.268:*:*:*:*:*:*:*", "cpeNameId": "91DAF395-305E-4836-A12C-1E2377F31FA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.269:*:*:*:*:*:*:*", "cpeNameId": "5FCE10E6-EC75-4696-82C2-8958D55E379A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.270:*:*:*:*:*:*:*", "cpeNameId": "431FAE79-4814-471C-ADD1-50E98CA62255"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.271:*:*:*:*:*:*:*", "cpeNameId": "90DCF88A-E713-42F3-9D1E-2CCCAA5074ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.272:*:*:*:*:*:*:*", "cpeNameId": "6B454F24-35C3-4974-86AC-E42EC930E187"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.273:*:*:*:*:*:*:*", "cpeNameId": "02AE5EE4-8747-4828-AC90-7DC0689482DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.274:*:*:*:*:*:*:*", "cpeNameId": "F006D7E9-C3E7-43D0-BFF9-1905CC924F0E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.275:*:*:*:*:*:*:*", "cpeNameId": "81C1BF7F-E953-42D0-965C-B5F736085500"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.276:*:*:*:*:*:*:*", "cpeNameId": "CFCF98F3-408F-4FB9-B097-3CE467D5C047"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.277:*:*:*:*:*:*:*", "cpeNameId": "8B64B495-66D8-4EE8-9391-2078D025F252"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.278:*:*:*:*:*:*:*", "cpeNameId": "25928F5C-D970-404D-B6CB-E3DFCD7EC853"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.279:*:*:*:*:*:*:*", "cpeNameId": "478BD5C9-EF9A-4FBB-9BCF-DF23EA8F3492"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.280:*:*:*:*:*:*:*", "cpeNameId": "9513977F-A95A-4F0F-AADE-B21201231052"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.281:*:*:*:*:*:*:*", "cpeNameId": "14DBE587-6D62-4B91-BC57-0C84D152E7EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.282:*:*:*:*:*:*:*", "cpeNameId": "6057E10C-DE66-4645-A2B5-44203C31F784"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.283:*:*:*:*:*:*:*", "cpeNameId": "951347D3-550A-41E6-B000-E2D716A96A20"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.284:*:*:*:*:*:*:*", "cpeNameId": "5979A8F6-3B9D-4C0C-8C75-9FA49E82A345"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.285:*:*:*:*:*:*:*", "cpeNameId": "F1278C94-D023-48BF-A6D6-36D0DF76CFF3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.286:*:*:*:*:*:*:*", "cpeNameId": "7E65B46E-A161-4126-9E85-B9F5B4C0005D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.297:*:*:*:*:*:*:*", "cpeNameId": "6DBCD7AC-F52A-4397-A3B8-8AFF7EF460FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5:*:*:*:*:*:*:*", "cpeNameId": "49DBB1C3-9AEF-4EC4-B62D-7D36F14EDFD9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5:-:*:*:*:*:*:*", "cpeNameId": "1F518EBF-1562-4E27-97CD-A3D668C77A8C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5:rc1:*:*:*:*:*:*", "cpeNameId": "5F85EA91-CF9D-413C-B2F0-C0DC16BF7928"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5:rc2:*:*:*:*:*:*", "cpeNameId": "B9A5A534-B718-4FFF-A889-D8A6EF731364"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5:rc3:*:*:*:*:*:*", "cpeNameId": "66795BCD-62BE-4EB7-B4C3-518EFDE1141E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5:rc4:*:*:*:*:*:*", "cpeNameId": "721CD8C6-1746-4BCA-B717-602990CE7D91"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5:rc5:*:*:*:*:*:*", "cpeNameId": "D4DCAF09-9CDF-4447-9167-4E76E661FBFA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5:rc6:*:*:*:*:*:*", "cpeNameId": "A393E2BB-4C21-483A-BD5E-5A4D6C03F2C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.0:*:*:*:*:*:*:*", "cpeNameId": "A2498E9A-09C4-421D-8C35-B607F76CA6D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.1:*:*:*:*:*:*:*", "cpeNameId": "F5C09E99-2653-42DE-8190-FF0FB4C94259"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.2:*:*:*:*:*:*:*", "cpeNameId": "0ED9D07A-5B08-4143-A891-7918475D27BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.3:*:*:*:*:*:*:*", "cpeNameId": "F033B4EC-A735-4E10-95EE-2AC9D67081EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.4:*:*:*:*:*:*:*", "cpeNameId": "9503CF12-7383-44DB-A50D-059A08956EC1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.5:*:*:*:*:*:*:*", "cpeNameId": "12D41A14-FC96-4874-B278-E57CFFCCC35F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.6:*:*:*:*:*:*:*", "cpeNameId": "733139E7-4729-4263-9BE9-4602D18C0307"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.7:*:*:*:*:*:*:*", "cpeNameId": "99D531E7-1606-42D1-AC48-03A258311B52"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.8:*:*:*:*:*:*:*", "cpeNameId": "DD45ED79-46BC-4D9E-BF13-2BCE447AB6AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.9:*:*:*:*:*:*:*", "cpeNameId": "EB76FD18-B13F-4423-B1AE-4D87EDCA59A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.10:*:*:*:*:*:*:*", "cpeNameId": "2D1E5A60-CACD-4B64-9771-8F27ECADF991"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.11:*:*:*:*:*:*:*", "cpeNameId": "D09F9D38-9B1B-40F3-89E6-C467A9247974"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.12:*:*:*:*:*:*:*", "cpeNameId": "0AFA53D6-C904-4260-A566-048D0DF14FE4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.13:*:*:*:*:*:*:*", "cpeNameId": "E3DD3225-582E-4CF7-9DEC-D58918ED5701"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.14:*:*:*:*:*:*:*", "cpeNameId": "6AA45C4C-C46A-4205-BE20-43DE712696D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.15:*:*:*:*:*:*:*", "cpeNameId": "01C8594F-1A7A-40E5-B6C3-F75CCFD1B7C9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.16:*:*:*:*:*:*:*", "cpeNameId": "32BF3DF9-BAC9-43EE-BA2B-BC53A137F299"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.17:*:*:*:*:*:*:*", "cpeNameId": "A6E18AD7-4B98-4E98-9C64-DF1A80536DCF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.18:*:*:*:*:*:*:*", "cpeNameId": "0E98522F-394C-4301-A85B-5E482CD4F4C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.19:*:*:*:*:*:*:*", "cpeNameId": "2A985199-F75F-4599-A95E-0AF97592DF71"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6:*:*:*:*:*:*:*", "cpeNameId": "D0B85891-4974-4AB3-834C-EC49CAAC82B8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6:-:*:*:*:*:*:*", "cpeNameId": "5174E1A3-A838-45BA-B4FA-AADFDF875FFC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6:rc1:*:*:*:*:*:*", "cpeNameId": "01524D2C-7501-4EC9-A0C3-A8F8B7D28FCF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6:rc2:*:*:*:*:*:*", "cpeNameId": "C6C932B1-DC39-43AD-A810-6F6BE4DC628C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6:rc3:*:*:*:*:*:*", "cpeNameId": "5AC13E72-7329-411C-8E43-AE91350E1984"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6:rc4:*:*:*:*:*:*", "cpeNameId": "E13CE8E0-4117-4CD6-B6DB-E9D85428FF27"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6:rc5:*:*:*:*:*:*", "cpeNameId": "F6F494A6-4576-4C86-AB89-78ABB06F8591"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.1:*:*:*:*:*:*:*", "cpeNameId": "7316EA10-E698-4056-9A73-CAEF10EF0D72"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.2:*:*:*:*:*:*:*", "cpeNameId": "F38E533D-F9F5-4B99-A2DF-23EE93C6716E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.3:*:*:*:*:*:*:*", "cpeNameId": "57E0290A-7943-4D3C-91E1-57110F6D698F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.4:*:*:*:*:*:*:*", "cpeNameId": "ABCD688B-6347-40A3-B19B-8D06DFA5A811"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.5:*:*:*:*:*:*:*", "cpeNameId": "05E67E62-01D6-4CAA-9BD2-5434427AD908"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.6:*:*:*:*:*:*:*", "cpeNameId": "AA5B4529-484F-4DB2-9ECF-181DDC0B2B86"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.7:*:*:*:*:*:*:*", "cpeNameId": "B2939052-3458-4C45-9A39-A1A835D29A02"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.7-1:*:*:*:*:*:*:*", "cpeNameId": "CDA63823-0948-48CE-9C3E-772A3FAF8386"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.8:*:*:*:*:*:*:*", "cpeNameId": "EC18E58B-1BFA-4C37-A35D-C17EBD6EE988"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.9:*:*:*:*:*:*:*", "cpeNameId": "BAD41340-BC92-4275-AAE6-6CD24B17CBA0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.10:*:*:*:*:*:*:*", "cpeNameId": "45C947BE-C438-4231-A0C2-28DA89A6C6B8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.11:*:*:*:*:*:*:*", "cpeNameId": "D285AD12-A45A-4F70-B4E2-29D2BDCABD83"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.12:*:*:*:*:*:*:*", "cpeNameId": "49E0F195-1D05-48F7-8E36-EACE60F54D21"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.13:*:*:*:*:*:*:*", "cpeNameId": "EAFD2DCB-733B-4E34-A1E5-9EC194692E96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.14:*:*:*:*:*:*:*", "cpeNameId": "228F9C86-B2C4-49E8-8171-FAE5C314C21A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.15:*:*:*:*:*:*:*", "cpeNameId": "4BF5012C-B142-489D-9B66-3FDFE7BB0686"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.16:*:*:*:*:*:*:*", "cpeNameId": "E46B8C4B-152A-4072-8544-3EF2CC90BC5C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.17:*:*:*:*:*:*:*", "cpeNameId": "16831F51-025C-481A-BB1B-F5A74E68D195"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.18:*:*:*:*:*:*:*", "cpeNameId": "6AFCEAAB-98C1-4E23-92CC-41C3103CED87"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.19:*:*:*:*:*:*:*", "cpeNameId": "D95E3BC5-BF59-4243-ADAA-4A70FEAB0042"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7:*:*:*:*:*:*:*", "cpeNameId": "D513E95A-293B-43E6-BB81-E30994D64488"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7:-:*:*:*:*:*:*", "cpeNameId": "EB1BB502-B09E-49F0-A7D2-A270EB7B6702"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7:rc1:*:*:*:*:*:*", "cpeNameId": "DAED72C2-F722-4E03-94CF-5CFC54AB3375"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7:rc2:*:*:*:*:*:*", "cpeNameId": "95928159-FAD7-4535-98AC-9BB8DE1BA8C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7:rc3:*:*:*:*:*:*", "cpeNameId": "BA4208E6-4ECB-4CC4-872B-9CCE02BCAE88"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7:rc4:*:*:*:*:*:*", "cpeNameId": "2203FB54-7292-4E7D-8AC5-AFF97AA62CB9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7:rc5:*:*:*:*:*:*", "cpeNameId": "F1565C19-81C0-4A57-840B-9A43914D232C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7:rc6:*:*:*:*:*:*", "cpeNameId": "F482AFCB-1119-4612-A3B3-6DCEA83454DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7:rc7:*:*:*:*:*:*", "cpeNameId": "0D9F6240-7FAF-46FE-93B6-5FDAF8026BB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.0:*:*:*:*:*:*:*", "cpeNameId": "7B2127FA-A707-4697-AD6B-CD155779E65D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.1:*:*:*:*:*:*:*", "cpeNameId": "1C140291-35F7-4777-9E23-B7CFD8361171"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.2:*:*:*:*:*:*:*", "cpeNameId": "B6DB2ACF-7055-4752-A880-931ECB34B58D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.3:*:*:*:*:*:*:*", "cpeNameId": "FFB09BE7-096E-4492-99AA-DB5504F4658B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.4:*:*:*:*:*:*:*", "cpeNameId": "1F1130BB-5BB2-48B5-849B-D111B75333D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.5:*:*:*:*:*:*:*", "cpeNameId": "A7DB133D-DDE7-4AE2-82AE-498E752AEA34"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.6:*:*:*:*:*:*:*", "cpeNameId": "92E0341D-5A2D-4CEA-A178-F8F3653CAA73"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.7:*:*:*:*:*:*:*", "cpeNameId": "63B4BA4D-2ED3-4979-AFB4-2317C7E3A1F4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.8:*:*:*:*:*:*:*", "cpeNameId": "1978F055-6B35-4431-A0FF-932F67E3E3AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.9:*:*:*:*:*:*:*", "cpeNameId": "F21A00EF-24CC-4632-90E7-67057A458DD9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.10:*:*:*:*:*:*:*", "cpeNameId": "D7F5F840-3660-45B8-A3C7-CB2AC7B95F6E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.11:*:*:*:*:*:*:*", "cpeNameId": "8E9708FA-F771-4BCB-AEC0-11556349160A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.12:*:*:*:*:*:*:*", "cpeNameId": "2A7711FD-E383-4D01-943D-9BAC425548D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.13:*:*:*:*:*:*:*", "cpeNameId": "6FB98443-3298-46FF-9819-3656A0E0A48D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.14:*:*:*:*:*:*:*", "cpeNameId": "05C7E01F-6097-4979-9807-A0ADE319D01F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.15:*:*:*:*:*:*:*", "cpeNameId": "8979AEB4-CADB-43E8-B3CE-C95CFEBF23EE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.16:*:*:*:*:*:*:*", "cpeNameId": "3DAB3E83-7F34-46E3-B14C-37C895CBE274"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.17:*:*:*:*:*:*:*", "cpeNameId": "8B4BF440-12E0-416D-8CAF-C07D04F07C2A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.18:*:*:*:*:*:*:*", "cpeNameId": "0D1B13B2-39EF-4E53-87CE-763DBA03DA05"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.19:*:*:*:*:*:*:*", "cpeNameId": "8CFCB3C4-4D44-4C18-BFCC-AD5FE0C06B4B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8:*:*:*:*:*:*:*", "cpeNameId": "07476EA3-FFDE-4B8C-912C-23138078B5EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8:-:*:*:*:*:*:*", "cpeNameId": "5178891D-6B7B-4263-879E-E69653C4D719"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8:rc1:*:*:*:*:*:*", "cpeNameId": "4BBEF5DE-A47A-4676-B324-008ABEC06865"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8:rc2:*:*:*:*:*:*", "cpeNameId": "3238D662-CCC8-4AB2-8157-A26CCE26D2D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8:rc3:*:*:*:*:*:*", "cpeNameId": "782D5463-6D0E-4C21-B4BA-5E91F105D4F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8:rc4:*:*:*:*:*:*", "cpeNameId": "C35E4C5D-1E1D-466F-A67C-2FC1F25CB430"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8:rc5:*:*:*:*:*:*", "cpeNameId": "83AAD5D5-4B05-4B36-9CE2-8200C3C961C5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8:rc6:*:*:*:*:*:*", "cpeNameId": "0E7ED941-6C90-4C40-8DB3-5E1B1B277E72"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.0:-:*:*:*:*:*:*", "cpeNameId": "5CF73E72-A891-4A42-9B0F-C7C9A5B8C8A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.0:rc1:*:*:*:*:*:*", "cpeNameId": "3A738E69-098D-4FCF-B7BD-4029B795DA7B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.0:rc2:*:*:*:*:*:*", "cpeNameId": "65ED0818-2628-4C3E-9153-7964EBEBE623"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.0:rc3:*:*:*:*:*:*", "cpeNameId": "B10D552F-439F-41F8-A37B-92C049C8DDFA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.0:rc4:*:*:*:*:*:*", "cpeNameId": "0C80D4FE-591B-4062-B4E0-034C8E6824DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.0:rc5:*:*:*:*:*:*", "cpeNameId": "A1FD0D8B-97CB-488B-B7CF-52C0CD54F200"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.0:rc6:*:*:*:*:*:*", "cpeNameId": "83533D12-466A-4B04-BC3A-1F3C5D8750B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.1:*:*:*:*:*:*:*", "cpeNameId": "C5B329AA-50C3-4D56-B10E-85876E2D6AFF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.2:*:*:*:*:*:*:*", "cpeNameId": "DA50D3B5-AE38-4686-B2AC-0C85E4CD89FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.3:*:*:*:*:*:*:*", "cpeNameId": "E54D1F8D-F883-4051-BF12-057D3F0FB128"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.4:*:*:*:*:*:*:*", "cpeNameId": "2A27C723-EFF7-416C-AFF2-D51C97DDE1DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.5:*:*:*:*:*:*:*", "cpeNameId": "4E4A5F0F-AE99-43F4-8003-657F1AC0AA93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.6:*:*:*:*:*:*:*", "cpeNameId": "57FFF781-B984-4F38-837E-255B22971C5F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.7:*:*:*:*:*:*:*", "cpeNameId": "ABBD5CFC-8A56-41FF-98BF-3F3DAF0F3841"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.8:*:*:*:*:*:*:*", "cpeNameId": "5DBF7892-0D9B-4153-9AAA-F72B0283A4A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.9:*:*:*:*:*:*:*", "cpeNameId": "6353E571-9A60-4036-B95E-2C814AAF7752"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.10:*:*:*:*:*:*:*", "cpeNameId": "EA57F68D-826E-43DB-A61A-DBE3B1C191C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.11:*:*:*:*:*:*:*", "cpeNameId": "80319CAF-347D-468D-B8FC-FD9C043FC4DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.12:*:*:*:*:*:*:*", "cpeNameId": "A5CE9EA4-85BD-43F3-8F6B-A09C25FD9167"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.13:*:*:*:*:*:*:*", "cpeNameId": "F91ADB87-9531-4398-BB0B-C063A074973B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.14:*:*:*:*:*:*:*", "cpeNameId": "7F82A887-A988-475B-9478-8CFCF7C3A704"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.15:*:*:*:*:*:*:*", "cpeNameId": "987E4679-4B40-4434-B0D7-3DEDAAB2F6BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.16:*:*:*:*:*:*:*", "cpeNameId": "9C363333-E73E-4B58-8D4C-37BD1D0B51C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.17:*:*:*:*:*:*:*", "cpeNameId": "27BE33C0-428F-4A80-A80B-BC74C075B66C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.18:*:*:*:*:*:*:*", "cpeNameId": "9EE86950-40B6-4663-8A3A-7E1D03696B0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9:*:*:*:*:*:*:*", "cpeNameId": "121E9A60-F4D2-433C-98BF-0AFA0E4A266F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.0:-:*:*:*:*:*:*", "cpeNameId": "469494B6-32FD-4685-BE2F-A210B6063294"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc1:*:*:*:*:*:*", "cpeNameId": "7F13BEF4-27D5-40F6-9765-358FD93E1792"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc2:*:*:*:*:*:*", "cpeNameId": "5ACD024B-F179-4BD5-BAAE-51108956284E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc3:*:*:*:*:*:*", "cpeNameId": "EB2E632F-62CB-44FF-8C0C-E0D47D05E493"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc4:*:*:*:*:*:*", "cpeNameId": "F87B3257-4230-45BA-9667-307E0A4904CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc5:*:*:*:*:*:*", "cpeNameId": "2CCEF2FF-6123-42D5-B8BB-D8E248F8843C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc6:*:*:*:*:*:*", "cpeNameId": "C025B18C-40C5-4D4E-83AC-6BFEA8EE6936"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.1:*:*:*:*:*:*:*", "cpeNameId": "44A6C28C-2EBF-4D99-AE8C-887010615909"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.2:*:*:*:*:*:*:*", "cpeNameId": "31CF2F4F-4453-4907-AA98-E8137382086D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.3:*:*:*:*:*:*:*", "cpeNameId": "F63DD037-0FDF-4CEC-8117-A3982CD33949"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.4:*:*:*:*:*:*:*", "cpeNameId": "5BEC457A-2479-43CE-98B2-71459DE758CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.5:*:*:*:*:*:*:*", "cpeNameId": "09C574BD-509E-420D-A4F1-3BD1C32E39C9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.6:*:*:*:*:*:*:*", "cpeNameId": "456FDC00-52BA-493A-B35B-CBB030B87FFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.7:*:*:*:*:*:*:*", "cpeNameId": "0C7FD0C5-7C16-45A5-AA4F-92609FC022D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.8:*:*:*:*:*:*:*", "cpeNameId": "C5131E57-D5F0-40F5-9D16-7C22AA4F9767"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.9:*:*:*:*:*:*:*", "cpeNameId": "D3CEA5D0-4D9E-4C39-87F9-BC90F5B770B8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.10:*:*:*:*:*:*:*", "cpeNameId": "76C03A6F-AF3B-4F19-95D9-F4150871865A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.11:*:*:*:*:*:*:*", "cpeNameId": "69578C8A-5886-441D-B835-5D0EDD95D146"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.12:*:*:*:*:*:*:*", "cpeNameId": "59581E9A-A564-46D2-B63E-4A838F09E213"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.13:*:*:*:*:*:*:*", "cpeNameId": "31137D81-EDA5-431E-BBA0-F1BA9752D0CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.14:*:*:*:*:*:*:*", "cpeNameId": "4D283523-B6B5-4CA3-A445-5FDA69F42FB9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.15:*:*:*:*:*:*:*", "cpeNameId": "0415500F-6FA8-4B11-BC14-0F8334371749"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.16:*:*:*:*:*:*:*", "cpeNameId": "086B2B23-E533-4D2E-9E90-0EC4BD2646EE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10:-:*:*:*:*:*:*", "cpeNameId": "2E1F1B79-2711-4459-B972-D3C83C48D2D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10:rc1:*:*:*:*:*:*", "cpeNameId": "4255DBFB-D157-45ED-BA6C-1BACB64A1623"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10:rc2:*:*:*:*:*:*", "cpeNameId": "C7BA0F25-7DD0-427A-A8FF-D5CCD17EA554"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10:rc4:*:*:*:*:*:*", "cpeNameId": "0962C2F4-E79A-4C61-8380-55EAAAD4AE1B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.0:-:*:*:*:*:*:*", "cpeNameId": "6B1D1EAB-0195-4F05-88FF-F862563F89FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.0:rc1:*:*:*:*:*:*", "cpeNameId": "EBBE0FA3-6C50-4C78-83C3-9BE6F9A064E3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.0:rc2:*:*:*:*:*:*", "cpeNameId": "E59C1055-110F-4E68-BB9C-8E3C564F72F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.0:rc3:*:*:*:*:*:*", "cpeNameId": "955307F1-B773-46C3-983A-DEA36FDEBCBD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.0:rc4:*:*:*:*:*:*", "cpeNameId": "4AC5F069-6642-4E36-ACF3-EE93FCEAC751"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.0:rc5:*:*:*:*:*:*", "cpeNameId": "EF537B63-6913-49CD-8CEB-A9B744FE8E4E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.1:*:*:*:*:*:*:*", "cpeNameId": "919C724B-829B-4250-B6F3-66C503930681"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.2:*:*:*:*:*:*:*", "cpeNameId": "7B9D0BBB-79E9-4CA5-81CF-2F8783866A20"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.3:*:*:*:*:*:*:*", "cpeNameId": "6F0C6AC0-1A96-4202-B3A4-42216BDC476C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.4:*:*:*:*:*:*:*", "cpeNameId": "59CCCD55-2025-4BD2-BB41-7FBF6B449783"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.5:*:*:*:*:*:*:*", "cpeNameId": "6BD60207-E9A0-4688-A2D3-3A68CAC97BFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.6:*:*:*:*:*:*:*", "cpeNameId": "54839987-2658-4873-BB81-585C8849EE8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.7:*:*:*:*:*:*:*", "cpeNameId": "FB32ECFD-B8DB-4422-83B4-7F26B1DCC763"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.8:*:*:*:*:*:*:*", "cpeNameId": "0FCF254D-C922-4F67-B85C-7247077BBF63"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.9:*:*:*:*:*:*:*", "cpeNameId": "2313CF18-EB32-4DB8-9B68-B24F46689725"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.10:*:*:*:*:*:*:*", "cpeNameId": "77C0418A-B48F-4E70-B71F-5030B901EC8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.11:*:*:*:*:*:*:*", "cpeNameId": "32769B56-4C74-41FE-A7D3-5D87006BE1B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.12:*:*:*:*:*:*:*", "cpeNameId": "C5244E7D-A816-42FD-80A2-22A1EBD41FA8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.13:*:*:*:*:*:*:*", "cpeNameId": "0E80BF7E-93CE-4658-854B-7EFB6AC17CEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.14:*:*:*:*:*:*:*", "cpeNameId": "BCB6377E-BAD8-4063-8DB2-A16392D24089"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.15:*:*:*:*:*:*:*", "cpeNameId": "09DAF5C5-3ADF-4BFB-B681-DEFAD2874241"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.16:*:*:*:*:*:*:*", "cpeNameId": "878924C9-1FEA-49D2-BB99-6AE2A8812570"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.17:*:*:*:*:*:*:*", "cpeNameId": "13722F1D-D730-4F7C-AB84-1267068EF08C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.18:*:*:*:*:*:*:*", "cpeNameId": "2A86DC03-D4AC-4EAE-88FE-54D103F5A3D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.19:*:*:*:*:*:*:*", "cpeNameId": "B833D784-AF50-4A28-88B3-B00A2ABA00D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.20:*:*:*:*:*:*:*", "cpeNameId": "EC92790E-8CEB-4EE7-9655-BE16A14BCAC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.21:*:*:*:*:*:*:*", "cpeNameId": "A0D9BB71-2049-4DEA-B438-0EE2AA9A09ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.22:*:*:*:*:*:*:*", "cpeNameId": "4F726530-1114-4DF2-956E-81715A37EE2A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.23:*:*:*:*:*:*:*", "cpeNameId": "6A9B3C74-81DE-4FDA-A058-89DD6494DD5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.24:*:*:*:*:*:*:*", "cpeNameId": "B98E61C1-1F45-4150-B477-FBFF4FAC3ED3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.25:*:*:*:*:*:*:*", "cpeNameId": "AEDF3A34-9D1B-4E78-9BC8-BFC839CBA294"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.26:*:*:*:*:*:*:*", "cpeNameId": "0B823FEF-0461-49A6-A380-1FCA2F2765FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.27:*:*:*:*:*:*:*", "cpeNameId": "494E65F5-4C04-45D6-830F-4EE9103EBB79"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.28:*:*:*:*:*:*:*", "cpeNameId": "83414679-66B4-40C0-B061-FF9FE1B23F95"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.29:*:*:*:*:*:*:*", "cpeNameId": "2EDD7AD5-8E29-4C05-B2B9-690CE6523AE8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.30:*:*:*:*:*:*:*", "cpeNameId": "F4A2F70D-4AEF-4F79-8BD3-2AAA3BED01E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.31:*:*:*:*:*:*:*", "cpeNameId": "6D4C13F5-4DC9-4498-B598-0C72F44C408F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.32:*:*:*:*:*:*:*", "cpeNameId": "0CC82644-C0F1-4FE3-BE00-1AA49A715186"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.33:*:*:*:*:*:*:*", "cpeNameId": "1CE00059-6557-4873-88DC-0D8989EA8352"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.34:*:*:*:*:*:*:*", "cpeNameId": "D681DBE9-23F8-4AB1-A4C6-73075E8753B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.35:*:*:*:*:*:*:*", "cpeNameId": "DA0FCEE1-0A6E-488B-A168-9885CE8A892B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.36:*:*:*:*:*:*:*", "cpeNameId": "8EC26158-07A8-4F5B-AED4-B1B247C7804F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.37:*:*:*:*:*:*:*", "cpeNameId": "AE2694A8-5857-4C19-81BE-E371A011643C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.38:*:*:*:*:*:*:*", "cpeNameId": "ABEB722B-6903-4915-B85C-1D2A05674826"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.39:*:*:*:*:*:*:*", "cpeNameId": "6AD9EBB8-8E60-4501-A44E-057A3BEEDA17"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.40:*:*:*:*:*:*:*", "cpeNameId": "F0D558A0-55C0-460B-BE39-F06AF16FAC31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.41:*:*:*:*:*:*:*", "cpeNameId": "275C969B-FC08-441F-BDBC-F24EC5810A99"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.42:*:*:*:*:*:*:*", "cpeNameId": "731A0F3B-A32B-4345-BE91-ABA294048D2A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.43:*:*:*:*:*:*:*", "cpeNameId": "3FE2BC04-D69F-4239-B3D8-17898AE1EC6E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.44:*:*:*:*:*:*:*", "cpeNameId": "575245F7-0BE3-4A47-A20F-0D1ECF247B3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.45:*:*:*:*:*:*:*", "cpeNameId": "4BC74ACC-355D-41FE-9D78-D50DD08425F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.46:*:*:*:*:*:*:*", "cpeNameId": "E63871AE-A0FC-41E1-B4AE-99FEA83DE6EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.47:*:*:*:*:*:*:*", "cpeNameId": "2D465F1B-9417-4099-9468-09D21B58EFE0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.48:*:*:*:*:*:*:*", "cpeNameId": "78FC9A7F-B877-4B4B-93C7-C5BAEB84BEF1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.49:*:*:*:*:*:*:*", "cpeNameId": "2343BB66-E088-4CAA-9458-F62F5624D1BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.50:*:*:*:*:*:*:*", "cpeNameId": "BED11231-C3C0-4B9A-A667-E96A5EB42728"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.51:*:*:*:*:*:*:*", "cpeNameId": "4BA151A6-3479-4D73-92A0-25D7D74DD76C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.52:*:*:*:*:*:*:*", "cpeNameId": "4CFCF22F-C2C8-46CA-A8C2-A6DB5AAD3670"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.53:*:*:*:*:*:*:*", "cpeNameId": "6326FFB7-116E-4FB8-B2C1-909CC3B6C3C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.54:*:*:*:*:*:*:*", "cpeNameId": "A7FDB1DD-DC8A-4424-A81A-37F8A0B2F1D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.55:*:*:*:*:*:*:*", "cpeNameId": "A9A96456-8676-4108-B958-7A0E3493F315"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.56:*:*:*:*:*:*:*", "cpeNameId": "7444E85B-6F15-4980-8721-5B0A708042E3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.57:*:*:*:*:*:*:*", "cpeNameId": "2D88C78E-CA4C-40A2-BF04-E487DE3D79C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.58:*:*:*:*:*:*:*", "cpeNameId": "D8167B04-7EDF-4F1B-B967-EFCDC6FB0D63"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.59:*:*:*:*:*:*:*", "cpeNameId": "66E8BCA7-8C84-42E6-A891-0840BE07CE79"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.60:*:*:*:*:*:*:*", "cpeNameId": "3FE27316-DB42-42B3-95E5-EBF8CB7498C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.61:*:*:*:*:*:*:*", "cpeNameId": "47AD2C14-A08F-4D75-960F-1D5C72EB1979"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.62:*:*:*:*:*:*:*", "cpeNameId": "E93FBE71-458B-4F4A-BA1E-153759B14744"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.63:*:*:*:*:*:*:*", "cpeNameId": "7FD84D94-2BA9-4552-9807-F06A66D760BA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.64:*:*:*:*:*:*:*", "cpeNameId": "9424301F-3046-46B4-863C-E887D542C94B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.65:*:*:*:*:*:*:*", "cpeNameId": "70F56D3D-6046-4B8E-961A-C9835F0B9090"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.66:*:*:*:*:*:*:*", "cpeNameId": "C4C18611-ABA7-482D-82FD-8CE9E3CBDB33"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.67:*:*:*:*:*:*:*", "cpeNameId": "0B905626-8718-42FB-9908-7573102CB541"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.68:*:*:*:*:*:*:*", "cpeNameId": "365DA1ED-E1C9-4A4C-9A38-54FDA5832296"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.69:*:*:*:*:*:*:*", "cpeNameId": "27BBA256-9FD8-4A99-A301-31761D2CB794"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.70:*:*:*:*:*:*:*", "cpeNameId": "3B7F8DF6-7523-4D9B-B7B7-10E77A9D132C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.71:*:*:*:*:*:*:*", "cpeNameId": "580454E1-93EE-4311-852E-4B749F7905DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.72:*:*:*:*:*:*:*", "cpeNameId": "1307A5B0-2E1A-48AD-A718-46BF09EA2F52"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.73:*:*:*:*:*:*:*", "cpeNameId": "33F6E183-DDDE-4425-86CB-91EFEA45EB7C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.74:*:*:*:*:*:*:*", "cpeNameId": "861EB0F3-ECA9-4F1B-8842-DB4EFB6A00A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.75:*:*:*:*:*:*:*", "cpeNameId": "2D8BE345-69E8-49AC-A829-8FE9A71E0570"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.76:*:*:*:*:*:*:*", "cpeNameId": "71972DCE-D514-471A-8C19-6F1266FBB229"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.77:*:*:*:*:*:*:*", "cpeNameId": "F8C0EEE1-9B24-411B-ADC9-740859F33B48"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.78:*:*:*:*:*:*:*", "cpeNameId": "A8B37EA6-CA2C-46D6-A181-278E5C31F0DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.79:*:*:*:*:*:*:*", "cpeNameId": "F27C5E99-159C-490C-AF32-50BE9563EB52"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.80:*:*:*:*:*:*:*", "cpeNameId": "17813E0B-D346-4177-8F05-9533B4C60865"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.81:*:*:*:*:*:*:*", "cpeNameId": "8D01EFE4-8A1B-4CCF-95E7-AC5A1539D62E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.82:*:*:*:*:*:*:*", "cpeNameId": "1F0FC27E-9086-4213-9CFE-FD6F1B9A4AF1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.83:*:*:*:*:*:*:*", "cpeNameId": "481F6A95-F56E-4D6D-854C-6F04ECBD66B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.84:*:*:*:*:*:*:*", "cpeNameId": "46CC33A3-5940-4D55-8E84-E73C3BD823F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.85:*:*:*:*:*:*:*", "cpeNameId": "2D2A56E7-26AC-4B25-B518-580C7B57B9AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.86:*:*:*:*:*:*:*", "cpeNameId": "74D61A28-F673-4952-8B5C-02F3C13CB122"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.87:*:*:*:*:*:*:*", "cpeNameId": "339A37D8-F764-445B-8DB3-84A8FAECE0E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.88:*:*:*:*:*:*:*", "cpeNameId": "D97DAA30-8EFA-4A17-BCF4-1DA94DEA4EDB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.89:*:*:*:*:*:*:*", "cpeNameId": "E27E4623-1A1D-4DFD-82DA-A2C5CC7F7697"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.90:*:*:*:*:*:*:*", "cpeNameId": "E504954E-D296-441C-873E-BB0A99B128A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.91:*:*:*:*:*:*:*", "cpeNameId": "972594C2-DBE3-4358-974A-4F4669143532"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.92:*:*:*:*:*:*:*", "cpeNameId": "844FF0AF-746F-460B-AF09-70F04AEFCF31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.93:*:*:*:*:*:*:*", "cpeNameId": "0759AD27-6E8F-4FB0-86A0-581270987FC8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.94:*:*:*:*:*:*:*", "cpeNameId": "4762F42E-1EB4-43B9-B4C6-FED6BD72F8F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.95:*:*:*:*:*:*:*", "cpeNameId": "3AB26935-F86A-4944-AB5E-2030498A5150"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.96:*:*:*:*:*:*:*", "cpeNameId": "1F32FA33-C031-4CB3-9FE9-5B8F2AB4F0DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.97:*:*:*:*:*:*:*", "cpeNameId": "EA2A46B2-E9A8-4939-B34C-305DADC1E706"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.98:*:*:*:*:*:*:*", "cpeNameId": "6F40D4DA-5127-4F65-B450-DACBFF729694"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.99:*:*:*:*:*:*:*", "cpeNameId": "4ACCE8A9-B038-41D4-853D-6FFCC67C6B64"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.100:*:*:*:*:*:*:*", "cpeNameId": "7BC07033-922F-4E00-9A7F-A9799C0665BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.101:*:*:*:*:*:*:*", "cpeNameId": "63A5156F-CEE7-4BF7-8421-892C0A117BFF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.102:*:*:*:*:*:*:*", "cpeNameId": "FE32C7D9-7BCC-4896-9D3A-954D3A175242"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.103:*:*:*:*:*:*:*", "cpeNameId": "0E21CE22-A7B8-4F83-BEE7-6672AE3A2C44"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.104:*:*:*:*:*:*:*", "cpeNameId": "A4E75A55-DB3C-43F3-AA43-A04380CB435A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.105:*:*:*:*:*:*:*", "cpeNameId": "217BD320-E966-48FB-A3DA-EAC81FBA3D02"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.106:*:*:*:*:*:*:*", "cpeNameId": "A13D5A45-1F78-4F9D-8932-09FB4963FE2B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.107:*:*:*:*:*:*:*", "cpeNameId": "94B537FB-3FC1-4A2A-90C5-A41C4E757EAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.108:*:*:*:*:*:*:*", "cpeNameId": "A36CC6BB-339C-4928-B79B-7047AD126CAE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.109:*:*:*:*:*:*:*", "cpeNameId": "787AABB6-F55D-41A7-99FA-AE59AD411920"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.110:*:*:*:*:*:*:*", "cpeNameId": "E8453C19-A25E-42BC-AC28-3967873C0502"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.111:*:*:*:*:*:*:*", "cpeNameId": "F25CCCEB-3631-4B9B-852D-A76ED56BA4DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.112:*:*:*:*:*:*:*", "cpeNameId": "5A726FC3-8B4B-4E63-9865-6A5C6BC9451D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.113:*:*:*:*:*:*:*", "cpeNameId": "CD45E388-608F-4BE6-8152-527548FE08DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.114:*:*:*:*:*:*:*", "cpeNameId": "A7BDF880-128D-4D74-8D98-E41C861040C5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.115:*:*:*:*:*:*:*", "cpeNameId": "6692FB97-9395-401A-B1CB-AD484F90B89A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.116:*:*:*:*:*:*:*", "cpeNameId": "9A64BA88-6D08-409E-BFE1-24CFA920C75A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.117:*:*:*:*:*:*:*", "cpeNameId": "2D582BFD-C229-4552-B828-115F83D73F89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.118:*:*:*:*:*:*:*", "cpeNameId": "CA086871-EB47-4699-8451-993791AA05DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.119:*:*:*:*:*:*:*", "cpeNameId": "483BEBC5-E6D4-4ED8-A5E5-DB2DD73986DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.120:*:*:*:*:*:*:*", "cpeNameId": "68EF2A7B-021A-4153-BDB1-A68499185EFB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.121:*:*:*:*:*:*:*", "cpeNameId": "C55B56E4-06A2-43C2-BE53-5681C0687D73"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.122:*:*:*:*:*:*:*", "cpeNameId": "CB7B49F3-DDD7-4A9E-BF7D-89BCA4437C52"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.123:*:*:*:*:*:*:*", "cpeNameId": "4A20AD3E-FA89-4524-8D02-B2728615111C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.124:*:*:*:*:*:*:*", "cpeNameId": "C30938C7-DF69-4F4C-ADF6-BF47C209872E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.125:*:*:*:*:*:*:*", "cpeNameId": "D091A040-31A4-4643-BD08-9D25F02BDDED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.126:*:*:*:*:*:*:*", "cpeNameId": "FF6CD639-C348-4BAA-8C59-8FE73D9966DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.127:*:*:*:*:*:*:*", "cpeNameId": "3F24CE79-3D3D-421A-AC44-E68C17FC5D92"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.128:*:*:*:*:*:*:*", "cpeNameId": "F9E550EF-FFA3-4194-9071-7922680C7E6E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.129:*:*:*:*:*:*:*", "cpeNameId": "987DB34E-E170-4E7E-B08A-CD32A73E9156"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.130:*:*:*:*:*:*:*", "cpeNameId": "A7E67D9A-9FA7-43ED-B536-312C5C01CD6E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.131:*:*:*:*:*:*:*", "cpeNameId": "D9C69A17-571F-45C1-9120-1BE31A33A948"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.132:*:*:*:*:*:*:*", "cpeNameId": "166EDBC5-3C18-4042-8C19-F339F25162FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.133:*:*:*:*:*:*:*", "cpeNameId": "CBA08C9F-0426-4B96-A6E8-7253C152FFBC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.134:*:*:*:*:*:*:*", "cpeNameId": "182AECF8-FAC1-4E1B-BE84-ABB34E11A3F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.135:*:*:*:*:*:*:*", "cpeNameId": "A7249039-E52A-4756-A93F-06A3284AEDEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.136:*:*:*:*:*:*:*", "cpeNameId": "84C67C6F-FA0B-41EE-9D20-11A0BC255F63"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.137:*:*:*:*:*:*:*", "cpeNameId": "00A8D67B-9DFD-4BBE-9A8D-976B22573BC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.138:*:*:*:*:*:*:*", "cpeNameId": "94A225AF-5670-4866-967D-29ECA4887457"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.139:*:*:*:*:*:*:*", "cpeNameId": "579F476A-FED8-4232-ADF1-3889FDC4C86C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.140:*:*:*:*:*:*:*", "cpeNameId": "84F54287-F019-47C9-9CB7-7B6B6CCBA9E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.141:*:*:*:*:*:*:*", "cpeNameId": "3E72C4BF-107C-4C73-AD2D-13564B590074"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.142:*:*:*:*:*:*:*", "cpeNameId": "FC309597-3B6C-4DB1-920B-97C1428824C2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.143:*:*:*:*:*:*:*", "cpeNameId": "0F20169C-AA6F-433A-AB4B-2FB83AFE4CBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.144:*:*:*:*:*:*:*", "cpeNameId": "02E301AD-B083-4D5E-81D5-7C1990FAA3B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.145:*:*:*:*:*:*:*", "cpeNameId": "BAA0E2C0-1BF2-4F95-BBDA-D294FFC56C90"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.146:*:*:*:*:*:*:*", "cpeNameId": "333D6187-DE99-4496-951B-79FC37281B50"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.147:*:*:*:*:*:*:*", "cpeNameId": "5B8EA31C-9846-414C-B164-133B7C72AFAC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.148:*:*:*:*:*:*:*", "cpeNameId": "48B13BAF-B20A-4DEA-9516-565B3030BD3F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.149:*:*:*:*:*:*:*", "cpeNameId": "2BDBBF02-8793-439B-B2B7-F1398DDC5165"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.150:*:*:*:*:*:*:*", "cpeNameId": "845A54DE-9847-4628-81AE-9202E104E5A7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.151:*:*:*:*:*:*:*", "cpeNameId": "429BF264-A007-4AFC-9AC8-17CA5BE8091F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.152:*:*:*:*:*:*:*", "cpeNameId": "A21895BD-17BD-4347-BB11-AC22832B5545"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.153:*:*:*:*:*:*:*", "cpeNameId": "C72F8FFE-0954-4360-ABC2-97FDC0DB5D45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.154:*:*:*:*:*:*:*", "cpeNameId": "76BE03E9-E28F-44A8-9B89-9700CF4E3689"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.155:*:*:*:*:*:*:*", "cpeNameId": "C28104D3-94AE-44FA-9395-B7B19859B677"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.156:*:*:*:*:*:*:*", "cpeNameId": "27FB0DEA-7659-4394-8E83-0EC289A5CAA4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.157:*:*:*:*:*:*:*", "cpeNameId": "D9820BF1-0B1A-432F-889F-F152AAA957DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.158:*:*:*:*:*:*:*", "cpeNameId": "C0BDDEFA-7B1D-4108-BCC9-FFA63A3DDC7E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.159:*:*:*:*:*:*:*", "cpeNameId": "8A23C014-F216-43C3-9D3C-5CEED86EE41D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.160:*:*:*:*:*:*:*", "cpeNameId": "1978465D-F79C-40EB-A6EF-50EFF77BB974"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.161:*:*:*:*:*:*:*", "cpeNameId": "29914586-1720-4AE1-A204-01432051782B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.162:*:*:*:*:*:*:*", "cpeNameId": "FBE6A9B7-94E5-456F-B336-59EE1C9C62E5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.163:*:*:*:*:*:*:*", "cpeNameId": "31DF5109-302D-4C99-BF27-7752453D8B5E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.164:*:*:*:*:*:*:*", "cpeNameId": "3262D873-56B3-449E-A70A-17DA2F4D9382"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.165:*:*:*:*:*:*:*", "cpeNameId": "21C9EF71-018C-41DE-ADCD-FF6A38C77E4C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.166:*:*:*:*:*:*:*", "cpeNameId": "46897616-FAB1-4E27-8F2B-7B59CF5B96D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.167:*:*:*:*:*:*:*", "cpeNameId": "2547AA22-645F-4613-A353-93431C5784F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.168:*:*:*:*:*:*:*", "cpeNameId": "FF6BB8B3-8746-4110-9FFC-C8FA51F8CD8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.169:*:*:*:*:*:*:*", "cpeNameId": "76B2AC55-7FE1-4EB6-B66F-AA2DA71D67CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.170:*:*:*:*:*:*:*", "cpeNameId": "E8A369DE-6CF8-43BF-ACC2-34CCEAAEADEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.171:*:*:*:*:*:*:*", "cpeNameId": "192DCF0D-9152-475F-828E-817AD9C86E8B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.172:*:*:*:*:*:*:*", "cpeNameId": "DF8383A9-7BF3-473B-9EE1-38C0FB296913"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.173:*:*:*:*:*:*:*", "cpeNameId": "7AB9EEF7-D575-4CB3-B57E-173AE0807897"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.174:*:*:*:*:*:*:*", "cpeNameId": "2658DE93-2BC0-4AC0-86D9-0487D4571A3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.175:*:*:*:*:*:*:*", "cpeNameId": "9C9415F0-7A65-436A-AAD8-31F99B9D7389"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.176:*:*:*:*:*:*:*", "cpeNameId": "1D0378DF-6D92-4307-904F-C66E45A7951E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.177:*:*:*:*:*:*:*", "cpeNameId": "EAE9A661-784D-4767-AF9B-7FBFA7D82738"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.178:*:*:*:*:*:*:*", "cpeNameId": "C17A6F7B-CD4A-49F4-A75B-B67338DDDDD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.179:*:*:*:*:*:*:*", "cpeNameId": "E79DFC9A-C359-4DD6-990B-2174E5B0024A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.180:*:*:*:*:*:*:*", "cpeNameId": "0A2AFA9A-832F-4C6C-BF9A-7C5A1C0E4FCA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.181:*:*:*:*:*:*:*", "cpeNameId": "4ED76815-B1FF-4FF7-B33D-4CC39C1A3948"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.182:*:*:*:*:*:*:*", "cpeNameId": "094B86B6-B8A4-408E-93F5-7514E0889F80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.183:*:*:*:*:*:*:*", "cpeNameId": "0ECF42BB-D201-4ED6-BA24-8B3A388564DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.184:*:*:*:*:*:*:*", "cpeNameId": "588AC0CC-AEA3-4230-8820-D46E13AFED1A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.185:*:*:*:*:*:*:*", "cpeNameId": "1B6E85FD-9863-43D4-830D-C46AC7CF8EA5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.186:*:*:*:*:*:*:*", "cpeNameId": "E1320383-8026-48C2-AA55-3D6DD4C91761"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.187:*:*:*:*:*:*:*", "cpeNameId": "78BC22D4-F955-4AC6-A00F-AD4832C1F2FA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.188:*:*:*:*:*:*:*", "cpeNameId": "E562975C-CD47-45F9-815A-F1549043871A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.189:*:*:*:*:*:*:*", "cpeNameId": "9F7D5828-8590-4C04-9BA2-03D8A9265783"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.190:*:*:*:*:*:*:*", "cpeNameId": "052F6967-B479-47A5-B705-66ADF5BAE5B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.191:*:*:*:*:*:*:*", "cpeNameId": "E6E1C494-101F-4F6C-B9F9-453EF9EC7D30"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.192:*:*:*:*:*:*:*", "cpeNameId": "A1A79F09-A517-41C9-81E2-0D1B960AC8E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.193:*:*:*:*:*:*:*", "cpeNameId": "329B75BA-C9CB-4193-A56B-4C175431194D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.194:*:*:*:*:*:*:*", "cpeNameId": "B3CC767E-10C4-4966-8921-50BB6E99E682"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.195:*:*:*:*:*:*:*", "cpeNameId": "BDAF83E0-E596-47CA-9FD5-E310643531AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.196:*:*:*:*:*:*:*", "cpeNameId": "B52AB3E0-7C8A-4E9B-9AB7-970D110AD689"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.197:*:*:*:*:*:*:*", "cpeNameId": "A98AABF5-2C66-4202-8CC8-7BD6A5BD206C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.198:*:*:*:*:*:*:*", "cpeNameId": "D2FB7CC8-3184-4B7B-8F15-206D478B957B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.199:*:*:*:*:*:*:*", "cpeNameId": "F17EC735-6954-48DE-9B79-129B113894DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.200:*:*:*:*:*:*:*", "cpeNameId": "215BF96E-9953-4137-9343-E664467C544B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.201:*:*:*:*:*:*:*", "cpeNameId": "4F5AA1AE-A206-4735-811F-D278CE94F425"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.202:*:*:*:*:*:*:*", "cpeNameId": "21709E5C-334E-4C9A-93FC-D33A6A234EBE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.203:*:*:*:*:*:*:*", "cpeNameId": "90B8792D-F589-4658-8105-D62452F51118"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.204:*:*:*:*:*:*:*", "cpeNameId": "783138D6-77F2-42BD-B712-64D5E3069478"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.205:*:*:*:*:*:*:*", "cpeNameId": "FDFF6DBF-A75C-45BA-A6EB-7EE625C06625"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.206:*:*:*:*:*:*:*", "cpeNameId": "3AFE0482-4EE2-4916-B1D9-6164C7CE9424"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.207:*:*:*:*:*:*:*", "cpeNameId": "B70FE32B-60B4-491B-BE0C-1709EFA5893C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.208:*:*:*:*:*:*:*", "cpeNameId": "0B61E6D6-2C0A-41BF-A847-2A0989F51690"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.209:*:*:*:*:*:*:*", "cpeNameId": "FAD83EB2-0BC4-4AD0-B7D0-84D486786E11"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.210:*:*:*:*:*:*:*", "cpeNameId": "4F085545-FA13-4D9D-ACC8-F268C0942C68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.211:*:*:*:*:*:*:*", "cpeNameId": "1110C146-0596-4E9A-9D9A-759EEE029BE7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.212:*:*:*:*:*:*:*", "cpeNameId": "C4725039-FE74-42A4-8F28-71890581F507"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.213:*:*:*:*:*:*:*", "cpeNameId": "01623D91-F403-4331-8911-FC3D9F207EEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.214:*:*:*:*:*:*:*", "cpeNameId": "6E428F60-24AE-403A-918B-A89C96B757C7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.215:*:*:*:*:*:*:*", "cpeNameId": "3800AEF1-ED61-41F4-9D70-EA3E0B77361D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.216:*:*:*:*:*:*:*", "cpeNameId": "0E9E733E-B81F-4112-AD2F-CE938439024B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.217:*:*:*:*:*:*:*", "cpeNameId": "48B7E2F6-5130-443C-8771-BE9DCDFBDD10"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.218:*:*:*:*:*:*:*", "cpeNameId": "3B485A54-4F57-4E7C-B620-A82938273FA7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.219:*:*:*:*:*:*:*", "cpeNameId": "C7F27EB7-A65A-45A2-A904-9F60507D342A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.220:*:*:*:*:*:*:*", "cpeNameId": "447A4E02-26AC-4CA2-B76D-B3508CF9B860"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.221:*:*:*:*:*:*:*", "cpeNameId": "436B2D40-F48C-4162-99D2-30D16807E3B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.222:*:*:*:*:*:*:*", "cpeNameId": "6BF3B63B-B671-44C8-8CBC-9FD21CA0E820"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.223:*:*:*:*:*:*:*", "cpeNameId": "121ACF12-28C3-4E2A-88C5-D5EF13920A90"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.224:*:*:*:*:*:*:*", "cpeNameId": "A67E472A-DC6E-4691-B5F1-225DE7946514"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.225:*:*:*:*:*:*:*", "cpeNameId": "CD10FD8D-0844-48A8-986D-33CA0DB5B3AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.226:*:*:*:*:*:*:*", "cpeNameId": "A11586F3-BA48-43B1-B808-2FD2280550F7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.227:*:*:*:*:*:*:*", "cpeNameId": "D3DD83A4-36EB-4F6B-86DB-524C91470807"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.229:*:*:*:*:*:*:*", "cpeNameId": "B816AFF0-A9B1-4F57-93E1-BB2D2A273A68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.230:*:*:*:*:*:*:*", "cpeNameId": "A940CCEF-1858-4FB9-BEC7-C2CD5A8DA5C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.244:*:*:*:*:*:*:*", "cpeNameId": "CA513596-6180-494F-A47C-4DC449B53BB7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:*:*:*:*:*:*:*", "cpeNameId": "63BC1E47-0228-41F4-989F-B4714260762B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:-:*:*:*:*:*:*", "cpeNameId": "BEEBF8B2-4493-470F-90B7-A9A57717C54C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:rc1:*:*:*:*:*:*", "cpeNameId": "AC145652-F483-4B19-B8C4-624F28E03010"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:rc2:*:*:*:*:*:*", "cpeNameId": "B9AE2C09-C300-4B2D-A5A7-E5D4CE11A0F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:rc3:*:*:*:*:*:*", "cpeNameId": "24855508-8DA6-4CA8-9B38-21B1C4505824"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:rc4:*:*:*:*:*:*", "cpeNameId": "B5E9A0D7-9681-4F6C-BBE8-30403B1C6F83"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:rc5:*:*:*:*:*:*", "cpeNameId": "95BCDE4B-2F7F-4F21-A2F1-A30E9C6370D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:rc6:*:*:*:*:*:*", "cpeNameId": "F455B799-C4F3-4B7A-8B65-0383984C3717"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:rc7:*:*:*:*:*:*", "cpeNameId": "1F290906-F5FA-45DF-922F-62ECC063EA76"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.1:*:*:*:*:*:*:*", "cpeNameId": "34D4AA87-9172-4704-BEA7-9DDEB516DB84"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.2:*:*:*:*:*:*:*", "cpeNameId": "8BF52BA5-E253-4CDD-A135-1531A86D543E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.3:*:*:*:*:*:*:*", "cpeNameId": "145EB557-D73C-47BB-87A6-B7029FA35A40"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.4:*:*:*:*:*:*:*", "cpeNameId": "7EEB122E-2E7E-4662-8AF2-B5F702EA3A6A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.5:*:*:*:*:*:*:*", "cpeNameId": "A3738040-9287-4A85-AE74-8E90D460C227"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.6:*:*:*:*:*:*:*", "cpeNameId": "C1C5E2C0-BA06-4A09-8063-F0CA9FC0ABFE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.7:*:*:*:*:*:*:*", "cpeNameId": "F2C4DB30-0C29-4A72-ACAD-AC339F102D29"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.8:*:*:*:*:*:*:*", "cpeNameId": "B8F6A213-C6B1-442B-BB9F-2B987BDEA023"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.9:*:*:*:*:*:*:*", "cpeNameId": "54EA37D0-6527-4F8B-A416-2ADF4F749CF8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.10:*:*:*:*:*:*:*", "cpeNameId": "620126E3-8499-4B1E-A182-2E3AF06B336B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.11:*:*:*:*:*:*:*", "cpeNameId": "193D233C-D3F2-4B20-AFFF-7B602948094F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.12:*:*:*:*:*:*:*", "cpeNameId": "90F5A23D-3E38-40C2-B5F8-8F4D6C1FA3E7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.13:*:*:*:*:*:*:*", "cpeNameId": "2B0BFF44-FCAF-4E26-BEB4-6F302ECCC398"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.14:*:*:*:*:*:*:*", "cpeNameId": "6F1AF9D1-837E-4681-A1B5-DBE553BB65DE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.15:*:*:*:*:*:*:*", "cpeNameId": "B9251847-EA27-4EBA-B9F3-1162156DBDFA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.16:*:*:*:*:*:*:*", "cpeNameId": "16A3579F-40D9-4FB0-B7D3-54FC47821FE8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.17:*:*:*:*:*:*:*", "cpeNameId": "BDFD9B25-4336-4D39-8C82-48867CB816ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.18:*:*:*:*:*:*:*", "cpeNameId": "82BF44C5-7264-4478-B8FC-06100D67440C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.19:*:*:*:*:*:*:*", "cpeNameId": "B4AE9BDA-08FC-43E5-B69A-12D179D1F0F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.20:*:*:*:*:*:*:*", "cpeNameId": "9FA3583C-D6CB-4E2D-8807-AD4BE72A8400"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.21:*:*:*:*:*:*:*", "cpeNameId": "4C39A0D8-85D6-4087-A5C7-E31B4763C30E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.22:*:*:*:*:*:*:*", "cpeNameId": "3734E58B-67DE-4CFE-8A0A-E198902F5EF3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12:-:*:*:*:*:*:*", "cpeNameId": "909AE298-650A-40FC-89B6-3C9B84F18D0D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12:rc1:*:*:*:*:*:*", "cpeNameId": "2DF254E6-DCA2-415F-A9CF-A8F8214C70C9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12:rc2:*:*:*:*:*:*", "cpeNameId": "28EA1789-0AA1-4DDF-8A3B-186FAE60250E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12:rc3:*:*:*:*:*:*", "cpeNameId": "18273D65-2C56-44F3-86BB-210E8183A30E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12:rc4:*:*:*:*:*:*", "cpeNameId": "1C698D86-842A-4A52-AC8A-0ACE001B6150"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12:rc5:*:*:*:*:*:*", "cpeNameId": "5DA86DC0-64A9-4E9C-A37C-A4EFB1764A84"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12:rc6:*:*:*:*:*:*", "cpeNameId": "DD2A90B7-FAAF-49E4-A5FE-F6E9ADF6A147"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12:rc7:*:*:*:*:*:*", "cpeNameId": "A990F6D8-E66C-4AD6-9606-71E2B8FB4CFE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.1:*:*:*:*:*:*:*", "cpeNameId": "7497D744-2E4C-45AD-9B58-D9ECD626175B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.2:*:*:*:*:*:*:*", "cpeNameId": "10641D0D-05A7-4B3D-82FB-FFE591B7DBD7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.3:*:*:*:*:*:*:*", "cpeNameId": "5AD0A9F1-5AD4-4ABB-A833-99BA7D351577"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.4:*:*:*:*:*:*:*", "cpeNameId": "4665239B-D45C-4558-9F54-695E98369E8C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.5:*:*:*:*:*:*:*", "cpeNameId": "8E690484-7C22-4011-9B03-9983E23095F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.6:*:*:*:*:*:*:*", "cpeNameId": "F9520114-68E1-4BB9-B088-7C1A27ACE515"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.7:*:*:*:*:*:*:*", "cpeNameId": "AD1AB54E-70EA-4B7E-B7D9-87F45E7F87A9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.8:*:*:*:*:*:*:*", "cpeNameId": "8C5ABC42-12D2-499A-B6CC-C9B1E15AEA71"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.9:*:*:*:*:*:*:*", "cpeNameId": "46196B73-964E-4ABC-B0E5-48B5F5CB7BFF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.10:*:*:*:*:*:*:*", "cpeNameId": "36A6AB9B-68B3-4234-A8E6-74EC108A160C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.11:*:*:*:*:*:*:*", "cpeNameId": "A12D7920-D1CA-44DC-A290-E26C4FE41EEF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.12:*:*:*:*:*:*:*", "cpeNameId": "9794C38E-32C0-4EB8-B4FE-D02D6E4ECFEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.13:*:*:*:*:*:*:*", "cpeNameId": "B5621156-BE25-4483-A3D0-4DD273245B57"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.14:*:*:*:*:*:*:*", "cpeNameId": "D1BB4FE7-AF71-4FEF-BD81-A88B9E860487"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.15:*:*:*:*:*:*:*", "cpeNameId": "9B349C0E-D91F-485E-A777-06055A4DF1D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.16:*:*:*:*:*:*:*", "cpeNameId": "0101B6BB-6E04-4238-A384-245C8C831FE0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.17:*:*:*:*:*:*:*", "cpeNameId": "B70E75C0-1784-4F2D-9890-72635AD1ABC8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.18:*:*:*:*:*:*:*", "cpeNameId": "FC1C2672-396B-452C-97B1-6C7F0583CB21"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.19:*:*:*:*:*:*:*", "cpeNameId": "6CE0FEDB-F644-4A9C-A88A-8F9D69B58BBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.25:*:*:*:*:*:*:*", "cpeNameId": "E9B47122-76AA-45F9-9BA9-9AA7D47E1819"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13:-:*:*:*:*:*:*", "cpeNameId": "760A4977-F4EC-4445-8EED-8F3540557E96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", "cpeNameId": "789E9076-49A9-4149-A146-FFAB80FD6312"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", "cpeNameId": "510FD2D9-571A-4924-B0B5-266204ABEF00"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", "cpeNameId": "B7FC9139-392C-42D9-B092-06ADE363B7C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", "cpeNameId": "78FDEB4A-AC37-4CEB-90F2-69700A1DFCB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*", "cpeNameId": "2B4C5B22-5D8E-46CA-A9A7-D488F2847060"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13:rc6:*:*:*:*:*:*", "cpeNameId": "55D4CFE3-C4CD-4A45-A04A-BFDA91D27503"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13:rc7:*:*:*:*:*:*", "cpeNameId": "DD429168-8AFF-457A-A8A7-8723FDC00949"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.0-52:*:*:*:*:*:*:*", "cpeNameId": "292646CC-C335-4347-87AE-6E1555659B40"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.1:*:*:*:*:*:*:*", "cpeNameId": "30F1E081-ED8A-457C-8465-D9C070DF0721"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.2:*:*:*:*:*:*:*", "cpeNameId": "17573538-60C1-4BBE-8321-EDE2F7F0E1A3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.3:*:*:*:*:*:*:*", "cpeNameId": "E0E67EF3-1AC9-4F29-B215-A82FF3493F6D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.4:*:*:*:*:*:*:*", "cpeNameId": "C6A71459-E60F-4B6A-B838-AE055D002725"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.5:*:*:*:*:*:*:*", "cpeNameId": "2F2A9933-4925-48E1-A572-276C4704E76F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.6:*:*:*:*:*:*:*", "cpeNameId": "9B5FC7E8-F482-43BD-B50D-7371AB3D4692"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.7:*:*:*:*:*:*:*", "cpeNameId": "94B23D33-6B16-475B-BF18-12A4FD5BE981"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.8:*:*:*:*:*:*:*", "cpeNameId": "71FC3F52-9D0F-4FA1-BEC8-7E662B3F0865"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.9:*:*:*:*:*:*:*", "cpeNameId": "5F17B3D4-BEAA-4606-B54B-419BE8532261"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.10:*:*:*:*:*:*:*", "cpeNameId": "73EC9A1A-02F6-4D0A-993F-5F2F9277F242"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.11:*:*:*:*:*:*:*", "cpeNameId": "45FFC97B-0FB5-4F9F-8660-FDCF0FBD5166"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.12:*:*:*:*:*:*:*", "cpeNameId": "2C6FC6E4-806F-4C8F-BC99-E279D18A47F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.13:*:*:*:*:*:*:*", "cpeNameId": "EBA292BE-DC50-49A1-8C5B-284C05E30E80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.14:*:*:*:*:*:*:*", "cpeNameId": "950E8486-A34F-4B8C-B6B9-213FB5D2B553"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.15:*:*:*:*:*:*:*", "cpeNameId": "DD0ACE31-23BC-46AE-8C24-DDE99C1677FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.16:*:*:*:*:*:*:*", "cpeNameId": "7D6ABA87-CFF7-4467-B1EB-26F1B2C8CD86"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.17:*:*:*:*:*:*:*", "cpeNameId": "B6F4951C-AB24-43F3-8361-34CD2C0DA81E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.18:*:*:*:*:*:*:*", "cpeNameId": "C7B2B5A1-F367-42EA-BB1B-F03C29AE7228"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.19:*:*:*:*:*:*:*", "cpeNameId": "39AC74B5-3F06-44E2-8F03-3C3F552C6111"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14:-:*:*:*:*:*:*", "cpeNameId": "290B9F79-3C87-4725-9517-AF89CC5F87D6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14:rc1:*:*:*:*:*:*", "cpeNameId": "A83E7C0B-A2D1-46BB-A787-DF9B68EA842A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14:rc2:*:*:*:*:*:*", "cpeNameId": "3FC14149-AA1E-48B5-8F75-5B5DD861A257"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14:rc3:*:*:*:*:*:*", "cpeNameId": "FA98B0B7-3C8F-4AC4-96E2-C1ED5869C608"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14:rc4:*:*:*:*:*:*", "cpeNameId": "21FB0B0F-DD53-4505-A841-D56D4C98ADDA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14:rc5:*:*:*:*:*:*", "cpeNameId": "4DDE3D5C-B126-49B9-8255-B97A9F55DC75"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14:rc6:*:*:*:*:*:*", "cpeNameId": "AC770C18-100E-4D5A-8E7C-548B363374D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.1:*:*:*:*:*:*:*", "cpeNameId": "6ED5E726-F7B4-446F-8B58-8756B5D09D3A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.2:*:*:*:*:*:*:*", "cpeNameId": "EEEEDE36-29F0-45B2-A5AD-AC615F9ECBFE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.3:*:*:*:*:*:*:*", "cpeNameId": "820DBC02-C9B5-4003-84F4-6C88EE2C3161"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.4:*:*:*:*:*:*:*", "cpeNameId": "75EEBB8F-B653-4BE3-8748-7973BB51D982"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.5:*:*:*:*:*:*:*", "cpeNameId": "EB2BAAA7-D118-4EE4-8974-B5E91B2DD088"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.6:*:*:*:*:*:*:*", "cpeNameId": "A90AEBB1-634D-4E4C-9EB4-5A378DA9921E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.7:*:*:*:*:*:*:*", "cpeNameId": "713408CD-13C2-4E22-A7CF-1CFA01082262"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.8:*:*:*:*:*:*:*", "cpeNameId": "AF7173EC-5AA6-4152-ADE2-77F860F5DCBD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.9:*:*:*:*:*:*:*", "cpeNameId": "5C3FF227-DDB0-4ACE-9170-4BE4CDA39239"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.10:*:*:*:*:*:*:*", "cpeNameId": "B9A635C8-CD0F-4897-A6E6-11F42F597CF7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.11:*:*:*:*:*:*:*", "cpeNameId": "D302868E-99BB-4C0C-9EC5-22E0F2F7B58A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.12:*:*:*:*:*:*:*", "cpeNameId": "227CCDD9-0DA9-4E19-A3A0-98182C78A04D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.13:*:*:*:*:*:*:*", "cpeNameId": "BA9F4788-9EAB-4974-B38D-F49FA29FCAB7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.14:*:*:*:*:*:*:*", "cpeNameId": "30A4EDD4-FFDC-46D1-9525-65CE02584D95"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.15:*:*:*:*:*:*:*", "cpeNameId": "253EE3A7-BB19-4AC4-B7F6-9B50D49FE43B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.16:*:*:*:*:*:*:*", "cpeNameId": "CFD0FB79-CC87-491D-8B44-C835289F1FF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.17:*:*:*:*:*:*:*", "cpeNameId": "6D7A8649-F82D-4F46-8B54-B4A42730DC62"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.18:*:*:*:*:*:*:*", "cpeNameId": "F5056E34-3AA2-4E1D-9445-D36A5E9AC2AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.19:*:*:*:*:*:*:*", "cpeNameId": "173C2A8A-1254-4EA0-8FE0-266FB47C42E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.20:*:*:*:*:*:*:*", "cpeNameId": "91634B25-518C-487C-90FC-C295D8AEF303"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.21:*:*:*:*:*:*:*", "cpeNameId": "1188704C-1DAC-4A1B-876D-B462547A9A1D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15:-:*:*:*:*:*:*", "cpeNameId": "599716EA-4916-4E30-8C24-4C6384D09138"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*", "cpeNameId": "CC920260-1BAF-4237-9263-2BCB29AE387F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*", "cpeNameId": "E052153B-5861-4C61-8207-1ED350609920"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:*", "cpeNameId": "6DBE44D0-670B-4B11-93BC-5CE160AE79A0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15:rc4:*:*:*:*:*:*", "cpeNameId": "D2702E38-FC04-4035-9742-46E5C2C32FF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15:rc5:*:*:*:*:*:*", "cpeNameId": "A638E326-4ACA-4CBB-8541-3860AEC16C9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15:rc6:*:*:*:*:*:*", "cpeNameId": "3E354D0D-99D1-4D2E-A42D-66946B7130B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15:rc7:*:*:*:*:*:*", "cpeNameId": "3FA3424A-B73B-4456-B871-280BBF7DE793"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.0:*:*:*:*:*:*:*", "cpeNameId": "3B152660-5C53-45F1-82AE-702237DAC922"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.0-58:*:*:*:*:*:*:*", "cpeNameId": "06ABD7CB-C7BF-4F85-ABD4-36F90A9114F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.1:*:*:*:*:*:*:*", "cpeNameId": "C92526FC-5702-4551-95C4-5D185E57703A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.2:*:*:*:*:*:*:*", "cpeNameId": "A70688C6-4AA2-4110-BC86-CA9E324DF3EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.3:*:*:*:*:*:*:*", "cpeNameId": "64CD2A28-6AE0-4894-8B00-F5232E3C34A9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.3:-:*:*:*:*:*:*", "cpeNameId": "FE18FBEA-C217-402C-8731-7C387B4B3D7F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.4:*:*:*:*:*:*:*", "cpeNameId": "969BD4C0-B372-451B-9376-0CA5FB3C286F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.5:*:*:*:*:*:*:*", "cpeNameId": "7309FA34-EDC1-41D1-BB4E-09F09900678F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.6:*:*:*:*:*:*:*", "cpeNameId": "DA042DB6-921A-4071-A171-7D0C2BBBC8F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.7:*:*:*:*:*:*:*", "cpeNameId": "0E69D848-C6AF-45F1-B581-3435108E1E1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.8:*:*:*:*:*:*:*", "cpeNameId": "73679DB9-DB66-4D04-9362-9F7FDE3ED7DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.9:*:*:*:*:*:*:*", "cpeNameId": "A914D016-CDDA-4F8C-8D11-AD68CA078395"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.10:*:*:*:*:*:*:*", "cpeNameId": "B8732B41-FD4D-4BB5-B500-664C2BA3129F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.11:*:*:*:*:*:*:*", "cpeNameId": "A58F2B5E-D805-40E6-B2EC-38AB78F48EBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.12:*:*:*:*:*:*:*", "cpeNameId": "C570EA74-0498-4116-8B63-2E08DB9EAF91"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.13:*:*:*:*:*:*:*", "cpeNameId": "D43ECFE8-45FA-41D1-94B9-F6A3601D99C4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.14:*:*:*:*:*:*:*", "cpeNameId": "9B285A1E-C507-4EDB-A79D-7F3A707A00D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.15:*:*:*:*:*:*:*", "cpeNameId": "479523C1-5DFC-4ADF-88A9-60D25E740ECD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.16:*:*:*:*:*:*:*", "cpeNameId": "283D07E0-7CF7-428B-B5E7-F9F389F42621"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.17:*:*:*:*:*:*:*", "cpeNameId": "28209832-3CD5-4EB8-BFF7-94C00921B21A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.18:*:*:*:*:*:*:*", "cpeNameId": "C402A420-3087-4169-B118-B9576726F29A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.19:*:*:*:*:*:*:*", "cpeNameId": "71FF4C04-4676-4339-904C-E431CA842C9A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.20:*:*:*:*:*:*:*", "cpeNameId": "D3AC6061-A8AD-4B32-9631-AAD5AE8AE846"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.21:*:*:*:*:*:*:*", "cpeNameId": "01512FC7-2E77-4185-84AD-233C3850F0C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.22:*:*:*:*:*:*:*", "cpeNameId": "13950585-5CDE-450C-8569-0F629C7EDB2E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.23:*:*:*:*:*:*:*", "cpeNameId": "84D3D456-7CBD-4BB2-940D-07D97BA08C58"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.24:*:*:*:*:*:*:*", "cpeNameId": "4B07A2D0-5A94-41AD-8478-EB93089837BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.25:*:*:*:*:*:*:*", "cpeNameId": "4B57878E-85D9-4630-81F9-971E521E1D04"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.26:*:*:*:*:*:*:*", "cpeNameId": "10C93845-0531-404A-B632-86FC15D22E78"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.27:*:*:*:*:*:*:*", "cpeNameId": "6B435B64-AB1B-4029-B6A5-01DD5C19206F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.28:*:*:*:*:*:*:*", "cpeNameId": "101F745E-07DD-436D-9573-77D88FEE7DA8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.29:*:*:*:*:*:*:*", "cpeNameId": "2126A535-152D-4C7D-BEEC-5E05EFF76DBF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.30:*:*:*:*:*:*:*", "cpeNameId": "3D5050EC-725E-41E0-A0BB-89C5CC71ACC5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.31:*:*:*:*:*:*:*", "cpeNameId": "CADD5BFF-62AF-44DA-8433-F0221493495C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.32:*:*:*:*:*:*:*", "cpeNameId": "D41546A8-EBED-4F57-BD4A-9E1B2A5C17CC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.33:*:*:*:*:*:*:*", "cpeNameId": "2AD16C2A-38AA-4931-922E-B883B7574C58"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.34:*:*:*:*:*:*:*", "cpeNameId": "99C916A9-866D-4905-9878-8DD27F5E980D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.35:*:*:*:*:*:*:*", "cpeNameId": "5F3D2240-53BA-4C7D-8199-FE7F31339D4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.36:*:*:*:*:*:*:*", "cpeNameId": "FF57011F-9545-414B-B253-52F38B78B77A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.37:*:*:*:*:*:*:*", "cpeNameId": "606225EC-ECF3-4F47-91A8-7F9D17842D62"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.38:*:*:*:*:*:*:*", "cpeNameId": "4DB0EF0E-5BF0-47C3-A2F9-B3522AFF7190"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.39:*:*:*:*:*:*:*", "cpeNameId": "A08CEA1B-91C1-4711-BD80-0F7ADDE94BA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.40:*:*:*:*:*:*:*", "cpeNameId": "89D88D81-DD0E-43FD-B671-78B808D88647"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.41:*:*:*:*:*:*:*", "cpeNameId": "DD7E6E45-BF7C-46DF-958C-735232ECCBED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.42:*:*:*:*:*:*:*", "cpeNameId": "B2520F43-B7D8-4373-8869-07DCFD59FF11"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.43:*:*:*:*:*:*:*", "cpeNameId": "F16FC01A-7763-44B0-B502-4FC46DA358AF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.44:*:*:*:*:*:*:*", "cpeNameId": "030D2A9C-692A-4DB1-9D63-44DBCC0C68F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.45:*:*:*:*:*:*:*", "cpeNameId": "94C51A53-591C-4ED3-BBD6-7549EE1F8068"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.46:*:*:*:*:*:*:*", "cpeNameId": "ACC8D217-A7B0-4C18-9B70-FA0E5262BFB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.47:*:*:*:*:*:*:*", "cpeNameId": "191C3ACC-27A6-438E-9334-742147EFFBFE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.48:*:*:*:*:*:*:*", "cpeNameId": "8B81D3ED-5819-4470-BE97-D8DEA91AFBB3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.49:*:*:*:*:*:*:*", "cpeNameId": "BAF8556B-BB65-4F53-8EB5-059A294DCD67"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.50:*:*:*:*:*:*:*", "cpeNameId": "D99EABCA-D9E3-44D7-AF96-2D5F1474CD15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.51:*:*:*:*:*:*:*", "cpeNameId": "89386483-66E5-4C04-B476-C08F5BD6D0D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.52:*:*:*:*:*:*:*", "cpeNameId": "076DEA19-48DB-476C-8CFA-06ACE89F67EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.53:*:*:*:*:*:*:*", "cpeNameId": "E3AAC0BA-7638-428F-9D89-08A94750E9EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.54:*:*:*:*:*:*:*", "cpeNameId": "56A56B25-D086-4413-8692-A5882F02760F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.55:*:*:*:*:*:*:*", "cpeNameId": "4BF52F71-274C-4E09-9D64-84AAC8D6F67E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.56:*:*:*:*:*:*:*", "cpeNameId": "2D041A4C-8395-4B72-B6B7-06ECBA8E8693"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.57:*:*:*:*:*:*:*", "cpeNameId": "6B5C0E6D-8C22-41CE-8CF7-5A85861A47D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.58:*:*:*:*:*:*:*", "cpeNameId": "FCE4E1B8-7046-4626-A6D1-53B7095B20A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.59:*:*:*:*:*:*:*", "cpeNameId": "729B700C-BDB9-4DFB-A795-98DFBE32EEC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.60:*:*:*:*:*:*:*", "cpeNameId": "1D98E598-4BF4-43D6-904C-9290DDF06272"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.61:*:*:*:*:*:*:*", "cpeNameId": "6CCCAF65-435F-482C-BA22-7DDC145109F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.62:*:*:*:*:*:*:*", "cpeNameId": "B90909CA-2810-4537-A85A-4CBA4A6AF37C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.63:*:*:*:*:*:*:*", "cpeNameId": "6F0C3B38-C13C-4A80-9EBD-65AC9FCC8F9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.64:*:*:*:*:*:*:*", "cpeNameId": "F91D8B0C-B2AC-43A8-8D6C-536E4C07BDA3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.65:*:*:*:*:*:*:*", "cpeNameId": "4C75DDA0-056C-4560-B8F6-FD3A28965C0F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.66:*:*:*:*:*:*:*", "cpeNameId": "479D10C6-D8AE-4C6C-95D8-D4935062ACDA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.67:*:*:*:*:*:*:*", "cpeNameId": "ADBEA5B5-A3FF-4667-A57F-EAA8FBC5F51A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.68:*:*:*:*:*:*:*", "cpeNameId": "E5298249-E4F2-40FD-9A02-0FFE62A97655"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.69:*:*:*:*:*:*:*", "cpeNameId": "AF74FFF5-EACB-41FA-9DDE-6E9F7C2D49E9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.70:*:*:*:*:*:*:*", "cpeNameId": "626D6B66-055F-40EF-87D0-BCA1ACB41632"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.71:*:*:*:*:*:*:*", "cpeNameId": "13BB2C1F-A7E8-4FEA-802A-FCB5DB17689E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.72:*:*:*:*:*:*:*", "cpeNameId": "687ACBBC-002B-4A57-B0C5-495C006BF83A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.73:*:*:*:*:*:*:*", "cpeNameId": "2FFC61CE-E920-4907-9237-ADCB03CF57F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.74:*:*:*:*:*:*:*", "cpeNameId": "21586670-7837-44DE-98F5-E8664ECB39F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.75:*:*:*:*:*:*:*", "cpeNameId": "257AECB1-0BFD-4F2F-9E1D-8B99451293E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.76:*:*:*:*:*:*:*", "cpeNameId": "4C6C2994-8803-478D-98AD-268D0B994FD2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.77:*:*:*:*:*:*:*", "cpeNameId": "67B26A96-5B92-41D5-A933-110235C90FC2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.78:*:*:*:*:*:*:*", "cpeNameId": "93765A6E-5FF1-428E-B6DD-08E9761E4BC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.79:*:*:*:*:*:*:*", "cpeNameId": "1E46E1F7-EC81-48DB-8D87-615670C42211"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.80:*:*:*:*:*:*:*", "cpeNameId": "403BE072-9172-420B-A0DF-A011387FC467"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.81:*:*:*:*:*:*:*", "cpeNameId": "76501F14-5447-4316-96C1-406CBB85ACEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.82:*:*:*:*:*:*:*", "cpeNameId": "EC139CB2-1B4C-41BA-B74E-6E21D4C75A65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.83:*:*:*:*:*:*:*", "cpeNameId": "B82C5952-6221-4637-A4F9-27F26C848140"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.84:*:*:*:*:*:*:*", "cpeNameId": "6D9BBF85-E068-4434-9F1D-FC5E2BCCCE15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.85:*:*:*:*:*:*:*", "cpeNameId": "4DFB6EEB-3B7C-4BBE-9C57-22212F5CF117"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.86:*:*:*:*:*:*:*", "cpeNameId": "54FA7373-2A0F-441F-B2DE-D0026C9E6E2A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.87:*:*:*:*:*:*:*", "cpeNameId": "D2002224-68A5-4CEB-84E8-C68A68A70477"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.88:*:*:*:*:*:*:*", "cpeNameId": "240ADDF1-F9B5-4E8A-BB28-8D25FD6EAFAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.89:*:*:*:*:*:*:*", "cpeNameId": "E8949735-535C-4365-9E77-3F5AFA127F45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.90:*:*:*:*:*:*:*", "cpeNameId": "27480E5A-75A6-4924-AE94-56C368919E20"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.91:*:*:*:*:*:*:*", "cpeNameId": "F1444DEC-505C-4B47-89E1-558CA1FE252D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.92:*:*:*:*:*:*:*", "cpeNameId": "366E992F-2DEB-4B73-8D13-0AAA6CDAB1AA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.93:*:*:*:*:*:*:*", "cpeNameId": "8B194E4D-C302-4781-A3EB-287B9338BB49"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.94:*:*:*:*:*:*:*", "cpeNameId": "8C4F3FDB-C7D3-4FAF-ADC9-F9C48692180C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.95:*:*:*:*:*:*:*", "cpeNameId": "78DB19FE-CDF2-4493-934F-F78BAC1E3525"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.96:*:*:*:*:*:*:*", "cpeNameId": "BD7068CF-1BF4-4836-A365-A1CAA95D8492"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.97:*:*:*:*:*:*:*", "cpeNameId": "8D4F726D-1B15-4756-B043-23B295E50326"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.98:*:*:*:*:*:*:*", "cpeNameId": "26CC4C2E-D776-4C60-9E36-FCAC66C0CA93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.99:*:*:*:*:*:*:*", "cpeNameId": "FB96FD42-EA7B-4EA4-BE27-FB6AE67A19D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.100:*:*:*:*:*:*:*", "cpeNameId": "8D34EF8C-BCA7-4EC8-9C69-559A59897E86"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.101:*:*:*:*:*:*:*", "cpeNameId": "6675EF7C-AACC-4247-A01C-896C9A44CFB9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.102:*:*:*:*:*:*:*", "cpeNameId": "2FEF936B-B116-4F46-8301-200550628240"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.103:*:*:*:*:*:*:*", "cpeNameId": "DE221176-159A-4357-8F12-AC71670703B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.104:*:*:*:*:*:*:*", "cpeNameId": "C1896DF2-E302-460B-9502-CF7063E5DF9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.105:*:*:*:*:*:*:*", "cpeNameId": "9E101463-342E-4486-823F-3BC4BD391306"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.106:*:*:*:*:*:*:*", "cpeNameId": "CA88855E-C837-4947-93E0-B9D7F9B827E7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.107:*:*:*:*:*:*:*", "cpeNameId": "B13F0C93-E3E4-4641-9EAB-3EA2990A1C89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.108:*:*:*:*:*:*:*", "cpeNameId": "130C0395-CE35-4126-A645-AADC5CD80532"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.109:*:*:*:*:*:*:*", "cpeNameId": "45D1D3CB-FD9D-42FB-A1D3-534BC36E80EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.110:*:*:*:*:*:*:*", "cpeNameId": "A931A0BD-98A1-47EB-9A75-0E8789CD2174"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.111:*:*:*:*:*:*:*", "cpeNameId": "CED0554E-DE06-438B-BD20-D55AB97E2137"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.112:*:*:*:*:*:*:*", "cpeNameId": "01469DE3-F508-4F50-B7EF-CFFAF6B0244A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.113:*:*:*:*:*:*:*", "cpeNameId": "EE8A8B31-F5BC-463C-8C3F-F99C8605D124"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.114:*:*:*:*:*:*:*", "cpeNameId": "7555AB4A-AA90-4F9E-AC9A-522F0EBB84B6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.115:*:*:*:*:*:*:*", "cpeNameId": "37780F52-A144-418A-8605-87E836109FA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.116:*:*:*:*:*:*:*", "cpeNameId": "67C9CBE9-0CF6-4DC1-96C9-8B8D0C572C76"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.117:*:*:*:*:*:*:*", "cpeNameId": "ADB012DE-27D7-4796-A07A-55897A9208B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.118:*:*:*:*:*:*:*", "cpeNameId": "6CAF3A99-3538-4B78-AB6F-1FD5BC1D3731"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.119:*:*:*:*:*:*:*", "cpeNameId": "F62E2EC5-1929-49E3-8920-4EFC89470EF3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.120:*:*:*:*:*:*:*", "cpeNameId": "1ACD20AE-5810-4832-9596-E0F2B77F6DED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.121:*:*:*:*:*:*:*", "cpeNameId": "0840D171-E172-4AEB-9A04-748165172F57"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.122:*:*:*:*:*:*:*", "cpeNameId": "108F7161-9C83-4AF5-81CE-7210DBE16A3B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.123:*:*:*:*:*:*:*", "cpeNameId": "AFC5B1D0-7550-4CA6-B9D8-7362589804BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.124:*:*:*:*:*:*:*", "cpeNameId": "607A4975-DD27-45FB-8492-B2D610C8CE49"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.125:*:*:*:*:*:*:*", "cpeNameId": "7CFAB9E2-3565-4DBE-A4A3-F420E0E6F1B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.126:*:*:*:*:*:*:*", "cpeNameId": "934C84D4-9205-4231-918D-52F8653AD03A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.127:*:*:*:*:*:*:*", "cpeNameId": "94F04153-424F-4287-9D87-86D843B8EC6B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.128:*:*:*:*:*:*:*", "cpeNameId": "3A0743EE-08EE-4033-974B-534685606B8D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.129:*:*:*:*:*:*:*", "cpeNameId": "1851B737-51D3-44EC-BAD0-C326CB4B258A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.130:*:*:*:*:*:*:*", "cpeNameId": "5E3B9172-8C12-4171-BE40-947651A6C1D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.131:*:*:*:*:*:*:*", "cpeNameId": "68CDD386-3C55-4849-BFDD-71A5DF5ECF00"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.132:*:*:*:*:*:*:*", "cpeNameId": "3F25FB70-CBCF-4363-947B-8D0749D054A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.133:*:*:*:*:*:*:*", "cpeNameId": "183855CE-2982-4596-954A-C8AD340BB217"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.134:*:*:*:*:*:*:*", "cpeNameId": "2C960D3A-EB30-4662-92DE-2F4DCA1B61DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.135:*:*:*:*:*:*:*", "cpeNameId": "795D4E07-5632-4B2F-889E-52121C56C87A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.136:*:*:*:*:*:*:*", "cpeNameId": "39F63867-B3B8-4B11-8568-793FE9BF0657"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.137:*:*:*:*:*:*:*", "cpeNameId": "86AFC96E-5CC1-4C7C-8D07-20BF5FD72F51"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.138:*:*:*:*:*:*:*", "cpeNameId": "6D98B672-ABF1-4E6A-85CA-C98156AD289F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.139:*:*:*:*:*:*:*", "cpeNameId": "60BDBDA5-D58A-4E1E-87FB-110840F829F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.140:*:*:*:*:*:*:*", "cpeNameId": "44DCAB0F-015F-4450-9454-1B281A41F7FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.141:*:*:*:*:*:*:*", "cpeNameId": "3C8C0EA5-6615-4404-9C0E-507EA505E607"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.142:*:*:*:*:*:*:*", "cpeNameId": "AACA090B-6D25-4504-8EEF-02C1DA914B55"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.143:*:*:*:*:*:*:*", "cpeNameId": "04411AB1-68B2-43CF-8AAF-023A00274276"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.144:*:*:*:*:*:*:*", "cpeNameId": "D1A15124-7544-4990-8884-8EC08CBDB231"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.145:*:*:*:*:*:*:*", "cpeNameId": "DBDB8123-C794-42AF-B554-13E794244440"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.146:*:*:*:*:*:*:*", "cpeNameId": "CD3243D1-4C4E-424A-BCFE-7FAF5782049D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.147:*:*:*:*:*:*:*", "cpeNameId": "D14C7C5E-C636-4B9B-941A-1B5D3FE4AF3B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.148:*:*:*:*:*:*:*", "cpeNameId": "43B668A9-8ADC-487B-8857-F8CC74D99990"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.149:*:*:*:*:*:*:*", "cpeNameId": "8C6DF61D-1354-424F-88D4-C76B0044C4BA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.150:*:*:*:*:*:*:*", "cpeNameId": "405263B7-A847-493D-BAC8-67CDC081E8A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.151:*:*:*:*:*:*:*", "cpeNameId": "AFB5460A-5F15-4E58-A1D9-438F22B08C61"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.152:*:*:*:*:*:*:*", "cpeNameId": "6FD5D09F-908B-4EA6-ADDA-D5D4867282C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.153:*:*:*:*:*:*:*", "cpeNameId": "35BC07C8-138B-48CB-94C8-F4F2DE1CEA73"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.154:*:*:*:*:*:*:*", "cpeNameId": "104BA652-53EA-4BE7-AEF6-1E69DF5BAB94"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.155:*:*:*:*:*:*:*", "cpeNameId": "82D13E0C-C092-4C55-8F8E-A8EC9F7C5B28"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.156:*:*:*:*:*:*:*", "cpeNameId": "0208D826-E36F-43ED-94E2-47B3786BDA8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.157:*:*:*:*:*:*:*", "cpeNameId": "29BE7FF8-0D66-4613-9FF9-1491805EF6E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.158:*:*:*:*:*:*:*", "cpeNameId": "F0BD86B6-9DA2-4CB5-925F-AED18EA69B7A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.159:*:*:*:*:*:*:*", "cpeNameId": "1967C928-055E-41A6-9452-11327EFD81F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.160:*:*:*:*:*:*:*", "cpeNameId": "39762989-4F30-40E8-9958-8100639F003F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.161:*:*:*:*:*:*:*", "cpeNameId": "93EFCF93-5625-453D-B8C8-D532F2F6B2EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.162:*:*:*:*:*:*:*", "cpeNameId": "AD93992B-560A-4880-AB8E-2B12E1ED9CE6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.163:*:*:*:*:*:*:*", "cpeNameId": "9F1AF162-C909-4161-9860-93F52BA93C11"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.164:*:*:*:*:*:*:*", "cpeNameId": "E82128C3-95AC-4517-8595-90030EB8B1B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.165:*:*:*:*:*:*:*", "cpeNameId": "DD75A3C4-3B2C-47C3-8249-25430F6326F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.166:*:*:*:*:*:*:*", "cpeNameId": "C4AE610D-F204-40F4-9F0E-A12F96513628"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.167:*:*:*:*:*:*:*", "cpeNameId": "AD2CD499-D496-457D-B206-76DD055935D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.168:*:*:*:*:*:*:*", "cpeNameId": "D17DDC10-C0C2-4595-99AA-7D081F156E28"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.170:*:*:*:*:*:*:*", "cpeNameId": "68B1E403-BB7E-46D6-93FB-39CCDEC9F903"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.171:*:*:*:*:*:*:*", "cpeNameId": "20D00418-523B-451C-A87C-A7494767A55C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.172:*:*:*:*:*:*:*", "cpeNameId": "BF5B290A-52DC-4153-9821-1E04DA80704B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16:-:*:*:*:*:*:*", "cpeNameId": "C83A7E51-CA73-46EC-8635-C725205B637D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*", "cpeNameId": "028A348E-72E2-4B13-9D61-56938AFFB6F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:*", "cpeNameId": "6495A470-21D2-43F0-B762-C6ECB6134C5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16:rc3:*:*:*:*:*:*", "cpeNameId": "6342FCDA-7AC5-4E1B-A8F7-C4A7CB62F606"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16:rc4:*:*:*:*:*:*", "cpeNameId": "3379676E-35B7-4474-8A99-EF053E0FD968"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16:rc5:*:*:*:*:*:*", "cpeNameId": "AE10DE94-CADF-4B77-B540-4197CCAB49EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16:rc6:*:*:*:*:*:*", "cpeNameId": "EFBAB573-844C-4A77-BC98-353AB1C86E1A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16:rc7:*:*:*:*:*:*", "cpeNameId": "71AEECF0-21D6-492A-999E-8D6687D719A7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.0:*:*:*:*:*:*:*", "cpeNameId": "081E7EC8-3E8E-48D4-8187-1B96F6BE062F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.0:rc1:*:*:*:*:*:*", "cpeNameId": "EB5911C8-9712-4439-99F2-5BCDED060240"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.1:*:*:*:*:*:*:*", "cpeNameId": "2730ED9E-094C-40E1-B3C5-75C02A9E1BBD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.2:*:*:*:*:*:*:*", "cpeNameId": "7A33187A-7AA3-4565-BD7A-EE2304904D3B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.3:*:*:*:*:*:*:*", "cpeNameId": "F0C5525B-4224-4481-9190-16DFA7982F9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.4:*:*:*:*:*:*:*", "cpeNameId": "891F8D0E-202D-4728-9D83-764496E40CB9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.5:*:*:*:*:*:*:*", "cpeNameId": "AFC47178-4013-4A67-BFBE-F2C1D8C43FAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.6:*:*:*:*:*:*:*", "cpeNameId": "A563BA20-7E45-4F95-97CC-B991BEE12EC2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.7:*:*:*:*:*:*:*", "cpeNameId": "62897C18-4BA0-46BF-A3C6-A2F57B2C400F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.8:*:*:*:*:*:*:*", "cpeNameId": "0D9ED6C5-B404-47B6-BDDA-21FB4E7392DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.9:*:*:*:*:*:*:*", "cpeNameId": "DBB9E77F-F972-4486-AE16-C40C76D64E87"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.10:*:*:*:*:*:*:*", "cpeNameId": "7D6A655C-B244-446F-8CDC-4D17D47253AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.11:*:*:*:*:*:*:*", "cpeNameId": "B5EB9714-867F-44F9-9AA3-BE8D500D4BC5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.12:*:*:*:*:*:*:*", "cpeNameId": "8BF0B6A9-F5F7-4EF6-A81F-9AA1DEBFBCE3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.13:*:*:*:*:*:*:*", "cpeNameId": "BE8039FF-A2FF-4592-BCF2-FDE1271C80D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.14:*:*:*:*:*:*:*", "cpeNameId": "70857AD4-FC92-4F1B-905E-19EC450C5B11"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.15:*:*:*:*:*:*:*", "cpeNameId": "AC26CE14-E5B3-4159-805B-6EC9D9B37D83"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.16:*:*:*:*:*:*:*", "cpeNameId": "544C971D-5F36-423D-AB36-E217BE202DB8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.17:*:*:*:*:*:*:*", "cpeNameId": "2A58FEF7-CB40-428A-806B-BE0B32BBB723"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.18:*:*:*:*:*:*:*", "cpeNameId": "7FBBF4E8-6F44-4592-8069-C21668D738E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.19:*:*:*:*:*:*:*", "cpeNameId": "CA37F5FB-5C02-45F3-B7B7-1F56F552B120"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.20:*:*:*:*:*:*:*", "cpeNameId": "83FC3AB5-576E-489E-A697-0865FE9D7439"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.62:*:*:*:*:*:*:*", "cpeNameId": "AC968C04-563B-44E7-A323-6CF404B73D4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:-:*:*:*:*:*:*", "cpeNameId": "805B659E-0A6A-4EDE-9E81-F83A30B3264A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*", "cpeNameId": "A87C09DD-69B1-4CA9-8AE6-3DBF4DF3F11D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*", "cpeNameId": "8F54EDC5-48AB-4577-8C36-660DC7D71454"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:rc3:*:*:*:*:*:*", "cpeNameId": "BA251D8D-4559-451C-9974-E9C6B8087A08"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:rc4:*:*:*:*:*:*", "cpeNameId": "75F94F87-13C3-44A6-80AF-C0C5C599E2A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:rc5:*:*:*:*:*:*", "cpeNameId": "CB671C15-924A-43CA-91DB-1D9FA9D0CC25"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:rc6:*:*:*:*:*:*", "cpeNameId": "A9B040E0-4FFC-4F00-ADB0-5AC01F8F04ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:rc7:*:*:*:*:*:*", "cpeNameId": "EC464421-E417-4360-86C8-511D0221DCF2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:rc8:*:*:*:*:*:*", "cpeNameId": "B3CC3FB2-843F-4B86-86B3-D72EEFBA33FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.1:*:*:*:*:*:*:*", "cpeNameId": "E3D26A37-A963-4501-AD97-1E252FA7A48E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.2:*:*:*:*:*:*:*", "cpeNameId": "7B9C1788-8178-4BDD-8547-0B3193B030A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.3:*:*:*:*:*:*:*", "cpeNameId": "C4DE0AAD-9698-4ADE-A59B-3A730D1B10C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.4:*:*:*:*:*:*:*", "cpeNameId": "EA1887EA-7FF5-4222-B72B-F17A05C0B035"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.5:*:*:*:*:*:*:*", "cpeNameId": "662B2A28-A112-4710-A201-3017CBD3FC8F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.6:*:*:*:*:*:*:*", "cpeNameId": "77EB0841-4431-4A1E-A99F-ACE36FC6FE50"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.7:*:*:*:*:*:*:*", "cpeNameId": "F2EA9343-31D9-42B5-B7DB-D7DDDE92F4F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.8:*:*:*:*:*:*:*", "cpeNameId": "31AD3C06-0526-4470-BC59-67D196013B43"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.9:*:*:*:*:*:*:*", "cpeNameId": "D3C822DE-EC22-4C9B-9AA7-C084613C6FF9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.10:*:*:*:*:*:*:*", "cpeNameId": "4CE524CA-B05D-4C9E-B81A-1937E7FFE6DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.11:*:*:*:*:*:*:*", "cpeNameId": "234E800C-A082-4960-BA0D-975F256DDD4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.12:*:*:*:*:*:*:*", "cpeNameId": "878DE0B7-411C-4C58-B753-C6D22E664553"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.13:*:*:*:*:*:*:*", "cpeNameId": "996D982B-11AA-4504-A9CD-8787C813BFBD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.14:*:*:*:*:*:*:*", "cpeNameId": "5E2AEB31-D1FD-4E9D-9CA9-0F9457674EA9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.15:*:*:*:*:*:*:*", "cpeNameId": "2C08D207-8B50-400F-9807-FB3072AD4E6A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:-:*:*:*:*:*:*", "cpeNameId": "0FD8602E-5D63-49B5-AB56-CB2948250E45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:rc1:*:*:*:*:*:*", "cpeNameId": "1DECE9B9-E9A2-4045-BD0B-C6510F69937D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:rc2:*:*:*:*:*:*", "cpeNameId": "EE2606B9-AA8F-4D28-8575-7AD825CAD250"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:rc3:*:*:*:*:*:*", "cpeNameId": "BC668967-571A-466D-8C69-9495260D3BBD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:rc4:*:*:*:*:*:*", "cpeNameId": "FD9CE501-B79F-4899-A816-149019C673E4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:rc5:*:*:*:*:*:*", "cpeNameId": "2E4EE9B2-FC64-4E7E-9757-5109B02E0AAF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:rc6:*:*:*:*:*:*", "cpeNameId": "D5A2141A-53D1-4E5B-B7C7-4FB179F6F219"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:rc7:*:*:*:*:*:*", "cpeNameId": "CF8E007E-9F74-4780-A09E-D101B3076FDF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:rc9:*:*:*:*:*:*", "cpeNameId": "E38067B2-E041-45F1-8A88-DE716AEDC5A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.1:*:*:*:*:*:*:*", "cpeNameId": "5EE504EE-64C4-4361-86B4-E5A7BD65776C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.2:*:*:*:*:*:*:*", "cpeNameId": "787215C4-0507-4760-BF1F-2A8491B66E4F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.3:*:*:*:*:*:*:*", "cpeNameId": "D2A628F1-1878-4C0B-87E6-B21A7CE382D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.4:*:*:*:*:*:*:*", "cpeNameId": "4890EDC3-B4E8-4CD2-AC95-A9DB9CB74FBF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.5:*:*:*:*:*:*:*", "cpeNameId": "BAA68B22-F0BC-45AD-A350-E8774FC53150"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.6:*:*:*:*:*:*:*", "cpeNameId": "C27B6005-D7EB-47DE-B01C-D5BD2B818D3A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.7:*:*:*:*:*:*:*", "cpeNameId": "89AE071D-DFF0-40A5-B7CE-BA33F9FCC5E7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.8:*:*:*:*:*:*:*", "cpeNameId": "F32F879F-B0ED-4F85-B1AD-A45D6DE80D86"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.9:*:*:*:*:*:*:*", "cpeNameId": "AE86A00C-455A-4075-9AC6-714B1F66D934"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.10:*:*:*:*:*:*:*", "cpeNameId": "704396EF-097A-4DFF-8DAE-4B19965C49AF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.11:*:*:*:*:*:*:*", "cpeNameId": "5CFE2D2B-62BD-448C-B0D4-5F7A9B8AB669"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.12:*:*:*:*:*:*:*", "cpeNameId": "F9A857D7-99FC-4761-B4DF-76E758BDE2BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.13:*:*:*:*:*:*:*", "cpeNameId": "A2A3B308-1BA2-4C79-88AF-861CE6482E28"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.14:*:*:*:*:*:*:*", "cpeNameId": "534CA992-2337-4EA8-B1F7-256574B35175"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.15:*:*:*:*:*:*:*", "cpeNameId": "2074E50B-BBEE-4902-B9F2-24E1B862076E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.16:*:*:*:*:*:*:*", "cpeNameId": "D2A2905E-45CE-4135-8D5D-0FF92766109E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.17:*:*:*:*:*:*:*", "cpeNameId": "4794F12E-3EDA-4619-BBB0-E275E1F06710"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.18:*:*:*:*:*:*:*", "cpeNameId": "17C90012-A0AA-459E-946A-B3C82983B22B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.19:*:*:*:*:*:*:*", "cpeNameId": "222B7748-23E3-4A4D-B9D5-4C5A6D5B2AEF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:-:*:*:*:*:*:*", "cpeNameId": "A7C04E0A-EF2B-426E-8AFE-CDFB04C2EE00"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*", "cpeNameId": "91317E86-8C24-4B48-BD6D-8EF732A881D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*", "cpeNameId": "4D6C0AAC-C284-42AB-8F4E-E54D5294D180"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*", "cpeNameId": "08BCB0AD-FBD2-4A2B-B8AE-9733E31BA02A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*", "cpeNameId": "5EC4698A-FD3A-4387-B636-810BCCBE2F15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*", "cpeNameId": "6FBD2340-901D-4CE1-BA59-55C77404D099"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*", "cpeNameId": "009D67E0-1C71-4212-BE27-834E15E8112B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*", "cpeNameId": "9294C90D-628E-44F8-B196-9ADEF3B72C89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:rc8:*:*:*:*:*:*", "cpeNameId": "1EF80A31-F9CD-4870-9F50-F71C1D3F4DC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.1:*:*:*:*:*:*:*", "cpeNameId": "3409D2C8-FB81-4CE9-9B26-677FAAD94F42"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.2:*:*:*:*:*:*:*", "cpeNameId": "0B80A369-7E22-4E25-8D33-298AD0B23074"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.3:*:*:*:*:*:*:*", "cpeNameId": "9E737761-792A-4225-9385-3EBF3CBBBA81"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.4:*:*:*:*:*:*:*", "cpeNameId": "5435810C-35B3-4401-9434-7EE8DE82604B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.5:*:*:*:*:*:*:*", "cpeNameId": "937FA107-2C1F-4AF8-955A-66F90A3DBB9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.6:*:*:*:*:*:*:*", "cpeNameId": "DD0D3175-C807-4197-BC7D-3737DEB5602D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.7:*:*:*:*:*:*:*", "cpeNameId": "A60E3F91-9293-4B3E-98E9-0D11D1942C1B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.8:*:*:*:*:*:*:*", "cpeNameId": "1A2B6F42-AF1B-473E-8033-83C73609D4E4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.9:*:*:*:*:*:*:*", "cpeNameId": "7664EA3B-7AD2-46EC-92EF-552091071A5F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.10:*:*:*:*:*:*:*", "cpeNameId": "93A56D61-5B65-4D74-ABEF-766372AF7AA0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.11:*:*:*:*:*:*:*", "cpeNameId": "C9534805-84C6-45B9-86BF-7D05E4136C96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.12:*:*:*:*:*:*:*", "cpeNameId": "DE9B1782-E79B-4EF2-8CDB-3D24CF153AC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.13:*:*:*:*:*:*:*", "cpeNameId": "BC90F145-D85D-4388-A4F8-2151884F1663"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.14:*:*:*:*:*:*:*", "cpeNameId": "C0BCABF8-19C2-4B49-9A49-EF7128C5B8B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.15:*:*:*:*:*:*:*", "cpeNameId": "88BDA49D-7A90-40EB-B71E-A570891B9EE6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.16:*:*:*:*:*:*:*", "cpeNameId": "9C3D06BA-AF02-4FFD-AE35-347B04643683"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.17:*:*:*:*:*:*:*", "cpeNameId": "124836C8-7921-4BFE-A64C-AE9F640C9130"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0:-:*:*:*:*:*:*", "cpeNameId": "3A2B23AB-CBA1-42BB-8FA6-C64C95B4FFC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:*", "cpeNameId": "28304135-D881-4B0E-B7C6-826D7CA6F1CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0:rc2:*:*:*:*:*:*", "cpeNameId": "80E35649-C2A2-423F-93D6-8DA4F6A8B4E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0:rc3:*:*:*:*:*:*", "cpeNameId": "D7F3713F-F696-4D43-80A5-98433FA9F02D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0:rc4:*:*:*:*:*:*", "cpeNameId": "C16C9B3F-BD8C-4404-B51D-91856734622D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0:rc5:*:*:*:*:*:*", "cpeNameId": "453F7A7A-15F4-4D21-B85B-6C1DE66FF9F4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0:rc6:*:*:*:*:*:*", "cpeNameId": "42BE5475-0D59-4599-AC53-94A247DA277C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0:rc7:*:*:*:*:*:*", "cpeNameId": "9F921345-A999-4E40-9F3F-4F009C78FBAE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.1:*:*:*:*:*:*:*", "cpeNameId": "DA897396-3BC0-4AC4-B42D-98475AAEFDB1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.2:*:*:*:*:*:*:*", "cpeNameId": "EAFB7D30-6006-44B3-9687-77CBE235323A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.3:*:*:*:*:*:*:*", "cpeNameId": "09573A93-AEDE-4BBA-88F3-6F5CC94F2EE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.4:*:*:*:*:*:*:*", "cpeNameId": "DA0AA4FE-4C59-448A-88DC-C8A8EAF513E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.5:*:*:*:*:*:*:*", "cpeNameId": "C8D96C96-4D7D-4FA4-9CEA-660BF39FC1D7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.6:*:*:*:*:*:*:*", "cpeNameId": "C978C4EF-7AF5-4AA8-BD1D-954E9D7476AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.7:*:*:*:*:*:*:*", "cpeNameId": "70248903-1B6E-43D3-963F-9CCA75253E2A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.8:*:*:*:*:*:*:*", "cpeNameId": "22375451-92E0-4690-B7C4-82B63F7F54AA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.9:*:*:*:*:*:*:*", "cpeNameId": "792202AB-6A0E-491B-87FC-3F98835781A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.10:*:*:*:*:*:*:*", "cpeNameId": "FF48867C-F23F-4340-96AC-8C40D01A93A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.11:*:*:*:*:*:*:*", "cpeNameId": "E8A33859-F785-4E67-83D6-3304A2AC8F1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.12:*:*:*:*:*:*:*", "cpeNameId": "BBCB0428-C568-4F4B-8069-BFC5DE18BA66"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.13:*:*:*:*:*:*:*", "cpeNameId": "785980A5-8FCC-4DEB-8C31-6B66B3F2ED06"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.14:*:*:*:*:*:*:*", "cpeNameId": "3D9CF1CA-591F-4D6B-835F-71E494855265"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.15:*:*:*:*:*:*:*", "cpeNameId": "3DB8BB3F-8384-49A3-9B5C-0C812B669916"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.16:*:*:*:*:*:*:*", "cpeNameId": "97B95EF5-6328-416C-A983-BAD4DB8178EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.17:*:*:*:*:*:*:*", "cpeNameId": "5D22785E-D725-46B7-83E8-9AA3F1B1EE61"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.18:*:*:*:*:*:*:*", "cpeNameId": "F5B47278-06DD-4334-BEAA-82D99836E0CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.19:*:*:*:*:*:*:*", "cpeNameId": "2D6FBBDE-1828-44E5-AE5B-0844E49DD7DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:-:*:*:*:*:*:*", "cpeNameId": "E1B09DBA-878F-4B52-AE09-74B0B8F5D68F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*", "cpeNameId": "30EC2354-B32A-44E9-9861-CEA7D545DFBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*", "cpeNameId": "BFAC13C0-7539-40DF-B674-4ECCA1868626"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*", "cpeNameId": "585AB024-3F59-4BDB-A302-D224DF5D8495"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*", "cpeNameId": "4A21513E-7139-44E5-88E8-9B991661CF3C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*", "cpeNameId": "8D834469-69DF-4937-AFF3-A0B90AB70455"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*", "cpeNameId": "25204659-6277-44F6-B75E-69B25412BE26"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*", "cpeNameId": "79676ADB-9CD8-4734-9FBF-13CA081A2193"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:rc8:*:*:*:*:*:*", "cpeNameId": "80492410-4FE5-4C8B-897C-243E42C03469"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.1:*:*:*:*:*:*:*", "cpeNameId": "3C595643-58A0-402D-8A1A-E2148719F38F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.2:*:*:*:*:*:*:*", "cpeNameId": "5F145B48-D5DB-4B52-ABDC-41BAACF04213"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.3:*:*:*:*:*:*:*", "cpeNameId": "59A7EC30-0E14-45EE-A5DA-9D98F4793E93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.4:*:*:*:*:*:*:*", "cpeNameId": "28AD2EF2-9A1F-4C90-A938-33E394A94615"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.5:*:*:*:*:*:*:*", "cpeNameId": "37B29EC5-AB56-4407-871C-6AF5177AE78F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.6:*:*:*:*:*:*:*", "cpeNameId": "76D2F6EA-F7DC-413B-85EC-C8B7916DCD0C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.7:*:*:*:*:*:*:*", "cpeNameId": "3E05D19C-FFAF-44BC-B9CB-D7054765D6D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.8:*:*:*:*:*:*:*", "cpeNameId": "9625E836-75C2-4337-BAA1-70F3958C06CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.9:*:*:*:*:*:*:*", "cpeNameId": "492A02F0-DBF7-40C0-9CD6-AFADC763E814"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.10:*:*:*:*:*:*:*", "cpeNameId": "9A0A4990-A036-4290-AD79-B7531545BA07"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.11:*:*:*:*:*:*:*", "cpeNameId": "5FDD9C37-5F34-43FE-98FA-3D3D7ED73B6F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.12:*:*:*:*:*:*:*", "cpeNameId": "54D136A5-6D3A-4CF8-8ECD-0A4B3345ED61"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.13:*:*:*:*:*:*:*", "cpeNameId": "A1D987CD-234D-48E5-BC87-D5BDAB19AD8D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.14:*:*:*:*:*:*:*", "cpeNameId": "51407BCD-81B8-4C16-9246-F7AC5E654783"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.15:*:*:*:*:*:*:*", "cpeNameId": "E0851513-6D8C-45D5-AA02-1A897F200C76"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.16:*:*:*:*:*:*:*", "cpeNameId": "FBCFC7A2-8E0C-400E-9903-F88E27BC6692"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.17:*:*:*:*:*:*:*", "cpeNameId": "D83234B0-70C7-49E3-B041-458A4388E5F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.18:*:*:*:*:*:*:*", "cpeNameId": "7BFD121A-9AAE-4FA4-B4BB-79BCFC945942"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.19:*:*:*:*:*:*:*", "cpeNameId": "5CEF4F40-C180-4D35-BFBE-CE813D0DB03A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.20:*:*:*:*:*:*:*", "cpeNameId": "8629FDD2-5ACC-47D6-A355-161F5C9E9DE2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.21:*:*:*:*:*:*:*", "cpeNameId": "5FAA107F-2A9C-4F4A-ADB6-BDE37B733B3A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.22:*:*:*:*:*:*:*", "cpeNameId": "8425DCE9-412B-439B-BCFA-0296FCF4AC3B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.23:*:*:*:*:*:*:*", "cpeNameId": "2CAA00B8-15FB-49C3-8D03-4EAC237C0C30"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.24:*:*:*:*:*:*:*", "cpeNameId": "55BE846B-6D72-4890-A345-41A221706A91"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.25:*:*:*:*:*:*:*", "cpeNameId": "6E8595D6-1B26-48C0-8BB5-7AA9956DA2EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.26:*:*:*:*:*:*:*", "cpeNameId": "579C1BAF-C0BD-4A23-8220-878509BD4041"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.27:*:*:*:*:*:*:*", "cpeNameId": "918EEE53-3E32-4088-A31F-7706A0658354"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.28:*:*:*:*:*:*:*", "cpeNameId": "E5894A09-16F4-4390-9756-7B55B730A5C7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.29:*:*:*:*:*:*:*", "cpeNameId": "4A87BD1D-E5CA-4D1E-BC1C-866333AC8B70"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.30:*:*:*:*:*:*:*", "cpeNameId": "EA84BB70-A3D7-488F-B591-6F660E5F72D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.31:*:*:*:*:*:*:*", "cpeNameId": "099FB693-8DF2-40B8-987C-638A2B85F830"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.32:*:*:*:*:*:*:*", "cpeNameId": "5A2E5E92-E0A5-4B86-979F-C06CBC9AF59E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.33:*:*:*:*:*:*:*", "cpeNameId": "4D00786A-3089-4F53-9833-D854D82A886A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.34:*:*:*:*:*:*:*", "cpeNameId": "394E558D-3CCA-4443-81A4-464D00F1796F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.35:*:*:*:*:*:*:*", "cpeNameId": "244B5E4B-3CCC-469E-BC89-424CC37562E5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.36:*:*:*:*:*:*:*", "cpeNameId": "A25A0D88-A1D0-44DD-9C59-0EC251F83B79"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.37:*:*:*:*:*:*:*", "cpeNameId": "FFD0F957-52D3-47DB-9B9B-9D40AB55A9E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.38:*:*:*:*:*:*:*", "cpeNameId": "A7384483-B54D-422E-BD1C-47B466DF7808"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.39:*:*:*:*:*:*:*", "cpeNameId": "BD0A672F-9FD5-470F-91C8-77E96F4B3741"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.40:*:*:*:*:*:*:*", "cpeNameId": "29E4B4C2-838C-48BD-B509-576D1E26C738"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.41:*:*:*:*:*:*:*", "cpeNameId": "C139FA8B-93DA-4053-B303-A3C1DC1382FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.42:*:*:*:*:*:*:*", "cpeNameId": "BF0F83BA-BD56-4364-B55F-EE486FFD9897"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.43:*:*:*:*:*:*:*", "cpeNameId": "37F54B64-6DB3-410B-9795-F9468CCD37D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.44:*:*:*:*:*:*:*", "cpeNameId": "A2813E22-3300-4145-9AF5-091D4FB91EDE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.45:*:*:*:*:*:*:*", "cpeNameId": "E862B1DC-542D-4E20-BEDE-89AC2B3B5D7F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.46:*:*:*:*:*:*:*", "cpeNameId": "940E4409-174B-45E7-B73A-69D72C14D42E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.47:*:*:*:*:*:*:*", "cpeNameId": "2E917523-B369-4B0C-B2FE-330ABAF30D9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.48:*:*:*:*:*:*:*", "cpeNameId": "7AE6B80A-97F9-46E1-91BF-10C5CFE9F291"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.49:*:*:*:*:*:*:*", "cpeNameId": "6C3E0D45-EDD1-48D6-B60C-99C23C609BB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.50:*:*:*:*:*:*:*", "cpeNameId": "3DB32BBC-2AFB-4C81-AB59-6F8C3BA243E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.51:*:*:*:*:*:*:*", "cpeNameId": "5AC8AA4E-C62F-4E70-9E99-6FDC429D2E4E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.52:*:*:*:*:*:*:*", "cpeNameId": "D833500B-5B7B-4D77-980F-A92A0E26CE6B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.53:*:*:*:*:*:*:*", "cpeNameId": "19E0C2D7-36FA-461C-B763-F0B8DBF346A7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.54:*:*:*:*:*:*:*", "cpeNameId": "CD384F60-5A3F-4B0C-A5A2-3ECEA68BB813"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.55:*:*:*:*:*:*:*", "cpeNameId": "768733C9-E2A4-4C01-8956-5FB868E592E3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.56:*:*:*:*:*:*:*", "cpeNameId": "0FC6F402-E917-4E7F-8D83-3D22EF171CAB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.57:*:*:*:*:*:*:*", "cpeNameId": "E8BCDBFF-F548-45B0-9AF9-3FB4B1E38539"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.58:*:*:*:*:*:*:*", "cpeNameId": "E8B92EC7-BB1E-4A65-A431-3125DA3DF1DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.59:*:*:*:*:*:*:*", "cpeNameId": "5C514FE3-ED8D-4DEA-874A-4B61A7578749"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.60:*:*:*:*:*:*:*", "cpeNameId": "215F5625-C874-4841-82C5-AE4A9E6ED912"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.61:*:*:*:*:*:*:*", "cpeNameId": "764780E0-FF24-42A3-A99B-CE11CB846C95"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.62:*:*:*:*:*:*:*", "cpeNameId": "5C2774B8-AF4C-4A7B-BBF4-9516ABF4B4E9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.63:*:*:*:*:*:*:*", "cpeNameId": "BC276565-052E-41EF-9F0F-7ECD9D9678BE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.64:*:*:*:*:*:*:*", "cpeNameId": "DB256AAF-90E8-463A-8C21-D57CC6368D0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.65:*:*:*:*:*:*:*", "cpeNameId": "C9A9E342-DEBC-44E6-82F3-3CCBCBD1F565"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.66:*:*:*:*:*:*:*", "cpeNameId": "68B83B2F-DA58-4442-A4E4-5EFBD7DA2E64"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.67:*:*:*:*:*:*:*", "cpeNameId": "FBD55969-6EB5-4ED7-AD05-1D03D728B999"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.68:*:*:*:*:*:*:*", "cpeNameId": "5A5B47CF-90B7-4BEF-B5AE-EE4FED51E095"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.69:*:*:*:*:*:*:*", "cpeNameId": "0ADD17CA-B3B5-4F53-B4F4-ED079642A461"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.70:*:*:*:*:*:*:*", "cpeNameId": "6F29E18D-63C6-4544-A0E7-92F17EB3ACFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.71:*:*:*:*:*:*:*", "cpeNameId": "A7455D5B-D8E2-4CBE-BF3D-D3CF1A6004FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.72:*:*:*:*:*:*:*", "cpeNameId": "91A1363B-FA51-4A72-AD5E-3784118C73E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.73:*:*:*:*:*:*:*", "cpeNameId": "7C1AD665-9759-452D-86AA-C903E4225BA7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.74:*:*:*:*:*:*:*", "cpeNameId": "7058C57F-5141-4FAC-932A-BDDF0F20C78A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.75:*:*:*:*:*:*:*", "cpeNameId": "2F7FAD3F-6381-42EE-B130-D942FAC1AED0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.76:*:*:*:*:*:*:*", "cpeNameId": "4F7988C5-FA25-4C7C-B0DC-5C084A8CA6DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.77:*:*:*:*:*:*:*", "cpeNameId": "9F7ABB2D-A627-40C5-BC86-9BC9BBBEDBB9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.78:*:*:*:*:*:*:*", "cpeNameId": "71DE43EB-3996-47C3-963A-B93C9E6C6142"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.79:*:*:*:*:*:*:*", "cpeNameId": "191F54D4-44BC-49D5-8FB9-5DFFD648B9F7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.80:*:*:*:*:*:*:*", "cpeNameId": "14B574EE-69F8-4E87-9017-91CBFDAEC743"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.81:*:*:*:*:*:*:*", "cpeNameId": "94E966D4-1DB0-4695-98DA-A28CB90D32EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.82:*:*:*:*:*:*:*", "cpeNameId": "8D92799A-0542-4509-923F-6006E116D1BE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.83:*:*:*:*:*:*:*", "cpeNameId": "C2EF5D53-F86A-4D8A-AB79-DD6491B257F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.84:*:*:*:*:*:*:*", "cpeNameId": "61BB8657-3718-4355-BAA8-92F84B14D1A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.85:*:*:*:*:*:*:*", "cpeNameId": "A599E08D-FD19-4E86-A335-C107B0C6CB0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.86:*:*:*:*:*:*:*", "cpeNameId": "324E1D15-3D11-4683-9B0A-D3BA95E6B7C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.87:*:*:*:*:*:*:*", "cpeNameId": "D320A094-647B-4DC5-83FB-BC79A60AAE61"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.88:*:*:*:*:*:*:*", "cpeNameId": "407DC4FD-0E42-48C0-8A16-07F5CB7F308F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.89:*:*:*:*:*:*:*", "cpeNameId": "2DCEF9A6-CB07-404E-ADCC-E2BD0F69354D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.90:*:*:*:*:*:*:*", "cpeNameId": "CD2E5E6E-F436-4447-BB45-4CA1EBCC1F0F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.91:*:*:*:*:*:*:*", "cpeNameId": "D5909F53-54F8-4E30-87B2-E5B74AEEF668"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.92:*:*:*:*:*:*:*", "cpeNameId": "825880D5-240B-4E5E-88D7-9FBE9377D725"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.93:*:*:*:*:*:*:*", "cpeNameId": "C34961F8-366C-44F9-884F-D95ED75D74E9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.94:*:*:*:*:*:*:*", "cpeNameId": "49338264-F467-4F72-851C-41E72F2E8849"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.95:*:*:*:*:*:*:*", "cpeNameId": "D583DD92-8DB8-4D08-8F84-FEACBF885E5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.96:*:*:*:*:*:*:*", "cpeNameId": "ABD92EA7-61F0-4324-AD60-18A4A9E0345B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.97:*:*:*:*:*:*:*", "cpeNameId": "9CA68F01-482D-4C81-9FAF-8FCB3F4EB631"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.98:*:*:*:*:*:*:*", "cpeNameId": "DB87B10B-0B00-43E6-9712-B7749C08C5B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.99:*:*:*:*:*:*:*", "cpeNameId": "FA3EF181-E416-4607-B59D-A6CEA2D95875"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.100:*:*:*:*:*:*:*", "cpeNameId": "92234FA1-8B41-45EB-BADB-32779B7E4E3C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.101:*:*:*:*:*:*:*", "cpeNameId": "2965F5F4-6322-4A74-BE47-C1E4FF4E4BB3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.102:*:*:*:*:*:*:*", "cpeNameId": "D936A06E-46B7-44F1-AEA1-6C899F68E2DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.103:*:*:*:*:*:*:*", "cpeNameId": "C3564FF2-0B2D-42BF-AA29-3AAF57DF9D0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.104:*:*:*:*:*:*:*", "cpeNameId": "CEF383F0-D9F1-4948-B102-C491944BECBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.105:*:*:*:*:*:*:*", "cpeNameId": "BC26835E-2E39-465E-B48C-E871C740CB06"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.106:*:*:*:*:*:*:*", "cpeNameId": "2142A9D9-E547-4FE9-BDA3-B7B27D3CEF4D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.107:*:*:*:*:*:*:*", "cpeNameId": "9F7EB5C3-3C76-4816-BB64-A0D47A8FF148"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.108:*:*:*:*:*:*:*", "cpeNameId": "A0B4BCED-0919-484E-B64A-2D6F944128BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.109:*:*:*:*:*:*:*", "cpeNameId": "14C4B1A8-4457-4620-A2F4-A7BAAB479E01"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.110:*:*:*:*:*:*:*", "cpeNameId": "08F57941-7A99-4F2F-982B-54B72CA90ECA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.111:*:*:*:*:*:*:*", "cpeNameId": "F75C660D-8C20-4B05-BAB3-2D3BEF6EBC9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.112:*:*:*:*:*:*:*", "cpeNameId": "82BF8B3E-D66C-40EF-B175-1E5A2466D997"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.113:*:*:*:*:*:*:*", "cpeNameId": "CF72EDAE-B29A-4A22-BF70-8FD89123C957"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.114:*:*:*:*:*:*:*", "cpeNameId": "86E6F51B-573A-4DB5-99FA-BB89A65DD613"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.115:*:*:*:*:*:*:*", "cpeNameId": "63567DC6-8639-44B7-BDBC-C600977ECD7C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.116:*:*:*:*:*:*:*", "cpeNameId": "7A6E8D0B-1EF6-4080-A3AD-45CD2B6C35AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.117:*:*:*:*:*:*:*", "cpeNameId": "AD8652AE-1F37-43B4-BC34-39F852FD3301"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.119:*:*:*:*:*:*:*", "cpeNameId": "3E564E16-38CA-428F-98CC-5F14B13A30CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2:-:*:*:*:*:*:*", "cpeNameId": "1169272C-BBEA-40DB-8272-4C826E9538C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*", "cpeNameId": "E28CC08F-A8C8-41F0-8B9B-69F577BA01E9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*", "cpeNameId": "1DF6965C-CF25-4833-AD19-5B4BBF4DA32E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*", "cpeNameId": "BEC899D6-049D-46DE-8B6C-36CB5ED02548"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:*", "cpeNameId": "C4A2FA72-6D42-476C-94B2-04713E760B6B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2:rc5:*:*:*:*:*:*", "cpeNameId": "6678F684-9CC5-4D18-B4E7-E627DAF11BF7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2:rc6:*:*:*:*:*:*", "cpeNameId": "BD104CC4-9CB1-4B5B-9FB2-AEAD085AE628"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2:rc7:*:*:*:*:*:*", "cpeNameId": "C0837C65-003D-4D18-8137-00585ED37DED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2:rc8:*:*:*:*:*:*", "cpeNameId": "7CE3A56A-19AE-4E88-AECB-316BEC1D5EB6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.0:rc1:*:*:*:*:*:*", "cpeNameId": "D6F8058D-EF1A-4187-9F6F-BB09A4C41F38"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.0:rc2:*:*:*:*:*:*", "cpeNameId": "0ACB4ECF-5031-4BFE-A7B7-97AE471871B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.0:rc3:*:*:*:*:*:*", "cpeNameId": "C7F43C6B-8673-4121-90DF-B578F2801110"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.0:rc4:*:*:*:*:*:*", "cpeNameId": "863A0838-669D-40BB-8DDF-F1A1D221EB7F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.0:rc5:*:*:*:*:*:*", "cpeNameId": "B7353B5E-C483-49FD-9503-328684843B80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.0:rc6:*:*:*:*:*:*", "cpeNameId": "156908BB-9B9E-4D10-9959-C22F247BB6FA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.1:*:*:*:*:*:*:*", "cpeNameId": "FE2BEA06-F67E-42CF-A481-1D83978BCA2A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.2:*:*:*:*:*:*:*", "cpeNameId": "8103109C-71B8-476F-997B-8DEB06AAEBF0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.3:*:*:*:*:*:*:*", "cpeNameId": "89EE49CF-2690-4316-947B-2695CBA50E00"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.4:*:*:*:*:*:*:*", "cpeNameId": "05A86547-7B27-4CAA-A1AA-F4EA197E3BD7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.5:*:*:*:*:*:*:*", "cpeNameId": "26AE4D28-D6A5-478F-A529-26B739E7054E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.6:*:*:*:*:*:*:*", "cpeNameId": "63DDA132-5AB2-4CFF-ACC6-F5FF2AB1400E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.7:*:*:*:*:*:*:*", "cpeNameId": "034CD058-5816-44A5-B13B-9F5A48180FAA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.8:*:*:*:*:*:*:*", "cpeNameId": "892DA63F-D86B-4FD6-9F27-8CFA173AEC59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.9:*:*:*:*:*:*:*", "cpeNameId": "99A70DD2-9396-4181-9A5E-15AA0223E5F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.10:*:*:*:*:*:*:*", "cpeNameId": "CD10F4E6-970E-4F86-94E1-A1EE17C66398"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.11:*:*:*:*:*:*:*", "cpeNameId": "CBC39BBD-7F8B-412E-B28B-4D03844979D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.12:*:*:*:*:*:*:*", "cpeNameId": "061399AB-7B17-401E-AA9B-D270E78A8C57"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.13:*:*:*:*:*:*:*", "cpeNameId": "C7F53FB8-5F99-4273-9AB5-FDD44CA6BB23"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.14:*:*:*:*:*:*:*", "cpeNameId": "D8B5CAAA-4076-47D1-9A3B-4C1D9E388180"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.15:*:*:*:*:*:*:*", "cpeNameId": "E1131D22-1ECE-498E-8C7B-C02B290319C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.16:*:*:*:*:*:*:*", "cpeNameId": "04EBA43D-8EFD-4838-918B-D40D2E686017"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3:-:*:*:*:*:*:*", "cpeNameId": "79E5017F-BBF4-44EE-8DE8-FFC33C7AF117"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3:rc1:*:*:*:*:*:*", "cpeNameId": "EAABF30A-689E-4D86-B06B-C5CDB63C100A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3:rc2:*:*:*:*:*:*", "cpeNameId": "BDEBBF51-457F-45BC-B4C0-0AB1C79ACBD9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3:rc3:*:*:*:*:*:*", "cpeNameId": "300AD1DF-157D-41D0-8A19-9D3CDD69C90A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3:rc4:*:*:*:*:*:*", "cpeNameId": "5F0278A8-AD9F-4517-892D-C2293A937C13"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3:rc5:*:*:*:*:*:*", "cpeNameId": "486C9057-BD07-4562-B17D-254BA2FD18B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3:rc6:*:*:*:*:*:*", "cpeNameId": "78072C23-298C-4933-A691-21F9AFD028AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3:rc7:*:*:*:*:*:*", "cpeNameId": "A332478B-A181-40C6-8321-46A03D0A9A59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3.1:*:*:*:*:*:*:*", "cpeNameId": "C5A262C5-03ED-4EB3-8EC4-C8D81E0A31F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3.2:*:*:*:*:*:*:*", "cpeNameId": "6935C9B1-1E01-4913-97DB-CF683C30B649"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3.3:*:*:*:*:*:*:*", "cpeNameId": "18D65783-E19A-462F-970F-3F360A4465EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3.4:*:*:*:*:*:*:*", "cpeNameId": "78C4FA4D-3C32-4D8F-9BE7-80AEA8DA132A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3.5:*:*:*:*:*:*:*", "cpeNameId": "EA8A0152-C071-47C4-8042-CC77521AEF69"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3.6:*:*:*:*:*:*:*", "cpeNameId": "91A4F87E-2342-4D2D-AC6D-E23B97C50EF3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3.7:*:*:*:*:*:*:*", "cpeNameId": "894CE6B3-3E3B-42B0-AE9E-FF50C5032AB3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3.8:*:*:*:*:*:*:*", "cpeNameId": "0C38DD95-E6DD-4170-BC9E-9F2F9606F243"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3.9:*:*:*:*:*:*:*", "cpeNameId": "D8886E14-BEA8-4F0C-BE81-4E79339738B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3.10:*:*:*:*:*:*:*", "cpeNameId": "6AFB3CC1-17BE-4B78-AAED-C878A9673470"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3.11:*:*:*:*:*:*:*", "cpeNameId": "EB35199C-7694-48CF-A3CE-071E82332BAB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3.12:*:*:*:*:*:*:*", "cpeNameId": "1FA512A5-D8D8-4BC8-AF03-A58047FF2D68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3.13:*:*:*:*:*:*:*", "cpeNameId": "AD5FCDFC-541B-4AC0-8CAE-629B9AB94DC9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4:-:*:*:*:*:*:*", "cpeNameId": "83E5A912-AAD8-4A94-81B2-2F6A24C8A489"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4:rc1:*:*:*:*:*:*", "cpeNameId": "DDA10D69-67F7-4B1D-93D7-8A5A748F6C25"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4:rc2:*:*:*:*:*:*", "cpeNameId": "FAFD5368-C833-4E9F-BAC2-5E67C1AED0ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4:rc3:*:*:*:*:*:*", "cpeNameId": "148F01E8-5A2E-47F8-AE25-222332BE2986"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4:rc4:*:*:*:*:*:*", "cpeNameId": "3E235E1B-7DBF-44DA-9A0A-82BB378B653D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4:rc5:*:*:*:*:*:*", "cpeNameId": "6757F97B-0CC1-478F-8E6C-1FA9FAC72A2E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4:rc6:*:*:*:*:*:*", "cpeNameId": "97B13CDD-F0A4-417D-9A03-66A2BDAB2A82"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4:rc7:*:*:*:*:*:*", "cpeNameId": "4F70C4E8-FD1F-4A92-8276-F9F9B90B931C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4.1:*:*:*:*:*:*:*", "cpeNameId": "2C06EC90-C0BF-4257-9461-C8B7F1A1C5FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4.2:*:*:*:*:*:*:*", "cpeNameId": "B5E39239-6F72-4D53-8F3A-3CDA2CFE3E93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4.3:*:*:*:*:*:*:*", "cpeNameId": "E6FC4FB9-573F-460D-B1F4-A7E82B585BB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4.4:*:*:*:*:*:*:*", "cpeNameId": "A2EC927F-1A3D-41C6-9C2D-7E9DD889ED8C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4.5:*:*:*:*:*:*:*", "cpeNameId": "02BAFBF5-CFA3-4B7E-96DE-EE60A14A7EA9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4.6:*:*:*:*:*:*:*", "cpeNameId": "6B4D7500-521D-4CA0-81BF-C6368A783680"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4.7:*:*:*:*:*:*:*", "cpeNameId": "8B8D8A31-718F-4596-832B-AF86EFD69D6F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4.8:*:*:*:*:*:*:*", "cpeNameId": "9DF078C6-FF6D-451B-88CA-E7D232BF2B3E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4.9:*:*:*:*:*:*:*", "cpeNameId": "914EC41A-CBDF-4B71-87B4-10796413AC3B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4.10:*:*:*:*:*:*:*", "cpeNameId": "D6B14513-F9B4-4ACD-94C5-625584EC5BD9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4.11:*:*:*:*:*:*:*", "cpeNameId": "28D6D5D5-F0DB-4DDC-8880-C567D47960BE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4.12:*:*:*:*:*:*:*", "cpeNameId": "B8EC6DB8-00AB-46C6-A2BA-A62875AC4529"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4.13:*:*:*:*:*:*:*", "cpeNameId": "9939B28C-8EA8-4A51-8123-F791EE3D70CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4.14:*:*:*:*:*:*:*", "cpeNameId": "AF0DDB66-698D-4A9C-A8B1-101F4943FA68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4.15:*:*:*:*:*:*:*", "cpeNameId": "3B38029B-C4AC-4B15-9F57-965526DB0B36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4.16:*:*:*:*:*:*:*", "cpeNameId": "C621AB7B-4708-48E7-A4E7-FF1BF38F33B2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5:-:*:*:*:*:*:*", "cpeNameId": "A80D8003-A1D9-4697-ACF3-C8C4B2CD471C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5:rc1:*:*:*:*:*:*", "cpeNameId": "E438D075-507D-41C0-B200-DC993357C174"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5:rc2:*:*:*:*:*:*", "cpeNameId": "AD292E24-AC9C-4864-B5EA-D4E619ABCA86"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5:rc3:*:*:*:*:*:*", "cpeNameId": "4F4EEA10-D4DB-48BE-A98B-AAEBD81956CC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5:rc4:*:*:*:*:*:*", "cpeNameId": "9D094BF9-E278-4685-ACD0-2119D9B7BBEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5:rc5:*:*:*:*:*:*", "cpeNameId": "D18AC1AA-3ADC-4E7F-B950-5B2CD32872C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5:rc6:*:*:*:*:*:*", "cpeNameId": "EA059EE3-FF5E-48F5-A146-491C388DD4A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5:rc7:*:*:*:*:*:*", "cpeNameId": "CFE2ACA0-C823-4A12-9BBC-A9C1144A6AFB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5.1:*:*:*:*:*:*:*", "cpeNameId": "9CC9F182-6A2B-4824-A26F-14A3C1AD7FD8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5.2:*:*:*:*:*:*:*", "cpeNameId": "8A6A2735-55B4-4BA0-A015-A6DEBC7843F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5.3:*:*:*:*:*:*:*", "cpeNameId": "E36EF007-BFCF-4FC9-A9CB-F474D1DE7A07"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5.4:*:*:*:*:*:*:*", "cpeNameId": "F3A9CAE5-207A-4E22-92D7-56057FCAF9EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5.5:*:*:*:*:*:*:*", "cpeNameId": "5532494F-EB3F-47CC-B858-8E4C7D0DCB9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5.6:*:*:*:*:*:*:*", "cpeNameId": "DC8A24AA-ADF4-4798-95BA-65EC0F1C6ED4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5.7:*:*:*:*:*:*:*", "cpeNameId": "303897F0-7D96-4723-B25B-1F8ED64ABE30"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5.8:*:*:*:*:*:*:*", "cpeNameId": "31C57602-5FE8-4C44-9C34-4BF2D0774DE5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5.9:*:*:*:*:*:*:*", "cpeNameId": "28E565A4-925E-4F42-9E6E-318B8ED7BF61"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5.10:*:*:*:*:*:*:*", "cpeNameId": "1FA9CD76-EF11-45B9-A943-04276B376848"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5.11:*:*:*:*:*:*:*", "cpeNameId": "E1891F07-83C7-4766-8D81-77635FB8B270"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5.12:*:*:*:*:*:*:*", "cpeNameId": "C4028EC2-F3E6-4FDD-8E12-DC6BE4EC7237"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5.13:*:*:*:*:*:*:*", "cpeNameId": "FCB352EC-6DE9-43B5-9BE1-BA336462C79A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6:-:*:*:*:*:*:*", "cpeNameId": "7708857B-B652-435E-8214-CFB2F756F7C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:*", "cpeNameId": "708B88D8-2A55-4C45-868F-D8F66C47D15E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:*", "cpeNameId": "C48DE5D1-CDF2-4A3C-8016-4794413F9BD8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6:rc3:*:*:*:*:*:*", "cpeNameId": "B895E9CB-0F9E-4B4E-BEA5-D5DBFA4FA317"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6:rc4:*:*:*:*:*:*", "cpeNameId": "25FB4811-BC5B-4066-B45D-015C8DF6AAA3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6:rc5:*:*:*:*:*:*", "cpeNameId": "667A7812-875A-4C8F-81B7-27257319E42C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6:rc6:*:*:*:*:*:*", "cpeNameId": "CF63FB11-7713-4C59-AD54-E1DEF5D3DF5A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6:rc7:*:*:*:*:*:*", "cpeNameId": "494210A9-8E24-4DAB-A9F3-B51B4EBC2EA9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.1:*:*:*:*:*:*:*", "cpeNameId": "48D20EB8-21AA-4DB7-9703-2953612A9A8F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.2:*:*:*:*:*:*:*", "cpeNameId": "493589E0-42C6-4184-9A22-D667EF8F7668"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.3:*:*:*:*:*:*:*", "cpeNameId": "DD99FA9C-5522-4516-A845-AD0347B8C111"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.4:*:*:*:*:*:*:*", "cpeNameId": "4B05FC17-F00C-431F-AF57-6898726E08ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.5:*:*:*:*:*:*:*", "cpeNameId": "6177881A-975B-474F-9C64-3821DB5E97ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.6:*:*:*:*:*:*:*", "cpeNameId": "DA74BBF4-9E69-468F-BCBA-BD85810A9DAC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.7:*:*:*:*:*:*:*", "cpeNameId": "57F39A24-CA69-43C4-91F8-846185741DED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.8:*:*:*:*:*:*:*", "cpeNameId": "D4C594C7-7CCE-4CE4-B587-71B1F90C64F4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.9:*:*:*:*:*:*:*", "cpeNameId": "3DB8BB56-8CED-4F06-8893-2B58D4DEF032"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.10:*:*:*:*:*:*:*", "cpeNameId": "737B1EE7-5BFA-4030-A1CD-3C04FD1B70BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.11:*:*:*:*:*:*:*", "cpeNameId": "909CFBD2-FFCD-4A6D-893F-0F64AFDD1E63"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.12:*:*:*:*:*:*:*", "cpeNameId": "213EDC79-F5D2-4D52-B5C6-83A21C781924"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.13:*:*:*:*:*:*:*", "cpeNameId": "36A0032F-6075-4595-BEA3-C8FD8FD82D51"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.14:*:*:*:*:*:*:*", "cpeNameId": "B2D98F70-DC33-4434-A9B9-F634DB261166"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.15:*:*:*:*:*:*:*", "cpeNameId": "321D7187-47FD-4AC9-8402-50C55A769462"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.16:*:*:*:*:*:*:*", "cpeNameId": "02B3F009-31A0-4E53-8A89-D2851F60161D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.17:*:*:*:*:*:*:*", "cpeNameId": "7964199C-934F-4EFC-8E10-769866A1CEF4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.18:*:*:*:*:*:*:*", "cpeNameId": "662DDE22-7180-40FE-AF01-F1D279B03479"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.19:*:*:*:*:*:*:*", "cpeNameId": "9EC8C911-B236-4DBC-AA91-7C5575FEA941"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.20:*:*:*:*:*:*:*", "cpeNameId": "E176BD49-D984-4DFD-BF94-B377343221D6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.21:*:*:*:*:*:*:*", "cpeNameId": "16CA36A1-B086-40E0-B626-A0041AD2B1B8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.22:*:*:*:*:*:*:*", "cpeNameId": "A0E240F0-1310-42EE-AED3-C127C92205E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.23:*:*:*:*:*:*:*", "cpeNameId": "A54F204C-8C1A-4FC4-9A38-B5D06F1663FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.24:*:*:*:*:*:*:*", "cpeNameId": "B5EF8483-CD4B-4B16-BBA4-BA817EC0A5E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.25:*:*:*:*:*:*:*", "cpeNameId": "38DE4FA7-E5C9-492F-889B-AC68708B13AA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.26:*:*:*:*:*:*:*", "cpeNameId": "86B955E4-8792-4840-A49E-23F1AD342821"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.27:*:*:*:*:*:*:*", "cpeNameId": "B0A9F8BB-3A53-4E29-BD15-361010510D10"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.28:*:*:*:*:*:*:*", "cpeNameId": "958125CC-ED54-4956-926D-6D42F6EED1E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.29:*:*:*:*:*:*:*", "cpeNameId": "EFDBB2F8-FA58-4E00-98F6-8885EE1E41D7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.30:*:*:*:*:*:*:*", "cpeNameId": "7F77386F-180B-4457-9655-FD2A67C4F65A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.31:*:*:*:*:*:*:*", "cpeNameId": "EB7F70B9-E173-40F8-B4F0-B8D8DC3913FA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.32:*:*:*:*:*:*:*", "cpeNameId": "7243F9D6-586E-4EEC-8B9E-A249EFB7B4D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.33:*:*:*:*:*:*:*", "cpeNameId": "E3D20161-DD78-402C-BD1D-02769B6A6C5F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.34:*:*:*:*:*:*:*", "cpeNameId": "AD267688-519F-4863-9379-8CB50DD27AE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.35:*:*:*:*:*:*:*", "cpeNameId": "1E4CA740-CB8A-4FB5-99CB-DA8DCF35DA02"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.36:*:*:*:*:*:*:*", "cpeNameId": "96AA1D16-A016-43DB-B0AB-FED45308D249"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.37:*:*:*:*:*:*:*", "cpeNameId": "D0A60FC5-E516-4560-B201-E9E7A3723645"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.38:*:*:*:*:*:*:*", "cpeNameId": "48C3A765-D278-4115-A7F8-0EAFE267BE54"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.39:*:*:*:*:*:*:*", "cpeNameId": "0F797385-0498-4377-B7F8-80FD439BFE3B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.40:*:*:*:*:*:*:*", "cpeNameId": "3F5097D6-6C8D-42A1-960B-CBA03E28B27F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.41:*:*:*:*:*:*:*", "cpeNameId": "C1AFD87A-72AE-4D46-B1F0-564094D3642F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.42:*:*:*:*:*:*:*", "cpeNameId": "6350E59C-B75C-4804-BD07-97CD611B7987"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.43:*:*:*:*:*:*:*", "cpeNameId": "542B2E1A-138C-4763-AAA6-0BFB5684CEF7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.44:*:*:*:*:*:*:*", "cpeNameId": "E250C350-641F-43DD-AEB4-1C946615157A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.45:*:*:*:*:*:*:*", "cpeNameId": "9CC34563-2759-4871-A4D2-C61DE8DA4E57"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.46:*:*:*:*:*:*:*", "cpeNameId": "A70F492D-EF48-4858-A873-B94D01C0A62A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.47:*:*:*:*:*:*:*", "cpeNameId": "06C4E559-4CE8-4E08-B443-7C305DEDA9E5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.48:*:*:*:*:*:*:*", "cpeNameId": "E482A830-7B81-4A42-A6B1-6F2E1F4D8173"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.49:*:*:*:*:*:*:*", "cpeNameId": "F9494DAB-1EA4-418D-B5C2-DBEBBD1564D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.50:*:*:*:*:*:*:*", "cpeNameId": "8A295CA4-B6C5-42E8-A119-ECF4416B4507"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.51:*:*:*:*:*:*:*", "cpeNameId": "57406E52-F157-4374-9FE6-3A974C64A5FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.52:*:*:*:*:*:*:*", "cpeNameId": "9BEB7881-4A89-41D9-919D-B462CBCA99F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.53:*:*:*:*:*:*:*", "cpeNameId": "CD60A649-DC43-4858-98E4-A9A84DAE254A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.54:*:*:*:*:*:*:*", "cpeNameId": "F719B1E7-9582-448B-9268-F1C4ABCB747E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.55:*:*:*:*:*:*:*", "cpeNameId": "98069CAA-0B81-48B1-9361-8646021ABCCF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.56:*:*:*:*:*:*:*", "cpeNameId": "7D55FD8F-1397-412E-ABBF-7CFF1D535DE5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.57:*:*:*:*:*:*:*", "cpeNameId": "F2412ACF-AD3C-4825-A861-BC86CB5773A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.58:*:*:*:*:*:*:*", "cpeNameId": "90298D18-9EA2-48D1-B8E5-A415753CD736"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.59:*:*:*:*:*:*:*", "cpeNameId": "B0A40B08-F604-4023-8546-70B000B581FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.60:*:*:*:*:*:*:*", "cpeNameId": "BA797BFD-CCD6-4D99-A0FE-EE8DBA7E10E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.61:*:*:*:*:*:*:*", "cpeNameId": "3098341D-1ACE-44C5-B68D-738D2F0755AF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.62:*:*:*:*:*:*:*", "cpeNameId": "8D335F96-0F12-49EB-9D54-4424F810B356"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.63:*:*:*:*:*:*:*", "cpeNameId": "D8EEFA5B-7B50-42BA-8337-E071DB25937D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.64:*:*:*:*:*:*:*", "cpeNameId": "51581C6F-56FC-46E5-AE9D-E414765DD203"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.66:*:*:*:*:*:*:*", "cpeNameId": "6F7D9B3C-6DBC-4FBB-977F-FC19E881B352"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.69:*:*:*:*:*:*:*", "cpeNameId": "EAD092F1-76CF-488E-9FDF-70ED83CF29E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7:-:*:*:*:*:*:*", "cpeNameId": "4F926A3F-EB69-4BA1-AA4D-89B4903AD53F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7:rc1:*:*:*:*:*:*", "cpeNameId": "E301E056-7928-4B81-A234-0C98F1236B85"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7:rc2:*:*:*:*:*:*", "cpeNameId": "43F3365E-C0C9-42BB-A915-34D7CBAB2DE0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7:rc3:*:*:*:*:*:*", "cpeNameId": "6DDBF4C8-7B8C-467B-9104-2A989321C78E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7:rc4:*:*:*:*:*:*", "cpeNameId": "B4BCF1CB-0208-4238-B258-5DE577FD9AD0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7:rc5:*:*:*:*:*:*", "cpeNameId": "E77625F8-8FB2-47ED-A9AD-F48005174C68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7:rc6:*:*:*:*:*:*", "cpeNameId": "6427DFBE-9CCC-4896-B0AE-F10BD5DBD126"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7:rc7:*:*:*:*:*:*", "cpeNameId": "1F6E6827-E8F8-41C3-992F-83481DEFA2B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7:rc8:*:*:*:*:*:*", "cpeNameId": "BF3EC0AD-6CD0-4473-A92A-9518DA968EF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7.1:*:*:*:*:*:*:*", "cpeNameId": "79D7ED41-5643-4D99-844C-9B043F32C448"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7.2:*:*:*:*:*:*:*", "cpeNameId": "C1ED5E3D-9AAE-49B9-AD5C-F67E5C2DED13"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7.3:*:*:*:*:*:*:*", "cpeNameId": "3F765E52-7235-45D2-9F5E-54A331DF8D5C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7.4:*:*:*:*:*:*:*", "cpeNameId": "1F5BBEFA-0A0E-41CF-ADCC-8F47EBCDB55C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7.5:*:*:*:*:*:*:*", "cpeNameId": "DBB2E8B7-C426-42F9-AA3C-49137FA9181F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7.6:*:*:*:*:*:*:*", "cpeNameId": "AE81517A-1398-4CBE-B09E-B7E4FE991601"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7.7:*:*:*:*:*:*:*", "cpeNameId": "9CC4542A-A669-4661-B058-053C2A9B7D13"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7.8:*:*:*:*:*:*:*", "cpeNameId": "E8303407-A959-458E-8957-F229F1DC34DE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7.9:*:*:*:*:*:*:*", "cpeNameId": "2378F7C0-BE31-4C41-B6F0-F5A488DD59DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7.10:*:*:*:*:*:*:*", "cpeNameId": "1C8BC43E-8B04-48EB-BDB9-B6F3AEDED204"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7.11:*:*:*:*:*:*:*", "cpeNameId": "0AD54002-D38C-49E2-9D46-7862AC5E7EA7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.7.12:*:*:*:*:*:*:*", "cpeNameId": "5D166373-D54C-40CD-846C-A0DE746BABBC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8:-:*:*:*:*:*:*", "cpeNameId": "E606D576-BCBB-484B-8F66-5D5EC7155998"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", "cpeNameId": "13DF8AF0-B00A-49F7-AA57-0800C102A3D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", "cpeNameId": "8104072A-D502-4FAA-B807-F029C7B49CCC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", "cpeNameId": "6E7613C9-9ED8-4B71-83E6-5464BF413555"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*", "cpeNameId": "31A56C8B-CC28-40D1-9B52-92A6E0C2BEC0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*", "cpeNameId": "9276C1E8-4FB4-44B0-86BF-B3510326B189"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*", "cpeNameId": "CE634D04-E4EA-451A-B849-91406DF4B55B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8.1:*:*:*:*:*:*:*", "cpeNameId": "7FB18F84-7509-49E5-8B57-DDCD7A4FFD54"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8.2:*:*:*:*:*:*:*", "cpeNameId": "668323DC-447E-419D-8E2E-328DABEFC77C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8.3:*:*:*:*:*:*:*", "cpeNameId": "2492ED49-34F3-4332-BF22-89C19C630B9E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8.4:*:*:*:*:*:*:*", "cpeNameId": "726617ED-6BBB-436F-BBC3-DEA9B9916623"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8.5:*:*:*:*:*:*:*", "cpeNameId": "5B4F2389-8891-4F37-AAC4-309514EE2AFC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8.6:*:*:*:*:*:*:*", "cpeNameId": "998736C2-6532-4B98-AB83-1BFB34798139"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8.7:*:*:*:*:*:*:*", "cpeNameId": "3F42568E-4784-41CB-9FF5-67C82CFBBA1A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8.8:*:*:*:*:*:*:*", "cpeNameId": "EC7097AC-D466-446F-83E2-9A7A39C5F78A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8.9:*:*:*:*:*:*:*", "cpeNameId": "F656AB16-669F-464E-9767-730CDC3CD068"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8.10:*:*:*:*:*:*:*", "cpeNameId": "DA233A76-2843-42F9-BE64-E161DCBE7084"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8.11:*:*:*:*:*:*:*", "cpeNameId": "D6510469-001B-4E1F-81C4-79B94BE9B631"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.8.12:*:*:*:*:*:*:*", "cpeNameId": "9F9FA208-A38C-4DDF-A6B1-DB3D6896163A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9:-:*:*:*:*:*:*", "cpeNameId": "DA68273F-A1B2-4072-8039-969DEC83F8B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*", "cpeNameId": "AD3F7724-6BA5-4196-BE25-BB908AD79224"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*", "cpeNameId": "EB425DB1-B18B-49FE-A1CD-D37A614EF196"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*", "cpeNameId": "5556F80D-9910-4BA1-BD39-A05DB521656C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*", "cpeNameId": "91148A86-2F56-4A4E-A618-4BFF86878C22"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:*", "cpeNameId": "4A6F1927-BF21-4430-B3E8-9A36CCC1BF7C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9:rc6:*:*:*:*:*:*", "cpeNameId": "A339A401-1D13-456C-8A03-21E0510811E3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9:rc7:*:*:*:*:*:*", "cpeNameId": "31965EBF-6545-45F2-9E6A-003EBFA0699B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9.1:*:*:*:*:*:*:*", "cpeNameId": "5409332C-40D6-44A9-82A7-28DB593D9017"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9.2:*:*:*:*:*:*:*", "cpeNameId": "895B3D2B-E49B-4522-A022-912A981787D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9.3:*:*:*:*:*:*:*", "cpeNameId": "2173448B-A956-45AD-86C8-740858CF88A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9.4:*:*:*:*:*:*:*", "cpeNameId": "FE7FFD19-DA74-4E11-BFD0-76F8418FF08B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9.5:*:*:*:*:*:*:*", "cpeNameId": "FB05F5D5-C3C5-47DB-82AC-AFD388940242"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9.6:*:*:*:*:*:*:*", "cpeNameId": "70A85201-A04C-469F-A3E0-40BC86FE0B8B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9.7:*:*:*:*:*:*:*", "cpeNameId": "ABA04A00-B7AF-4E92-A00F-27AF9DD38F88"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9.8:*:*:*:*:*:*:*", "cpeNameId": "DAA9BE88-6890-4061-8D58-6FFD85083184"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9.9:*:*:*:*:*:*:*", "cpeNameId": "6BF442C2-3D11-45DB-BDC2-9BF6162441D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9.10:*:*:*:*:*:*:*", "cpeNameId": "51127D6B-DBBA-40F8-98D1-A2BC3207393E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9.11:*:*:*:*:*:*:*", "cpeNameId": "7B3B966A-8BE8-45DB-B90F-1712FB11B7F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.9.12:*:*:*:*:*:*:*", "cpeNameId": "B72A7495-1D73-4DD9-B3B9-B5ABF72C0EBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10:-:*:*:*:*:*:*", "cpeNameId": "33286ABD-F4EA-4F52-ABAF-90E4F9A40DC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*", "cpeNameId": "E3646D55-E6C9-45FB-B1A0-BC0B03CF9E9B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*", "cpeNameId": "9290D3F5-3EB5-4F3D-BBCC-757366758235"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*", "cpeNameId": "2DDCD76C-E056-41A7-A529-49E6DAF202D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*", "cpeNameId": "0BE3BCC9-5B0E-4A89-B662-E06F539878A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:*", "cpeNameId": "1C1806B7-1B9B-4D3A-B320-F8F93D12CA76"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10:rc6:*:*:*:*:*:*", "cpeNameId": "BD2DAAE2-0295-4DEF-890E-00E509610C5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10:rc7:*:*:*:*:*:*", "cpeNameId": "E4A1F3E6-6C2B-4E6C-9905-C28050CD03F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10.0:rc1:*:*:*:*:*:*", "cpeNameId": "4B006DC1-D30B-4EBE-B103-7F2C1F283DEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10.0:rc2:*:*:*:*:*:*", "cpeNameId": "C467A3E6-50F3-4D61-BC58-8554E9B2FEDA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10.0:rc3:*:*:*:*:*:*", "cpeNameId": "92F85456-7188-43FB-BCC1-3FC42DB1AD04"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10.1:*:*:*:*:*:*:*", "cpeNameId": "9DC1C968-7D70-4D77-9C80-E924C5BDBFD0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10.2:*:*:*:*:*:*:*", "cpeNameId": "6505BF6C-7B1F-4AD2-919F-95E8424C5655"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10.3:*:*:*:*:*:*:*", "cpeNameId": "52ECC529-5C55-4BF7-A72D-BD5233038B5C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10.4:*:*:*:*:*:*:*", "cpeNameId": "3AE1E52D-645D-49E2-B912-03E29DA32345"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10.5:*:*:*:*:*:*:*", "cpeNameId": "5B55EAC3-7C40-4D75-B398-16B166F3FD22"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10.6:*:*:*:*:*:*:*", "cpeNameId": "7E932982-7E26-415F-844D-315F2F5C948C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10.7:*:*:*:*:*:*:*", "cpeNameId": "A6988850-5FA9-49D5-8590-E3A4EE102859"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10.8:*:*:*:*:*:*:*", "cpeNameId": "B57DB349-33DC-4330-BDE6-892DE85147F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10.9:*:*:*:*:*:*:*", "cpeNameId": "47155132-EA0F-464F-B64D-7D8471B01C43"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10.10:*:*:*:*:*:*:*", "cpeNameId": "74E57DC5-D464-44BB-847F-8E3243AB319C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10.11:*:*:*:*:*:*:*", "cpeNameId": "F02AECA0-B93A-43BB-B039-92CE60BE643E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10.12:*:*:*:*:*:*:*", "cpeNameId": "D7EE8EC1-EDE8-49B2-AF80-3546F7C9F97E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10.13:*:*:*:*:*:*:*", "cpeNameId": "E2625B6C-03BB-4290-885D-EF36C2928C0D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.10.14:*:*:*:*:*:*:*", "cpeNameId": "9368FB15-B2E5-4EDF-AB92-CE69EB5A9B25"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11:-:*:*:*:*:*:*", "cpeNameId": "D9796FCF-DF1C-4C11-9B21-DE3E5FCDE51C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", "cpeNameId": "11452F50-843F-4849-B0DF-FE5BFDBF5453"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", "cpeNameId": "D6BCD8FE-1131-4209-84D9-C060130E9FB3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*", "cpeNameId": "1F11FBEB-C56C-4CD0-92A1-9D515CD37197"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*", "cpeNameId": "D40D5AD3-6A6D-4192-94C9-5722335A5D0A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*", "cpeNameId": "1E20CDB6-B75C-4C9F-9FC5-8FB8D78A5341"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11:rc6:*:*:*:*:*:*", "cpeNameId": "BB4EA85D-981C-4FFA-A580-B102DCD07F73"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11:rc7:*:*:*:*:*:*", "cpeNameId": "CEA79089-82F2-42AB-87CB-85E788963687"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11:rc8:*:*:*:*:*:*", "cpeNameId": "FAE3B2C5-55FA-4E79-B6E5-9C2DCC93CE9C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11.1:*:*:*:*:*:*:*", "cpeNameId": "2EA27B24-8931-41F5-A44A-5F16AD703E95"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11.2:*:*:*:*:*:*:*", "cpeNameId": "94AD59E6-37CA-47AF-A40F-714406474754"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11.3:*:*:*:*:*:*:*", "cpeNameId": "8EF7CFFD-5176-47EC-B832-6D82331D3C68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11.4:*:*:*:*:*:*:*", "cpeNameId": "F3799B44-911D-446D-94A2-0E539D056143"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11.5:*:*:*:*:*:*:*", "cpeNameId": "7686FD31-8647-4F3A-9C99-9AD107D11924"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11.6:*:*:*:*:*:*:*", "cpeNameId": "F1DE77FC-8E60-4D63-B18E-B7BA79940CB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11.7:*:*:*:*:*:*:*", "cpeNameId": "9B065310-1D5F-44FA-A4C6-EC5749CF61B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11.8:*:*:*:*:*:*:*", "cpeNameId": "C3E26A1B-B3C5-4AE9-96EC-602DA39F49AA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.11.10:*:*:*:*:*:*:*", "cpeNameId": "7E44ECC0-C3DF-41FB-A0DD-06945D8D465A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.12:-:*:*:*:*:*:*", "cpeNameId": "A6E24F28-F074-43F4-82D4-E576BF65E7E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", "cpeNameId": "FB19590B-8DC8-4AE8-9275-41B707178E02"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", "cpeNameId": "50D3D00F-E837-4BDE-8B6C-7CF51830A090"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*", "cpeNameId": "57179203-7A5D-490F-A8CF-4C4741F7497B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*", "cpeNameId": "EDE41C0D-4AB2-4CA6-B3C5-C095ED1CC4F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*", "cpeNameId": "A57E7724-0F01-442E-8E3B-40D312BEA8FF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*", "cpeNameId": "A13E0435-FB89-490C-AE2A-7CDDA505D96D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.12:rc7:*:*:*:*:*:*", "cpeNameId": "49B7D7EE-C6BD-441E-89B8-7B58C8D2720C"}]}} \ No newline at end of file diff --git a/cpematch/F1/F1E7ED7E-1798-4455-8767-9A474D147FDF.json b/cpematch/F1/F1E7ED7E-1798-4455-8767-9A474D147FDF.json new file mode 100644 index 00000000000..ff6aa56d67e --- /dev/null +++ b/cpematch/F1/F1E7ED7E-1798-4455-8767-9A474D147FDF.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "F1E7ED7E-1798-4455-8767-9A474D147FDF", "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartExcluding": "6.2", "versionEndExcluding": "6.6.64", "lastModified": "2025-01-09T16:17:59.330", "cpeLastModified": "2025-01-09T16:17:59.330", "created": "2025-01-09T16:17:59.330", "status": "Active", "matches": [{"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.0:rc1:*:*:*:*:*:*", "cpeNameId": "D6F8058D-EF1A-4187-9F6F-BB09A4C41F38"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.0:rc2:*:*:*:*:*:*", "cpeNameId": "0ACB4ECF-5031-4BFE-A7B7-97AE471871B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.0:rc3:*:*:*:*:*:*", "cpeNameId": "C7F43C6B-8673-4121-90DF-B578F2801110"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.0:rc4:*:*:*:*:*:*", "cpeNameId": "863A0838-669D-40BB-8DDF-F1A1D221EB7F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.0:rc5:*:*:*:*:*:*", "cpeNameId": "B7353B5E-C483-49FD-9503-328684843B80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.0:rc6:*:*:*:*:*:*", "cpeNameId": "156908BB-9B9E-4D10-9959-C22F247BB6FA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.1:*:*:*:*:*:*:*", "cpeNameId": "FE2BEA06-F67E-42CF-A481-1D83978BCA2A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.2:*:*:*:*:*:*:*", "cpeNameId": "8103109C-71B8-476F-997B-8DEB06AAEBF0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.3:*:*:*:*:*:*:*", "cpeNameId": "89EE49CF-2690-4316-947B-2695CBA50E00"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.4:*:*:*:*:*:*:*", "cpeNameId": "05A86547-7B27-4CAA-A1AA-F4EA197E3BD7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.5:*:*:*:*:*:*:*", "cpeNameId": "26AE4D28-D6A5-478F-A529-26B739E7054E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.6:*:*:*:*:*:*:*", "cpeNameId": "63DDA132-5AB2-4CFF-ACC6-F5FF2AB1400E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.7:*:*:*:*:*:*:*", "cpeNameId": "034CD058-5816-44A5-B13B-9F5A48180FAA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.8:*:*:*:*:*:*:*", "cpeNameId": "892DA63F-D86B-4FD6-9F27-8CFA173AEC59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.9:*:*:*:*:*:*:*", "cpeNameId": "99A70DD2-9396-4181-9A5E-15AA0223E5F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.10:*:*:*:*:*:*:*", "cpeNameId": "CD10F4E6-970E-4F86-94E1-A1EE17C66398"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.11:*:*:*:*:*:*:*", "cpeNameId": "CBC39BBD-7F8B-412E-B28B-4D03844979D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.12:*:*:*:*:*:*:*", "cpeNameId": "061399AB-7B17-401E-AA9B-D270E78A8C57"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.13:*:*:*:*:*:*:*", "cpeNameId": "C7F53FB8-5F99-4273-9AB5-FDD44CA6BB23"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.14:*:*:*:*:*:*:*", "cpeNameId": "D8B5CAAA-4076-47D1-9A3B-4C1D9E388180"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.15:*:*:*:*:*:*:*", "cpeNameId": "E1131D22-1ECE-498E-8C7B-C02B290319C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.16:*:*:*:*:*:*:*", "cpeNameId": "04EBA43D-8EFD-4838-918B-D40D2E686017"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3:-:*:*:*:*:*:*", "cpeNameId": "79E5017F-BBF4-44EE-8DE8-FFC33C7AF117"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3:rc1:*:*:*:*:*:*", "cpeNameId": "EAABF30A-689E-4D86-B06B-C5CDB63C100A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3:rc2:*:*:*:*:*:*", "cpeNameId": "BDEBBF51-457F-45BC-B4C0-0AB1C79ACBD9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3:rc3:*:*:*:*:*:*", "cpeNameId": "300AD1DF-157D-41D0-8A19-9D3CDD69C90A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3:rc4:*:*:*:*:*:*", "cpeNameId": "5F0278A8-AD9F-4517-892D-C2293A937C13"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3:rc5:*:*:*:*:*:*", "cpeNameId": "486C9057-BD07-4562-B17D-254BA2FD18B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3:rc6:*:*:*:*:*:*", "cpeNameId": "78072C23-298C-4933-A691-21F9AFD028AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3:rc7:*:*:*:*:*:*", "cpeNameId": "A332478B-A181-40C6-8321-46A03D0A9A59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3.1:*:*:*:*:*:*:*", "cpeNameId": "C5A262C5-03ED-4EB3-8EC4-C8D81E0A31F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3.2:*:*:*:*:*:*:*", "cpeNameId": "6935C9B1-1E01-4913-97DB-CF683C30B649"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3.3:*:*:*:*:*:*:*", "cpeNameId": "18D65783-E19A-462F-970F-3F360A4465EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3.4:*:*:*:*:*:*:*", "cpeNameId": "78C4FA4D-3C32-4D8F-9BE7-80AEA8DA132A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3.5:*:*:*:*:*:*:*", "cpeNameId": "EA8A0152-C071-47C4-8042-CC77521AEF69"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3.6:*:*:*:*:*:*:*", "cpeNameId": "91A4F87E-2342-4D2D-AC6D-E23B97C50EF3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3.7:*:*:*:*:*:*:*", "cpeNameId": "894CE6B3-3E3B-42B0-AE9E-FF50C5032AB3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3.8:*:*:*:*:*:*:*", "cpeNameId": "0C38DD95-E6DD-4170-BC9E-9F2F9606F243"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3.9:*:*:*:*:*:*:*", "cpeNameId": "D8886E14-BEA8-4F0C-BE81-4E79339738B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3.10:*:*:*:*:*:*:*", "cpeNameId": "6AFB3CC1-17BE-4B78-AAED-C878A9673470"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3.11:*:*:*:*:*:*:*", "cpeNameId": "EB35199C-7694-48CF-A3CE-071E82332BAB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3.12:*:*:*:*:*:*:*", "cpeNameId": "1FA512A5-D8D8-4BC8-AF03-A58047FF2D68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3.13:*:*:*:*:*:*:*", "cpeNameId": "AD5FCDFC-541B-4AC0-8CAE-629B9AB94DC9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4:-:*:*:*:*:*:*", "cpeNameId": "83E5A912-AAD8-4A94-81B2-2F6A24C8A489"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4:rc1:*:*:*:*:*:*", "cpeNameId": "DDA10D69-67F7-4B1D-93D7-8A5A748F6C25"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4:rc2:*:*:*:*:*:*", "cpeNameId": "FAFD5368-C833-4E9F-BAC2-5E67C1AED0ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4:rc3:*:*:*:*:*:*", "cpeNameId": "148F01E8-5A2E-47F8-AE25-222332BE2986"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4:rc4:*:*:*:*:*:*", "cpeNameId": "3E235E1B-7DBF-44DA-9A0A-82BB378B653D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4:rc5:*:*:*:*:*:*", "cpeNameId": "6757F97B-0CC1-478F-8E6C-1FA9FAC72A2E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4:rc6:*:*:*:*:*:*", "cpeNameId": "97B13CDD-F0A4-417D-9A03-66A2BDAB2A82"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4:rc7:*:*:*:*:*:*", "cpeNameId": "4F70C4E8-FD1F-4A92-8276-F9F9B90B931C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4.1:*:*:*:*:*:*:*", "cpeNameId": "2C06EC90-C0BF-4257-9461-C8B7F1A1C5FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4.2:*:*:*:*:*:*:*", "cpeNameId": "B5E39239-6F72-4D53-8F3A-3CDA2CFE3E93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4.3:*:*:*:*:*:*:*", "cpeNameId": "E6FC4FB9-573F-460D-B1F4-A7E82B585BB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4.4:*:*:*:*:*:*:*", "cpeNameId": "A2EC927F-1A3D-41C6-9C2D-7E9DD889ED8C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4.5:*:*:*:*:*:*:*", "cpeNameId": "02BAFBF5-CFA3-4B7E-96DE-EE60A14A7EA9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4.6:*:*:*:*:*:*:*", "cpeNameId": "6B4D7500-521D-4CA0-81BF-C6368A783680"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4.7:*:*:*:*:*:*:*", "cpeNameId": "8B8D8A31-718F-4596-832B-AF86EFD69D6F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4.8:*:*:*:*:*:*:*", "cpeNameId": "9DF078C6-FF6D-451B-88CA-E7D232BF2B3E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4.9:*:*:*:*:*:*:*", "cpeNameId": "914EC41A-CBDF-4B71-87B4-10796413AC3B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4.10:*:*:*:*:*:*:*", "cpeNameId": "D6B14513-F9B4-4ACD-94C5-625584EC5BD9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4.11:*:*:*:*:*:*:*", "cpeNameId": "28D6D5D5-F0DB-4DDC-8880-C567D47960BE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4.12:*:*:*:*:*:*:*", "cpeNameId": "B8EC6DB8-00AB-46C6-A2BA-A62875AC4529"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4.13:*:*:*:*:*:*:*", "cpeNameId": "9939B28C-8EA8-4A51-8123-F791EE3D70CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4.14:*:*:*:*:*:*:*", "cpeNameId": "AF0DDB66-698D-4A9C-A8B1-101F4943FA68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4.15:*:*:*:*:*:*:*", "cpeNameId": "3B38029B-C4AC-4B15-9F57-965526DB0B36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4.16:*:*:*:*:*:*:*", "cpeNameId": "C621AB7B-4708-48E7-A4E7-FF1BF38F33B2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5:-:*:*:*:*:*:*", "cpeNameId": "A80D8003-A1D9-4697-ACF3-C8C4B2CD471C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5:rc1:*:*:*:*:*:*", "cpeNameId": "E438D075-507D-41C0-B200-DC993357C174"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5:rc2:*:*:*:*:*:*", "cpeNameId": "AD292E24-AC9C-4864-B5EA-D4E619ABCA86"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5:rc3:*:*:*:*:*:*", "cpeNameId": "4F4EEA10-D4DB-48BE-A98B-AAEBD81956CC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5:rc4:*:*:*:*:*:*", "cpeNameId": "9D094BF9-E278-4685-ACD0-2119D9B7BBEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5:rc5:*:*:*:*:*:*", "cpeNameId": "D18AC1AA-3ADC-4E7F-B950-5B2CD32872C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5:rc6:*:*:*:*:*:*", "cpeNameId": "EA059EE3-FF5E-48F5-A146-491C388DD4A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5:rc7:*:*:*:*:*:*", "cpeNameId": "CFE2ACA0-C823-4A12-9BBC-A9C1144A6AFB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5.1:*:*:*:*:*:*:*", "cpeNameId": "9CC9F182-6A2B-4824-A26F-14A3C1AD7FD8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5.2:*:*:*:*:*:*:*", "cpeNameId": "8A6A2735-55B4-4BA0-A015-A6DEBC7843F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5.3:*:*:*:*:*:*:*", "cpeNameId": "E36EF007-BFCF-4FC9-A9CB-F474D1DE7A07"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5.4:*:*:*:*:*:*:*", "cpeNameId": "F3A9CAE5-207A-4E22-92D7-56057FCAF9EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5.5:*:*:*:*:*:*:*", "cpeNameId": "5532494F-EB3F-47CC-B858-8E4C7D0DCB9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5.6:*:*:*:*:*:*:*", "cpeNameId": "DC8A24AA-ADF4-4798-95BA-65EC0F1C6ED4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5.7:*:*:*:*:*:*:*", "cpeNameId": "303897F0-7D96-4723-B25B-1F8ED64ABE30"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5.8:*:*:*:*:*:*:*", "cpeNameId": "31C57602-5FE8-4C44-9C34-4BF2D0774DE5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5.9:*:*:*:*:*:*:*", "cpeNameId": "28E565A4-925E-4F42-9E6E-318B8ED7BF61"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5.10:*:*:*:*:*:*:*", "cpeNameId": "1FA9CD76-EF11-45B9-A943-04276B376848"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5.11:*:*:*:*:*:*:*", "cpeNameId": "E1891F07-83C7-4766-8D81-77635FB8B270"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5.12:*:*:*:*:*:*:*", "cpeNameId": "C4028EC2-F3E6-4FDD-8E12-DC6BE4EC7237"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5.13:*:*:*:*:*:*:*", "cpeNameId": "FCB352EC-6DE9-43B5-9BE1-BA336462C79A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6:-:*:*:*:*:*:*", "cpeNameId": "7708857B-B652-435E-8214-CFB2F756F7C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:*", "cpeNameId": "708B88D8-2A55-4C45-868F-D8F66C47D15E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:*", "cpeNameId": "C48DE5D1-CDF2-4A3C-8016-4794413F9BD8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6:rc3:*:*:*:*:*:*", "cpeNameId": "B895E9CB-0F9E-4B4E-BEA5-D5DBFA4FA317"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6:rc4:*:*:*:*:*:*", "cpeNameId": "25FB4811-BC5B-4066-B45D-015C8DF6AAA3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6:rc5:*:*:*:*:*:*", "cpeNameId": "667A7812-875A-4C8F-81B7-27257319E42C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6:rc6:*:*:*:*:*:*", "cpeNameId": "CF63FB11-7713-4C59-AD54-E1DEF5D3DF5A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6:rc7:*:*:*:*:*:*", "cpeNameId": "494210A9-8E24-4DAB-A9F3-B51B4EBC2EA9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.1:*:*:*:*:*:*:*", "cpeNameId": "48D20EB8-21AA-4DB7-9703-2953612A9A8F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.2:*:*:*:*:*:*:*", "cpeNameId": "493589E0-42C6-4184-9A22-D667EF8F7668"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.3:*:*:*:*:*:*:*", "cpeNameId": "DD99FA9C-5522-4516-A845-AD0347B8C111"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.4:*:*:*:*:*:*:*", "cpeNameId": "4B05FC17-F00C-431F-AF57-6898726E08ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.5:*:*:*:*:*:*:*", "cpeNameId": "6177881A-975B-474F-9C64-3821DB5E97ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.6:*:*:*:*:*:*:*", "cpeNameId": "DA74BBF4-9E69-468F-BCBA-BD85810A9DAC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.7:*:*:*:*:*:*:*", "cpeNameId": "57F39A24-CA69-43C4-91F8-846185741DED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.8:*:*:*:*:*:*:*", "cpeNameId": "D4C594C7-7CCE-4CE4-B587-71B1F90C64F4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.9:*:*:*:*:*:*:*", "cpeNameId": "3DB8BB56-8CED-4F06-8893-2B58D4DEF032"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.10:*:*:*:*:*:*:*", "cpeNameId": "737B1EE7-5BFA-4030-A1CD-3C04FD1B70BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.11:*:*:*:*:*:*:*", "cpeNameId": "909CFBD2-FFCD-4A6D-893F-0F64AFDD1E63"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.12:*:*:*:*:*:*:*", "cpeNameId": "213EDC79-F5D2-4D52-B5C6-83A21C781924"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.13:*:*:*:*:*:*:*", "cpeNameId": "36A0032F-6075-4595-BEA3-C8FD8FD82D51"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.14:*:*:*:*:*:*:*", "cpeNameId": "B2D98F70-DC33-4434-A9B9-F634DB261166"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.15:*:*:*:*:*:*:*", "cpeNameId": "321D7187-47FD-4AC9-8402-50C55A769462"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.16:*:*:*:*:*:*:*", "cpeNameId": "02B3F009-31A0-4E53-8A89-D2851F60161D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.17:*:*:*:*:*:*:*", "cpeNameId": "7964199C-934F-4EFC-8E10-769866A1CEF4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.18:*:*:*:*:*:*:*", "cpeNameId": "662DDE22-7180-40FE-AF01-F1D279B03479"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.19:*:*:*:*:*:*:*", "cpeNameId": "9EC8C911-B236-4DBC-AA91-7C5575FEA941"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.20:*:*:*:*:*:*:*", "cpeNameId": "E176BD49-D984-4DFD-BF94-B377343221D6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.21:*:*:*:*:*:*:*", "cpeNameId": "16CA36A1-B086-40E0-B626-A0041AD2B1B8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.22:*:*:*:*:*:*:*", "cpeNameId": "A0E240F0-1310-42EE-AED3-C127C92205E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.23:*:*:*:*:*:*:*", "cpeNameId": "A54F204C-8C1A-4FC4-9A38-B5D06F1663FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.24:*:*:*:*:*:*:*", "cpeNameId": "B5EF8483-CD4B-4B16-BBA4-BA817EC0A5E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.25:*:*:*:*:*:*:*", "cpeNameId": "38DE4FA7-E5C9-492F-889B-AC68708B13AA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.26:*:*:*:*:*:*:*", "cpeNameId": "86B955E4-8792-4840-A49E-23F1AD342821"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.27:*:*:*:*:*:*:*", "cpeNameId": "B0A9F8BB-3A53-4E29-BD15-361010510D10"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.28:*:*:*:*:*:*:*", "cpeNameId": "958125CC-ED54-4956-926D-6D42F6EED1E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.29:*:*:*:*:*:*:*", "cpeNameId": "EFDBB2F8-FA58-4E00-98F6-8885EE1E41D7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.30:*:*:*:*:*:*:*", "cpeNameId": "7F77386F-180B-4457-9655-FD2A67C4F65A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.31:*:*:*:*:*:*:*", "cpeNameId": "EB7F70B9-E173-40F8-B4F0-B8D8DC3913FA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.32:*:*:*:*:*:*:*", "cpeNameId": "7243F9D6-586E-4EEC-8B9E-A249EFB7B4D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.33:*:*:*:*:*:*:*", "cpeNameId": "E3D20161-DD78-402C-BD1D-02769B6A6C5F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.34:*:*:*:*:*:*:*", "cpeNameId": "AD267688-519F-4863-9379-8CB50DD27AE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.35:*:*:*:*:*:*:*", "cpeNameId": "1E4CA740-CB8A-4FB5-99CB-DA8DCF35DA02"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.36:*:*:*:*:*:*:*", "cpeNameId": "96AA1D16-A016-43DB-B0AB-FED45308D249"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.37:*:*:*:*:*:*:*", "cpeNameId": "D0A60FC5-E516-4560-B201-E9E7A3723645"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.38:*:*:*:*:*:*:*", "cpeNameId": "48C3A765-D278-4115-A7F8-0EAFE267BE54"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.39:*:*:*:*:*:*:*", "cpeNameId": "0F797385-0498-4377-B7F8-80FD439BFE3B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.40:*:*:*:*:*:*:*", "cpeNameId": "3F5097D6-6C8D-42A1-960B-CBA03E28B27F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.41:*:*:*:*:*:*:*", "cpeNameId": "C1AFD87A-72AE-4D46-B1F0-564094D3642F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.42:*:*:*:*:*:*:*", "cpeNameId": "6350E59C-B75C-4804-BD07-97CD611B7987"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.43:*:*:*:*:*:*:*", "cpeNameId": "542B2E1A-138C-4763-AAA6-0BFB5684CEF7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.44:*:*:*:*:*:*:*", "cpeNameId": "E250C350-641F-43DD-AEB4-1C946615157A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.45:*:*:*:*:*:*:*", "cpeNameId": "9CC34563-2759-4871-A4D2-C61DE8DA4E57"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.46:*:*:*:*:*:*:*", "cpeNameId": "A70F492D-EF48-4858-A873-B94D01C0A62A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.47:*:*:*:*:*:*:*", "cpeNameId": "06C4E559-4CE8-4E08-B443-7C305DEDA9E5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.48:*:*:*:*:*:*:*", "cpeNameId": "E482A830-7B81-4A42-A6B1-6F2E1F4D8173"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.49:*:*:*:*:*:*:*", "cpeNameId": "F9494DAB-1EA4-418D-B5C2-DBEBBD1564D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.50:*:*:*:*:*:*:*", "cpeNameId": "8A295CA4-B6C5-42E8-A119-ECF4416B4507"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.51:*:*:*:*:*:*:*", "cpeNameId": "57406E52-F157-4374-9FE6-3A974C64A5FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.52:*:*:*:*:*:*:*", "cpeNameId": "9BEB7881-4A89-41D9-919D-B462CBCA99F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.53:*:*:*:*:*:*:*", "cpeNameId": "CD60A649-DC43-4858-98E4-A9A84DAE254A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.54:*:*:*:*:*:*:*", "cpeNameId": "F719B1E7-9582-448B-9268-F1C4ABCB747E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.55:*:*:*:*:*:*:*", "cpeNameId": "98069CAA-0B81-48B1-9361-8646021ABCCF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.56:*:*:*:*:*:*:*", "cpeNameId": "7D55FD8F-1397-412E-ABBF-7CFF1D535DE5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.57:*:*:*:*:*:*:*", "cpeNameId": "F2412ACF-AD3C-4825-A861-BC86CB5773A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.58:*:*:*:*:*:*:*", "cpeNameId": "90298D18-9EA2-48D1-B8E5-A415753CD736"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.59:*:*:*:*:*:*:*", "cpeNameId": "B0A40B08-F604-4023-8546-70B000B581FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.60:*:*:*:*:*:*:*", "cpeNameId": "BA797BFD-CCD6-4D99-A0FE-EE8DBA7E10E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.61:*:*:*:*:*:*:*", "cpeNameId": "3098341D-1ACE-44C5-B68D-738D2F0755AF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.62:*:*:*:*:*:*:*", "cpeNameId": "8D335F96-0F12-49EB-9D54-4424F810B356"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.63:*:*:*:*:*:*:*", "cpeNameId": "D8EEFA5B-7B50-42BA-8337-E071DB25937D"}]}} \ No newline at end of file diff --git a/cpematch/FF/FFB283D2-9626-493E-AC5C-7B9B507AC546.json b/cpematch/FF/FFB283D2-9626-493E-AC5C-7B9B507AC546.json new file mode 100644 index 00000000000..bca653151e0 --- /dev/null +++ b/cpematch/FF/FFB283D2-9626-493E-AC5C-7B9B507AC546.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "FFB283D2-9626-493E-AC5C-7B9B507AC546", "criteria": "cpe:2.3:a:advantech:iview:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.7.04.6752", "lastModified": "2025-01-09T16:03:31.020", "cpeLastModified": "2025-01-09T16:03:31.020", "created": "2025-01-09T16:03:31.020", "status": "Active", "matches": [{"cpeName": "cpe:2.3:a:advantech:iview:5.6:*:*:*:*:*:*:*", "cpeNameId": "15569AB2-6ECD-4EAA-88A7-89E07FA6B0DC"}, {"cpeName": "cpe:2.3:a:advantech:iview:5.7:*:*:*:*:*:*:*", "cpeNameId": "A52F9486-0022-43FC-8207-6AD8794D6B7F"}, {"cpeName": "cpe:2.3:a:advantech:iview:5.7.02:*:*:*:*:*:*:*", "cpeNameId": "4C050B0C-4817-473A-9373-FB989551AE47"}, {"cpeName": "cpe:2.3:a:advantech:iview:5.7.03.6112:*:*:*:*:*:*:*", "cpeNameId": "07197562-39F9-4182-81C7-C36469748B08"}, {"cpeName": "cpe:2.3:a:advantech:iview:5.7.03.6182:*:*:*:*:*:*:*", "cpeNameId": "EFE828AE-475A-4CFB-B518-7FB530AAAE12"}, {"cpeName": "cpe:2.3:a:advantech:iview:5.7.04.6469:*:*:*:*:*:*:*", "cpeNameId": "028C193E-4F6E-48D5-BBF5-C105E50EA03C"}, {"cpeName": "cpe:2.3:a:advantech:iview:5.7.04.6583:*:*:*:*:*:*:*", "cpeNameId": "CCB0CD33-F874-4D9A-AA76-E1E2A1E9A4E6"}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-1945.json b/cve/2023/CVE-2023-1945.json index 200239a602c..fafb8e7edd6 100644 --- a/cve/2023/CVE-2023-1945.json +++ b/cve/2023/CVE-2023-1945.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-1945", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-02T17:15:10.493", "lastModified": "2024-11-21T07:40:12.070", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "Unexpected data returned from the Safe Browsing API could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 102.10 and Firefox ESR < 102.10."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-787"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "versionEndExcluding": "102.10", "matchCriteriaId": "03736567-251A-4F75-992E-AB7C957FB587"}, {"vulnerable": true, "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "versionEndExcluding": "102.10", "matchCriteriaId": "7C8C9D9E-9BDA-475D-B7D6-10D1C6E9DD72"}]}]}], "references": [{"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1777588", "source": "security@mozilla.org", "tags": ["Issue Tracking", "Permissions Required", "Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-14/", "source": "security@mozilla.org", "tags": ["Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-15/", "source": "security@mozilla.org", "tags": ["Vendor Advisory"]}, {"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1777588", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Issue Tracking", "Permissions Required", "Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-14/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-15/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-1945", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-02T17:15:10.493", "lastModified": "2025-01-09T17:15:08.213", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "Unexpected data returned from the Safe Browsing API could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 102.10 and Firefox ESR < 102.10."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 3.6}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-787"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-787"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "versionEndExcluding": "102.10", "matchCriteriaId": "03736567-251A-4F75-992E-AB7C957FB587"}, {"vulnerable": true, "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "versionEndExcluding": "102.10", "matchCriteriaId": "7C8C9D9E-9BDA-475D-B7D6-10D1C6E9DD72"}]}]}], "references": [{"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1777588", "source": "security@mozilla.org", "tags": ["Issue Tracking", "Permissions Required", "Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-14/", "source": "security@mozilla.org", "tags": ["Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-15/", "source": "security@mozilla.org", "tags": ["Vendor Advisory"]}, {"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1777588", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Issue Tracking", "Permissions Required", "Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-14/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-15/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-24010.json b/cve/2023/CVE-2023-24010.json index aa46ff0d4d4..b34a80500e6 100644 --- a/cve/2023/CVE-2023-24010.json +++ b/cve/2023/CVE-2023-24010.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-24010", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2025-01-09T15:15:11.467", "lastModified": "2025-01-09T15:15:11.467", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "An attacker can arbitrarily craft malicious DDS Participants (or ROS 2 Nodes) with valid certificates to compromise and get full control of the attacked secure DDS databus system by exploiting vulnerable attributes in the configuration of PKCS#7 certificate\u2019s validation. This is caused by a non-compliant implementation of permission document verification used by some DDS vendors. Specifically, an improper use of the OpenSSL PKCS7_verify function used to validate S/MIME signatures."}], "metrics": {"cvssMetricV31": [{"source": "cve-coordination@incibe.es", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L", "baseScore": 8.2, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "LOW"}, "exploitabilityScore": 3.9, "impactScore": 4.2}]}, "weaknesses": [{"source": "cve-coordination@incibe.es", "type": "Primary", "description": [{"lang": "en", "value": "CWE-200"}]}], "references": [{"url": "https://gist.github.com/vmayoral/235c02d0b0ef85a29812eff6980ff80d", "source": "cve-coordination@incibe.es"}, {"url": "https://github.com/ros2/sros2/issues/282", "source": "cve-coordination@incibe.es"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-24010", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2025-01-09T15:15:11.467", "lastModified": "2025-01-09T16:15:30.803", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "An attacker can arbitrarily craft malicious DDS Participants (or ROS 2 Nodes) with valid certificates to compromise and get full control of the attacked secure DDS databus system by exploiting vulnerable attributes in the configuration of PKCS#7 certificate\u2019s validation. This is caused by a non-compliant implementation of permission document verification used by some DDS vendors. Specifically, an improper use of the OpenSSL PKCS7_verify function used to validate S/MIME signatures."}], "metrics": {"cvssMetricV31": [{"source": "cve-coordination@incibe.es", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L", "baseScore": 8.2, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "LOW"}, "exploitabilityScore": 3.9, "impactScore": 4.2}]}, "weaknesses": [{"source": "cve-coordination@incibe.es", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-200"}]}], "references": [{"url": "https://gist.github.com/vmayoral/235c02d0b0ef85a29812eff6980ff80d", "source": "cve-coordination@incibe.es"}, {"url": "https://github.com/ros2/sros2/issues/282", "source": "cve-coordination@incibe.es"}, {"url": "https://gist.github.com/vmayoral/235c02d0b0ef85a29812eff6980ff80d", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-24011.json b/cve/2023/CVE-2023-24011.json index 2ba455dedb7..8878e341fa5 100644 --- a/cve/2023/CVE-2023-24011.json +++ b/cve/2023/CVE-2023-24011.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-24011", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2025-01-09T15:15:11.657", "lastModified": "2025-01-09T15:15:11.657", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "An attacker can arbitrarily craft malicious DDS Participants (or ROS 2 Nodes) with valid certificates to compromise and get full control of the attacked secure DDS databus system by exploiting vulnerable attributes in the configuration of PKCS#7 certificate\u2019s validation. This is caused by a non-compliant implementation of permission document verification used by some DDS vendors. Specifically, an improper use of the OpenSSL PKCS7_verify function used to validate S/MIME signatures."}], "metrics": {"cvssMetricV31": [{"source": "cve-coordination@incibe.es", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L", "baseScore": 8.2, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "LOW"}, "exploitabilityScore": 3.9, "impactScore": 4.2}]}, "weaknesses": [{"source": "cve-coordination@incibe.es", "type": "Primary", "description": [{"lang": "en", "value": "CWE-200"}]}], "references": [{"url": "https://gist.github.com/vmayoral/235c02d0b0ef85a29812eff6980ff80d", "source": "cve-coordination@incibe.es"}, {"url": "https://github.com/ros2/sros2/issues/282", "source": "cve-coordination@incibe.es"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-24011", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2025-01-09T15:15:11.657", "lastModified": "2025-01-09T16:15:31.323", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "An attacker can arbitrarily craft malicious DDS Participants (or ROS 2 Nodes) with valid certificates to compromise and get full control of the attacked secure DDS databus system by exploiting vulnerable attributes in the configuration of PKCS#7 certificate\u2019s validation. This is caused by a non-compliant implementation of permission document verification used by some DDS vendors. Specifically, an improper use of the OpenSSL PKCS7_verify function used to validate S/MIME signatures."}], "metrics": {"cvssMetricV31": [{"source": "cve-coordination@incibe.es", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L", "baseScore": 8.2, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "LOW"}, "exploitabilityScore": 3.9, "impactScore": 4.2}]}, "weaknesses": [{"source": "cve-coordination@incibe.es", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-200"}]}], "references": [{"url": "https://gist.github.com/vmayoral/235c02d0b0ef85a29812eff6980ff80d", "source": "cve-coordination@incibe.es"}, {"url": "https://github.com/ros2/sros2/issues/282", "source": "cve-coordination@incibe.es"}, {"url": "https://gist.github.com/vmayoral/235c02d0b0ef85a29812eff6980ff80d", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-24012.json b/cve/2023/CVE-2023-24012.json index 961a82ddbcf..301aa27fc51 100644 --- a/cve/2023/CVE-2023-24012.json +++ b/cve/2023/CVE-2023-24012.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-24012", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2025-01-09T15:15:11.810", "lastModified": "2025-01-09T15:15:11.810", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "An attacker can arbitrarily craft malicious DDS Participants (or ROS 2 Nodes) with valid certificates to compromise and get full control of the attacked secure DDS databus system by exploiting vulnerable attributes in the configuration of PKCS#7 certificate\u2019s validation. This is caused by a non-compliant implementation of permission document verification used by some DDS vendors. Specifically, an improper use of the OpenSSL PKCS7_verify function used to validate S/MIME signatures."}], "metrics": {"cvssMetricV31": [{"source": "cve-coordination@incibe.es", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L", "baseScore": 8.2, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "LOW"}, "exploitabilityScore": 3.9, "impactScore": 4.2}]}, "weaknesses": [{"source": "cve-coordination@incibe.es", "type": "Primary", "description": [{"lang": "en", "value": "CWE-200"}]}], "references": [{"url": "https://gist.github.com/vmayoral/235c02d0b0ef85a29812eff6980ff80d", "source": "cve-coordination@incibe.es"}, {"url": "https://github.com/ros2/sros2/issues/282", "source": "cve-coordination@incibe.es"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-24012", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2025-01-09T15:15:11.810", "lastModified": "2025-01-09T16:15:31.440", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "An attacker can arbitrarily craft malicious DDS Participants (or ROS 2 Nodes) with valid certificates to compromise and get full control of the attacked secure DDS databus system by exploiting vulnerable attributes in the configuration of PKCS#7 certificate\u2019s validation. This is caused by a non-compliant implementation of permission document verification used by some DDS vendors. Specifically, an improper use of the OpenSSL PKCS7_verify function used to validate S/MIME signatures."}], "metrics": {"cvssMetricV31": [{"source": "cve-coordination@incibe.es", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L", "baseScore": 8.2, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "LOW"}, "exploitabilityScore": 3.9, "impactScore": 4.2}]}, "weaknesses": [{"source": "cve-coordination@incibe.es", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-200"}]}], "references": [{"url": "https://gist.github.com/vmayoral/235c02d0b0ef85a29812eff6980ff80d", "source": "cve-coordination@incibe.es"}, {"url": "https://github.com/ros2/sros2/issues/282", "source": "cve-coordination@incibe.es"}, {"url": "https://gist.github.com/vmayoral/235c02d0b0ef85a29812eff6980ff80d", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-28159.json b/cve/2023/CVE-2023-28159.json index 04584844c88..d3087424636 100644 --- a/cve/2023/CVE-2023-28159.json +++ b/cve/2023/CVE-2023-28159.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-28159", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-02T17:15:12.033", "lastModified": "2024-11-21T07:54:30.473", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "The fullscreen notification could have been hidden on Firefox for Android by using download popups, resulting in potential user confusion or spoofing attacks.
*This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 111."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "baseScore": 4.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 1.4}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionEndExcluding": "111.0", "matchCriteriaId": "4C92D5DB-CF3B-4C0C-918A-D2DE67B898F8"}, {"vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:android:*:*", "versionEndExcluding": "111.0", "matchCriteriaId": "15D61809-2D26-4664-9034-0504D0183F60"}]}]}], "references": [{"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1783561", "source": "security@mozilla.org", "tags": ["Issue Tracking", "Permissions Required", "Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-09/", "source": "security@mozilla.org", "tags": ["Vendor Advisory"]}, {"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1783561", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Issue Tracking", "Permissions Required", "Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-09/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-28159", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-02T17:15:12.033", "lastModified": "2025-01-09T17:15:09.523", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "The fullscreen notification could have been hidden on Firefox for Android by using download popups, resulting in potential user confusion or spoofing attacks.
*This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 111."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "baseScore": 4.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 1.4}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "baseScore": 4.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 1.4}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-1021"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionEndExcluding": "111.0", "matchCriteriaId": "4C92D5DB-CF3B-4C0C-918A-D2DE67B898F8"}, {"vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:android:*:*", "versionEndExcluding": "111.0", "matchCriteriaId": "15D61809-2D26-4664-9034-0504D0183F60"}]}]}], "references": [{"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1783561", "source": "security@mozilla.org", "tags": ["Issue Tracking", "Permissions Required", "Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-09/", "source": "security@mozilla.org", "tags": ["Vendor Advisory"]}, {"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1783561", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Issue Tracking", "Permissions Required", "Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-09/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}, {"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1783561", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "tags": ["Issue Tracking", "Permissions Required", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-28160.json b/cve/2023/CVE-2023-28160.json index 2682a20079d..6285b83c684 100644 --- a/cve/2023/CVE-2023-28160.json +++ b/cve/2023/CVE-2023-28160.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-28160", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-02T17:15:12.077", "lastModified": "2024-11-21T07:54:30.597", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "When following a redirect to a publicly accessible web extension file, the URL may have been translated to the actual local path, leaking potentially sensitive information. This vulnerability affects Firefox < 111."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionEndExcluding": "111.0", "matchCriteriaId": "4C92D5DB-CF3B-4C0C-918A-D2DE67B898F8"}]}]}], "references": [{"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1802385", "source": "security@mozilla.org", "tags": ["Issue Tracking", "Permissions Required", "Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-09/", "source": "security@mozilla.org", "tags": ["Vendor Advisory"]}, {"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1802385", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Issue Tracking", "Permissions Required", "Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-09/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-28160", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-02T17:15:12.077", "lastModified": "2025-01-09T16:15:33.733", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "When following a redirect to a publicly accessible web extension file, the URL may have been translated to the actual local path, leaking potentially sensitive information. This vulnerability affects Firefox < 111."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 3.6}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-425"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionEndExcluding": "111.0", "matchCriteriaId": "4C92D5DB-CF3B-4C0C-918A-D2DE67B898F8"}]}]}], "references": [{"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1802385", "source": "security@mozilla.org", "tags": ["Issue Tracking", "Permissions Required", "Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-09/", "source": "security@mozilla.org", "tags": ["Vendor Advisory"]}, {"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1802385", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Issue Tracking", "Permissions Required", "Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-09/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}, {"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1802385", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "tags": ["Issue Tracking", "Permissions Required", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-28161.json b/cve/2023/CVE-2023-28161.json index 3b246422bab..c5111951f98 100644 --- a/cve/2023/CVE-2023-28161.json +++ b/cve/2023/CVE-2023-28161.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-28161", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-02T17:15:12.120", "lastModified": "2024-11-21T07:54:30.717", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "If temporary \"one-time\" permissions, such as the ability to use the Camera, were granted to a document loaded using a file: URL, that permission persisted in that tab for all other documents loaded from a file: URL. This is potentially dangerous if the local files came from different sources, such as in a download directory. This vulnerability affects Firefox < 111."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "baseScore": 8.8, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-281"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionEndExcluding": "111.0", "matchCriteriaId": "4C92D5DB-CF3B-4C0C-918A-D2DE67B898F8"}]}]}], "references": [{"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1811181", "source": "security@mozilla.org", "tags": ["Issue Tracking", "Permissions Required", "Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-09/", "source": "security@mozilla.org", "tags": ["Vendor Advisory"]}, {"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1811181", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Issue Tracking", "Permissions Required", "Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-09/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-28161", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-02T17:15:12.120", "lastModified": "2025-01-09T16:15:33.927", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "If temporary \"one-time\" permissions, such as the ability to use the Camera, were granted to a document loaded using a file: URL, that permission persisted in that tab for all other documents loaded from a file: URL. This is potentially dangerous if the local files came from different sources, such as in a download directory. This vulnerability affects Firefox < 111."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "baseScore": 8.8, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 5.9}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "baseScore": 8.8, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-281"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-281"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionEndExcluding": "111.0", "matchCriteriaId": "4C92D5DB-CF3B-4C0C-918A-D2DE67B898F8"}]}]}], "references": [{"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1811181", "source": "security@mozilla.org", "tags": ["Issue Tracking", "Permissions Required", "Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-09/", "source": "security@mozilla.org", "tags": ["Vendor Advisory"]}, {"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1811181", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Issue Tracking", "Permissions Required", "Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-09/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}, {"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1811181", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "tags": ["Issue Tracking", "Permissions Required", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-28162.json b/cve/2023/CVE-2023-28162.json index 37cfc2c851b..f6c685f4f70 100644 --- a/cve/2023/CVE-2023-28162.json +++ b/cve/2023/CVE-2023-28162.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-28162", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-02T17:15:12.160", "lastModified": "2024-11-21T07:54:30.837", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "While implementing AudioWorklets, some code may have casted one type to another, invalid, dynamic type. This could have led to a potentially exploitable crash. This vulnerability affects Firefox < 111, Firefox ESR < 102.9, and Thunderbird < 102.9."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "baseScore": 8.8, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-704"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionEndExcluding": "111.0", "matchCriteriaId": "4C92D5DB-CF3B-4C0C-918A-D2DE67B898F8"}, {"vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "versionEndExcluding": "102.9", "matchCriteriaId": "58A3D950-1352-42E9-9EB7-2093771B3C43"}, {"vulnerable": true, "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "versionEndExcluding": "102.9", "matchCriteriaId": "240CD7F0-941B-4C7D-8AAE-E0E65D014D7A"}]}]}], "references": [{"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1811327", "source": "security@mozilla.org", "tags": ["Issue Tracking", "Permissions Required", "Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-09/", "source": "security@mozilla.org", "tags": ["Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-10/", "source": "security@mozilla.org", "tags": ["Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-11/", "source": "security@mozilla.org", "tags": ["Vendor Advisory"]}, {"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1811327", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Issue Tracking", "Permissions Required", "Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-09/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-10/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-11/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-28162", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-02T17:15:12.160", "lastModified": "2025-01-09T16:15:34.110", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "While implementing AudioWorklets, some code may have casted one type to another, invalid, dynamic type. This could have led to a potentially exploitable crash. This vulnerability affects Firefox < 111, Firefox ESR < 102.9, and Thunderbird < 102.9."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "baseScore": 8.8, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 5.9}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "baseScore": 8.8, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-704"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-843"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionEndExcluding": "111.0", "matchCriteriaId": "4C92D5DB-CF3B-4C0C-918A-D2DE67B898F8"}, {"vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "versionEndExcluding": "102.9", "matchCriteriaId": "58A3D950-1352-42E9-9EB7-2093771B3C43"}, {"vulnerable": true, "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "versionEndExcluding": "102.9", "matchCriteriaId": "240CD7F0-941B-4C7D-8AAE-E0E65D014D7A"}]}]}], "references": [{"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1811327", "source": "security@mozilla.org", "tags": ["Issue Tracking", "Permissions Required", "Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-09/", "source": "security@mozilla.org", "tags": ["Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-10/", "source": "security@mozilla.org", "tags": ["Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-11/", "source": "security@mozilla.org", "tags": ["Vendor Advisory"]}, {"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1811327", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Issue Tracking", "Permissions Required", "Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-09/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-10/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-11/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}, {"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1811327", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "tags": ["Issue Tracking", "Permissions Required", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-28163.json b/cve/2023/CVE-2023-28163.json index f819eb807c0..2008b65f671 100644 --- a/cve/2023/CVE-2023-28163.json +++ b/cve/2023/CVE-2023-28163.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-28163", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-02T17:15:12.207", "lastModified": "2024-11-21T07:54:30.960", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "When downloading files through the Save As dialog on Windows with suggested filenames containing environment variable names, Windows would have resolved those in the context of the current user.
*This bug only affects Firefox on Windows. Other versions of Firefox are unaffected.*. This vulnerability affects Firefox < 111, Firefox ESR < 102.9, and Thunderbird < 102.9."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionEndExcluding": "111.0", "matchCriteriaId": "4C92D5DB-CF3B-4C0C-918A-D2DE67B898F8"}, {"vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "versionEndExcluding": "102.9", "matchCriteriaId": "58A3D950-1352-42E9-9EB7-2093771B3C43"}, {"vulnerable": true, "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "versionEndExcluding": "102.9", "matchCriteriaId": "240CD7F0-941B-4C7D-8AAE-E0E65D014D7A"}]}]}], "references": [{"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1817768", "source": "security@mozilla.org", "tags": ["Issue Tracking", "Permissions Required", "Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-09/", "source": "security@mozilla.org", "tags": ["Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-10/", "source": "security@mozilla.org", "tags": ["Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-11/", "source": "security@mozilla.org", "tags": ["Vendor Advisory"]}, {"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1817768", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Issue Tracking", "Permissions Required", "Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-09/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-10/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-11/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-28163", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-02T17:15:12.207", "lastModified": "2025-01-09T16:15:34.343", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "When downloading files through the Save As dialog on Windows with suggested filenames containing environment variable names, Windows would have resolved those in the context of the current user.
*This bug only affects Firefox on Windows. Other versions of Firefox are unaffected.*. This vulnerability affects Firefox < 111, Firefox ESR < 102.9, and Thunderbird < 102.9."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 3.6}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-22"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionEndExcluding": "111.0", "matchCriteriaId": "4C92D5DB-CF3B-4C0C-918A-D2DE67B898F8"}, {"vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "versionEndExcluding": "102.9", "matchCriteriaId": "58A3D950-1352-42E9-9EB7-2093771B3C43"}, {"vulnerable": true, "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "versionEndExcluding": "102.9", "matchCriteriaId": "240CD7F0-941B-4C7D-8AAE-E0E65D014D7A"}]}]}], "references": [{"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1817768", "source": "security@mozilla.org", "tags": ["Issue Tracking", "Permissions Required", "Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-09/", "source": "security@mozilla.org", "tags": ["Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-10/", "source": "security@mozilla.org", "tags": ["Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-11/", "source": "security@mozilla.org", "tags": ["Vendor Advisory"]}, {"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1817768", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Issue Tracking", "Permissions Required", "Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-09/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-10/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-11/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}, {"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1817768", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "tags": ["Issue Tracking", "Permissions Required", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-28547.json b/cve/2023/CVE-2023-28547.json index 6d8beb7bbfd..a6ffb1d0035 100644 --- a/cve/2023/CVE-2023-28547.json +++ b/cve/2023/CVE-2023-28547.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-28547", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-04-01T15:15:46.473", "lastModified": "2024-11-21T07:55:23.513", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Memory corruption in SPS Application while requesting for public key in sorter TA."}, {"lang": "es", "value": "Corrupci\u00f3n de la memoria en la aplicaci\u00f3n SPS al solicitar la clave p\u00fablica en el clasificador TA."}], "metrics": {"cvssMetricV31": [{"source": "product-security@qualcomm.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 8.4, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.5, "impactScore": 5.9}]}, "weaknesses": [{"source": "product-security@qualcomm.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-120"}]}], "references": [{"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2024-bulletin.html", "source": "product-security@qualcomm.com"}, {"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2024-bulletin.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-28547", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-04-01T15:15:46.473", "lastModified": "2025-01-09T16:17:24.953", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Memory corruption in SPS Application while requesting for public key in sorter TA."}, {"lang": "es", "value": "Corrupci\u00f3n de la memoria en la aplicaci\u00f3n SPS al solicitar la clave p\u00fablica en el clasificador TA."}], "metrics": {"cvssMetricV31": [{"source": "product-security@qualcomm.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 8.4, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.5, "impactScore": 5.9}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.8, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "product-security@qualcomm.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-120"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-787"}]}], "configurations": [{"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:315_5g_iot_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "58DD55C5-DDF3-4C9E-9084-694543AEFB4E"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:315_5g_iot:-:*:*:*:*:*:*:*", "matchCriteriaId": "00E63554-F1C6-4241-B7B8-00C889ADB35E"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:9205_lte_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BA1C725-EA2C-488F-AAAC-2781095AC134"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:9205_lte:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB62156B-B4B6-42C7-9AE8-4FF40F735C1A"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:apq8017_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FEDA6CA-A0FD-4A72-B856-C8E65AC86902"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:apq8017:-:*:*:*:*:*:*:*", "matchCriteriaId": "8D29295A-7183-46BE-B4EE-F891D1C17ED9"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:apq8037_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEE0D211-0EF0-441A-9E10-3DE578811250"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:apq8037:-:*:*:*:*:*:*:*", "matchCriteriaId": "A594A57E-525C-451C-B3BA-567E0F757968"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:apq8064au_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CDCB8499-A096-4633-8506-63C0A227A958"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:apq8064au:-:*:*:*:*:*:*:*", "matchCriteriaId": "BEE2C7C3-E928-4466-B537-0D1826E2223C"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC6FCE91-BF38-49ED-8FFB-429BAFEE7832"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "715A9F94-5F9E-45E5-B07B-699410C01478"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:ar8031_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FCE1ADA9-8042-4CDE-A2B9-E96665CB41BE"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:ar8031:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB1DE046-DD70-4ACA-9DF4-59939DAC1889"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:c-v2x_9150_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A725088-FC3B-4439-9189-72AA10954721"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:c-v2x_9150:-:*:*:*:*:*:*:*", "matchCriteriaId": "B80D6366-4C0C-4C0D-9A38-769C66D62F0F"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA42F2EA-5D00-42B8-B020-C27675B72915"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:csra6620:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFCF207D-B8C8-4860-89C7-673C821F0237"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8A35ECF-B12E-42DE-A74B-2C3BE03639A4"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:csra6640:-:*:*:*:*:*:*:*", "matchCriteriaId": "65B283D6-B2D2-49B6-98A8-08EDB54C1F15"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:csrb31024_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EBF42F8-50BA-4172-A3A0-7FD1BA4B3ED3"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:csrb31024:-:*:*:*:*:*:*:*", "matchCriteriaId": "770F3924-BE27-4BDE-B922-680B3C9753EB"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CDE1CBDE-3D28-463C-B215-AA7DF373EF09"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:fastconnect_6200:-:*:*:*:*:*:*:*", "matchCriteriaId": "66BD3B88-7CF9-482D-A2DD-67F6ACF4CC57"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "82B82E87-F3F4-466F-A76B-C8809121FF6F"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*", "matchCriteriaId": "419A132E-E42C-4395-B74B-788A39DF1D13"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D89F035A-2388-48FC-AEBB-8429C6880F4A"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:fastconnect_6800:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA13EF4E-AAE6-45F4-9E41-78310E37CE81"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*", "matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*", "matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:flight_rb5_5g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD5C60F1-5B7F-4AB0-9863-720A1972563E"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:flight_rb5_5g:-:*:*:*:*:*:*:*", "matchCriteriaId": "C43A4F08-1E8A-4CEF-8E61-4152ED78E600"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:fsm10056_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0EF47C0-45AA-4B1C-B9E8-A83E5D9938F9"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:fsm10056:-:*:*:*:*:*:*:*", "matchCriteriaId": "A78E2A04-CD5D-4963-A45D-B111DD5E0B44"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:home_hub_100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EFFEA50-D8F0-49DB-AF22-EBC2DA8C634D"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:home_hub_100:-:*:*:*:*:*:*:*", "matchCriteriaId": "D57A69BF-7FBF-4519-94DA-A2C1766B48EC"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:mdm9205s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0AEA758D-ECAD-4973-9586-2621CC3B2BA2"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:mdm9205s:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4F1EED8-567D-4E1B-92D6-37ADE97B06FC"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FD1C359-C79B-4CE8-A192-5AA34D0BF05B"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*", "matchCriteriaId": "716B747E-672C-4B95-9D8E-1262338E67EA"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "35B7E25E-FA92-4C36-883C-CFF36F4B3507"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECD99C6F-2444-4A5E-A517-0C8023DDF23D"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CA1E7B0-782B-4757-B118-802943798984"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*", "matchCriteriaId": "95CB08EC-AE12-4A54-AA3C-998F01FC8763"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:pm8937_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4558B01C-171D-47F7-8831-E9C53BC953BF"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:pm8937:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B8E31E7-9ED7-4F8E-ADC8-60C087F4E340"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3723C7B1-A7E2-401F-8D6D-189350F6BCA5"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qam8255p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B12B89EF-7B12-481E-BCBC-F12B9D16321A"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2D9E281-B382-41AC-84CB-5B1063E5AC51"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qam8295p:-:*:*:*:*:*:*:*", "matchCriteriaId": "44EBEBD5-98C3-493B-A108-FD4DE6FFBE97"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "295E75BD-2A6C-4A76-A376-A9977DDB17FF"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qam8650p:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD37AA1A-B911-45BF-9BCC-C772FA83E657"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "49B2DF91-BE6B-4E9E-B63C-98DADD29AD6B"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qam8775p:-:*:*:*:*:*:*:*", "matchCriteriaId": "58170126-928F-4AE5-B5AF-5ED4710F9BA2"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qamsrv1h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8673334-5E11-4E95-B33D-3029499F71DF"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qamsrv1h:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC0B32F6-5EF0-4591-99D7-D0E9B09DEC5A"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qamsrv1m_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE03AB2A-3ED9-4489-8E5B-4FCF8BAA8559"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qamsrv1m:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E646738-6A87-4470-9640-6A5A1DF3AF78"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca4004_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DFB39496-8699-4DAF-BD7B-AE69260B20CB"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca4004:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9CFBC24-5F15-40DE-806E-62C1EE808992"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FF653D0-15CF-4A10-8D8E-BE56F4DAB890"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*", "matchCriteriaId": "C31FA74C-6659-4457-BC32-257624F43C66"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6234_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "912215EB-CF3C-4AA4-B3F5-2EB19B131427"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6234:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2C7FE6F-6106-4EF3-9925-95B25D047418"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6310_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "62DC4FBB-D9CB-43EB-829E-0A892306D0E2"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6310:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B0F8ED6-EAE7-44EA-A8C6-F5AD408261F0"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6320_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "886CF046-E1D9-4FD4-AC02-EAB61C3F70FD"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6320:-:*:*:*:*:*:*:*", "matchCriteriaId": "059486E9-3F99-4C65-A763-470564EDAF2C"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6335_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "966CDA56-809F-4FF4-909D-0DD92F44CF67"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6335:-:*:*:*:*:*:*:*", "matchCriteriaId": "C90747B4-2CC0-4816-A994-58E00F5ADA05"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "83B53119-1B2F-4978-B7F5-33B84BE73B68"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FEBC0C5-CAA1-475C-96C2-B8D24B2E4536"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E16994A-6DBA-426C-ADD2-B1E8B49FEDBF"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6420:-:*:*:*:*:*:*:*", "matchCriteriaId": "47E674DE-55AB-44E5-8E00-C804FC9D4DC0"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6421_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "503CEDEF-99D0-4432-88A0-295340743606"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6421:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE9115A0-0D87-49BE-9A9B-091DBF8D9E6E"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A344E78F-D15A-460E-8EF8-7C6FC39F2D5E"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FF5EC23-4884-4C2B-8E77-50B1E8E28A3D"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "95AFC483-1468-43FC-96FA-A56165C290E0"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6430:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A963FDF-6FF4-4F48-834E-2A14D241716D"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6431_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "76FD6A24-B6F4-4C65-968F-AFF90A1A60B8"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6431:-:*:*:*:*:*:*:*", "matchCriteriaId": "34661A30-92C3-4F0D-ABD1-8DA8E928DFF9"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "04F574BC-9AB2-4B83-A466-556ECEBBD3DF"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*", "matchCriteriaId": "A34D021D-C043-4EFD-9AB3-B2174528CBA3"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6564_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "00FE294D-4BE0-4436-9273-507E760884EC"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6564:-:*:*:*:*:*:*:*", "matchCriteriaId": "424CB795-58E5-43A4-A2EC-C563D93C5E72"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "886124F6-B397-4EB6-8E01-6012E468ABE9"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6564a:-:*:*:*:*:*:*:*", "matchCriteriaId": "93ED74CE-6BF2-4983-8780-07D5336745B3"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B59672A0-2FA6-46CC-B75A-C599B842AFB9"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*", "matchCriteriaId": "3847F4A5-90A5-4C84-B43F-0DDD81BD79CE"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B828AC8-4A01-4537-B2BD-8180C99F5C32"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*", "matchCriteriaId": "66C16E1E-9D4A-4F20-B697-833FDCCA86FB"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "828CFB37-76A6-4927-9D00-AF9A1C432DD6"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*", "matchCriteriaId": "11405993-5903-4716-B452-370281034B42"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*", "matchCriteriaId": "8374DDB3-D484-4141-AE0C-42333D2721F6"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C3DDA896-576C-44B8-85B6-F71F473F776B"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*", "matchCriteriaId": "51A87BDA-5B24-4212-BAB3-D2BBB2F4162E"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "643EC76D-2836-48E6-81DA-78C4883C33CA"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*", "matchCriteriaId": "477F6529-4CE1-44FC-B6EE-D24D44C71AE7"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "288F637F-22F8-47CF-B67F-C798A730A1BD"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0996EA3-1C92-4933-BE34-9CF625E59FE7"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6678aq_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D001127D-8160-42F0-B8B9-2FAA2976B530"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6678aq:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9EB615F-FD4C-450B-AB25-E936FD9816C4"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E23922D-C37F-476F-A623-4C1458A9156F"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5FA1F8F4-EAF2-4704-A8A6-19AD3CA1B577"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3F7853D-09EE-476F-B48D-BB30AEB4A67D"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6797aq_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "797295C2-535C-46A9-A725-E1A5405F0436"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6797aq:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BFC575E-594E-4711-94B1-2DC8D03B9AC4"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D1C53DC-D2F3-4C92-9725-9A85340AF026"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED0585FF-E390-46E8-8701-70964A4057BB"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2FA8F9DA-1386-4961-B9B2-484E4347852A"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*", "matchCriteriaId": "117289C8-7484-4EAE-8F35-A25768F00EED"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4D2B46E-3996-42FD-B932-09E92C02EC8A"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E58C63-F253-4DCC-8A14-48FEB64B4C3D"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca9379_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "25565FDA-651D-4A05-8B1E-2188B6921253"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca9379:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8D49750-BBEA-4A3D-9898-28B7A50A7F42"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A75D017-032F-4369-917C-567EE2A809F2"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*", "matchCriteriaId": "107F0423-608C-404D-B58B-616A6494418F"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcm2150_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "723EAD03-6C32-4B1C-95C1-6FDA94F08151"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcm2150:-:*:*:*:*:*:*:*", "matchCriteriaId": "FBB4BB6E-8AF2-433A-A36C-0711598602BC"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcm2290_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5AB1F0FA-25F3-4304-A3BC-5264E55CC092"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcm2290:-:*:*:*:*:*:*:*", "matchCriteriaId": "214A053F-D80C-4AD9-B4F1-83384095A3F3"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcm4290_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C7FFB96-53E7-41A2-BC99-7ACD853214A8"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcm4290:-:*:*:*:*:*:*:*", "matchCriteriaId": "74EBA77E-69A5-4145-9BEC-CD39BA132309"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcm4325_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2D8044B-D4E5-4174-A0FB-478F8434EE8F"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcm4325:-:*:*:*:*:*:*:*", "matchCriteriaId": "163FE96E-DF5B-4B67-8EDE-44A5B9A8492D"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcm4490_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA506489-4338-44DF-8F92-12E60AF0048C"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcm4490:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8718C37-A82A-4A08-A887-3F22B37601A9"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcm5430_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EC5F81B-AA24-4E3C-9FC8-53E010AC977E"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcm5430:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5C66DAD-0D85-46B8-92D7-6D68B9429E9A"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB226552-52D9-44F5-A170-35C44761A72B"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcm6125:-:*:*:*:*:*:*:*", "matchCriteriaId": "FBB16DC4-CDC9-4936-9C6A-0ED8E1F6D056"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ADD6D51E-5787-42A6-8A02-4EBBAFFF9C94"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*", "matchCriteriaId": "99AA0291-B822-4CAD-BA17-81B632FC3FEF"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "646B241B-2971-4929-9FB6-7A4CBF801CBB"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcm8550:-:*:*:*:*:*:*:*", "matchCriteriaId": "5654FFB5-9A89-4399-AFAB-0A26726DEC81"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A49DBE04-E2EA-4DA1-B774-A878A71524AC"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcn6024:-:*:*:*:*:*:*:*", "matchCriteriaId": "69E98386-3BB2-4E8C-AD00-E05123608439"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F4362D2-30A3-4388-ABB6-293878AD7036"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcn6224:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB6AE9A7-386A-473B-9BD5-DA37B1E696C5"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "88376C1D-AC4D-4EB0-AF6A-274D020F5859"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcn6274:-:*:*:*:*:*:*:*", "matchCriteriaId": "E15BA4B4-C97F-45C0-A4AD-7E46387F19A6"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcn7606_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F466A5BD-1912-4811-9A93-81555F101D46"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcn7606:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F92914E-16F6-4A25-9FEF-FB7CB3377132"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcn9011_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9306C34D-47E4-40CF-89F4-BA5263655D13"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcn9011:-:*:*:*:*:*:*:*", "matchCriteriaId": "02BA009F-24E1-4953-BA95-2A5BC1CDBDBB"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "61F34DD2-9DC0-49E5-BC85-1543EA199477"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcn9012:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A06879F-6FE9-448A-8186-8347D76F872B"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A64CDA49-19BF-413F-A0E0-2B9729E45E25"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcn9024:-:*:*:*:*:*:*:*", "matchCriteriaId": "345CCD64-C09E-407D-AAA2-311C4CCFE24F"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "65303C2D-C6BF-47CB-8146-E240CB8BBE42"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcn9074:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6B03022-497A-4F42-BB4D-5624EA7DF1B9"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcs2290_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "93CDB7BC-89F2-4482-B8E3-9DDBD918C851"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcs2290:-:*:*:*:*:*:*:*", "matchCriteriaId": "76E03AE9-2485-449B-BCFD-3E452BB01FC6"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC43BB27-0516-4750-A4C2-C45298441398"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcs410:-:*:*:*:*:*:*:*", "matchCriteriaId": "969585DE-93D6-4406-A632-D838ECD4D5AD"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "06789CB9-E6FA-400D-90B6-C2DB6C8EF153"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcs4290:-:*:*:*:*:*:*:*", "matchCriteriaId": "FFCB9F22-57F2-4327-95B9-B2342A02E45E"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3336CDD7-9E7B-4FFB-A5CE-594B19B63A6C"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcs4490:-:*:*:*:*:*:*:*", "matchCriteriaId": "1197E229-1E27-4CA3-A386-B77FAE5DFE1A"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcs5430_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6926498-667C-4866-B3DD-A7E20B8F4D7F"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcs5430:-:*:*:*:*:*:*:*", "matchCriteriaId": "CEFEBC7A-80C0-4E4F-B9C7-53EECF86B6B5"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E634F59C-6817-4898-A141-082044E66836"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*", "matchCriteriaId": "29762819-EC90-499C-A8C6-1423DE3FE6B9"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4468EA5D-87B0-4FEC-A3DB-617651B0D169"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcs6125:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DA2C3E1-E285-4CAD-9FA3-813C8EC436F6"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "403AE561-6C9E-49F3-A5D6-C48DDD51D663"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FAC140F-FC5E-4C88-B777-7F5EBF49A695"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcs7230_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B92C311A-306B-43C9-ACBA-B1B390927C6A"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcs7230:-:*:*:*:*:*:*:*", "matchCriteriaId": "F68F9B33-6BA5-46E1-A370-547CDA626985"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcs8155_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "487E7EA3-CE9C-4DB9-97D9-A74406C8BC9B"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcs8155:-:*:*:*:*:*:*:*", "matchCriteriaId": "644A4FF4-1494-480B-BDBA-22CC13C4E8EF"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcs8250_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CDDD37F-4C3A-4955-9AFB-7774021A0198"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcs8250:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D13E375-0562-4263-8452-53E117F14E83"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FFF23DDB-98A0-4343-ADD3-5AB9C2383E7E"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcs8550:-:*:*:*:*:*:*:*", "matchCriteriaId": "5ACB8AFB-5B91-4AA1-BA3A-1AF0B3503080"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qdu1000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "407EE4D5-1F52-40D6-B85A-E49915D6EF2D"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qdu1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "5846C9DD-63E5-482D-BE01-3A1E89CC0EDE"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qdu1010_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B6A4AA9-E35B-4B25-9FD3-BFB907B822DB"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qdu1010:-:*:*:*:*:*:*:*", "matchCriteriaId": "5AC8538B-6663-4CF7-BD4A-9766C04CBAB5"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qdu1110_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F5F9F3D-1F57-4D16-972E-AF39E438E4C3"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qdu1110:-:*:*:*:*:*:*:*", "matchCriteriaId": "53D6BEFE-AA21-4786-B11C-A6683AC06622"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qdu1210_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "32E0EBD5-A846-44F9-9DEC-1C6711C96A5B"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qdu1210:-:*:*:*:*:*:*:*", "matchCriteriaId": "C68F8102-788C-4EF3-83E4-56DF764DFFBC"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qdx1010_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B7AB84B-55D0-45EB-ABA8-F69E5179507E"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qdx1010:-:*:*:*:*:*:*:*", "matchCriteriaId": "B908A65E-F3B2-417A-91EE-1BE855BABD2E"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qdx1011_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6554B2E1-AE96-40CE-A19F-C7516CDBC41A"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qdx1011:-:*:*:*:*:*:*:*", "matchCriteriaId": "1991232B-B58F-481E-A7EE-0546E64C12CC"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qep8111_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BEB4913D-940F-49CC-951A-9704CCEE636C"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qep8111:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E93E1D2-4546-4D60-B53D-20CF09551766"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7456782E-B6CE-42ED-A51E-39907120E28B"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*", "matchCriteriaId": "637BF4DF-BB40-479F-B696-6AD9D4B35D64"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D72C4CE0-AB59-4652-854F-94C9998F2712"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qfw7124:-:*:*:*:*:*:*:*", "matchCriteriaId": "98720774-11B8-4B4B-BC73-D4DA84E07F78"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qrb5165m_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9CC1C8B-F642-4068-B9E3-ECE027486E45"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qrb5165m:-:*:*:*:*:*:*:*", "matchCriteriaId": "A60F8378-B827-4557-B891-A8A02F8F2A25"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qrb5165n_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "97BB1EB7-D194-4FE2-B4F6-A7A52F344DDE"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qrb5165n:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA2C90E7-0F3A-43BB-ABF7-63CEA7A85ADA"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qru1032_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8ECC6966-23CF-4189-81B3-477A97E38B05"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qru1032:-:*:*:*:*:*:*:*", "matchCriteriaId": "01490429-D26C-4F80-83A4-8DC257142B86"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qru1052_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EAAB699-BFDA-465B-9B82-5E957C67D52A"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qru1052:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D2C3994-110F-40FA-B60F-D2C85A36E256"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qru1062_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C81773C-4A1C-4589-A6FD-A85770F3ADFE"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qru1062:-:*:*:*:*:*:*:*", "matchCriteriaId": "CABCCB94-8C93-4CF1-9EA1-D410FF6ACD72"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qsm8250_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C194363-7FDE-43C9-B6FE-2BD6B474816F"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qsm8250:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8CC9433-6B33-4B9C-8EC3-BBBB43897E5C"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qsm8350_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1894F6B9-31DA-44E8-AA28-064F73EBEE8D"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qsm8350:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AA23845-D9F5-4035-8A93-F475D865586F"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qts110_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2D4B026-2118-448D-A48D-36864DE715B8"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qts110:-:*:*:*:*:*:*:*", "matchCriteriaId": "5ED10480-E005-452C-A03C-D669CE94ABE4"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:215_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "492AAB72-7E31-4711-9873-D97B76D77F53"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:215_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "12B165C3-4EE1-4E0B-9255-913AC805D141"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:video_collaboration_vc1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "25811F6A-AC23-4DCC-A987-B91E98EA7FB0"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:video_collaboration_vc1:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB0C4385-336B-4E10-B776-0AE51EBB6A12"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:video_collaboration_vc3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "77397AFD-F4B1-437E-AB50-99EE6F305859"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:video_collaboration_vc3:-:*:*:*:*:*:*:*", "matchCriteriaId": "50FAF626-07C9-42CB-B92B-C263D66CF27D"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:video_collaboration_vc5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4A3D6E5-8D3B-41D8-A6A6-596F35E34D7C"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:video_collaboration_vc5:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D55041D-7CD4-446D-B6F2-EB89EF75D10F"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:robotics_rb3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "01264215-1B23-4406-B5A2-2C0A7B4E9937"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:robotics_rb3:-:*:*:*:*:*:*:*", "matchCriteriaId": "F67FE29B-D218-4B32-B881-79262BD6BFA1"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:robotics_rb5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "71CFA659-DE2C-4AA0-8AAD-75033B2F4663"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:robotics_rb5:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C3E952A-9CA6-4A41-820C-9756B453DECF"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sa4150p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0DC99C0C-8AE3-4918-B91D-2C26990FE931"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sa4150p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A558A868-1B67-48D2-8A94-FDEA7126FAE7"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sa4155p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8D28764-EF4F-4FB3-B936-B42397450EFD"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sa4155p:-:*:*:*:*:*:*:*", "matchCriteriaId": "7964A762-467B-47D7-865F-30D48A0AE47C"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C66671C1-AE1A-44BE-9DB2-0B09FF4417DB"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*", "matchCriteriaId": "74AA3929-3F80-4D54-B13A-9B070D5C03BB"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "054F77D6-FC66-4151-9005-DC7ECDB5C722"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8ED3F589-16D9-46A7-A539-C9862473EE0D"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C40544E-B040-491C-8DF3-50225E70B50C"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sa6155:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2DAC85C-CDC9-4784-A69A-147A2CE8A8B2"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DC40C14-3B2D-4E00-9E0F-86E6BDBF2D81"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0514D433-162C-4680-8912-721D19BE6201"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sa7255p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2B651F0A-34DA-400F-A376-B499BFDF8E86"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sa7255p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CFF093D-98C8-470F-8330-E5126E06343A"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A71D74B0-0963-49FD-8E97-148C8993B263"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sa8145p:-:*:*:*:*:*:*:*", "matchCriteriaId": "910CBFA4-50F7-4C7A-B9B9-B88C8A919827"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "69C1B02F-8D2D-42E7-B70D-41F4D9844FD1"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*", "matchCriteriaId": "3FEACAA9-C061-4713-9A54-37D8BFC0B00B"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F33EB594-B0D3-42F2-B1CA-B0E6C9D82C6B"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sa8155:-:*:*:*:*:*:*:*", "matchCriteriaId": "50EF47E5-2875-412F-815D-44804BB3A739"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8648B38-2597-401A-8F53-D582FA911569"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A01CD59B-8F21-4CD6-8A1A-7B37547A8715"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "51BC0A66-493B-43BE-B51F-640BDF2FF32E"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8DA4D12-7ABF-4A04-B44E-E1D68C8E58AB"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC6E268D-C4AF-4950-9223-39EA36D538A8"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sa8255p:-:*:*:*:*:*:*:*", "matchCriteriaId": "073C1A81-D02B-4F2F-9378-CD1B2DCE0E5B"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A19659B-A0C3-44B7-8D54-BA21729873A4"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sa8295p:-:*:*:*:*:*:*:*", "matchCriteriaId": "F978041A-CE28-4BDF-A7DB-F0360F1A5F14"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sa8540p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FE8B62D-83B4-4326-8A53-FED5947D5FFE"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sa8540p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D6F8899-136A-4A57-9F02-BD428E1663DA"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sa8620p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6ACE6D64-A498-482F-8270-718F4884CFFD"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sa8620p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6E016D6-1B83-4261-A27E-1F9873F81E14"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sa8650p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0E807AA-5646-48AD-9A5C-B0B13E222AA9"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sa8650p:-:*:*:*:*:*:*:*", "matchCriteriaId": "45FBB72B-B850-4E3F-ACBB-9392157FF131"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "781CCC31-C08F-499B-BE73-6C7DB70437AF"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sa8770p:-:*:*:*:*:*:*:*", "matchCriteriaId": "75AFAA21-0589-4C6A-9418-34EE8A61BBAD"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C79595B-1259-4431-96F9-C5A24E624305"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sa8775p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F2F3431-9CD7-4D4F-833D-DD4D3ACF94C7"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A024AB04-B213-4018-A4C1-FA467C7BA775"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sa9000p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2A8AB7C-5D34-4794-8C06-2193075B323F"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sc8180x\\+sdx55_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C751ABFE-3B9B-472B-A10C-277270790D95"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sc8180x\\+sdx55:-:*:*:*:*:*:*:*", "matchCriteriaId": "C819454D-D413-478A-B78D-CFF6994803A1"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sc8380xp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "14E3FE58-7F1C-4F5C-B62D-0CF124E14AB2"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sc8380xp:-:*:*:*:*:*:*:*", "matchCriteriaId": "FFCB0BBA-3F81-4FCA-B3DE-190C46DA50DB"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sd_455_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3EF9964-D615-473E-A289-8A01D91D87AA"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sd_455:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C177163-B6E6-42D8-8969-C2F9832C6701"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F900C8F-9763-441A-B97E-E5394A68A08A"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sd_675:-:*:*:*:*:*:*:*", "matchCriteriaId": "589C1001-E9F6-41A6-BCC8-A94A3C97F2E6"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "76910884-45D9-4EA2-BA30-44A8C7CC1339"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sd_8_gen1_5g:-:*:*:*:*:*:*:*", "matchCriteriaId": "33D393A6-4586-4416-86EB-F9D86DC3DED8"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sd460_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "52036768-810C-40C2-9213-8397A4073703"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sd460:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE8AB22C-54EA-4D61-B6F9-7BC45820D29E"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sd626_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9043720-6B49-4305-BB4F-C88CCB6D89E9"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sd626:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC8F19D3-F322-4CDC-83C5-A9F7F1777DAD"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sd660_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3991C516-4FBE-43D8-835F-413FE45BF73E"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sd660:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9CF5EBB-B25A-4A76-B522-951F108263CC"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sd662_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7BE7001-5539-4C5E-A064-6E62023803AE"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sd662:-:*:*:*:*:*:*:*", "matchCriteriaId": "06661DAC-5D22-433E-B5EC-486931E265B4"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sd670_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B8DA94C-23A0-4C99-9F05-144B9B5224B3"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sd670:-:*:*:*:*:*:*:*", "matchCriteriaId": "39E10E22-E7CC-41D6-80F3-030083F45645"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sd675_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1497D052-884E-496B-BEF8-6904A25125ED"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sd675:-:*:*:*:*:*:*:*", "matchCriteriaId": "589F4888-28F6-4ECA-860E-8054C2A8C419"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sd730_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC4DA7EA-DB81-4C71-A875-2612D8D7D726"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sd730:-:*:*:*:*:*:*:*", "matchCriteriaId": "48F26F64-98D4-420A-8918-E5E56ABA1D47"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sd820_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC508C49-0B76-43A8-B2AF-0F8EB989E238"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sd820:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9665200-D306-4EEB-9F42-6C5963524179"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sd821_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A54F4A3-19E3-4825-98C7-DA632D692A06"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sd821:-:*:*:*:*:*:*:*", "matchCriteriaId": "028CD81A-0D9D-40B0-9E2F-DC8689607B24"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sd835_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DA605FD-B801-43BB-B52D-879013F7F57E"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sd835:-:*:*:*:*:*:*:*", "matchCriteriaId": "908BFD96-0423-4AFC-B8F3-105B2D5B4C73"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "42B30014-95AB-4F24-A7A5-60A907502609"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*", "matchCriteriaId": "F562ED3D-CBE3-4DCC-BFBB-DE0AD2425A9C"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "72433485-B229-46A6-BCA4-394AA4EEA683"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*", "matchCriteriaId": "04D40EC4-BF31-4BFD-8D0A-8193F541AF02"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "79219DA5-0D09-4CEF-AEFD-917F269AE7DF"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sd888:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D30BACF-71C1-4A6D-8811-9AD708A98307"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7E52771-4FB7-45DB-A349-4DD911F53752"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:*", "matchCriteriaId": "72F6CE39-9299-4FC3-BC48-11F79034F2E4"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E93FB34B-3674-404D-9687-E092E9A246AB"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3FF5A9A-A34A-499C-B6E0-D67B496C5454"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sg4150p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9279F02F-6C30-4891-8941-97003DE9C8C7"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sg4150p:-:*:*:*:*:*:*:*", "matchCriteriaId": "FFA7BB42-305C-451F-92D8-0718DF68A012"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8509F3A3-A1CA-466B-9031-4146C36B9AF8"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sg8275p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1813AB7-44F5-476B-9533-536F5B2F26BB"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sm4125_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2B93301-AFE8-409B-A8C8-6754BE5A0C14"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sm4125:-:*:*:*:*:*:*:*", "matchCriteriaId": "B185412C-177F-48E2-87F9-1269E0FB8E31"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FACA2BF1-85D3-447F-A08D-B90330A22550"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sm6250:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2ABA18D-82C1-4366-B1D7-DED42DD3D5C5"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sm6250p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3FB2972-94B6-4716-BA96-4B452BA3990F"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sm6250p:-:*:*:*:*:*:*:*", "matchCriteriaId": "57F4F872-094E-4E27-BB89-D8251FAFB713"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sm6370_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FCB558B-F8E3-4846-8869-51F0268D1EE1"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sm6370:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5F9A9AA-65AC-4331-9A76-8AF86C8D2E98"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "76DB5472-DF51-4144-8A69-9B231CF782DA"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D395018-251C-45AA-9EE8-A638CAB0B508"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sm7315_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4508742-7D97-43D8-B8F5-041F4C588723"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sm7315:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF8C63E8-169F-4164-BD49-348ED894813F"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BEC725F-19B1-4078-B13D-CE624BE23344"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sm7325p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EA43E38-A12D-49C3-B05C-A2AF07ED2710"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4CDD6A2-5A3C-4572-8CE1-2F102333BB79"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sm8550p:-:*:*:*:*:*:*:*", "matchCriteriaId": "699E5D17-6144-4F0A-8D52-1E8C83990E52"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:smart_audio_400_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF7A6EE4-D951-480F-8F68-D49983C911D6"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:smart_audio_400:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FD155BC-1157-4DEA-940A-FB8BD117D4C6"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:smart_display_200_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "13B56F26-ABA3-453C-8B69-2D9B044A3ECB"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:smart_display_200:-:*:*:*:*:*:*:*", "matchCriteriaId": "E01002F4-2FB0-46A9-A007-F6EA347E6CE2"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_4_gen_1_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "227113B6-BED5-4415-ACE5-192315EC214E"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_4_gen_1_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "65A640F4-373F-4358-92A6-F10C96A209AA"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_4_gen_2_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C120BFA0-D702-4305-817E-AEF5859D16A2"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_4_gen_2_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD9E9B05-12C3-4CE4-BA00-656021ABA4AC"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_425_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "12751FE9-CACC-4073-AFA7-68BC72085FFA"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_425_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "F312F7A1-6305-47C5-A084-C415E88FEC8D"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_427_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "39EE5BB7-EDA9-4E70-9CA8-99EC311158E6"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_427_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "262AA502-1003-4F71-B1A2-5440FB22CCE6"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_429_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B29ED8BE-FB30-4E28-B080-7970BBCF67CF"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_429_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1C36217-A66F-445C-8B5C-73E6096308DA"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_430_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC166AE9-7AB5-4817-BABF-1A3DAC8B0BD9"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_430_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FF08256-8F75-49C6-8E60-0A2707993D9C"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_435_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D23F7D4D-E1EC-4207-8C49-962E5ECCDE6F"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_435_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "2751EF7C-6021-48C5-BE0C-BBA0F4DA79FD"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_439_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA0C78AA-3643-4F5B-9135-EC4AB26F4568"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_439_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E284A11-239C-4B5E-9250-6D40ED782BE4"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_450_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C967E2C-6ADA-4833-8D7F-A437C8D6D0E1"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_450_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "407C101D-D392-46F2-8083-EA9CC2BF2472"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_460_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "94AD752A-551D-4FAB-9274-CB2164C857D9"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_460_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "8842CC5B-C753-47D9-BE13-723A4163FF8C"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_480_5g_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7289102B-C117-4CB3-9DBA-66BACC9FE193"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_480_5g_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "666B4CAD-FE81-4EDF-BB6F-CD260692A60B"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_480\\+_5g_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8DF4C4E-182D-472E-97AE-987203EE9057"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_480\\+_5g_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C8879AF-2AEE-49DB-BC00-8EF7E3C9A0F4"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_625_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEB22B82-1848-4EE3-A642-8F70C6630321"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_625_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7A6746D-9A3C-4128-BBDC-51414272F960"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_626_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D90D058A-66C7-49D5-8017-5E72A743B10D"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_626_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "BBB2966F-515F-4BBA-9E99-C12BEA2B1E8E"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_630_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D382DEBB-A358-4EA6-84B9-CB3F9161A1F2"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_630_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "B47A12A6-1DDF-453E-8590-1CA83234DB42"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_632_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F182BA2-4338-4925-A23A-BBDAAF3DB1A3"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_632_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DFFA4DA-4879-4040-A2C7-57D605629BB5"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_636_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BA77F18-C031-476E-9552-2BA63152321D"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_636_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "F59E6158-B097-4209-AE0D-A97A512C0473"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_660_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C2619A4-BBC8-4F27-B350-388EBAC36C47"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_660_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A4936DB-0B92-4DBF-9F55-19D439FCB2EB"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_662_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B099F64-FCD9-43F1-A066-A4FAE6738C5A"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_662_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0A285E2-E2CE-4488-8E3D-F5D5331D992C"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_665_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "12C0BA73-D23A-4136-974D-3332F0714113"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_665_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D5AF0B7-8B15-41AA-88E1-70E15A5F680A"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_670_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "066BEC31-0C11-4816-A76A-D1D4BC516FBA"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_670_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8196A85-1D01-4663-8C6E-043BFACFE25E"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_675_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "46DCE136-DC16-41A2-92F4-36A859AF833F"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_675_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D1E661D-F412-43D8-98C2-CE371C2FD316"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_678_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C34EE20-69D2-407A-A916-77E79D0C27E8"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_678_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "568B682C-2B70-4EC0-9E1A-E6A418D53F4C"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_680_4g_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D957EE2B-0964-4806-A55B-D6EDE64F4B2B"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_680_4g_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "13B91E86-CBB8-4561-A983-0199B4491085"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_685_4g_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5BFA049-4B7C-4B94-B48B-5770E05B7486"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_685_4g_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "6BD0F530-6F6D-4507-9A64-31DC64E601CE"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_690_5g_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "68A8C971-F15A-43DA-B0CB-E5DFFD38CC67"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_690_5g_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "6186C3B6-BAE1-4858-9E6A-6610AC2CE557"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_695_5g_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C0D8E82-3425-4605-B220-068F36A190CE"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_695_5g_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "187FA325-AC3A-476B-9250-2B5B0368D28E"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_710_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "551389EF-6963-428B-8288-53516F691B2E"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_710_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "73ED06A2-6EDF-4752-95B8-8672B235D3D4"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_712_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5D964C7-EAC3-4218-9C54-22D6E8CE59F5"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_712_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EA59351-C34B-415B-B7EF-BAAB2BEC23DE"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_720g_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0FD385E-E449-4188-88CE-2710D547D8DA"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_720g_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "2823F2C7-811A-4839-9F85-A49E11E2BBA8"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_730_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FA9BDF1-C4E1-4820-BF42-C02348D8F9C7"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_730_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "917D4DBB-A92B-4358-99E2-5B77B210DE16"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_730g_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "769EAF36-C661-473E-84F2-0708CCFC3C1B"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_730g_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "62203044-75B4-4283-8D96-2AC4EC158178"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_732g_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2948781-8EE5-49A5-83F1-632CBF310A80"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_732g_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE017277-5D70-4853-B804-391D5B37D72E"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_750g_5g_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9138F28E-342A-4D3F-AF83-A2C166784775"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_750g_5g_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "410C540A-E8FA-4765-8519-8CA69E23A891"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_765_5g_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0D23A8E-06DE-4DE2-ADAD-9D9B7CA09F7D"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_765_5g_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "B00B72F0-6E85-40D6-A162-66908A570F46"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_765g_5g_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "16B75F00-99B2-4C63-81F0-39257002630A"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_765g_5g_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2D3D004-F706-4D66-993A-B72AB0F9D129"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_768g_5g_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A7E183E-2BD3-4745-81EA-21A357C14E0D"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_768g_5g_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1BF63E3-8673-463E-BF55-3F9B32EF9A29"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_778g_5g_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0E4E3E9-0BF2-47D1-BCC1-2254A5480759"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_778g_5g_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD1EC478-D2DA-43AA-9302-B6BC99AB69E9"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_778g\\+_5g_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "643FA101-D9EB-4B92-ABF1-70FEE2E8968E"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_778g\\+_5g_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "73CF3FE5-6139-4537-8CDD-9039C4F8FA41"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_780g_5g_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D31E13FF-84CC-443D-8299-BE3F950B21B2"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_780g_5g_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "68CBA070-8BAE-4915-8E74-07224641A474"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_782g_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B96B9F8F-8B71-41A1-985B-45678BC4334D"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_782g_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "3018C28E-A5E5-4AEA-A209-4A3A4BBA208E"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_7c_compute_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B80BE46-13C8-4AA5-8C39-865603713F8B"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_7c_compute:-:*:*:*:*:*:*:*", "matchCriteriaId": "5489E441-7C58-4B0F-B878-9060ABE05D9E"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_7c_gen_2_compute_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2931C0E3-D4E7-4A75-B80E-0E248E2E5001"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_7c_gen_2_compute:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C7F2111-F4F3-4C22-B9F8-65EAF8FF7452"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_7c\\+_gen_3_compute_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4A050CA-8514-400A-A6B3-F513CC93CA14"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_7c\\+_gen_3_compute:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD850305-1E76-4952-A3FB-F6229CBF7FE9"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "13AF1A58-3121-4F06-9B13-D7D94A8A10A8"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_1_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "629264C3-8EA3-475F-88D5-4407691499DA"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "863BA6B8-5F2D-4D97-BBBE-EAD5B35AB3AA"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_2_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E0344CF-A15E-4734-852F-9553E780644B"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_3_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA40FA0B-F9F1-48D4-B68A-ECD7241A5F39"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_3_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B00530E-070B-4832-AFF0-535D4A1A6F85"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_1_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "30C5328F-51FE-4EFB-BFA4-5BA9D504AC6D"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_1_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3E50675-727A-4749-B8BB-3BCF507C4468"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_2_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "28D14A7F-F116-416B-A359-32D395F706D4"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_2_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B67D19B-E1B0-41A2-B122-FBA6D797F3C8"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_820_automotive_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "73954A37-654B-4EE2-B14F-A70A992CA807"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_820_automotive:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC6A42E7-0D95-4697-9088-41E92600C16A"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_820_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "26CC97B1-E6D9-4D13-ABD7-7B6AD7EC58A1"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_820_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "23F78240-ED43-42EB-8ABA-7F45BAA9CF27"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_821_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB6B7180-1E7D-4030-8A0B-FD19B095CB55"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_821_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "05FEBD40-CC19-4441-9540-C1B142EA1421"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_835_mobile_pc_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A0CFBBA-C906-47AF-AEFF-AA65326A381C"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_835_mobile_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "3081C8F0-7A06-4E66-B54E-76A0D1ED24D3"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_845_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "14F878B5-7E62-40D5-AD88-D109130F6F57"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_845_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "3BDDA689-D36D-456B-9AC1-3FA925563F30"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_855_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F83F4E9E-481F-4275-BCB2-0706D52D8DEE"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_855_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B49C835-2316-49CA-B87C-790C19D81688"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_855\\+_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B3A4256-DBA0-4981-A6EE-BEA06AF3C1D8"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_855\\+_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "C200D712-451B-4748-B0DE-5EBCFB591045"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_860_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9FC371A-F67E-466C-BE01-F867EE587078"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_860_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A2FAB27-2BDF-4FED-872D-9622050992CF"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_865_5g_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0627B052-B244-492C-9257-9E85ACCE0B19"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_865_5g_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6285755-E27F-4538-8F48-5F9DCDC4CB09"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_865\\+_5g_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8130D33F-B5B7-439D-A35B-AD662C35B690"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_865\\+_5g_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "A89428FC-0EB0-4121-B674-664EAD761DD0"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_870_5g_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE2EBD77-F5C5-43DE-BD01-788471DB8262"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_870_5g_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C666B23-5049-424C-80A5-BC45F579DECD"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_888_5g_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F461BDE7-E847-4FF4-8D05-598FBF76D7B6"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_888_5g_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "0BC46263-C6FF-4BC0-83A5-D5A17954DB5F"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_888\\+_5g_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F2F6A7B-053D-4C18-883E-32DD0E317D04"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_888\\+_5g_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "60739810-16B9-48FA-8DB5-E0AD336F6912"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sc8180x-ad_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2802A422-CCEA-4634-B164-09AC35C00C2F"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sc8180x-ad:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AB65F7E-6921-44AA-8B2C-C4814BD51A7F"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sc8180xp-ad_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7EB4CA4-CEAF-4D8C-AE28-5373CC5E46D7"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sc8180xp-ad:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B12A03C-20D1-452A-99E6-BA94C02BA982"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sc8180x-aaab_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "328838FB-9338-4BB1-8492-9F3E6628F105"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sc8180x-aaab:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C73B5E9-9786-4D98-B701-7341A6673410"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sc8180xp-acaf_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "360E939C-2089-4402-9D72-EF3014EBB330"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sc8180xp-acaf:-:*:*:*:*:*:*:*", "matchCriteriaId": "784952CE-8A95-4288-A672-36CCC3B5FB18"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sc8180x-acaf_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "84B9DA10-0264-4226-AA31-B5C7DAEA8BB0"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sc8180x-acaf:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DF82CE3-F715-4039-9473-9B47888A6501"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sc8180xp-aaab_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "04274F69-E871-4EEC-A66B-698048D00225"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sc8180xp-aaab:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D40E4D1-64B4-4E16-B43E-90A0627EE07D"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sc8280xp-abbb_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7EA3A08-8624-4B78-AD75-828A3DF4CC52"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sc8280xp-abbb:-:*:*:*:*:*:*:*", "matchCriteriaId": "57E75758-F191-45B7-86A8-7F4EC08D2965"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_ar2_gen_1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BB4A33E-6647-447E-BDA3-24246D49C5DD"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_ar2_gen_1:-:*:*:*:*:*:*:*", "matchCriteriaId": "1046CC3E-FB12-4527-9978-DCC40EEE8938"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "88AF39A5-F44E-4B14-AA6E-4F80D9EEB017"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A25FE8F-555A-4D85-8A94-A808B62EAE86"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE5FCA7F-1FBE-42AA-B4E6-09CEA02A33EC"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf_gen_2:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2D789BC-43F5-40FB-A191-163C01BA5FBE"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_w5\\+_gen_1_wearable_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0F761E3-62F7-4A70-A3CA-09FF283ABD9C"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_w5\\+_gen_1_wearable:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6136853-B719-4DA2-B6C9-C9E8EF02B35A"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_wear_1300_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8571A7EB-7BF1-4613-8CCB-667995115FC0"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_wear_1300:-:*:*:*:*:*:*:*", "matchCriteriaId": "2AE7E6EB-E3E7-45FB-AA7B-29937C21D116"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_wear_4100\\+_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA1AEB2C-F420-46A6-8804-A35870153BAA"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_wear_4100\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "20746D0A-8D06-4483-AE84-2E0232259171"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_x24_lte_modem_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5CAB1351-A614-4E73-B58E-7D624695C657"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_x24_lte_modem:-:*:*:*:*:*:*:*", "matchCriteriaId": "4494AAD7-D132-41DB-9756-CAD1F3F7AE7E"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_x35_5g_modem-rf_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B42EAAC-230A-4901-8B3A-45EF95087109"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_x35_5g_modem-rf:-:*:*:*:*:*:*:*", "matchCriteriaId": "19E8F0E4-F768-4EC4-A9C1-1291A7C79E23"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_x50_5g_modem-rf_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0945BED-18AD-4B6E-92EC-E5421D333B95"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_x50_5g_modem-rf:-:*:*:*:*:*:*:*", "matchCriteriaId": "067F3D3D-59C4-4245-9385-F8A9697779E8"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_x55_5g_modem-rf_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DD56A4A-BBE6-4AE4-A4C1-4914E997F08C"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_x55_5g_modem-rf:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DE28E8F-0A21-497B-9082-79EB74E1CF33"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF9DE2CE-4765-4696-ABFE-4808EF77C8D9"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_x65_5g_modem-rf:-:*:*:*:*:*:*:*", "matchCriteriaId": "8031F868-16B3-4173-835A-0F818471CF4F"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D82AAC94-6D8C-4EB7-ADDF-544AFCA809D6"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_x75_5g_modem-rf:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A169176-2CBF-44B6-B4C8-C93D72E6D77D"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED623126-9BE8-441A-8F5D-397F588FFC48"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr1:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A55B55F-D25A-455D-8CC2-415A677393F6"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr2_5g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "665811D8-F648-4F32-A375-FAF9C9E928B3"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr2_5g:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A537932-6EAD-411B-83FF-48CF050F603A"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr2\\+_gen_1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD779739-5919-43A9-B949-D1FB4A46FA11"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr2\\+_gen_1:-:*:*:*:*:*:*:*", "matchCriteriaId": "BDA3083D-C664-45C7-98CD-E90223F887A8"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_4g_modem_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C8F12FE-0057-4A13-9A7F-D12C114ECEF9"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_4g_modem:-:*:*:*:*:*:*:*", "matchCriteriaId": "1271B0C7-2D91-4129-9B58-E6689DD68C39"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:srv1h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CD199F5-DA68-4BEB-AA99-11572DA26B4F"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:srv1h:-:*:*:*:*:*:*:*", "matchCriteriaId": "8ACA2D4D-FC77-4C1A-8278-1C27B3EA3303"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:srv1m_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4B29E7F-8BFE-466A-B357-63F8A2160C4E"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:srv1m:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D55CC7D-2E65-4CA9-9892-B6FBCC087E6F"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:ssg2115p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A146E52D-4AFC-47B4-920F-DAC76077DF25"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:ssg2115p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BA4BA00-C8D1-4DAC-8030-CB5EEC7D4591"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:ssg2125p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA41907C-1CDE-42F3-B21D-5D53B2F06AF7"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:ssg2125p:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDC270A7-205C-41EB-A2E5-2A381A16BFBB"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA1BF9BB-AF11-46A7-A71C-F7D289E76E3F"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sw5100:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B8455D6-287D-4934-8E4D-F4127A9C0449"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB599A9F-0305-4FE4-8623-0F86630FEDCB"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sw5100p:-:*:*:*:*:*:*:*", "matchCriteriaId": "EEB883BF-68B2-4C25-84DC-5DA953BFAA2F"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sxr1120_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF839E24-6542-4C5D-A1B7-FD3BA00683CB"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sxr1120:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9F12284-93E0-482D-9D35-EB38BA7D6C6D"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sxr1230p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE3236D6-0D01-4D05-B580-8888B99BAA5D"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sxr1230p:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E1753FC-F3CD-4B50-886D-8E16D9301A84"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F9FA3B1-E4E4-4D9B-A99C-7BF958D4B993"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*", "matchCriteriaId": "95762B01-2762-45BD-8388-5DB77EA6139C"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD6444F6-A477-4B4C-8A09-C22C47CCE45B"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sxr2230p:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3E20681-4FC4-46E2-AF77-BCF03BC8E77E"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sxr2250p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "68A93ED1-F509-439E-AE7B-F0EC87AE759F"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sxr2250p:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB5E2A98-EDD0-4298-911D-EC7527D5A424"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:talynplus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D2CEB90-83F6-4A96-A666-18F81533F67D"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:talynplus:-:*:*:*:*:*:*:*", "matchCriteriaId": "73131CBF-918D-46A8-AD05-6D822015ACF8"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:vision_intelligence_100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7950993A-8669-479E-9531-B8FBF6AF6EB2"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:vision_intelligence_100:-:*:*:*:*:*:*:*", "matchCriteriaId": "B34E6D81-1585-4CAF-9A94-BD14500A1E67"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:vision_intelligence_200_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4535EF79-92F4-484B-B84B-5927FF07F3CD"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:vision_intelligence_200:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D8B89D9-12BD-44B5-95A6-DBAAB5B0745B"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:vision_intelligence_300_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C33CAF7D-F810-41D3-9BFE-C61E7758CE84"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:vision_intelligence_300:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B4BAC93-2C2A-4A73-A652-CD6B2F608CDD"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:vision_intelligence_400_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8E976A6-4785-4F88-9035-0F6F0509A642"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:vision_intelligence_400:-:*:*:*:*:*:*:*", "matchCriteriaId": "16204302-0B17-4759-A4C8-E8B0301BBCAB"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcd9306_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC012AD0-BCEE-4B1E-9B15-5D77D78CEA01"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcd9306:-:*:*:*:*:*:*:*", "matchCriteriaId": "F51C69B9-F0AB-4BF5-A8C2-64FEB7075593"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A2FAD34-B7C5-400A-8575-A12CDE65ACBE"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcd9326:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A39A2E5-6D8D-4F6E-98CB-96DB1975A4BC"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "28717583-463A-468A-8073-ECF0F90585F6"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D1A7188-7D5D-4D46-AEAB-08BA84FFF539"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BA28CC6-C8BB-4F50-BFE3-A59F664A4F54"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*", "matchCriteriaId": "94D2BDF1-764C-48BA-8944-3275E8768078"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE852339-1CAE-4983-9757-8F00EDEF1141"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D9E96B3-F1BB-46F8-B715-7DF90180F1E1"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcd9360_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4D6C6B2-36DC-4D0D-AFF8-2108A090A78D"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcd9360:-:*:*:*:*:*:*:*", "matchCriteriaId": "28FEB3B1-F641-436D-AC4F-3304C37167C4"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1295D869-F4DD-4766-B4AA-3513752F43B4"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*", "matchCriteriaId": "B98784DC-3143-4D38-AD28-DBBDCCAB4272"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcd9371_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2503805B-B2A6-4AEE-8AB1-2B8A040702BD"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcd9371:-:*:*:*:*:*:*:*", "matchCriteriaId": "D3AD370C-2ED0-43CF-83D9-50DC92A01CA5"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "34143ABA-7D09-429F-A65C-3A33438BF62C"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D56DFE3-5EF1-4B23-BBD5-0203FBF9CCEC"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1FA2EB9-416F-4D69-8786-386CC73978AE"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "896F1C04-9957-440F-BF01-C3772CC3B3DF"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*", "matchCriteriaId": "A90555EB-47A7-4717-92D5-35B561825F06"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "699056F6-1517-4F25-AE07-4FFCF6923B9F"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4C023D2-6FF5-4FFC-B9F2-895979166580"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcn3610_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DAFD64E7-3F13-4DCA-8C46-6E8FE0C6F798"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcn3610:-:*:*:*:*:*:*:*", "matchCriteriaId": "044A14FB-64F6-4200-AC85-8DC91C31BD16"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcn3615_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9590EF1F-E821-4525-943B-4A315ACAEFFC"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcn3615:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A7D32B3-325E-4B1F-8649-3D0071396BBA"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D99CA230-0694-4898-A06E-9C522CCB86CE"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcn3620:-:*:*:*:*:*:*:*", "matchCriteriaId": "62B00662-139A-4E36-98FA-D4F7D101D4AB"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcn3660_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B2669D0-81C0-4F3C-B9AF-1453815C68B1"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcn3660:-:*:*:*:*:*:*:*", "matchCriteriaId": "34D7240B-DCB4-4BF4-94C7-13EBECA62D6C"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB37B5DB-2493-4082-B2BF-60385B7E027C"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*", "matchCriteriaId": "6BCD2FE2-11F2-4B2A-9BD7-EB26718139DA"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcn3680_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F66A898-3C7A-4D44-86BD-89129F04E654"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcn3680:-:*:*:*:*:*:*:*", "matchCriteriaId": "B612B044-C7D1-4662-AB2A-5400E34A3CA7"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0755F669-6D7E-454A-95DA-D60FA0696FD9"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcn3680b:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE861CE7-B530-4698-A9BC-43A159647BF2"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcn3910_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F0D7B24-D567-479A-B4F1-595FAA053418"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcn3910:-:*:*:*:*:*:*:*", "matchCriteriaId": "33A8FAA1-F824-4561-9CCC-7F0DF12F740F"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3FEF2DB6-00F5-4B07-953B-EF58B31267F1"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*", "matchCriteriaId": "120E8F0F-EBEB-4565-9927-2D473F783EF7"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C6E9038-9B18-4958-BE1E-215901C9B4B2"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*", "matchCriteriaId": "B36D3274-F8D0-49C5-A6D5-95F5DC6D1950"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4BFB25F-013B-48E3-99FF-3E8687F94423"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF676C5B-838B-446C-A689-6A25AB8A87E2"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2744A053-5BD9-45A9-A2FC-791BCA0CCD4C"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5F28E29-520F-469E-B048-62DE2EF07ADD"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcn3999_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF49BC31-A332-4B9A-A826-F63116D7029F"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcn3999:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DD3C245-D5F8-4145-8CDF-F635D2C8F088"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB5DB2B8-25E1-4C0F-8AFB-7627FF9A04E1"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB21B3F-6D07-4B45-8A71-DC5490176296"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "15307882-7039-43E9-9BA3-035045988B99"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA85B322-E593-4499-829A-CC6D70BAE884"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E839A0B9-64C3-4C7A-82B7-D2AAF65928F8"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E870D82-DE3B-4199-A730-C8FB545BAA98"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7ACAD26E-B79E-4659-91A5-D301281F7D36"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0E46DA6-9494-4D92-A4AE-A272AF6ACCCC"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA33DE15-C177-43B3-AD50-FF797753D12E"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE1A5841-5BCB-4033-ACB9-23F3FCA65309"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B47BF35-3AA0-4667-842E-19B0FE30BF3C"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A071672-9405-4418-9141-35CEADBB65AF"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB7CF473-8B25-4851-91F2-1BD693CCDC85"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*", "matchCriteriaId": "91E591F2-8F72-4A5A-9264-2742EB2DABDA"}]}]}], "references": [{"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2024-bulletin.html", "source": "product-security@qualcomm.com", "tags": ["Vendor Advisory"]}, {"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2024-bulletin.html", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-33023.json b/cve/2023/CVE-2023-33023.json index d19196c388a..f2a0ee6bd91 100644 --- a/cve/2023/CVE-2023-33023.json +++ b/cve/2023/CVE-2023-33023.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-33023", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-04-01T15:15:46.793", "lastModified": "2024-11-21T08:04:27.550", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Memory corruption while processing finish_sign command to pass a rsp buffer."}, {"lang": "es", "value": "Corrupci\u00f3n de la memoria al procesar el comando Finish_sign para pasar un b\u00fafer rsp."}], "metrics": {"cvssMetricV31": [{"source": "product-security@qualcomm.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 8.4, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.5, "impactScore": 5.9}]}, "weaknesses": [{"source": "product-security@qualcomm.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-120"}]}], "references": [{"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2024-bulletin.html", "source": "product-security@qualcomm.com"}, {"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2024-bulletin.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-33023", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-04-01T15:15:46.793", "lastModified": "2025-01-09T16:20:50.163", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Memory corruption while processing finish_sign command to pass a rsp buffer."}, {"lang": "es", "value": "Corrupci\u00f3n de la memoria al procesar el comando Finish_sign para pasar un b\u00fafer rsp."}], "metrics": {"cvssMetricV31": [{"source": "product-security@qualcomm.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 8.4, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.5, "impactScore": 5.9}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.8, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "product-security@qualcomm.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-120"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-120"}]}], "configurations": [{"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:315_5g_iot_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "58DD55C5-DDF3-4C9E-9084-694543AEFB4E"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:315_5g_iot:-:*:*:*:*:*:*:*", "matchCriteriaId": "00E63554-F1C6-4241-B7B8-00C889ADB35E"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:apq8017_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FEDA6CA-A0FD-4A72-B856-C8E65AC86902"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:apq8017:-:*:*:*:*:*:*:*", "matchCriteriaId": "8D29295A-7183-46BE-B4EE-F891D1C17ED9"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:apq8037_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEE0D211-0EF0-441A-9E10-3DE578811250"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:apq8037:-:*:*:*:*:*:*:*", "matchCriteriaId": "A594A57E-525C-451C-B3BA-567E0F757968"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:apq8064au_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CDCB8499-A096-4633-8506-63C0A227A958"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:apq8064au:-:*:*:*:*:*:*:*", "matchCriteriaId": "BEE2C7C3-E928-4466-B537-0D1826E2223C"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC6FCE91-BF38-49ED-8FFB-429BAFEE7832"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "715A9F94-5F9E-45E5-B07B-699410C01478"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:ar8031_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FCE1ADA9-8042-4CDE-A2B9-E96665CB41BE"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:ar8031:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB1DE046-DD70-4ACA-9DF4-59939DAC1889"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:c-v2x_9150_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A725088-FC3B-4439-9189-72AA10954721"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:c-v2x_9150:-:*:*:*:*:*:*:*", "matchCriteriaId": "B80D6366-4C0C-4C0D-9A38-769C66D62F0F"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA42F2EA-5D00-42B8-B020-C27675B72915"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:csra6620:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFCF207D-B8C8-4860-89C7-673C821F0237"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8A35ECF-B12E-42DE-A74B-2C3BE03639A4"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:csra6640:-:*:*:*:*:*:*:*", "matchCriteriaId": "65B283D6-B2D2-49B6-98A8-08EDB54C1F15"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:csrb31024_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EBF42F8-50BA-4172-A3A0-7FD1BA4B3ED3"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:csrb31024:-:*:*:*:*:*:*:*", "matchCriteriaId": "770F3924-BE27-4BDE-B922-680B3C9753EB"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CDE1CBDE-3D28-463C-B215-AA7DF373EF09"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:fastconnect_6200:-:*:*:*:*:*:*:*", "matchCriteriaId": "66BD3B88-7CF9-482D-A2DD-67F6ACF4CC57"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "82B82E87-F3F4-466F-A76B-C8809121FF6F"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*", "matchCriteriaId": "419A132E-E42C-4395-B74B-788A39DF1D13"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D89F035A-2388-48FC-AEBB-8429C6880F4A"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:fastconnect_6800:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA13EF4E-AAE6-45F4-9E41-78310E37CE81"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*", "matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*", "matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:flight_rb5_5g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD5C60F1-5B7F-4AB0-9863-720A1972563E"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:flight_rb5_5g:-:*:*:*:*:*:*:*", "matchCriteriaId": "C43A4F08-1E8A-4CEF-8E61-4152ED78E600"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:home_hub_100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EFFEA50-D8F0-49DB-AF22-EBC2DA8C634D"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:home_hub_100:-:*:*:*:*:*:*:*", "matchCriteriaId": "D57A69BF-7FBF-4519-94DA-A2C1766B48EC"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FD1C359-C79B-4CE8-A192-5AA34D0BF05B"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*", "matchCriteriaId": "716B747E-672C-4B95-9D8E-1262338E67EA"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "35B7E25E-FA92-4C36-883C-CFF36F4B3507"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECD99C6F-2444-4A5E-A517-0C8023DDF23D"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CA1E7B0-782B-4757-B118-802943798984"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*", "matchCriteriaId": "95CB08EC-AE12-4A54-AA3C-998F01FC8763"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:pm8937_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4558B01C-171D-47F7-8831-E9C53BC953BF"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:pm8937:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B8E31E7-9ED7-4F8E-ADC8-60C087F4E340"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3723C7B1-A7E2-401F-8D6D-189350F6BCA5"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qam8255p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B12B89EF-7B12-481E-BCBC-F12B9D16321A"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2D9E281-B382-41AC-84CB-5B1063E5AC51"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qam8295p:-:*:*:*:*:*:*:*", "matchCriteriaId": "44EBEBD5-98C3-493B-A108-FD4DE6FFBE97"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "295E75BD-2A6C-4A76-A376-A9977DDB17FF"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qam8650p:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD37AA1A-B911-45BF-9BCC-C772FA83E657"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "49B2DF91-BE6B-4E9E-B63C-98DADD29AD6B"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qam8775p:-:*:*:*:*:*:*:*", "matchCriteriaId": "58170126-928F-4AE5-B5AF-5ED4710F9BA2"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qamsrv1h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8673334-5E11-4E95-B33D-3029499F71DF"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qamsrv1h:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC0B32F6-5EF0-4591-99D7-D0E9B09DEC5A"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qamsrv1m_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE03AB2A-3ED9-4489-8E5B-4FCF8BAA8559"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qamsrv1m:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E646738-6A87-4470-9640-6A5A1DF3AF78"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FF653D0-15CF-4A10-8D8E-BE56F4DAB890"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*", "matchCriteriaId": "C31FA74C-6659-4457-BC32-257624F43C66"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6234_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "912215EB-CF3C-4AA4-B3F5-2EB19B131427"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6234:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2C7FE6F-6106-4EF3-9925-95B25D047418"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6310_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "62DC4FBB-D9CB-43EB-829E-0A892306D0E2"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6310:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B0F8ED6-EAE7-44EA-A8C6-F5AD408261F0"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6320_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "886CF046-E1D9-4FD4-AC02-EAB61C3F70FD"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6320:-:*:*:*:*:*:*:*", "matchCriteriaId": "059486E9-3F99-4C65-A763-470564EDAF2C"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6335_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "966CDA56-809F-4FF4-909D-0DD92F44CF67"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6335:-:*:*:*:*:*:*:*", "matchCriteriaId": "C90747B4-2CC0-4816-A994-58E00F5ADA05"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "83B53119-1B2F-4978-B7F5-33B84BE73B68"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FEBC0C5-CAA1-475C-96C2-B8D24B2E4536"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E16994A-6DBA-426C-ADD2-B1E8B49FEDBF"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6420:-:*:*:*:*:*:*:*", "matchCriteriaId": "47E674DE-55AB-44E5-8E00-C804FC9D4DC0"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6421_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "503CEDEF-99D0-4432-88A0-295340743606"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6421:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE9115A0-0D87-49BE-9A9B-091DBF8D9E6E"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A344E78F-D15A-460E-8EF8-7C6FC39F2D5E"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FF5EC23-4884-4C2B-8E77-50B1E8E28A3D"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "95AFC483-1468-43FC-96FA-A56165C290E0"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6430:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A963FDF-6FF4-4F48-834E-2A14D241716D"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6431_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "76FD6A24-B6F4-4C65-968F-AFF90A1A60B8"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6431:-:*:*:*:*:*:*:*", "matchCriteriaId": "34661A30-92C3-4F0D-ABD1-8DA8E928DFF9"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "04F574BC-9AB2-4B83-A466-556ECEBBD3DF"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*", "matchCriteriaId": "A34D021D-C043-4EFD-9AB3-B2174528CBA3"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "886124F6-B397-4EB6-8E01-6012E468ABE9"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6564a:-:*:*:*:*:*:*:*", "matchCriteriaId": "93ED74CE-6BF2-4983-8780-07D5336745B3"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B59672A0-2FA6-46CC-B75A-C599B842AFB9"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*", "matchCriteriaId": "3847F4A5-90A5-4C84-B43F-0DDD81BD79CE"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B828AC8-4A01-4537-B2BD-8180C99F5C32"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*", "matchCriteriaId": "66C16E1E-9D4A-4F20-B697-833FDCCA86FB"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "828CFB37-76A6-4927-9D00-AF9A1C432DD6"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*", "matchCriteriaId": "11405993-5903-4716-B452-370281034B42"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*", "matchCriteriaId": "8374DDB3-D484-4141-AE0C-42333D2721F6"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C3DDA896-576C-44B8-85B6-F71F473F776B"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*", "matchCriteriaId": "51A87BDA-5B24-4212-BAB3-D2BBB2F4162E"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "643EC76D-2836-48E6-81DA-78C4883C33CA"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*", "matchCriteriaId": "477F6529-4CE1-44FC-B6EE-D24D44C71AE7"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "288F637F-22F8-47CF-B67F-C798A730A1BD"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0996EA3-1C92-4933-BE34-9CF625E59FE7"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6678aq_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D001127D-8160-42F0-B8B9-2FAA2976B530"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6678aq:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9EB615F-FD4C-450B-AB25-E936FD9816C4"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E23922D-C37F-476F-A623-4C1458A9156F"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5FA1F8F4-EAF2-4704-A8A6-19AD3CA1B577"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3F7853D-09EE-476F-B48D-BB30AEB4A67D"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6797aq_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "797295C2-535C-46A9-A725-E1A5405F0436"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6797aq:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BFC575E-594E-4711-94B1-2DC8D03B9AC4"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D1C53DC-D2F3-4C92-9725-9A85340AF026"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED0585FF-E390-46E8-8701-70964A4057BB"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2FA8F9DA-1386-4961-B9B2-484E4347852A"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*", "matchCriteriaId": "117289C8-7484-4EAE-8F35-A25768F00EED"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4D2B46E-3996-42FD-B932-09E92C02EC8A"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E58C63-F253-4DCC-8A14-48FEB64B4C3D"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca9379_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "25565FDA-651D-4A05-8B1E-2188B6921253"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca9379:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8D49750-BBEA-4A3D-9898-28B7A50A7F42"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A75D017-032F-4369-917C-567EE2A809F2"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*", "matchCriteriaId": "107F0423-608C-404D-B58B-616A6494418F"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcm2150_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "723EAD03-6C32-4B1C-95C1-6FDA94F08151"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcm2150:-:*:*:*:*:*:*:*", "matchCriteriaId": "FBB4BB6E-8AF2-433A-A36C-0711598602BC"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcm2290_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5AB1F0FA-25F3-4304-A3BC-5264E55CC092"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcm2290:-:*:*:*:*:*:*:*", "matchCriteriaId": "214A053F-D80C-4AD9-B4F1-83384095A3F3"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcm4290_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C7FFB96-53E7-41A2-BC99-7ACD853214A8"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcm4290:-:*:*:*:*:*:*:*", "matchCriteriaId": "74EBA77E-69A5-4145-9BEC-CD39BA132309"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcm4325_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2D8044B-D4E5-4174-A0FB-478F8434EE8F"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcm4325:-:*:*:*:*:*:*:*", "matchCriteriaId": "163FE96E-DF5B-4B67-8EDE-44A5B9A8492D"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcm4490_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA506489-4338-44DF-8F92-12E60AF0048C"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcm4490:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8718C37-A82A-4A08-A887-3F22B37601A9"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcm5430_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EC5F81B-AA24-4E3C-9FC8-53E010AC977E"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcm5430:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5C66DAD-0D85-46B8-92D7-6D68B9429E9A"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB226552-52D9-44F5-A170-35C44761A72B"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcm6125:-:*:*:*:*:*:*:*", "matchCriteriaId": "FBB16DC4-CDC9-4936-9C6A-0ED8E1F6D056"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ADD6D51E-5787-42A6-8A02-4EBBAFFF9C94"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*", "matchCriteriaId": "99AA0291-B822-4CAD-BA17-81B632FC3FEF"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "646B241B-2971-4929-9FB6-7A4CBF801CBB"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcm8550:-:*:*:*:*:*:*:*", "matchCriteriaId": "5654FFB5-9A89-4399-AFAB-0A26726DEC81"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A49DBE04-E2EA-4DA1-B774-A878A71524AC"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcn6024:-:*:*:*:*:*:*:*", "matchCriteriaId": "69E98386-3BB2-4E8C-AD00-E05123608439"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F4362D2-30A3-4388-ABB6-293878AD7036"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcn6224:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB6AE9A7-386A-473B-9BD5-DA37B1E696C5"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "88376C1D-AC4D-4EB0-AF6A-274D020F5859"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcn6274:-:*:*:*:*:*:*:*", "matchCriteriaId": "E15BA4B4-C97F-45C0-A4AD-7E46387F19A6"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcn7606_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F466A5BD-1912-4811-9A93-81555F101D46"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcn7606:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F92914E-16F6-4A25-9FEF-FB7CB3377132"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A64CDA49-19BF-413F-A0E0-2B9729E45E25"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcn9024:-:*:*:*:*:*:*:*", "matchCriteriaId": "345CCD64-C09E-407D-AAA2-311C4CCFE24F"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "65303C2D-C6BF-47CB-8146-E240CB8BBE42"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcn9074:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6B03022-497A-4F42-BB4D-5624EA7DF1B9"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcs2290_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "93CDB7BC-89F2-4482-B8E3-9DDBD918C851"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcs2290:-:*:*:*:*:*:*:*", "matchCriteriaId": "76E03AE9-2485-449B-BCFD-3E452BB01FC6"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC43BB27-0516-4750-A4C2-C45298441398"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcs410:-:*:*:*:*:*:*:*", "matchCriteriaId": "969585DE-93D6-4406-A632-D838ECD4D5AD"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "06789CB9-E6FA-400D-90B6-C2DB6C8EF153"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcs4290:-:*:*:*:*:*:*:*", "matchCriteriaId": "FFCB9F22-57F2-4327-95B9-B2342A02E45E"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3336CDD7-9E7B-4FFB-A5CE-594B19B63A6C"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcs4490:-:*:*:*:*:*:*:*", "matchCriteriaId": "1197E229-1E27-4CA3-A386-B77FAE5DFE1A"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcs5430_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6926498-667C-4866-B3DD-A7E20B8F4D7F"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcs5430:-:*:*:*:*:*:*:*", "matchCriteriaId": "CEFEBC7A-80C0-4E4F-B9C7-53EECF86B6B5"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E634F59C-6817-4898-A141-082044E66836"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*", "matchCriteriaId": "29762819-EC90-499C-A8C6-1423DE3FE6B9"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4468EA5D-87B0-4FEC-A3DB-617651B0D169"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcs6125:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DA2C3E1-E285-4CAD-9FA3-813C8EC436F6"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "403AE561-6C9E-49F3-A5D6-C48DDD51D663"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FAC140F-FC5E-4C88-B777-7F5EBF49A695"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FFF23DDB-98A0-4343-ADD3-5AB9C2383E7E"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcs8550:-:*:*:*:*:*:*:*", "matchCriteriaId": "5ACB8AFB-5B91-4AA1-BA3A-1AF0B3503080"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qdu1000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "407EE4D5-1F52-40D6-B85A-E49915D6EF2D"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qdu1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "5846C9DD-63E5-482D-BE01-3A1E89CC0EDE"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qdu1010_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B6A4AA9-E35B-4B25-9FD3-BFB907B822DB"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qdu1010:-:*:*:*:*:*:*:*", "matchCriteriaId": "5AC8538B-6663-4CF7-BD4A-9766C04CBAB5"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qdu1110_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F5F9F3D-1F57-4D16-972E-AF39E438E4C3"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qdu1110:-:*:*:*:*:*:*:*", "matchCriteriaId": "53D6BEFE-AA21-4786-B11C-A6683AC06622"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qdu1210_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "32E0EBD5-A846-44F9-9DEC-1C6711C96A5B"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qdu1210:-:*:*:*:*:*:*:*", "matchCriteriaId": "C68F8102-788C-4EF3-83E4-56DF764DFFBC"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qdx1010_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B7AB84B-55D0-45EB-ABA8-F69E5179507E"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qdx1010:-:*:*:*:*:*:*:*", "matchCriteriaId": "B908A65E-F3B2-417A-91EE-1BE855BABD2E"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qdx1011_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6554B2E1-AE96-40CE-A19F-C7516CDBC41A"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qdx1011:-:*:*:*:*:*:*:*", "matchCriteriaId": "1991232B-B58F-481E-A7EE-0546E64C12CC"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qep8111_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BEB4913D-940F-49CC-951A-9704CCEE636C"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qep8111:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E93E1D2-4546-4D60-B53D-20CF09551766"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7456782E-B6CE-42ED-A51E-39907120E28B"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*", "matchCriteriaId": "637BF4DF-BB40-479F-B696-6AD9D4B35D64"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D72C4CE0-AB59-4652-854F-94C9998F2712"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qfw7124:-:*:*:*:*:*:*:*", "matchCriteriaId": "98720774-11B8-4B4B-BC73-D4DA84E07F78"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qrb5165m_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9CC1C8B-F642-4068-B9E3-ECE027486E45"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qrb5165m:-:*:*:*:*:*:*:*", "matchCriteriaId": "A60F8378-B827-4557-B891-A8A02F8F2A25"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qrb5165n_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "97BB1EB7-D194-4FE2-B4F6-A7A52F344DDE"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qrb5165n:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA2C90E7-0F3A-43BB-ABF7-63CEA7A85ADA"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qru1032_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8ECC6966-23CF-4189-81B3-477A97E38B05"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qru1032:-:*:*:*:*:*:*:*", "matchCriteriaId": "01490429-D26C-4F80-83A4-8DC257142B86"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qru1052_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EAAB699-BFDA-465B-9B82-5E957C67D52A"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qru1052:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D2C3994-110F-40FA-B60F-D2C85A36E256"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qru1062_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C81773C-4A1C-4589-A6FD-A85770F3ADFE"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qru1062:-:*:*:*:*:*:*:*", "matchCriteriaId": "CABCCB94-8C93-4CF1-9EA1-D410FF6ACD72"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qsm8250_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C194363-7FDE-43C9-B6FE-2BD6B474816F"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qsm8250:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8CC9433-6B33-4B9C-8EC3-BBBB43897E5C"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qsm8350_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1894F6B9-31DA-44E8-AA28-064F73EBEE8D"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qsm8350:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AA23845-D9F5-4035-8A93-F475D865586F"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:215_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "492AAB72-7E31-4711-9873-D97B76D77F53"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:215_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "12B165C3-4EE1-4E0B-9255-913AC805D141"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:video_collaboration_vc1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "25811F6A-AC23-4DCC-A987-B91E98EA7FB0"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:video_collaboration_vc1:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB0C4385-336B-4E10-B776-0AE51EBB6A12"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:video_collaboration_vc3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "77397AFD-F4B1-437E-AB50-99EE6F305859"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:video_collaboration_vc3:-:*:*:*:*:*:*:*", "matchCriteriaId": "50FAF626-07C9-42CB-B92B-C263D66CF27D"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:robotics_rb3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "01264215-1B23-4406-B5A2-2C0A7B4E9937"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:robotics_rb3:-:*:*:*:*:*:*:*", "matchCriteriaId": "F67FE29B-D218-4B32-B881-79262BD6BFA1"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:robotics_rb5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "71CFA659-DE2C-4AA0-8AAD-75033B2F4663"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:robotics_rb5:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C3E952A-9CA6-4A41-820C-9756B453DECF"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sa4150p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0DC99C0C-8AE3-4918-B91D-2C26990FE931"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sa4150p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A558A868-1B67-48D2-8A94-FDEA7126FAE7"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sa4155p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8D28764-EF4F-4FB3-B936-B42397450EFD"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sa4155p:-:*:*:*:*:*:*:*", "matchCriteriaId": "7964A762-467B-47D7-865F-30D48A0AE47C"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C66671C1-AE1A-44BE-9DB2-0B09FF4417DB"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*", "matchCriteriaId": "74AA3929-3F80-4D54-B13A-9B070D5C03BB"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "054F77D6-FC66-4151-9005-DC7ECDB5C722"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8ED3F589-16D9-46A7-A539-C9862473EE0D"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C40544E-B040-491C-8DF3-50225E70B50C"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sa6155:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2DAC85C-CDC9-4784-A69A-147A2CE8A8B2"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DC40C14-3B2D-4E00-9E0F-86E6BDBF2D81"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0514D433-162C-4680-8912-721D19BE6201"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sa7255p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2B651F0A-34DA-400F-A376-B499BFDF8E86"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sa7255p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CFF093D-98C8-470F-8330-E5126E06343A"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A71D74B0-0963-49FD-8E97-148C8993B263"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sa8145p:-:*:*:*:*:*:*:*", "matchCriteriaId": "910CBFA4-50F7-4C7A-B9B9-B88C8A919827"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "69C1B02F-8D2D-42E7-B70D-41F4D9844FD1"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*", "matchCriteriaId": "3FEACAA9-C061-4713-9A54-37D8BFC0B00B"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F33EB594-B0D3-42F2-B1CA-B0E6C9D82C6B"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sa8155:-:*:*:*:*:*:*:*", "matchCriteriaId": "50EF47E5-2875-412F-815D-44804BB3A739"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8648B38-2597-401A-8F53-D582FA911569"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A01CD59B-8F21-4CD6-8A1A-7B37547A8715"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "51BC0A66-493B-43BE-B51F-640BDF2FF32E"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8DA4D12-7ABF-4A04-B44E-E1D68C8E58AB"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC6E268D-C4AF-4950-9223-39EA36D538A8"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sa8255p:-:*:*:*:*:*:*:*", "matchCriteriaId": "073C1A81-D02B-4F2F-9378-CD1B2DCE0E5B"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A19659B-A0C3-44B7-8D54-BA21729873A4"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sa8295p:-:*:*:*:*:*:*:*", "matchCriteriaId": "F978041A-CE28-4BDF-A7DB-F0360F1A5F14"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sa8540p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FE8B62D-83B4-4326-8A53-FED5947D5FFE"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sa8540p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D6F8899-136A-4A57-9F02-BD428E1663DA"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sa8620p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6ACE6D64-A498-482F-8270-718F4884CFFD"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sa8620p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6E016D6-1B83-4261-A27E-1F9873F81E14"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sa8650p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0E807AA-5646-48AD-9A5C-B0B13E222AA9"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sa8650p:-:*:*:*:*:*:*:*", "matchCriteriaId": "45FBB72B-B850-4E3F-ACBB-9392157FF131"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "781CCC31-C08F-499B-BE73-6C7DB70437AF"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sa8770p:-:*:*:*:*:*:*:*", "matchCriteriaId": "75AFAA21-0589-4C6A-9418-34EE8A61BBAD"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C79595B-1259-4431-96F9-C5A24E624305"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sa8775p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F2F3431-9CD7-4D4F-833D-DD4D3ACF94C7"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A024AB04-B213-4018-A4C1-FA467C7BA775"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sa9000p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2A8AB7C-5D34-4794-8C06-2193075B323F"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sc8180x\\+sdx55_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C751ABFE-3B9B-472B-A10C-277270790D95"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sc8180x\\+sdx55:-:*:*:*:*:*:*:*", "matchCriteriaId": "C819454D-D413-478A-B78D-CFF6994803A1"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sc8380xp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "14E3FE58-7F1C-4F5C-B62D-0CF124E14AB2"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sc8380xp:-:*:*:*:*:*:*:*", "matchCriteriaId": "FFCB0BBA-3F81-4FCA-B3DE-190C46DA50DB"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sd_455_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3EF9964-D615-473E-A289-8A01D91D87AA"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sd_455:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C177163-B6E6-42D8-8969-C2F9832C6701"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F900C8F-9763-441A-B97E-E5394A68A08A"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sd_675:-:*:*:*:*:*:*:*", "matchCriteriaId": "589C1001-E9F6-41A6-BCC8-A94A3C97F2E6"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "76910884-45D9-4EA2-BA30-44A8C7CC1339"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sd_8_gen1_5g:-:*:*:*:*:*:*:*", "matchCriteriaId": "33D393A6-4586-4416-86EB-F9D86DC3DED8"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sd460_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "52036768-810C-40C2-9213-8397A4073703"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sd460:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE8AB22C-54EA-4D61-B6F9-7BC45820D29E"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sd626_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9043720-6B49-4305-BB4F-C88CCB6D89E9"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sd626:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC8F19D3-F322-4CDC-83C5-A9F7F1777DAD"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sd660_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3991C516-4FBE-43D8-835F-413FE45BF73E"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sd660:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9CF5EBB-B25A-4A76-B522-951F108263CC"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sd662_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7BE7001-5539-4C5E-A064-6E62023803AE"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sd662:-:*:*:*:*:*:*:*", "matchCriteriaId": "06661DAC-5D22-433E-B5EC-486931E265B4"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sd670_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B8DA94C-23A0-4C99-9F05-144B9B5224B3"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sd670:-:*:*:*:*:*:*:*", "matchCriteriaId": "39E10E22-E7CC-41D6-80F3-030083F45645"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sd675_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1497D052-884E-496B-BEF8-6904A25125ED"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sd675:-:*:*:*:*:*:*:*", "matchCriteriaId": "589F4888-28F6-4ECA-860E-8054C2A8C419"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sd730_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC4DA7EA-DB81-4C71-A875-2612D8D7D726"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sd730:-:*:*:*:*:*:*:*", "matchCriteriaId": "48F26F64-98D4-420A-8918-E5E56ABA1D47"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sd820_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC508C49-0B76-43A8-B2AF-0F8EB989E238"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sd820:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9665200-D306-4EEB-9F42-6C5963524179"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sd821_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A54F4A3-19E3-4825-98C7-DA632D692A06"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sd821:-:*:*:*:*:*:*:*", "matchCriteriaId": "028CD81A-0D9D-40B0-9E2F-DC8689607B24"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sd835_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DA605FD-B801-43BB-B52D-879013F7F57E"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sd835:-:*:*:*:*:*:*:*", "matchCriteriaId": "908BFD96-0423-4AFC-B8F3-105B2D5B4C73"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "42B30014-95AB-4F24-A7A5-60A907502609"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*", "matchCriteriaId": "F562ED3D-CBE3-4DCC-BFBB-DE0AD2425A9C"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "72433485-B229-46A6-BCA4-394AA4EEA683"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*", "matchCriteriaId": "04D40EC4-BF31-4BFD-8D0A-8193F541AF02"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "79219DA5-0D09-4CEF-AEFD-917F269AE7DF"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sd888:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D30BACF-71C1-4A6D-8811-9AD708A98307"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7E52771-4FB7-45DB-A349-4DD911F53752"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:*", "matchCriteriaId": "72F6CE39-9299-4FC3-BC48-11F79034F2E4"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E93FB34B-3674-404D-9687-E092E9A246AB"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3FF5A9A-A34A-499C-B6E0-D67B496C5454"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sg4150p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9279F02F-6C30-4891-8941-97003DE9C8C7"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sg4150p:-:*:*:*:*:*:*:*", "matchCriteriaId": "FFA7BB42-305C-451F-92D8-0718DF68A012"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8509F3A3-A1CA-466B-9031-4146C36B9AF8"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sg8275p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1813AB7-44F5-476B-9533-536F5B2F26BB"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sm4125_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2B93301-AFE8-409B-A8C8-6754BE5A0C14"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sm4125:-:*:*:*:*:*:*:*", "matchCriteriaId": "B185412C-177F-48E2-87F9-1269E0FB8E31"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FACA2BF1-85D3-447F-A08D-B90330A22550"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sm6250:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2ABA18D-82C1-4366-B1D7-DED42DD3D5C5"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sm6250p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3FB2972-94B6-4716-BA96-4B452BA3990F"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sm6250p:-:*:*:*:*:*:*:*", "matchCriteriaId": "57F4F872-094E-4E27-BB89-D8251FAFB713"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sm6370_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FCB558B-F8E3-4846-8869-51F0268D1EE1"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sm6370:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5F9A9AA-65AC-4331-9A76-8AF86C8D2E98"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "76DB5472-DF51-4144-8A69-9B231CF782DA"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D395018-251C-45AA-9EE8-A638CAB0B508"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sm7315_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4508742-7D97-43D8-B8F5-041F4C588723"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sm7315:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF8C63E8-169F-4164-BD49-348ED894813F"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BEC725F-19B1-4078-B13D-CE624BE23344"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sm7325p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EA43E38-A12D-49C3-B05C-A2AF07ED2710"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4CDD6A2-5A3C-4572-8CE1-2F102333BB79"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sm8550p:-:*:*:*:*:*:*:*", "matchCriteriaId": "699E5D17-6144-4F0A-8D52-1E8C83990E52"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:smart_audio_400_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF7A6EE4-D951-480F-8F68-D49983C911D6"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:smart_audio_400:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FD155BC-1157-4DEA-940A-FB8BD117D4C6"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:smart_display_200_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "13B56F26-ABA3-453C-8B69-2D9B044A3ECB"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:smart_display_200:-:*:*:*:*:*:*:*", "matchCriteriaId": "E01002F4-2FB0-46A9-A007-F6EA347E6CE2"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_4_gen_1_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "227113B6-BED5-4415-ACE5-192315EC214E"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_4_gen_1_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "65A640F4-373F-4358-92A6-F10C96A209AA"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_4_gen_2_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C120BFA0-D702-4305-817E-AEF5859D16A2"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_4_gen_2_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD9E9B05-12C3-4CE4-BA00-656021ABA4AC"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_425_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "12751FE9-CACC-4073-AFA7-68BC72085FFA"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_425_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "F312F7A1-6305-47C5-A084-C415E88FEC8D"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_427_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "39EE5BB7-EDA9-4E70-9CA8-99EC311158E6"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_427_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "262AA502-1003-4F71-B1A2-5440FB22CCE6"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_429_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B29ED8BE-FB30-4E28-B080-7970BBCF67CF"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_429_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1C36217-A66F-445C-8B5C-73E6096308DA"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_430_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC166AE9-7AB5-4817-BABF-1A3DAC8B0BD9"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_430_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FF08256-8F75-49C6-8E60-0A2707993D9C"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_435_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D23F7D4D-E1EC-4207-8C49-962E5ECCDE6F"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_435_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "2751EF7C-6021-48C5-BE0C-BBA0F4DA79FD"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_439_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA0C78AA-3643-4F5B-9135-EC4AB26F4568"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_439_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E284A11-239C-4B5E-9250-6D40ED782BE4"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_450_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C967E2C-6ADA-4833-8D7F-A437C8D6D0E1"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_450_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "407C101D-D392-46F2-8083-EA9CC2BF2472"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_460_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "94AD752A-551D-4FAB-9274-CB2164C857D9"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_460_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "8842CC5B-C753-47D9-BE13-723A4163FF8C"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_480_5g_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7289102B-C117-4CB3-9DBA-66BACC9FE193"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_480_5g_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "666B4CAD-FE81-4EDF-BB6F-CD260692A60B"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_480\\+_5g_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8DF4C4E-182D-472E-97AE-987203EE9057"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_480\\+_5g_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C8879AF-2AEE-49DB-BC00-8EF7E3C9A0F4"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_625_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEB22B82-1848-4EE3-A642-8F70C6630321"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_625_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7A6746D-9A3C-4128-BBDC-51414272F960"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_626_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D90D058A-66C7-49D5-8017-5E72A743B10D"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_626_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "BBB2966F-515F-4BBA-9E99-C12BEA2B1E8E"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_630_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D382DEBB-A358-4EA6-84B9-CB3F9161A1F2"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_630_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "B47A12A6-1DDF-453E-8590-1CA83234DB42"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_632_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F182BA2-4338-4925-A23A-BBDAAF3DB1A3"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_632_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DFFA4DA-4879-4040-A2C7-57D605629BB5"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_636_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BA77F18-C031-476E-9552-2BA63152321D"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_636_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "F59E6158-B097-4209-AE0D-A97A512C0473"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_660_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C2619A4-BBC8-4F27-B350-388EBAC36C47"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_660_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A4936DB-0B92-4DBF-9F55-19D439FCB2EB"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_662_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B099F64-FCD9-43F1-A066-A4FAE6738C5A"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_662_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0A285E2-E2CE-4488-8E3D-F5D5331D992C"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_665_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "12C0BA73-D23A-4136-974D-3332F0714113"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_665_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D5AF0B7-8B15-41AA-88E1-70E15A5F680A"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_670_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "066BEC31-0C11-4816-A76A-D1D4BC516FBA"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_670_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8196A85-1D01-4663-8C6E-043BFACFE25E"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_675_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "46DCE136-DC16-41A2-92F4-36A859AF833F"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_675_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D1E661D-F412-43D8-98C2-CE371C2FD316"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_678_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C34EE20-69D2-407A-A916-77E79D0C27E8"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_678_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "568B682C-2B70-4EC0-9E1A-E6A418D53F4C"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_680_4g_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D957EE2B-0964-4806-A55B-D6EDE64F4B2B"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_680_4g_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "13B91E86-CBB8-4561-A983-0199B4491085"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_685_4g_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5BFA049-4B7C-4B94-B48B-5770E05B7486"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_685_4g_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "6BD0F530-6F6D-4507-9A64-31DC64E601CE"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_690_5g_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "68A8C971-F15A-43DA-B0CB-E5DFFD38CC67"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_690_5g_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "6186C3B6-BAE1-4858-9E6A-6610AC2CE557"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_695_5g_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C0D8E82-3425-4605-B220-068F36A190CE"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_695_5g_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "187FA325-AC3A-476B-9250-2B5B0368D28E"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_710_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "551389EF-6963-428B-8288-53516F691B2E"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_710_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "73ED06A2-6EDF-4752-95B8-8672B235D3D4"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_712_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5D964C7-EAC3-4218-9C54-22D6E8CE59F5"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_712_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EA59351-C34B-415B-B7EF-BAAB2BEC23DE"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_720g_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0FD385E-E449-4188-88CE-2710D547D8DA"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_720g_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "2823F2C7-811A-4839-9F85-A49E11E2BBA8"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_730_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FA9BDF1-C4E1-4820-BF42-C02348D8F9C7"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_730_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "917D4DBB-A92B-4358-99E2-5B77B210DE16"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_730g_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "769EAF36-C661-473E-84F2-0708CCFC3C1B"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_730g_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "62203044-75B4-4283-8D96-2AC4EC158178"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_732g_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2948781-8EE5-49A5-83F1-632CBF310A80"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_732g_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE017277-5D70-4853-B804-391D5B37D72E"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_750g_5g_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9138F28E-342A-4D3F-AF83-A2C166784775"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_750g_5g_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "410C540A-E8FA-4765-8519-8CA69E23A891"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_765_5g_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0D23A8E-06DE-4DE2-ADAD-9D9B7CA09F7D"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_765_5g_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "B00B72F0-6E85-40D6-A162-66908A570F46"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_765g_5g_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "16B75F00-99B2-4C63-81F0-39257002630A"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_765g_5g_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2D3D004-F706-4D66-993A-B72AB0F9D129"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_768g_5g_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A7E183E-2BD3-4745-81EA-21A357C14E0D"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_768g_5g_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1BF63E3-8673-463E-BF55-3F9B32EF9A29"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_778g_5g_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0E4E3E9-0BF2-47D1-BCC1-2254A5480759"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_778g_5g_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD1EC478-D2DA-43AA-9302-B6BC99AB69E9"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_778g\\+_5g_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "643FA101-D9EB-4B92-ABF1-70FEE2E8968E"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_778g\\+_5g_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "73CF3FE5-6139-4537-8CDD-9039C4F8FA41"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_780g_5g_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D31E13FF-84CC-443D-8299-BE3F950B21B2"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_780g_5g_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "68CBA070-8BAE-4915-8E74-07224641A474"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_782g_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B96B9F8F-8B71-41A1-985B-45678BC4334D"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_782g_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "3018C28E-A5E5-4AEA-A209-4A3A4BBA208E"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_7c_compute_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B80BE46-13C8-4AA5-8C39-865603713F8B"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_7c_compute:-:*:*:*:*:*:*:*", "matchCriteriaId": "5489E441-7C58-4B0F-B878-9060ABE05D9E"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_7c_gen_2_compute_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2931C0E3-D4E7-4A75-B80E-0E248E2E5001"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_7c_gen_2_compute:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C7F2111-F4F3-4C22-B9F8-65EAF8FF7452"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_7c\\+_gen_3_compute_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4A050CA-8514-400A-A6B3-F513CC93CA14"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_7c\\+_gen_3_compute:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD850305-1E76-4952-A3FB-F6229CBF7FE9"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "13AF1A58-3121-4F06-9B13-D7D94A8A10A8"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_1_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "629264C3-8EA3-475F-88D5-4407691499DA"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "863BA6B8-5F2D-4D97-BBBE-EAD5B35AB3AA"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_2_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E0344CF-A15E-4734-852F-9553E780644B"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_3_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA40FA0B-F9F1-48D4-B68A-ECD7241A5F39"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_3_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B00530E-070B-4832-AFF0-535D4A1A6F85"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_1_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "30C5328F-51FE-4EFB-BFA4-5BA9D504AC6D"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_1_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3E50675-727A-4749-B8BB-3BCF507C4468"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_2_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "28D14A7F-F116-416B-A359-32D395F706D4"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_2_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B67D19B-E1B0-41A2-B122-FBA6D797F3C8"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_820_automotive_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "73954A37-654B-4EE2-B14F-A70A992CA807"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_820_automotive:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC6A42E7-0D95-4697-9088-41E92600C16A"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_820_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "26CC97B1-E6D9-4D13-ABD7-7B6AD7EC58A1"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_820_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "23F78240-ED43-42EB-8ABA-7F45BAA9CF27"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_821_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB6B7180-1E7D-4030-8A0B-FD19B095CB55"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_821_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "05FEBD40-CC19-4441-9540-C1B142EA1421"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_835_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B58D6FA9-8A6D-43CA-82F2-4D2EE88F99CD"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_835_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "56398619-46AB-4A00-999B-5F0C091C2B15"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_845_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "14F878B5-7E62-40D5-AD88-D109130F6F57"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_845_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "3BDDA689-D36D-456B-9AC1-3FA925563F30"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_855_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F83F4E9E-481F-4275-BCB2-0706D52D8DEE"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_855_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B49C835-2316-49CA-B87C-790C19D81688"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_855\\+_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B3A4256-DBA0-4981-A6EE-BEA06AF3C1D8"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_855\\+_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "C200D712-451B-4748-B0DE-5EBCFB591045"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_860_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9FC371A-F67E-466C-BE01-F867EE587078"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_860_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A2FAB27-2BDF-4FED-872D-9622050992CF"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_865_5g_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0627B052-B244-492C-9257-9E85ACCE0B19"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_865_5g_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6285755-E27F-4538-8F48-5F9DCDC4CB09"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_865\\+_5g_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8130D33F-B5B7-439D-A35B-AD662C35B690"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_865\\+_5g_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "A89428FC-0EB0-4121-B674-664EAD761DD0"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_870_5g_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE2EBD77-F5C5-43DE-BD01-788471DB8262"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_870_5g_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C666B23-5049-424C-80A5-BC45F579DECD"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_888_5g_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F461BDE7-E847-4FF4-8D05-598FBF76D7B6"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_888_5g_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "0BC46263-C6FF-4BC0-83A5-D5A17954DB5F"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_888\\+_5g_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F2F6A7B-053D-4C18-883E-32DD0E317D04"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_888\\+_5g_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "60739810-16B9-48FA-8DB5-E0AD336F6912"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sc8180x-ad_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2802A422-CCEA-4634-B164-09AC35C00C2F"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sc8180x-ad:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AB65F7E-6921-44AA-8B2C-C4814BD51A7F"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sc8180xp-ad_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7EB4CA4-CEAF-4D8C-AE28-5373CC5E46D7"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sc8180xp-ad:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B12A03C-20D1-452A-99E6-BA94C02BA982"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sc8180x-aaab_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "328838FB-9338-4BB1-8492-9F3E6628F105"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sc8180x-aaab:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C73B5E9-9786-4D98-B701-7341A6673410"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sc8180xp-acaf_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "360E939C-2089-4402-9D72-EF3014EBB330"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sc8180xp-acaf:-:*:*:*:*:*:*:*", "matchCriteriaId": "784952CE-8A95-4288-A672-36CCC3B5FB18"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sc8180x-acaf_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "84B9DA10-0264-4226-AA31-B5C7DAEA8BB0"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sc8180x-acaf:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DF82CE3-F715-4039-9473-9B47888A6501"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sc8180xp-aaab_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "04274F69-E871-4EEC-A66B-698048D00225"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sc8180xp-aaab:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D40E4D1-64B4-4E16-B43E-90A0627EE07D"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sc8280xp-abbb_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7EA3A08-8624-4B78-AD75-828A3DF4CC52"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sc8280xp-abbb:-:*:*:*:*:*:*:*", "matchCriteriaId": "57E75758-F191-45B7-86A8-7F4EC08D2965"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_ar2_gen_1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BB4A33E-6647-447E-BDA3-24246D49C5DD"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_ar2_gen_1:-:*:*:*:*:*:*:*", "matchCriteriaId": "1046CC3E-FB12-4527-9978-DCC40EEE8938"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "88AF39A5-F44E-4B14-AA6E-4F80D9EEB017"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A25FE8F-555A-4D85-8A94-A808B62EAE86"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE5FCA7F-1FBE-42AA-B4E6-09CEA02A33EC"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf_gen_2:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2D789BC-43F5-40FB-A191-163C01BA5FBE"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_w5\\+_gen_1_wearable_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0F761E3-62F7-4A70-A3CA-09FF283ABD9C"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_w5\\+_gen_1_wearable:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6136853-B719-4DA2-B6C9-C9E8EF02B35A"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_wear_4100\\+_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA1AEB2C-F420-46A6-8804-A35870153BAA"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_wear_4100\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "20746D0A-8D06-4483-AE84-2E0232259171"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_x24_lte_modem_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5CAB1351-A614-4E73-B58E-7D624695C657"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_x24_lte_modem:-:*:*:*:*:*:*:*", "matchCriteriaId": "4494AAD7-D132-41DB-9756-CAD1F3F7AE7E"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_x35_5g_modem-rf_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B42EAAC-230A-4901-8B3A-45EF95087109"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_x35_5g_modem-rf:-:*:*:*:*:*:*:*", "matchCriteriaId": "19E8F0E4-F768-4EC4-A9C1-1291A7C79E23"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_x50_5g_modem-rf_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0945BED-18AD-4B6E-92EC-E5421D333B95"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_x50_5g_modem-rf:-:*:*:*:*:*:*:*", "matchCriteriaId": "067F3D3D-59C4-4245-9385-F8A9697779E8"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_x55_5g_modem-rf_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DD56A4A-BBE6-4AE4-A4C1-4914E997F08C"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_x55_5g_modem-rf:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DE28E8F-0A21-497B-9082-79EB74E1CF33"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF9DE2CE-4765-4696-ABFE-4808EF77C8D9"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_x65_5g_modem-rf:-:*:*:*:*:*:*:*", "matchCriteriaId": "8031F868-16B3-4173-835A-0F818471CF4F"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D82AAC94-6D8C-4EB7-ADDF-544AFCA809D6"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_x75_5g_modem-rf:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A169176-2CBF-44B6-B4C8-C93D72E6D77D"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED623126-9BE8-441A-8F5D-397F588FFC48"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr1:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A55B55F-D25A-455D-8CC2-415A677393F6"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr2_5g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "665811D8-F648-4F32-A375-FAF9C9E928B3"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr2_5g:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A537932-6EAD-411B-83FF-48CF050F603A"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr2\\+_gen_1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD779739-5919-43A9-B949-D1FB4A46FA11"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr2\\+_gen_1:-:*:*:*:*:*:*:*", "matchCriteriaId": "BDA3083D-C664-45C7-98CD-E90223F887A8"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_4g_modem_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C8F12FE-0057-4A13-9A7F-D12C114ECEF9"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_4g_modem:-:*:*:*:*:*:*:*", "matchCriteriaId": "1271B0C7-2D91-4129-9B58-E6689DD68C39"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:srv1h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CD199F5-DA68-4BEB-AA99-11572DA26B4F"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:srv1h:-:*:*:*:*:*:*:*", "matchCriteriaId": "8ACA2D4D-FC77-4C1A-8278-1C27B3EA3303"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:srv1m_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4B29E7F-8BFE-466A-B357-63F8A2160C4E"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:srv1m:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D55CC7D-2E65-4CA9-9892-B6FBCC087E6F"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:ssg2115p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A146E52D-4AFC-47B4-920F-DAC76077DF25"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:ssg2115p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BA4BA00-C8D1-4DAC-8030-CB5EEC7D4591"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:ssg2125p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA41907C-1CDE-42F3-B21D-5D53B2F06AF7"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:ssg2125p:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDC270A7-205C-41EB-A2E5-2A381A16BFBB"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA1BF9BB-AF11-46A7-A71C-F7D289E76E3F"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sw5100:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B8455D6-287D-4934-8E4D-F4127A9C0449"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB599A9F-0305-4FE4-8623-0F86630FEDCB"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sw5100p:-:*:*:*:*:*:*:*", "matchCriteriaId": "EEB883BF-68B2-4C25-84DC-5DA953BFAA2F"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sxr1120_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF839E24-6542-4C5D-A1B7-FD3BA00683CB"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sxr1120:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9F12284-93E0-482D-9D35-EB38BA7D6C6D"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sxr1230p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE3236D6-0D01-4D05-B580-8888B99BAA5D"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sxr1230p:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E1753FC-F3CD-4B50-886D-8E16D9301A84"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F9FA3B1-E4E4-4D9B-A99C-7BF958D4B993"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*", "matchCriteriaId": "95762B01-2762-45BD-8388-5DB77EA6139C"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD6444F6-A477-4B4C-8A09-C22C47CCE45B"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sxr2230p:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3E20681-4FC4-46E2-AF77-BCF03BC8E77E"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sxr2250p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "68A93ED1-F509-439E-AE7B-F0EC87AE759F"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sxr2250p:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB5E2A98-EDD0-4298-911D-EC7527D5A424"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:talynplus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D2CEB90-83F6-4A96-A666-18F81533F67D"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:talynplus:-:*:*:*:*:*:*:*", "matchCriteriaId": "73131CBF-918D-46A8-AD05-6D822015ACF8"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:vision_intelligence_100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7950993A-8669-479E-9531-B8FBF6AF6EB2"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:vision_intelligence_100:-:*:*:*:*:*:*:*", "matchCriteriaId": "B34E6D81-1585-4CAF-9A94-BD14500A1E67"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:vision_intelligence_200_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4535EF79-92F4-484B-B84B-5927FF07F3CD"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:vision_intelligence_200:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D8B89D9-12BD-44B5-95A6-DBAAB5B0745B"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:vision_intelligence_300_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C33CAF7D-F810-41D3-9BFE-C61E7758CE84"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:vision_intelligence_300:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B4BAC93-2C2A-4A73-A652-CD6B2F608CDD"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:vision_intelligence_400_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8E976A6-4785-4F88-9035-0F6F0509A642"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:vision_intelligence_400:-:*:*:*:*:*:*:*", "matchCriteriaId": "16204302-0B17-4759-A4C8-E8B0301BBCAB"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A2FAD34-B7C5-400A-8575-A12CDE65ACBE"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcd9326:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A39A2E5-6D8D-4F6E-98CB-96DB1975A4BC"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "28717583-463A-468A-8073-ECF0F90585F6"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D1A7188-7D5D-4D46-AEAB-08BA84FFF539"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BA28CC6-C8BB-4F50-BFE3-A59F664A4F54"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*", "matchCriteriaId": "94D2BDF1-764C-48BA-8944-3275E8768078"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE852339-1CAE-4983-9757-8F00EDEF1141"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D9E96B3-F1BB-46F8-B715-7DF90180F1E1"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcd9360_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4D6C6B2-36DC-4D0D-AFF8-2108A090A78D"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcd9360:-:*:*:*:*:*:*:*", "matchCriteriaId": "28FEB3B1-F641-436D-AC4F-3304C37167C4"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1295D869-F4DD-4766-B4AA-3513752F43B4"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*", "matchCriteriaId": "B98784DC-3143-4D38-AD28-DBBDCCAB4272"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcd9371_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2503805B-B2A6-4AEE-8AB1-2B8A040702BD"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcd9371:-:*:*:*:*:*:*:*", "matchCriteriaId": "D3AD370C-2ED0-43CF-83D9-50DC92A01CA5"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "34143ABA-7D09-429F-A65C-3A33438BF62C"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D56DFE3-5EF1-4B23-BBD5-0203FBF9CCEC"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1FA2EB9-416F-4D69-8786-386CC73978AE"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "896F1C04-9957-440F-BF01-C3772CC3B3DF"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*", "matchCriteriaId": "A90555EB-47A7-4717-92D5-35B561825F06"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "699056F6-1517-4F25-AE07-4FFCF6923B9F"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4C023D2-6FF5-4FFC-B9F2-895979166580"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcn3610_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DAFD64E7-3F13-4DCA-8C46-6E8FE0C6F798"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcn3610:-:*:*:*:*:*:*:*", "matchCriteriaId": "044A14FB-64F6-4200-AC85-8DC91C31BD16"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcn3615_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9590EF1F-E821-4525-943B-4A315ACAEFFC"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcn3615:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A7D32B3-325E-4B1F-8649-3D0071396BBA"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D99CA230-0694-4898-A06E-9C522CCB86CE"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcn3620:-:*:*:*:*:*:*:*", "matchCriteriaId": "62B00662-139A-4E36-98FA-D4F7D101D4AB"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcn3660_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B2669D0-81C0-4F3C-B9AF-1453815C68B1"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcn3660:-:*:*:*:*:*:*:*", "matchCriteriaId": "34D7240B-DCB4-4BF4-94C7-13EBECA62D6C"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB37B5DB-2493-4082-B2BF-60385B7E027C"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*", "matchCriteriaId": "6BCD2FE2-11F2-4B2A-9BD7-EB26718139DA"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcn3680_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F66A898-3C7A-4D44-86BD-89129F04E654"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcn3680:-:*:*:*:*:*:*:*", "matchCriteriaId": "B612B044-C7D1-4662-AB2A-5400E34A3CA7"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0755F669-6D7E-454A-95DA-D60FA0696FD9"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcn3680b:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE861CE7-B530-4698-A9BC-43A159647BF2"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcn3910_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F0D7B24-D567-479A-B4F1-595FAA053418"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcn3910:-:*:*:*:*:*:*:*", "matchCriteriaId": "33A8FAA1-F824-4561-9CCC-7F0DF12F740F"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3FEF2DB6-00F5-4B07-953B-EF58B31267F1"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*", "matchCriteriaId": "120E8F0F-EBEB-4565-9927-2D473F783EF7"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C6E9038-9B18-4958-BE1E-215901C9B4B2"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*", "matchCriteriaId": "B36D3274-F8D0-49C5-A6D5-95F5DC6D1950"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4BFB25F-013B-48E3-99FF-3E8687F94423"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF676C5B-838B-446C-A689-6A25AB8A87E2"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2744A053-5BD9-45A9-A2FC-791BCA0CCD4C"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5F28E29-520F-469E-B048-62DE2EF07ADD"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcn3999_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF49BC31-A332-4B9A-A826-F63116D7029F"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcn3999:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DD3C245-D5F8-4145-8CDF-F635D2C8F088"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB5DB2B8-25E1-4C0F-8AFB-7627FF9A04E1"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB21B3F-6D07-4B45-8A71-DC5490176296"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "15307882-7039-43E9-9BA3-035045988B99"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA85B322-E593-4499-829A-CC6D70BAE884"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E839A0B9-64C3-4C7A-82B7-D2AAF65928F8"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E870D82-DE3B-4199-A730-C8FB545BAA98"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7ACAD26E-B79E-4659-91A5-D301281F7D36"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0E46DA6-9494-4D92-A4AE-A272AF6ACCCC"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA33DE15-C177-43B3-AD50-FF797753D12E"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE1A5841-5BCB-4033-ACB9-23F3FCA65309"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B47BF35-3AA0-4667-842E-19B0FE30BF3C"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A071672-9405-4418-9141-35CEADBB65AF"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB7CF473-8B25-4851-91F2-1BD693CCDC85"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*", "matchCriteriaId": "91E591F2-8F72-4A5A-9264-2742EB2DABDA"}]}]}], "references": [{"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2024-bulletin.html", "source": "product-security@qualcomm.com", "tags": ["Vendor Advisory"]}, {"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2024-bulletin.html", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-33461.json b/cve/2023/CVE-2023-33461.json index d5f9b9fb841..b9a11d65c46 100644 --- a/cve/2023/CVE-2023-33461.json +++ b/cve/2023/CVE-2023-33461.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-33461", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-01T03:15:20.547", "lastModified": "2024-11-21T08:05:35.730", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "iniparser v4.1 is vulnerable to NULL Pointer Dereference in function iniparser_getlongint which misses check NULL for function iniparser_getstring's return."}, {"lang": "es", "value": "Iniparser v4.1 es vulnerable a una desreferencia de puntero NULL en la funci\u00f3n \"iniparser_getlongint\" que no comprueba el retorno NULL de la funci\u00f3n \"iniparser_getstring\". "}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "baseScore": 5.5, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-476"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:ndevilla:iniparser:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "90A0D9C2-3EC9-42A8-A01F-1D90B64994EC"}]}]}], "references": [{"url": "https://github.com/ndevilla/iniparser/issues/144", "source": "cve@mitre.org", "tags": ["Exploit", "Issue Tracking", "Vendor Advisory"]}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ASV7SEDHGCP63GYAFEW3CTTVQDZM5RIK/", "source": "cve@mitre.org", "tags": ["Mailing List", "Third Party Advisory"]}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BQAIP5AURSTWIQOOP7G4CXYJ5IIGPY3Q/", "source": "cve@mitre.org", "tags": ["Mailing List", "Third Party Advisory"]}, {"url": "https://github.com/ndevilla/iniparser/issues/144", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Issue Tracking", "Vendor Advisory"]}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ASV7SEDHGCP63GYAFEW3CTTVQDZM5RIK/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Mailing List", "Third Party Advisory"]}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BQAIP5AURSTWIQOOP7G4CXYJ5IIGPY3Q/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Mailing List", "Third Party Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-33461", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-01T03:15:20.547", "lastModified": "2025-01-09T17:15:09.730", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "iniparser v4.1 is vulnerable to NULL Pointer Dereference in function iniparser_getlongint which misses check NULL for function iniparser_getstring's return."}, {"lang": "es", "value": "Iniparser v4.1 es vulnerable a una desreferencia de puntero NULL en la funci\u00f3n \"iniparser_getlongint\" que no comprueba el retorno NULL de la funci\u00f3n \"iniparser_getstring\". "}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "baseScore": 5.5, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 3.6}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "baseScore": 5.5, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-476"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-476"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:ndevilla:iniparser:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "90A0D9C2-3EC9-42A8-A01F-1D90B64994EC"}]}]}], "references": [{"url": "https://github.com/ndevilla/iniparser/issues/144", "source": "cve@mitre.org", "tags": ["Exploit", "Issue Tracking", "Vendor Advisory"]}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ASV7SEDHGCP63GYAFEW3CTTVQDZM5RIK/", "source": "cve@mitre.org", "tags": ["Mailing List", "Third Party Advisory"]}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BQAIP5AURSTWIQOOP7G4CXYJ5IIGPY3Q/", "source": "cve@mitre.org", "tags": ["Mailing List", "Third Party Advisory"]}, {"url": "https://github.com/ndevilla/iniparser/issues/144", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Issue Tracking", "Vendor Advisory"]}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ASV7SEDHGCP63GYAFEW3CTTVQDZM5RIK/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Mailing List", "Third Party Advisory"]}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BQAIP5AURSTWIQOOP7G4CXYJ5IIGPY3Q/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Mailing List", "Third Party Advisory"]}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-33544.json b/cve/2023/CVE-2023-33544.json index 795749bccb5..93b2af2902f 100644 --- a/cve/2023/CVE-2023-33544.json +++ b/cve/2023/CVE-2023-33544.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-33544", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-01T13:15:10.637", "lastModified": "2024-11-21T08:05:41.690", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "hawtio 2.17.2 is vulnerable to Path Traversal. it is possible to input malicious zip files, which can result in the high-risk files after decompression being stored in any location, even leading to file overwrite."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "baseScore": 5.5, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "availabilityImpact": "NONE"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-22"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:hawt:hawtio:2.17.2:*:*:*:*:*:*:*", "matchCriteriaId": "C51751B6-656C-4410-8B49-25E3796FD279"}]}]}], "references": [{"url": "https://github.com/hawtio/hawtio/issues/2832", "source": "cve@mitre.org", "tags": ["Exploit", "Issue Tracking", "Third Party Advisory"]}, {"url": "https://github.com/hawtio/hawtio/issues/2832", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Issue Tracking", "Third Party Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-33544", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-01T13:15:10.637", "lastModified": "2025-01-09T17:15:09.997", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "hawtio 2.17.2 is vulnerable to Path Traversal. it is possible to input malicious zip files, which can result in the high-risk files after decompression being stored in any location, even leading to file overwrite."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "baseScore": 5.5, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "availabilityImpact": "NONE"}, "exploitabilityScore": 1.8, "impactScore": 3.6}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "baseScore": 5.5, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "availabilityImpact": "NONE"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-22"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-22"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:hawt:hawtio:2.17.2:*:*:*:*:*:*:*", "matchCriteriaId": "C51751B6-656C-4410-8B49-25E3796FD279"}]}]}], "references": [{"url": "https://github.com/hawtio/hawtio/issues/2832", "source": "cve@mitre.org", "tags": ["Exploit", "Issue Tracking", "Third Party Advisory"]}, {"url": "https://github.com/hawtio/hawtio/issues/2832", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Issue Tracking", "Third Party Advisory"]}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-33552.json b/cve/2023/CVE-2023-33552.json index 1a61ff4e52d..dd7ea9ae4cf 100644 --- a/cve/2023/CVE-2023-33552.json +++ b/cve/2023/CVE-2023-33552.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-33552", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-01T15:15:09.163", "lastModified": "2024-11-21T08:05:42.310", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "Heap Buffer Overflow in the erofs_read_one_data function at data.c in erofs-utils v1.6 allows remote attackers to execute arbitrary code via a crafted erofs filesystem image."}, {"lang": "es", "value": "Desbordamiento de B\u00fafer en la funci\u00f3n erofs_read_one_data en data.c en erofs-utils v1.6 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de una imagen del sistema de archivos erofs manipulada."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "baseScore": 7.8, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-787"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:erofs-utils_project:erofs-utils:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "C8CA601C-DA3C-45D8-AD44-6927478FC63D"}]}]}], "references": [{"url": "https://github.com/lometsj/blog_repo/issues/1", "source": "cve@mitre.org", "tags": ["Exploit", "Issue Tracking", "Patch", "Third Party Advisory"]}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHOIRL6XH5NYR3LYI3KP5DE4SDSQWR7W/", "source": "cve@mitre.org"}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGGIYW7PHYQM2NPYCJPSPSLULLD2P2PE/", "source": "cve@mitre.org"}, {"url": "https://github.com/lometsj/blog_repo/issues/1", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Issue Tracking", "Patch", "Third Party Advisory"]}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHOIRL6XH5NYR3LYI3KP5DE4SDSQWR7W/", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGGIYW7PHYQM2NPYCJPSPSLULLD2P2PE/", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-33552", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-01T15:15:09.163", "lastModified": "2025-01-09T17:15:10.250", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "Heap Buffer Overflow in the erofs_read_one_data function at data.c in erofs-utils v1.6 allows remote attackers to execute arbitrary code via a crafted erofs filesystem image."}, {"lang": "es", "value": "Desbordamiento de B\u00fafer en la funci\u00f3n erofs_read_one_data en data.c en erofs-utils v1.6 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de una imagen del sistema de archivos erofs manipulada."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "baseScore": 7.8, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "baseScore": 7.8, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-787"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-787"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:erofs-utils_project:erofs-utils:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "C8CA601C-DA3C-45D8-AD44-6927478FC63D"}]}]}], "references": [{"url": "https://github.com/lometsj/blog_repo/issues/1", "source": "cve@mitre.org", "tags": ["Exploit", "Issue Tracking", "Patch", "Third Party Advisory"]}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHOIRL6XH5NYR3LYI3KP5DE4SDSQWR7W/", "source": "cve@mitre.org"}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGGIYW7PHYQM2NPYCJPSPSLULLD2P2PE/", "source": "cve@mitre.org"}, {"url": "https://github.com/lometsj/blog_repo/issues/1", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Issue Tracking", "Patch", "Third Party Advisory"]}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHOIRL6XH5NYR3LYI3KP5DE4SDSQWR7W/", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGGIYW7PHYQM2NPYCJPSPSLULLD2P2PE/", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-33754.json b/cve/2023/CVE-2023-33754.json index 2d747e932df..723fcb80f8a 100644 --- a/cve/2023/CVE-2023-33754.json +++ b/cve/2023/CVE-2023-33754.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-33754", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-01T20:15:09.467", "lastModified": "2024-11-21T08:05:56.947", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "The captive portal in Inpiazza Cloud WiFi versions prior to v4.2.17 does not enforce limits on the number of attempts for password recovery, allowing attackers to brute force valid user accounts to gain access to login credentials."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-307"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:inpiazza:cloud_wifi:*:*:*:*:*:*:*:*", "versionEndExcluding": "4.2.17", "matchCriteriaId": "52E35BA6-25EC-4A10-BF97-06AD7D757B7C"}]}]}], "references": [{"url": "https://github.com/Alkatraz97/CVEs/blob/main/CVE-2023-33754.md", "source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"]}, {"url": "https://github.com/Alkatraz97/CVEs/blob/main/CVE-2023-33754.md", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-33754", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-01T20:15:09.467", "lastModified": "2025-01-09T17:15:10.470", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "The captive portal in Inpiazza Cloud WiFi versions prior to v4.2.17 does not enforce limits on the number of attempts for password recovery, allowing attackers to brute force valid user accounts to gain access to login credentials."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 3.6}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-307"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-307"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:inpiazza:cloud_wifi:*:*:*:*:*:*:*:*", "versionEndExcluding": "4.2.17", "matchCriteriaId": "52E35BA6-25EC-4A10-BF97-06AD7D757B7C"}]}]}], "references": [{"url": "https://github.com/Alkatraz97/CVEs/blob/main/CVE-2023-33754.md", "source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"]}, {"url": "https://github.com/Alkatraz97/CVEs/blob/main/CVE-2023-33754.md", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"]}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-34312.json b/cve/2023/CVE-2023-34312.json index 75759301ec5..e85120f1b3d 100644 --- a/cve/2023/CVE-2023-34312.json +++ b/cve/2023/CVE-2023-34312.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-34312", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-01T03:15:20.673", "lastModified": "2024-11-21T08:06:59.357", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "In Tencent QQ through 9.7.8.29039 and TIM through 3.4.7.22084, QQProtect.exe and QQProtectEngine.dll do not validate pointers from inter-process communication, which leads to a write-what-where condition."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.8, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-763"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:tencent:qq:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.7.1.28940", "versionEndIncluding": "9.7.8.29039", "matchCriteriaId": "5FE916C4-93CB-42B0-B01F-45015B263C7F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:tencent:tim:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.4.5.22071", "versionEndIncluding": "3.4.7.22084", "matchCriteriaId": "7EF89892-427C-4662-B796-645E549813D8"}]}]}], "references": [{"url": "https://github.com/vi3t1/qq-tim-elevation", "source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"]}, {"url": "https://github.com/vi3t1/qq-tim-elevation", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-34312", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-01T03:15:20.673", "lastModified": "2025-01-09T17:15:10.757", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "In Tencent QQ through 9.7.8.29039 and TIM through 3.4.7.22084, QQProtect.exe and QQProtectEngine.dll do not validate pointers from inter-process communication, which leads to a write-what-where condition."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.8, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.8, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-763"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-763"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:tencent:qq:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.7.1.28940", "versionEndIncluding": "9.7.8.29039", "matchCriteriaId": "5FE916C4-93CB-42B0-B01F-45015B263C7F"}, {"vulnerable": true, "criteria": "cpe:2.3:a:tencent:tim:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.4.5.22071", "versionEndIncluding": "3.4.7.22084", "matchCriteriaId": "7EF89892-427C-4662-B796-645E549813D8"}]}]}], "references": [{"url": "https://github.com/vi3t1/qq-tim-elevation", "source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"]}, {"url": "https://github.com/vi3t1/qq-tim-elevation", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"]}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-43553.json b/cve/2023/CVE-2023-43553.json index faaf97611a2..3c8765279f4 100644 --- a/cve/2023/CVE-2023-43553.json +++ b/cve/2023/CVE-2023-43553.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-43553", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-03-04T11:15:14.370", "lastModified": "2024-11-21T08:24:21.573", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Memory corruption while parsing beacon/probe response frame when AP sends more supported links in MLIE."}, {"lang": "es", "value": "Corrupci\u00f3n de la memoria al analizar el marco de respuesta de baliza/sonda cuando AP env\u00eda m\u00e1s enlaces compatibles en MLIE."}], "metrics": {"cvssMetricV31": [{"source": "product-security@qualcomm.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 5.9}]}, "weaknesses": [{"source": "product-security@qualcomm.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-823"}]}], "references": [{"url": "https://www.qualcomm.com/company/product-security/bulletins/march-2024-bulletin", "source": "product-security@qualcomm.com"}, {"url": "https://www.qualcomm.com/company/product-security/bulletins/march-2024-bulletin", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-43553", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-03-04T11:15:14.370", "lastModified": "2025-01-09T16:13:46.290", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Memory corruption while parsing beacon/probe response frame when AP sends more supported links in MLIE."}, {"lang": "es", "value": "Corrupci\u00f3n de la memoria al analizar el marco de respuesta de baliza/sonda cuando AP env\u00eda m\u00e1s enlaces compatibles en MLIE."}], "metrics": {"cvssMetricV31": [{"source": "product-security@qualcomm.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 5.9}]}, "weaknesses": [{"source": "product-security@qualcomm.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-823"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "configurations": [{"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:csr8811_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4CAA848-413D-4C63-823B-BFCE95C7740C"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:csr8811:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AA32CC0-DE30-4B15-8EC6-1FAF14C5C4E2"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*", "matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*", "matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:immersive_home_214_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C7CEC6E-D316-4A89-BB58-003C2E3369FD"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:immersive_home_214:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA5A801F-F95E-4E6F-AE6A-9F3D112FA69C"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:immersive_home_216_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "779827C5-93CF-45BE-827C-F8B4443AE302"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:immersive_home_216:-:*:*:*:*:*:*:*", "matchCriteriaId": "30EB0454-57C1-4054-BB62-ADC31817D254"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:immersive_home_316_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7FCC903-A4B0-4462-9D1D-9B7B767D4607"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:immersive_home_316:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1725FFF-665F-4569-996C-31A0BB094D4F"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:immersive_home_318_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "87655E53-09B3-4BC0-8BB4-1E4F0FFAE15F"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:immersive_home_318:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA1B1C6F-9195-4B94-9AAB-7E3EA6275F62"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:immersive_home_3210_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "76575CA9-1AB3-4439-94CA-92BB5621BCBE"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:immersive_home_3210:-:*:*:*:*:*:*:*", "matchCriteriaId": "2044DFDA-60AB-4C29-9FC3-3D5439C6DCD5"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:immersive_home_326_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "88A90EF6-B60A-4027-B301-C9A86CB096A2"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:immersive_home_326:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C1EFED-B36C-49E4-9791-68338C24C565"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:ipq5010_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8543C671-054B-489F-ACFE-B7D7BEC1DEE6"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:ipq5010:-:*:*:*:*:*:*:*", "matchCriteriaId": "15C5F8CB-3291-4E13-94F0-680FC85A9669"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:ipq5028_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5AE3085F-59BE-46A0-9A96-65CFAB7DFEAE"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:ipq5028:-:*:*:*:*:*:*:*", "matchCriteriaId": "825524E0-BB01-4CAD-9F65-95E096467D28"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:ipq5302_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EB5FF59-057F-42D9-8829-EF0AD2CBB6DD"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:ipq5302:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE256F7A-9696-44D0-B8C9-C60A7B61FC91"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:ipq5312_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "01F79573-A728-4052-92A6-5ADE4E7A4B23"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:ipq5312:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AA3AFC1-C1A8-46F4-9AE9-053AB9E56B0D"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:ipq5332_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A795F64D-6DE9-4D56-AA22-D77470B9E5AD"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:ipq5332:-:*:*:*:*:*:*:*", "matchCriteriaId": "32521715-D9BF-4A86-BE4B-D9BB29C133F0"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:ipq6000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA7A5C46-48BF-42A9-A477-A660C6D7B437"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:ipq6000:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDB79382-19D6-4A67-9013-7099A9C58829"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:ipq6010_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5CF970F-17AE-4C59-89A5-5B41A41E1DE0"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:ipq6010:-:*:*:*:*:*:*:*", "matchCriteriaId": "71C54A70-AAA8-4B5E-AC1B-471A5C7E79B0"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:ipq6018_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B04589FF-F299-4EF6-A57B-1AD145372DBB"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:ipq6018:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDC1ADAD-DA77-47EF-8DB9-C36961C560C2"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:ipq6028_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "06126F30-D081-4A11-92FB-4074A451FAF9"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:ipq6028:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2550040-CCC7-4B52-8D3E-7948B3E3C62B"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:ipq8070a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "711FC14F-4DED-4F90-9BA5-0036537E6DCF"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:ipq8070a:-:*:*:*:*:*:*:*", "matchCriteriaId": "302F06C0-4835-4CD6-B745-BF7B704C3C86"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:ipq8071a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "623ED6A2-EE37-458E-BEFA-8BAD08256AE8"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:ipq8071a:-:*:*:*:*:*:*:*", "matchCriteriaId": "53449B68-4C58-4AEB-82B7-72726ADE0E2C"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:ipq8072a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "93E5DB9B-F388-49F3-ABD5-CE773FC4B045"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:ipq8072a:-:*:*:*:*:*:*:*", "matchCriteriaId": "0137E60A-1869-479C-9B4B-378E5FCCBA1D"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:ipq8074a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C7691C2-C4F8-4F23-9B5F-5E8FE0E2293E"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:ipq8074a:-:*:*:*:*:*:*:*", "matchCriteriaId": "02BF2E50-E2A4-44FF-9748-ED96C0C1AB5F"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:ipq8076_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "966392A8-DD8E-4AA1-B407-5BF2D937139E"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:ipq8076:-:*:*:*:*:*:*:*", "matchCriteriaId": "A211C022-8EDF-4B76-89D6-599812900446"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:ipq8076a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF245F8E-C056-4BEF-982E-9616F8C65CD6"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:ipq8076a:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE302EF9-165F-47F9-B0D6-BE1E3D8C6C65"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:ipq8078_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A24951FD-C4AB-4988-A1DD-019412430AC6"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:ipq8078:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFEC5D65-C1E3-40ED-9FE3-8DF888CA2654"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:ipq8078a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF609C6C-CD50-423A-A75E-83C730296089"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:ipq8078a:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8B35C18-9A01-41E1-8CE9-D8FA7E4A25ED"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:ipq8173_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8890C528-C2A3-4148-A397-85B63FB920C4"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:ipq8173:-:*:*:*:*:*:*:*", "matchCriteriaId": "81494D75-1D4D-4DC5-AF67-F83FD562DBB9"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:ipq8174_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6BB84228-3083-4048-8E83-E1F30B537223"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:ipq8174:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB58F259-62BA-40B9-BD71-960F25D20BED"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:ipq9008_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "78A6F4F3-0CE3-4A02-B615-63E76C93ADC4"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:ipq9008:-:*:*:*:*:*:*:*", "matchCriteriaId": "31D07608-80F7-44AA-BE91-1F97FC1CE313"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:ipq9570_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A6182C0-AAE7-45A9-8ECB-F198B55181AB"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:ipq9570:-:*:*:*:*:*:*:*", "matchCriteriaId": "61FC3830-8AAF-4836-89C3-2C6355CC0272"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:ipq9574_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0327D8C9-DD6B-4831-BBD4-2EE57A351493"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:ipq9574:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C866E83-23ED-495C-AA5A-0B01973674BF"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3723C7B1-A7E2-401F-8D6D-189350F6BCA5"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qam8255p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B12B89EF-7B12-481E-BCBC-F12B9D16321A"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "295E75BD-2A6C-4A76-A376-A9977DDB17FF"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qam8650p:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD37AA1A-B911-45BF-9BCC-C772FA83E657"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "49B2DF91-BE6B-4E9E-B63C-98DADD29AD6B"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qam8775p:-:*:*:*:*:*:*:*", "matchCriteriaId": "58170126-928F-4AE5-B5AF-5ED4710F9BA2"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qamsrv1h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8673334-5E11-4E95-B33D-3029499F71DF"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qamsrv1h:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC0B32F6-5EF0-4591-99D7-D0E9B09DEC5A"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qamsrv1m_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE03AB2A-3ED9-4489-8E5B-4FCF8BAA8559"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qamsrv1m:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E646738-6A87-4470-9640-6A5A1DF3AF78"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca0000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC941093-1A7C-47B2-AB3B-05AE4AE2FBE4"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca0000:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A2AA834-C17C-4E0E-A510-795818041E47"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca4024_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C359D1E7-6E0A-41B5-ABE5-B55598960700"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca4024:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4DC3CE7-0C4A-458B-A42E-8F80C062DD5F"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6554a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B1397F3-8CCF-4BBA-9F0F-A12E4F045754"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6554a:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5888224-567D-4C84-BE6D-17B636BF506C"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B59672A0-2FA6-46CC-B75A-C599B842AFB9"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*", "matchCriteriaId": "3847F4A5-90A5-4C84-B43F-0DDD81BD79CE"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B828AC8-4A01-4537-B2BD-8180C99F5C32"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*", "matchCriteriaId": "66C16E1E-9D4A-4F20-B697-833FDCCA86FB"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "828CFB37-76A6-4927-9D00-AF9A1C432DD6"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*", "matchCriteriaId": "11405993-5903-4716-B452-370281034B42"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*", "matchCriteriaId": "8374DDB3-D484-4141-AE0C-42333D2721F6"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C3DDA896-576C-44B8-85B6-F71F473F776B"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*", "matchCriteriaId": "51A87BDA-5B24-4212-BAB3-D2BBB2F4162E"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "643EC76D-2836-48E6-81DA-78C4883C33CA"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*", "matchCriteriaId": "477F6529-4CE1-44FC-B6EE-D24D44C71AE7"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "288F637F-22F8-47CF-B67F-C798A730A1BD"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0996EA3-1C92-4933-BE34-9CF625E59FE7"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6678aq_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D001127D-8160-42F0-B8B9-2FAA2976B530"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6678aq:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9EB615F-FD4C-450B-AB25-E936FD9816C4"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E23922D-C37F-476F-A623-4C1458A9156F"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5FA1F8F4-EAF2-4704-A8A6-19AD3CA1B577"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3F7853D-09EE-476F-B48D-BB30AEB4A67D"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca6797aq_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "797295C2-535C-46A9-A725-E1A5405F0436"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca6797aq:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BFC575E-594E-4711-94B1-2DC8D03B9AC4"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca8075_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC8A5A87-7D62-4EB7-962A-0F160DE3E889"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca8075:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B68D126-7F49-4FFA-8AF8-78120973D78E"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D1C53DC-D2F3-4C92-9725-9A85340AF026"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED0585FF-E390-46E8-8701-70964A4057BB"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca8082_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB1F2E8B-1ED2-473D-AFD8-F2590F6BD414"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca8082:-:*:*:*:*:*:*:*", "matchCriteriaId": "FBDA9657-7D30-41FD-8112-F53E6C69D53A"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca8084_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B9045A8-BA53-43C4-B24D-5EF320DE7A4A"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca8084:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D6E8939-AFA3-41AC-B811-BCC282A43106"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca8085_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B87335A8-DC52-478E-B19F-0C4CC63132EA"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca8085:-:*:*:*:*:*:*:*", "matchCriteriaId": "99C34523-FE2A-4DDC-9A8A-D9072F3D0FD3"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2FA8F9DA-1386-4961-B9B2-484E4347852A"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*", "matchCriteriaId": "117289C8-7484-4EAE-8F35-A25768F00EED"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca8386_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "08E9E6CB-2216-4AF2-81C2-D482598298BE"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca8386:-:*:*:*:*:*:*:*", "matchCriteriaId": "4774FAA6-6141-4B08-819C-58D4D9A2B69F"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca9888_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF227702-EEFC-43CC-AC80-81EA6E4927E0"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca9888:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE5DFEA5-EA29-40B6-83DB-883B276E8245"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qca9889_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "728CCD27-ED06-49FD-AECD-9B0856813EDF"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qca9889:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D181868-AE93-4116-B45F-81D94F537227"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcc2073_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E02CCE45-27E9-436A-A49F-F92B1C9B0926"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcc2073:-:*:*:*:*:*:*:*", "matchCriteriaId": "59A4483F-3A2A-4C31-AB38-A3147CC7D55A"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcc2076_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "90EF18E5-6D32-4A75-95B8-DF41A5373DEB"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcc2076:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D3E2A00-5BFA-48A0-8DF1-DC33B2CA3DD7"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A75D017-032F-4369-917C-567EE2A809F2"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*", "matchCriteriaId": "107F0423-608C-404D-B58B-616A6494418F"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcf8000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A05AC12-9E7A-4837-A447-1718396011FC"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcf8000:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E3FF297-D849-45AE-AAB8-DDEA64A23FF3"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcf8001_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "287199B4-9CBB-4290-BDB3-ABBB41794259"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcf8001:-:*:*:*:*:*:*:*", "matchCriteriaId": "142DC510-DD92-4174-8B37-4D239573661E"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcn5022_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "478B79F0-D257-41B2-965B-3E251A584D45"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcn5022:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B6D2C9D-1BF9-4D78-90FB-B7633DD87E67"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcn5024_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "63965F19-033E-4755-B9CA-EF409EC339A3"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcn5024:-:*:*:*:*:*:*:*", "matchCriteriaId": "CCA0E68F-6D5F-4C20-AABC-26CA6867D3D6"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcn5052_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "85740DB4-3B08-48A4-ACAF-7BBB2612009A"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcn5052:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A0BD404-5EBA-4988-91B6-ECE8FCF4F041"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcn5122_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "290BFC8A-0D76-4BCD-B059-2DAFD368A10C"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcn5122:-:*:*:*:*:*:*:*", "matchCriteriaId": "936A308A-92B9-468C-9BC6-8FD71C7C2315"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcn5124_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A9F76FF-96D3-4BCE-918D-B3B0ADA3E8E0"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcn5124:-:*:*:*:*:*:*:*", "matchCriteriaId": "2908A543-EFE4-477D-9CF3-76534B2E6CF6"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcn5152_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EAE1EBF-AD14-4C07-99B5-2547A5196B20"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcn5152:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4829FF9-C0BA-4E40-A01A-3EF179462029"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcn5154_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0ED3ED74-C2D0-4A84-A2F8-392818E5CD20"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcn5154:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F1CA219-959D-481A-8622-69F1825832FB"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcn5164_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F6EAD64-D133-42C4-92ED-90C49938C0F1"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcn5164:-:*:*:*:*:*:*:*", "matchCriteriaId": "93E7ED58-C5A7-4F78-8233-750780CCAB16"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcn6023_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "63FF89C5-3BBF-4A13-8A3B-F490C2FA1A95"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcn6023:-:*:*:*:*:*:*:*", "matchCriteriaId": "6784EC5F-2C26-49C5-9A03-6FD2056C04EF"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A49DBE04-E2EA-4DA1-B774-A878A71524AC"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcn6024:-:*:*:*:*:*:*:*", "matchCriteriaId": "69E98386-3BB2-4E8C-AD00-E05123608439"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcn6112_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6300827E-F6F0-490B-8043-38DD415E3161"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcn6112:-:*:*:*:*:*:*:*", "matchCriteriaId": "58F6B4C5-2C26-4A13-BA10-5B70805AD8B6"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcn6122_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A988BD3-71D8-4F2B-9EC2-8E385B114114"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcn6122:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E7049A3-9F35-465F-9B2E-96788E54EC63"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcn6132_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A59FBBDC-0495-422C-B25A-FFDF94D33C34"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcn6132:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6E55C06-45EE-4144-8CBC-4D41DDE4D899"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F4362D2-30A3-4388-ABB6-293878AD7036"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcn6224:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB6AE9A7-386A-473B-9BD5-DA37B1E696C5"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "88376C1D-AC4D-4EB0-AF6A-274D020F5859"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcn6274:-:*:*:*:*:*:*:*", "matchCriteriaId": "E15BA4B4-C97F-45C0-A4AD-7E46387F19A6"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcn6402_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C46FCBE-C6AC-4715-8E16-6B070A222452"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcn6402:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A27FD2C-695B-4A5E-9715-5683E868809E"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcn6412_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1F6CC23-583C-4A6C-BB56-EE68CA4803DF"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcn6412:-:*:*:*:*:*:*:*", "matchCriteriaId": "36CFB570-A437-4158-A306-1237BE6AD7FC"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcn6422_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "48BBE3D5-9B42-444C-9119-DB282FAE98FF"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcn6422:-:*:*:*:*:*:*:*", "matchCriteriaId": "E09A34F0-5BC6-436C-AEB8-99873439742D"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcn6432_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B079570-EBBE-40B6-8C08-343CDA74DB04"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcn6432:-:*:*:*:*:*:*:*", "matchCriteriaId": "613879FB-77E8-4339-ABC1-8EABAC78EBB0"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcn9000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5BCCFF8B-4857-439D-BD4A-EB35672F474B"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcn9000:-:*:*:*:*:*:*:*", "matchCriteriaId": "86896D55-89F5-440B-9082-916E486B65D9"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "61F34DD2-9DC0-49E5-BC85-1543EA199477"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcn9012:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A06879F-6FE9-448A-8186-8347D76F872B"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcn9013_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1EC8266-96C3-44F2-B9FA-5A5E0815565B"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcn9013:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F4612E3-E1C9-4225-A5E9-C854BF3FA28D"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcn9022_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "36A10EB2-E7A2-461F-836E-FC38B9428C98"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcn9022:-:*:*:*:*:*:*:*", "matchCriteriaId": "A457C1D6-A026-4B5F-9CB1-FA795785A515"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A64CDA49-19BF-413F-A0E0-2B9729E45E25"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcn9024:-:*:*:*:*:*:*:*", "matchCriteriaId": "345CCD64-C09E-407D-AAA2-311C4CCFE24F"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcn9070_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C10CAAC-FD93-4116-9F0C-E983B3693FAF"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcn9070:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FEC2402-BA39-49BB-A34C-FF32ED44A158"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcn9072_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "809FD84D-11C5-4EE3-B830-62CF5F6CB1BC"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcn9072:-:*:*:*:*:*:*:*", "matchCriteriaId": "DFD77A52-D53C-424F-9E17-160B710469C3"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "65303C2D-C6BF-47CB-8146-E240CB8BBE42"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcn9074:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6B03022-497A-4F42-BB4D-5624EA7DF1B9"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcn9100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B31EEE9E-CDEC-4E88-B950-3413205E483E"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcn9100:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E1E341A-7DDD-47E5-BB5F-0666482B41C0"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcn9274_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9129A244-AB8C-4AA4-BFBB-37F84D66BD3E"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcn9274:-:*:*:*:*:*:*:*", "matchCriteriaId": "41F243A1-3C0B-4780-95BF-69A4E1A91F18"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FFF23DDB-98A0-4343-ADD3-5AB9C2383E7E"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qcs8550:-:*:*:*:*:*:*:*", "matchCriteriaId": "5ACB8AFB-5B91-4AA1-BA3A-1AF0B3503080"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7456782E-B6CE-42ED-A51E-39907120E28B"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*", "matchCriteriaId": "637BF4DF-BB40-479F-B696-6AD9D4B35D64"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D72C4CE0-AB59-4652-854F-94C9998F2712"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:qfw7124:-:*:*:*:*:*:*:*", "matchCriteriaId": "98720774-11B8-4B4B-BC73-D4DA84E07F78"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DC40C14-3B2D-4E00-9E0F-86E6BDBF2D81"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0514D433-162C-4680-8912-721D19BE6201"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sa7255p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2B651F0A-34DA-400F-A376-B499BFDF8E86"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sa7255p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CFF093D-98C8-470F-8330-E5126E06343A"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8648B38-2597-401A-8F53-D582FA911569"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A01CD59B-8F21-4CD6-8A1A-7B37547A8715"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "51BC0A66-493B-43BE-B51F-640BDF2FF32E"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8DA4D12-7ABF-4A04-B44E-E1D68C8E58AB"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC6E268D-C4AF-4950-9223-39EA36D538A8"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sa8255p:-:*:*:*:*:*:*:*", "matchCriteriaId": "073C1A81-D02B-4F2F-9378-CD1B2DCE0E5B"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sa8650p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0E807AA-5646-48AD-9A5C-B0B13E222AA9"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sa8650p:-:*:*:*:*:*:*:*", "matchCriteriaId": "45FBB72B-B850-4E3F-ACBB-9392157FF131"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "781CCC31-C08F-499B-BE73-6C7DB70437AF"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sa8770p:-:*:*:*:*:*:*:*", "matchCriteriaId": "75AFAA21-0589-4C6A-9418-34EE8A61BBAD"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C79595B-1259-4431-96F9-C5A24E624305"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sa8775p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F2F3431-9CD7-4D4F-833D-DD4D3ACF94C7"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A024AB04-B213-4018-A4C1-FA467C7BA775"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sa9000p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2A8AB7C-5D34-4794-8C06-2193075B323F"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E93FB34B-3674-404D-9687-E092E9A246AB"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3FF5A9A-A34A-499C-B6E0-D67B496C5454"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sdx65m_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "08C59BD9-8629-467F-9C1C-F2232C821DDB"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sdx65m:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E7510FC-E89C-4EE4-84AE-8002E48937D2"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4CDD6A2-5A3C-4572-8CE1-2F102333BB79"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sm8550p:-:*:*:*:*:*:*:*", "matchCriteriaId": "699E5D17-6144-4F0A-8D52-1E8C83990E52"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "863BA6B8-5F2D-4D97-BBBE-EAD5B35AB3AA"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_2_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E0344CF-A15E-4734-852F-9553E780644B"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_2_mobile_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "28D14A7F-F116-416B-A359-32D395F706D4"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_2_mobile:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B67D19B-E1B0-41A2-B122-FBA6D797F3C8"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_ar2_gen_1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BB4A33E-6647-447E-BDA3-24246D49C5DD"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_ar2_gen_1:-:*:*:*:*:*:*:*", "matchCriteriaId": "1046CC3E-FB12-4527-9978-DCC40EEE8938"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF9DE2CE-4765-4696-ABFE-4808EF77C8D9"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_x65_5g_modem-rf:-:*:*:*:*:*:*:*", "matchCriteriaId": "8031F868-16B3-4173-835A-0F818471CF4F"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D82AAC94-6D8C-4EB7-ADDF-544AFCA809D6"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:snapdragon_x75_5g_modem-rf:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A169176-2CBF-44B6-B4C8-C93D72E6D77D"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:srv1h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CD199F5-DA68-4BEB-AA99-11572DA26B4F"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:srv1h:-:*:*:*:*:*:*:*", "matchCriteriaId": "8ACA2D4D-FC77-4C1A-8278-1C27B3EA3303"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:srv1m_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4B29E7F-8BFE-466A-B357-63F8A2160C4E"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:srv1m:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D55CC7D-2E65-4CA9-9892-B6FBCC087E6F"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:ssg2115p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A146E52D-4AFC-47B4-920F-DAC76077DF25"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:ssg2115p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BA4BA00-C8D1-4DAC-8030-CB5EEC7D4591"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:ssg2125p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA41907C-1CDE-42F3-B21D-5D53B2F06AF7"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:ssg2125p:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDC270A7-205C-41EB-A2E5-2A381A16BFBB"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sxr1230p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE3236D6-0D01-4D05-B580-8888B99BAA5D"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sxr1230p:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E1753FC-F3CD-4B50-886D-8E16D9301A84"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD6444F6-A477-4B4C-8A09-C22C47CCE45B"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sxr2230p:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3E20681-4FC4-46E2-AF77-BCF03BC8E77E"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BA28CC6-C8BB-4F50-BFE3-A59F664A4F54"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*", "matchCriteriaId": "94D2BDF1-764C-48BA-8944-3275E8768078"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1FA2EB9-416F-4D69-8786-386CC73978AE"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "896F1C04-9957-440F-BF01-C3772CC3B3DF"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*", "matchCriteriaId": "A90555EB-47A7-4717-92D5-35B561825F06"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "699056F6-1517-4F25-AE07-4FFCF6923B9F"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4C023D2-6FF5-4FFC-B9F2-895979166580"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7ACAD26E-B79E-4659-91A5-D301281F7D36"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0E46DA6-9494-4D92-A4AE-A272AF6ACCCC"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA33DE15-C177-43B3-AD50-FF797753D12E"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE1A5841-5BCB-4033-ACB9-23F3FCA65309"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B47BF35-3AA0-4667-842E-19B0FE30BF3C"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A071672-9405-4418-9141-35CEADBB65AF"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB7CF473-8B25-4851-91F2-1BD693CCDC85"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*", "matchCriteriaId": "91E591F2-8F72-4A5A-9264-2742EB2DABDA"}]}]}], "references": [{"url": "https://www.qualcomm.com/company/product-security/bulletins/march-2024-bulletin", "source": "product-security@qualcomm.com", "tags": ["Patch", "Vendor Advisory"]}, {"url": "https://www.qualcomm.com/company/product-security/bulletins/march-2024-bulletin", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-49275.json b/cve/2023/CVE-2023-49275.json index f7f42d4abf7..f611932fa92 100644 --- a/cve/2023/CVE-2023-49275.json +++ b/cve/2023/CVE-2023-49275.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-49275", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-19T15:15:49.847", "lastModified": "2024-11-21T08:33:09.917", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Wazuh is a free and open source platform used for threat prevention, detection, and response. A NULL pointer dereference was detected during fuzzing of the analysis engine, allowing malicious clients to DoS the analysis engine. The bug occurs when `analysisd` receives a syscollector message with the `hotfix` `msg_type` but lacking a `timestamp`. It uses `cJSON_GetObjectItem()` to get the `timestamp` object item and dereferences it without checking for a `NULL` value. A malicious client can DoS the analysis engine. This vulnerability is fixed in 4.7.1."}, {"lang": "es", "value": "Wazuh es una plataforma gratuita y de c\u00f3digo abierto que se utiliza para la prevenci\u00f3n, detecci\u00f3n y respuesta a amenazas. Se detect\u00f3 una desreferencia de puntero NULL durante la confusi\u00f3n del motor de an\u00e1lisis, lo que permiti\u00f3 a clientes malintencionados realizar DoS en el motor de an\u00e1lisis. El error ocurre cuando `analysisd` recibe un mensaje de syscollector con el `hotfix` `msg_type` pero sin una `timestamp`. Utiliza `cJSON_GetObjectItem()` para obtener el elemento del objeto `timestamp` y lo desreferencia sin verificar un valor `NULL`. Un cliente malintencionado puede hacer DoS en el motor de an\u00e1lisis. Esta vulnerabilidad se solucion\u00f3 en 4.7.1."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-476"}]}], "references": [{"url": "https://github.com/wazuh/wazuh/blob/e1d5231b31b68a75f3b8b33f833155b362411078/src/analysisd/decoders/syscollector.c#L1573", "source": "security-advisories@github.com"}, {"url": "https://github.com/wazuh/wazuh/blob/e1d5231b31b68a75f3b8b33f833155b362411078/src/analysisd/decoders/syscollector.c#L1578", "source": "security-advisories@github.com"}, {"url": "https://github.com/wazuh/wazuh/security/advisories/GHSA-4mq7-w9r6-9975", "source": "security-advisories@github.com"}, {"url": "https://github.com/wazuh/wazuh/blob/e1d5231b31b68a75f3b8b33f833155b362411078/src/analysisd/decoders/syscollector.c#L1573", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/wazuh/wazuh/blob/e1d5231b31b68a75f3b8b33f833155b362411078/src/analysisd/decoders/syscollector.c#L1578", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/wazuh/wazuh/security/advisories/GHSA-4mq7-w9r6-9975", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-49275", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-19T15:15:49.847", "lastModified": "2025-01-09T17:42:46.960", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Wazuh is a free and open source platform used for threat prevention, detection, and response. A NULL pointer dereference was detected during fuzzing of the analysis engine, allowing malicious clients to DoS the analysis engine. The bug occurs when `analysisd` receives a syscollector message with the `hotfix` `msg_type` but lacking a `timestamp`. It uses `cJSON_GetObjectItem()` to get the `timestamp` object item and dereferences it without checking for a `NULL` value. A malicious client can DoS the analysis engine. This vulnerability is fixed in 4.7.1."}, {"lang": "es", "value": "Wazuh es una plataforma gratuita y de c\u00f3digo abierto que se utiliza para la prevenci\u00f3n, detecci\u00f3n y respuesta a amenazas. Se detect\u00f3 una desreferencia de puntero NULL durante la confusi\u00f3n del motor de an\u00e1lisis, lo que permiti\u00f3 a clientes malintencionados realizar DoS en el motor de an\u00e1lisis. El error ocurre cuando `analysisd` recibe un mensaje de syscollector con el `hotfix` `msg_type` pero sin una `timestamp`. Utiliza `cJSON_GetObjectItem()` para obtener el elemento del objeto `timestamp` y lo desreferencia sin verificar un valor `NULL`. Un cliente malintencionado puede hacer DoS en el motor de an\u00e1lisis. Esta vulnerabilidad se solucion\u00f3 en 4.7.1."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 3.6}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-476"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-476"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:wazuh:wazuh:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.2.0", "versionEndExcluding": "4.7.1", "matchCriteriaId": "1423F835-4122-4332-85F6-B66CADB156DB"}]}]}], "references": [{"url": "https://github.com/wazuh/wazuh/blob/e1d5231b31b68a75f3b8b33f833155b362411078/src/analysisd/decoders/syscollector.c#L1573", "source": "security-advisories@github.com", "tags": ["Product"]}, {"url": "https://github.com/wazuh/wazuh/blob/e1d5231b31b68a75f3b8b33f833155b362411078/src/analysisd/decoders/syscollector.c#L1578", "source": "security-advisories@github.com", "tags": ["Product"]}, {"url": "https://github.com/wazuh/wazuh/security/advisories/GHSA-4mq7-w9r6-9975", "source": "security-advisories@github.com", "tags": ["Exploit", "Vendor Advisory"]}, {"url": "https://github.com/wazuh/wazuh/blob/e1d5231b31b68a75f3b8b33f833155b362411078/src/analysisd/decoders/syscollector.c#L1573", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Product"]}, {"url": "https://github.com/wazuh/wazuh/blob/e1d5231b31b68a75f3b8b33f833155b362411078/src/analysisd/decoders/syscollector.c#L1578", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Product"]}, {"url": "https://github.com/wazuh/wazuh/security/advisories/GHSA-4mq7-w9r6-9975", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-50260.json b/cve/2023/CVE-2023-50260.json index c98b90c97e3..1dc12561070 100644 --- a/cve/2023/CVE-2023-50260.json +++ b/cve/2023/CVE-2023-50260.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-50260", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-19T15:15:50.040", "lastModified": "2024-11-21T08:36:46.290", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Wazuh is a free and open source platform used for threat prevention, detection, and response. A wrong validation in the `host_deny` script allows to write any string in the `hosts.deny` file, which can end in an arbitrary command execution on the target system. This vulnerability is part of the active response feature, which can automatically triggers actions in response to alerts. By default, active responses are limited to a set of pre defined executables. This is enforced by only allowing executables stored under `/var/ossec/active-response/bin` to be run as an active response. However, the `/var/ossec/active-response/bin/host_deny` can be exploited. `host_deny` is used to add IP address to the `/etc/hosts.deny` file to block incoming connections on a service level by using TCP wrappers. Attacker can inject arbitrary command into the `/etc/hosts.deny` file and execute arbitrary command by using the spawn directive. The active response can be triggered by writing events either to the local `execd` queue on server or to the `ar` queue which forwards the events to agents. So, it can leads to LPE on server as root and RCE on agent as root. This vulnerability is fixed in 4.7.2."}, {"lang": "es", "value": "Wazuh es una plataforma gratuita y de c\u00f3digo abierto que se utiliza para la prevenci\u00f3n, detecci\u00f3n y respuesta a amenazas. Una validaci\u00f3n incorrecta en el script `host_deny` permite escribir cualquier cadena en el archivo `hosts.deny`, lo que puede terminar en la ejecuci\u00f3n de un comando arbitrario en el sistema de destino. Esta vulnerabilidad es parte de la funci\u00f3n de respuesta activa, que puede desencadenar acciones autom\u00e1ticamente en respuesta a alertas. De forma predeterminada, las respuestas activas est\u00e1n limitadas a un conjunto de ejecutables predefinidos. Esto se aplica permitiendo que solo los ejecutables almacenados en `/var/ossec/active-response/bin` se ejecuten como una respuesta activa. Sin embargo, el `/var/ossec/active-response/bin/host_deny` puede ser explotado. `host_deny` se usa para agregar una direcci\u00f3n IP al archivo `/etc/hosts.deny` para bloquear conexiones entrantes en un nivel de servicio mediante el uso de contenedores TCP. El atacante puede inyectar un comando arbitrario en el archivo `/etc/hosts.deny` y ejecutar un comando arbitrario utilizando la directiva spawn. La respuesta activa se puede activar escribiendo eventos en la cola \"execd\" local en el servidor o en la cola \"ar\" que reenv\u00eda los eventos a los agentes. Por lo tanto, puede conducir a LPE en el servidor como ra\u00edz y a RCE en el agente como ra\u00edz. Esta vulnerabilidad se soluciona en 4.7.2."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 8.8, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-94"}]}], "references": [{"url": "https://github.com/wazuh/wazuh/security/advisories/GHSA-mjq2-xf8g-68vw", "source": "security-advisories@github.com"}, {"url": "https://github.com/wazuh/wazuh/security/advisories/GHSA-mjq2-xf8g-68vw", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-50260", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-19T15:15:50.040", "lastModified": "2025-01-09T17:41:36.720", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Wazuh is a free and open source platform used for threat prevention, detection, and response. A wrong validation in the `host_deny` script allows to write any string in the `hosts.deny` file, which can end in an arbitrary command execution on the target system. This vulnerability is part of the active response feature, which can automatically triggers actions in response to alerts. By default, active responses are limited to a set of pre defined executables. This is enforced by only allowing executables stored under `/var/ossec/active-response/bin` to be run as an active response. However, the `/var/ossec/active-response/bin/host_deny` can be exploited. `host_deny` is used to add IP address to the `/etc/hosts.deny` file to block incoming connections on a service level by using TCP wrappers. Attacker can inject arbitrary command into the `/etc/hosts.deny` file and execute arbitrary command by using the spawn directive. The active response can be triggered by writing events either to the local `execd` queue on server or to the `ar` queue which forwards the events to agents. So, it can leads to LPE on server as root and RCE on agent as root. This vulnerability is fixed in 4.7.2."}, {"lang": "es", "value": "Wazuh es una plataforma gratuita y de c\u00f3digo abierto que se utiliza para la prevenci\u00f3n, detecci\u00f3n y respuesta a amenazas. Una validaci\u00f3n incorrecta en el script `host_deny` permite escribir cualquier cadena en el archivo `hosts.deny`, lo que puede terminar en la ejecuci\u00f3n de un comando arbitrario en el sistema de destino. Esta vulnerabilidad es parte de la funci\u00f3n de respuesta activa, que puede desencadenar acciones autom\u00e1ticamente en respuesta a alertas. De forma predeterminada, las respuestas activas est\u00e1n limitadas a un conjunto de ejecutables predefinidos. Esto se aplica permitiendo que solo los ejecutables almacenados en `/var/ossec/active-response/bin` se ejecuten como una respuesta activa. Sin embargo, el `/var/ossec/active-response/bin/host_deny` puede ser explotado. `host_deny` se usa para agregar una direcci\u00f3n IP al archivo `/etc/hosts.deny` para bloquear conexiones entrantes en un nivel de servicio mediante el uso de contenedores TCP. El atacante puede inyectar un comando arbitrario en el archivo `/etc/hosts.deny` y ejecutar un comando arbitrario utilizando la directiva spawn. La respuesta activa se puede activar escribiendo eventos en la cola \"execd\" local en el servidor o en la cola \"ar\" que reenv\u00eda los eventos a los agentes. Por lo tanto, puede conducir a LPE en el servidor como ra\u00edz y a RCE en el agente como ra\u00edz. Esta vulnerabilidad se soluciona en 4.7.2."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 8.8, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 5.9}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 8.8, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-94"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-94"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:wazuh:wazuh:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.2.0", "versionEndExcluding": "4.7.2", "matchCriteriaId": "A4731D6B-7AF2-4064-8D9B-792314DD0940"}]}]}], "references": [{"url": "https://github.com/wazuh/wazuh/security/advisories/GHSA-mjq2-xf8g-68vw", "source": "security-advisories@github.com", "tags": ["Exploit", "Vendor Advisory"]}, {"url": "https://github.com/wazuh/wazuh/security/advisories/GHSA-mjq2-xf8g-68vw", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-52335.json b/cve/2023/CVE-2023-52335.json index dffacd2adfd..34539705db8 100644 --- a/cve/2023/CVE-2023-52335.json +++ b/cve/2023/CVE-2023-52335.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-52335", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-11-22T20:15:07.927", "lastModified": "2024-11-22T20:15:07.927", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Advantech iView ConfigurationServlet SQL Injection Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech iView. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the ConfigurationServlet servlet, which listens on TCP port 8080 by default. When parsing the column_value element, the process does not properly validate a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-17863."}, {"lang": "es", "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n mediante inyecci\u00f3n SQL en ConfigurationServlet de Advantech iView. Esta vulnerabilidad permite a atacantes remotos divulgar informaci\u00f3n confidencial sobre las instalaciones afectadas de Advantech iView. No se requiere autenticaci\u00f3n para explotar esta vulnerabilidad. La falla espec\u00edfica existe dentro del servlet ConfigurationServlet, que escucha en el puerto TCP 8080 de manera predeterminada. Al analizar el elemento column_value, el proceso no valida correctamente una cadena proporcionada por el usuario antes de usarla para construir consultas SQL. Un atacante puede aprovechar esta vulnerabilidad para divulgar credenciales almacenadas, lo que conduce a una mayor vulnerabilidad. Era ZDI-CAN-17863."}], "metrics": {"cvssMetricV30": [{"source": "zdi-disclosures@trendmicro.com", "type": "Secondary", "cvssData": {"version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE"}, "exploitabilityScore": 3.9, "impactScore": 3.6}]}, "weaknesses": [{"source": "zdi-disclosures@trendmicro.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-89"}]}], "references": [{"url": "https://www.advantech.com/zh-tw/support/details/firmware?id=1-HIPU-183", "source": "zdi-disclosures@trendmicro.com"}, {"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-610/", "source": "zdi-disclosures@trendmicro.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-52335", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-11-22T20:15:07.927", "lastModified": "2025-01-09T16:05:53.673", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Advantech iView ConfigurationServlet SQL Injection Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech iView. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the ConfigurationServlet servlet, which listens on TCP port 8080 by default. When parsing the column_value element, the process does not properly validate a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-17863."}, {"lang": "es", "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n mediante inyecci\u00f3n SQL en ConfigurationServlet de Advantech iView. Esta vulnerabilidad permite a atacantes remotos divulgar informaci\u00f3n confidencial sobre las instalaciones afectadas de Advantech iView. No se requiere autenticaci\u00f3n para explotar esta vulnerabilidad. La falla espec\u00edfica existe dentro del servlet ConfigurationServlet, que escucha en el puerto TCP 8080 de manera predeterminada. Al analizar el elemento column_value, el proceso no valida correctamente una cadena proporcionada por el usuario antes de usarla para construir consultas SQL. Un atacante puede aprovechar esta vulnerabilidad para divulgar credenciales almacenadas, lo que conduce a una mayor vulnerabilidad. Era ZDI-CAN-17863."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE"}, "exploitabilityScore": 3.9, "impactScore": 3.6}], "cvssMetricV30": [{"source": "zdi-disclosures@trendmicro.com", "type": "Secondary", "cvssData": {"version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE"}, "exploitabilityScore": 3.9, "impactScore": 3.6}]}, "weaknesses": [{"source": "zdi-disclosures@trendmicro.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-89"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:advantech:iview:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.7.04.6752", "matchCriteriaId": "FFB283D2-9626-493E-AC5C-7B9B507AC546"}]}]}], "references": [{"url": "https://www.advantech.com/zh-tw/support/details/firmware?id=1-HIPU-183", "source": "zdi-disclosures@trendmicro.com", "tags": ["Release Notes"]}, {"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-610/", "source": "zdi-disclosures@trendmicro.com", "tags": ["Third Party Advisory"]}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-52920.json b/cve/2023/CVE-2023-52920.json index af22257169d..89ebe786c8e 100644 --- a/cve/2023/CVE-2023-52920.json +++ b/cve/2023/CVE-2023-52920.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-52920", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-05T10:15:24.580", "lastModified": "2024-12-09T11:15:05.403", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: support non-r10 register spill/fill to/from stack in precision tracking\n\nUse instruction (jump) history to record instructions that performed\nregister spill/fill to/from stack, regardless if this was done through\nread-only r10 register, or any other register after copying r10 into it\n*and* potentially adjusting offset.\n\nTo make this work reliably, we push extra per-instruction flags into\ninstruction history, encoding stack slot index (spi) and stack frame\nnumber in extra 10 bit flags we take away from prev_idx in instruction\nhistory. We don't touch idx field for maximum performance, as it's\nchecked most frequently during backtracking.\n\nThis change removes basically the last remaining practical limitation of\nprecision backtracking logic in BPF verifier. It fixes known\ndeficiencies, but also opens up new opportunities to reduce number of\nverified states, explored in the subsequent patches.\n\nThere are only three differences in selftests' BPF object files\naccording to veristat, all in the positive direction (less states).\n\nFile Program Insns (A) Insns (B) Insns (DIFF) States (A) States (B) States (DIFF)\n-------------------------------------- ------------- --------- --------- ------------- ---------- ---------- -------------\ntest_cls_redirect_dynptr.bpf.linked3.o cls_redirect 2987 2864 -123 (-4.12%) 240 231 -9 (-3.75%)\nxdp_synproxy_kern.bpf.linked3.o syncookie_tc 82848 82661 -187 (-0.23%) 5107 5073 -34 (-0.67%)\nxdp_synproxy_kern.bpf.linked3.o syncookie_xdp 85116 84964 -152 (-0.18%) 5162 5130 -32 (-0.62%)\n\nNote, I avoided renaming jmp_history to more generic insn_hist to\nminimize number of lines changed and potential merge conflicts between\nbpf and bpf-next trees.\n\nNotice also cur_hist_entry pointer reset to NULL at the beginning of\ninstruction verification loop. This pointer avoids the problem of\nrelying on last jump history entry's insn_idx to determine whether we\nalready have entry for current instruction or not. It can happen that we\nadded jump history entry because current instruction is_jmp_point(), but\nalso we need to add instruction flags for stack access. In this case, we\ndon't want to entries, so we need to reuse last added entry, if it is\npresent.\n\nRelying on insn_idx comparison has the same ambiguity problem as the one\nthat was fixed recently in [0], so we avoid that.\n\n [0] https://patchwork.kernel.org/project/netdevbpf/patch/20231110002638.4168352-3-andrii@kernel.org/"}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf: soporte para derrame/relleno de registros que no sean r10 hacia/desde la pila en seguimiento de precisi\u00f3n. Use el historial de instrucciones (saltos) para registrar instrucciones que realizaron derrame/relleno de registros hacia/desde la pila, independientemente de si esto se hizo a trav\u00e9s de un registro r10 de solo lectura, o cualquier otro registro despu\u00e9s de copiar r10 en \u00e9l *y* potencialmente ajustar el desplazamiento. Para que esto funcione de manera confiable, insertamos indicadores adicionales por instrucci\u00f3n en el historial de instrucciones, codificando el \u00edndice de ranura de pila (spi) y el n\u00famero de marco de pila en indicadores adicionales de 10 bits que quitamos de prev_idx en el historial de instrucciones. No tocamos el campo idx para obtener el m\u00e1ximo rendimiento, ya que se verifica con mayor frecuencia durante el seguimiento hacia atr\u00e1s. Este cambio elimina b\u00e1sicamente la \u00faltima limitaci\u00f3n pr\u00e1ctica restante de la l\u00f3gica de seguimiento hacia atr\u00e1s de precisi\u00f3n en el verificador BPF. Corrige deficiencias conocidas, pero tambi\u00e9n abre nuevas oportunidades para reducir la cantidad de estados verificados, exploradas en los parches posteriores. Solo hay tres diferencias en los archivos de objetos BPF de las autopruebas seg\u00fan veristat, todas en la direcci\u00f3n positiva (menos estados). Archivo Programa Insns (A) Insns (B) Insns (DIFF) Estados (A) Estados (B) Estados (DIFF) -------------------------------------- ------------- --------- --------- ------------- ---------- ---------- ------------- test_cls_redirect_dynptr.bpf.linked3.o cls_redirect 2987 2864 -123 (-4,12%) 240 231 -9 (-3,75%) xdp_synproxy_kern.bpf.linked3.o syncookie_tc 82848 82661 -187 (-0,23%) 5107 5073 -34 (-0,67%) xdp_synproxy_kern.bpf.linked3.o syncookie_xdp 85116 84964 -152 (-0,18%) 5162 5130 -32 (-0,62%) Nota: evit\u00e9 cambiar el nombre de jmp_history al m\u00e1s gen\u00e9rico insn_hist para minimizar la cantidad de l\u00edneas cambiadas y los posibles conflictos de fusi\u00f3n entre los \u00e1rboles bpf y bpf-next. Observe tambi\u00e9n que el puntero cur_hist_entry se restablece a NULL al comienzo del bucle de verificaci\u00f3n de instrucciones. Este puntero evita el problema de confiar en el insn_idx de la \u00faltima entrada del historial de saltos para determinar si ya tenemos una entrada para la instrucci\u00f3n actual o no. Puede suceder que agreguemos una entrada del historial de saltos porque la instrucci\u00f3n actual es_jmp_point(), pero tambi\u00e9n necesitamos agregar indicadores de instrucci\u00f3n para el acceso a la pila. En este caso, no queremos entradas, por lo que necesitamos reutilizar la \u00faltima entrada agregada, si est\u00e1 presente. Confiar en la comparaci\u00f3n insn_idx tiene el mismo problema de ambig\u00fcedad que el que se solucion\u00f3 recientemente en [0], por lo que lo evitamos. [0] https://patchwork.kernel.org/project/netdevbpf/patch/20231110002638.4168352-3-andrii@kernel.org/"}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "baseScore": 5.5, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-476"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.8", "matchCriteriaId": "D0B66B9B-B773-474F-A817-85A8F2B3CF0E"}]}]}], "references": [{"url": "https://git.kernel.org/stable/c/41f6f64e6999a837048b1bd13a2f8742964eca6b", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Mailing List", "Patch"]}, {"url": "https://git.kernel.org/stable/c/ecc2aeeaa08a355d84d3ca9c3d2512399a194f29", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-52920", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-05T10:15:24.580", "lastModified": "2025-01-09T16:15:35.587", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: support non-r10 register spill/fill to/from stack in precision tracking\n\nUse instruction (jump) history to record instructions that performed\nregister spill/fill to/from stack, regardless if this was done through\nread-only r10 register, or any other register after copying r10 into it\n*and* potentially adjusting offset.\n\nTo make this work reliably, we push extra per-instruction flags into\ninstruction history, encoding stack slot index (spi) and stack frame\nnumber in extra 10 bit flags we take away from prev_idx in instruction\nhistory. We don't touch idx field for maximum performance, as it's\nchecked most frequently during backtracking.\n\nThis change removes basically the last remaining practical limitation of\nprecision backtracking logic in BPF verifier. It fixes known\ndeficiencies, but also opens up new opportunities to reduce number of\nverified states, explored in the subsequent patches.\n\nThere are only three differences in selftests' BPF object files\naccording to veristat, all in the positive direction (less states).\n\nFile Program Insns (A) Insns (B) Insns (DIFF) States (A) States (B) States (DIFF)\n-------------------------------------- ------------- --------- --------- ------------- ---------- ---------- -------------\ntest_cls_redirect_dynptr.bpf.linked3.o cls_redirect 2987 2864 -123 (-4.12%) 240 231 -9 (-3.75%)\nxdp_synproxy_kern.bpf.linked3.o syncookie_tc 82848 82661 -187 (-0.23%) 5107 5073 -34 (-0.67%)\nxdp_synproxy_kern.bpf.linked3.o syncookie_xdp 85116 84964 -152 (-0.18%) 5162 5130 -32 (-0.62%)\n\nNote, I avoided renaming jmp_history to more generic insn_hist to\nminimize number of lines changed and potential merge conflicts between\nbpf and bpf-next trees.\n\nNotice also cur_hist_entry pointer reset to NULL at the beginning of\ninstruction verification loop. This pointer avoids the problem of\nrelying on last jump history entry's insn_idx to determine whether we\nalready have entry for current instruction or not. It can happen that we\nadded jump history entry because current instruction is_jmp_point(), but\nalso we need to add instruction flags for stack access. In this case, we\ndon't want to entries, so we need to reuse last added entry, if it is\npresent.\n\nRelying on insn_idx comparison has the same ambiguity problem as the one\nthat was fixed recently in [0], so we avoid that.\n\n [0] https://patchwork.kernel.org/project/netdevbpf/patch/20231110002638.4168352-3-andrii@kernel.org/"}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf: soporte para derrame/relleno de registros que no sean r10 hacia/desde la pila en seguimiento de precisi\u00f3n. Use el historial de instrucciones (saltos) para registrar instrucciones que realizaron derrame/relleno de registros hacia/desde la pila, independientemente de si esto se hizo a trav\u00e9s de un registro r10 de solo lectura, o cualquier otro registro despu\u00e9s de copiar r10 en \u00e9l *y* potencialmente ajustar el desplazamiento. Para que esto funcione de manera confiable, insertamos indicadores adicionales por instrucci\u00f3n en el historial de instrucciones, codificando el \u00edndice de ranura de pila (spi) y el n\u00famero de marco de pila en indicadores adicionales de 10 bits que quitamos de prev_idx en el historial de instrucciones. No tocamos el campo idx para obtener el m\u00e1ximo rendimiento, ya que se verifica con mayor frecuencia durante el seguimiento hacia atr\u00e1s. Este cambio elimina b\u00e1sicamente la \u00faltima limitaci\u00f3n pr\u00e1ctica restante de la l\u00f3gica de seguimiento hacia atr\u00e1s de precisi\u00f3n en el verificador BPF. Corrige deficiencias conocidas, pero tambi\u00e9n abre nuevas oportunidades para reducir la cantidad de estados verificados, exploradas en los parches posteriores. Solo hay tres diferencias en los archivos de objetos BPF de las autopruebas seg\u00fan veristat, todas en la direcci\u00f3n positiva (menos estados). Archivo Programa Insns (A) Insns (B) Insns (DIFF) Estados (A) Estados (B) Estados (DIFF) -------------------------------------- ------------- --------- --------- ------------- ---------- ---------- ------------- test_cls_redirect_dynptr.bpf.linked3.o cls_redirect 2987 2864 -123 (-4,12%) 240 231 -9 (-3,75%) xdp_synproxy_kern.bpf.linked3.o syncookie_tc 82848 82661 -187 (-0,23%) 5107 5073 -34 (-0,67%) xdp_synproxy_kern.bpf.linked3.o syncookie_xdp 85116 84964 -152 (-0,18%) 5162 5130 -32 (-0,62%) Nota: evit\u00e9 cambiar el nombre de jmp_history al m\u00e1s gen\u00e9rico insn_hist para minimizar la cantidad de l\u00edneas cambiadas y los posibles conflictos de fusi\u00f3n entre los \u00e1rboles bpf y bpf-next. Observe tambi\u00e9n que el puntero cur_hist_entry se restablece a NULL al comienzo del bucle de verificaci\u00f3n de instrucciones. Este puntero evita el problema de confiar en el insn_idx de la \u00faltima entrada del historial de saltos para determinar si ya tenemos una entrada para la instrucci\u00f3n actual o no. Puede suceder que agreguemos una entrada del historial de saltos porque la instrucci\u00f3n actual es_jmp_point(), pero tambi\u00e9n necesitamos agregar indicadores de instrucci\u00f3n para el acceso a la pila. En este caso, no queremos entradas, por lo que necesitamos reutilizar la \u00faltima entrada agregada, si est\u00e1 presente. Confiar en la comparaci\u00f3n insn_idx tiene el mismo problema de ambig\u00fcedad que el que se solucion\u00f3 recientemente en [0], por lo que lo evitamos. [0] https://patchwork.kernel.org/project/netdevbpf/patch/20231110002638.4168352-3-andrii@kernel.org/"}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "baseScore": 5.5, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-476"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.8", "matchCriteriaId": "D0B66B9B-B773-474F-A817-85A8F2B3CF0E"}]}]}], "references": [{"url": "https://git.kernel.org/stable/c/199f0452873741fa4b8d4d88958e929030b2f92b", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/41f6f64e6999a837048b1bd13a2f8742964eca6b", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Mailing List", "Patch"]}, {"url": "https://git.kernel.org/stable/c/ecc2aeeaa08a355d84d3ca9c3d2512399a194f29", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-10815.json b/cve/2024/CVE-2024-10815.json index f2185df1cd3..5fb9f444bcf 100644 --- a/cve/2024/CVE-2024-10815.json +++ b/cve/2024/CVE-2024-10815.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-10815", "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-09T06:15:14.533", "lastModified": "2025-01-09T06:15:14.533", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "The PostLists WordPress plugin through 2.0.2 does not escape the $_SERVER['REQUEST_URI'] parameter before outputting it back in an attribute, which could lead to Reflected Cross-Site Scripting in old web browsers"}], "metrics": {}, "references": [{"url": "https://wpscan.com/vulnerability/309a445a-6261-4bd1-bac0-a78096d0c12b/", "source": "contact@wpscan.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-10815", "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-09T06:15:14.533", "lastModified": "2025-01-09T16:15:35.800", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "The PostLists WordPress plugin through 2.0.2 does not escape the $_SERVER['REQUEST_URI'] parameter before outputting it back in an attribute, which could lead to Reflected Cross-Site Scripting in old web browsers"}, {"lang": "es", "value": "El complemento PostLists WordPress hasta la versi\u00f3n 2.0.2 no escapa al par\u00e1metro $_SERVER['REQUEST_URI'] antes de mostrarlo nuevamente en un atributo, lo que podr\u00eda generar Cross-Site Scripting reflejado en navegadores web antiguos."}], "metrics": {"cvssMetricV31": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", "baseScore": 4.2, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 1.6, "impactScore": 2.5}]}, "references": [{"url": "https://wpscan.com/vulnerability/309a445a-6261-4bd1-bac0-a78096d0c12b/", "source": "contact@wpscan.com"}, {"url": "https://wpscan.com/vulnerability/309a445a-6261-4bd1-bac0-a78096d0c12b/", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-11614.json b/cve/2024/CVE-2024-11614.json index 5b0f5c2e3a3..e03bc9a4453 100644 --- a/cve/2024/CVE-2024-11614.json +++ b/cve/2024/CVE-2024-11614.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-11614", "sourceIdentifier": "secalert@redhat.com", "published": "2024-12-18T09:15:06.660", "lastModified": "2024-12-18T09:15:06.660", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "An out-of-bounds read vulnerability was found in DPDK's Vhost library checksum offload feature. This issue enables an untrusted or compromised guest to crash the hypervisor's vSwitch by forging Virtio descriptors to cause out-of-bounds reads. This flaw allows an attacker with a malicious VM using a virtio driver to cause the vhost-user side to crash by sending a packet with a Tx checksum offload request and an invalid csum_start offset."}], "metrics": {"cvssMetricV30": [{"source": "secalert@redhat.com", "type": "Secondary", "cvssData": {"version": "3.0", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "baseScore": 7.4, "baseSeverity": "HIGH", "attackVector": "ADJACENT_NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 4.0}]}, "weaknesses": [{"source": "secalert@redhat.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-125"}]}], "references": [{"url": "https://access.redhat.com/security/cve/CVE-2024-11614", "source": "secalert@redhat.com"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2327955", "source": "secalert@redhat.com"}, {"url": "http://www.openwall.com/lists/oss-security/2024/12/17/3", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-11614", "sourceIdentifier": "secalert@redhat.com", "published": "2024-12-18T09:15:06.660", "lastModified": "2025-01-09T17:15:10.980", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "An out-of-bounds read vulnerability was found in DPDK's Vhost library checksum offload feature. This issue enables an untrusted or compromised guest to crash the hypervisor's vSwitch by forging Virtio descriptors to cause out-of-bounds reads. This flaw allows an attacker with a malicious VM using a virtio driver to cause the vhost-user side to crash by sending a packet with a Tx checksum offload request and an invalid csum_start offset."}, {"lang": "es", "value": "Se encontr\u00f3 una vulnerabilidad de lectura fuera de los l\u00edmites en la funci\u00f3n de descarga de suma de comprobaci\u00f3n de la librer\u00eda DPDK's Vhost. Este problema permite que un invitado no confiable o comprometido bloquee el vSwitch del hipervisor falsificando descriptores Virtio para provocar lecturas fuera de los l\u00edmites. Esta falla permite que un atacante con una m\u00e1quina virtual maliciosa que utilice un controlador Virtio haga que el lado del usuario vhost se bloquee enviando un paquete con una solicitud de descarga de suma de comprobaci\u00f3n Tx y un desplazamiento csum_start no v\u00e1lido."}], "metrics": {"cvssMetricV30": [{"source": "secalert@redhat.com", "type": "Secondary", "cvssData": {"version": "3.0", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "baseScore": 7.4, "baseSeverity": "HIGH", "attackVector": "ADJACENT_NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 4.0}]}, "weaknesses": [{"source": "secalert@redhat.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-125"}]}], "references": [{"url": "https://access.redhat.com/errata/RHSA-2025:0208", "source": "secalert@redhat.com"}, {"url": "https://access.redhat.com/errata/RHSA-2025:0209", "source": "secalert@redhat.com"}, {"url": "https://access.redhat.com/errata/RHSA-2025:0210", "source": "secalert@redhat.com"}, {"url": "https://access.redhat.com/errata/RHSA-2025:0220", "source": "secalert@redhat.com"}, {"url": "https://access.redhat.com/errata/RHSA-2025:0221", "source": "secalert@redhat.com"}, {"url": "https://access.redhat.com/errata/RHSA-2025:0222", "source": "secalert@redhat.com"}, {"url": "https://access.redhat.com/security/cve/CVE-2024-11614", "source": "secalert@redhat.com"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2327955", "source": "secalert@redhat.com"}, {"url": "http://www.openwall.com/lists/oss-security/2024/12/17/3", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-12714.json b/cve/2024/CVE-2024-12714.json index 6258f8c7d60..86eecadf01f 100644 --- a/cve/2024/CVE-2024-12714.json +++ b/cve/2024/CVE-2024-12714.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-12714", "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-09T06:15:14.797", "lastModified": "2025-01-09T06:15:14.797", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "The Backlink Monitoring Manager WordPress plugin through 0.1.3 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin."}], "metrics": {}, "references": [{"url": "https://wpscan.com/vulnerability/f7fb2aef-16ce-4ae7-927c-2ffbc45fbda5/", "source": "contact@wpscan.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-12714", "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-09T06:15:14.797", "lastModified": "2025-01-09T16:15:36.200", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "The Backlink Monitoring Manager WordPress plugin through 0.1.3 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin."}, {"lang": "es", "value": "El complemento Backlink Monitoring Manager WordPress hasta la versi\u00f3n 0.1.3 no desinfecta ni escapa un par\u00e1metro antes de mostrarlo nuevamente en la p\u00e1gina, lo que genera un Cross-Site Scripting reflejado que podr\u00eda usarse contra usuarios con altos privilegios, como el administrador."}], "metrics": {"cvssMetricV31": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "baseScore": 6.1, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 2.7}]}, "weaknesses": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://wpscan.com/vulnerability/f7fb2aef-16ce-4ae7-927c-2ffbc45fbda5/", "source": "contact@wpscan.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-12715.json b/cve/2024/CVE-2024-12715.json index 580038ebfe0..4bc217f6dfb 100644 --- a/cve/2024/CVE-2024-12715.json +++ b/cve/2024/CVE-2024-12715.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-12715", "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-09T06:15:14.917", "lastModified": "2025-01-09T06:15:14.917", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "The Asgard Security Scanner WordPress plugin through 0.7 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin."}], "metrics": {}, "references": [{"url": "https://wpscan.com/vulnerability/e1456295-75ba-4dc2-9b1a-dc16a2000db2/", "source": "contact@wpscan.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-12715", "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-09T06:15:14.917", "lastModified": "2025-01-09T16:15:36.360", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "The Asgard Security Scanner WordPress plugin through 0.7 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin."}, {"lang": "es", "value": "El complemento Asgard Security Scanner WordPress hasta la versi\u00f3n 0.7 no desinfecta ni escapa un par\u00e1metro antes de mostrarlo nuevamente en la p\u00e1gina, lo que genera Cross-Site Scripting reflejado que podr\u00eda usarse contra usuarios con altos privilegios, como el administrador."}], "metrics": {"cvssMetricV31": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "baseScore": 6.1, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 2.7}]}, "weaknesses": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://wpscan.com/vulnerability/e1456295-75ba-4dc2-9b1a-dc16a2000db2/", "source": "contact@wpscan.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-12731.json b/cve/2024/CVE-2024-12731.json index 6a50457e9b2..2b23220f229 100644 --- a/cve/2024/CVE-2024-12731.json +++ b/cve/2024/CVE-2024-12731.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-12731", "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-09T06:15:15.150", "lastModified": "2025-01-09T06:15:15.150", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "The Aklamator INfeed WordPress plugin through 2.0.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin."}], "metrics": {}, "references": [{"url": "https://wpscan.com/vulnerability/e1c3754f-60e0-4a89-b4fc-89056dba3616/", "source": "contact@wpscan.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-12731", "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-09T06:15:15.150", "lastModified": "2025-01-09T16:15:36.527", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "The Aklamator INfeed WordPress plugin through 2.0.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin."}, {"lang": "es", "value": "El complemento Aklamator INfeed para WordPress hasta la versi\u00f3n 2.0.0 no desinfecta ni escapa un par\u00e1metro antes de mostrarlo nuevamente en la p\u00e1gina, lo que genera un error de Cross-Site Scripting reflejado que podr\u00eda usarse contra usuarios con privilegios elevados, como el administrador."}], "metrics": {"cvssMetricV31": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "baseScore": 6.1, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 2.7}]}, "references": [{"url": "https://wpscan.com/vulnerability/e1c3754f-60e0-4a89-b4fc-89056dba3616/", "source": "contact@wpscan.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-12736.json b/cve/2024/CVE-2024-12736.json index c20071b4542..22e7fafa6e7 100644 --- a/cve/2024/CVE-2024-12736.json +++ b/cve/2024/CVE-2024-12736.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-12736", "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-09T06:15:15.273", "lastModified": "2025-01-09T06:15:15.273", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "The BU Section Editing WordPress plugin through 0.9.9 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin."}], "metrics": {}, "references": [{"url": "https://wpscan.com/vulnerability/d3c6a4c1-8358-4f8b-b58d-3f712052668f/", "source": "contact@wpscan.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-12736", "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-09T06:15:15.273", "lastModified": "2025-01-09T16:15:36.680", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "The BU Section Editing WordPress plugin through 0.9.9 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin."}, {"lang": "es", "value": "El complemento BU Section Editing WordPress hasta la versi\u00f3n 0.9.9 no desinfecta ni escapa un par\u00e1metro antes de mostrarlo nuevamente en la p\u00e1gina, lo que genera Cross-Site Scripting reflejado que podr\u00eda usarse contra usuarios con privilegios altos, como el administrador."}], "metrics": {"cvssMetricV31": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "baseScore": 6.1, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 2.7}]}, "references": [{"url": "https://wpscan.com/vulnerability/d3c6a4c1-8358-4f8b-b58d-3f712052668f/", "source": "contact@wpscan.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-1289.json b/cve/2024/CVE-2024-1289.json index 41b54098343..6a2ac24d7ad 100644 --- a/cve/2024/CVE-2024-1289.json +++ b/cve/2024/CVE-2024-1289.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-1289", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:15.990", "lastModified": "2024-11-21T08:50:14.563", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "The LearnPress \u2013 WordPress LMS Plugin plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.2.6.3 due to missing validation on a user controlled key when looking up order information. This makes it possible for authenticated attackers to obtain information on orders placed by other users and guests, which can be leveraged to sign up for paid courses that were purchased by guests. Emails of other users are also exposed."}, {"lang": "es", "value": "El complemento LearnPress \u2013 WordPress LMS Plugin para WordPress es vulnerable a la referencia directa de objetos inseguros en todas las versiones hasta la 4.2.6.3 incluida debido a la falta de validaci\u00f3n en una clave controlada por el usuario al buscar informaci\u00f3n de pedido. Esto hace posible que los atacantes autenticados obtengan informaci\u00f3n sobre los pedidos realizados por otros usuarios e invitados, que pueden aprovecharse para inscribirse en cursos pagos que compraron los invitados. Tambi\u00e9n quedan expuestos los correos electr\u00f3nicos de otros usuarios."}], "metrics": {"cvssMetricV31": [{"source": "security@wordfence.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 3.9, "impactScore": 2.5}]}, "references": [{"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3042945%40learnpress%2Ftags%2F4.2.6.3&new=3061851%40learnpress%2Ftags%2F4.2.6.4", "source": "security@wordfence.com"}, {"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0c410d91-08cc-496d-9c8e-c57f107399da?source=cve", "source": "security@wordfence.com"}, {"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3042945%40learnpress%2Ftags%2F4.2.6.3&new=3061851%40learnpress%2Ftags%2F4.2.6.4", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0c410d91-08cc-496d-9c8e-c57f107399da?source=cve", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-1289", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:15.990", "lastModified": "2025-01-09T17:41:10.137", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "The LearnPress \u2013 WordPress LMS Plugin plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.2.6.3 due to missing validation on a user controlled key when looking up order information. This makes it possible for authenticated attackers to obtain information on orders placed by other users and guests, which can be leveraged to sign up for paid courses that were purchased by guests. Emails of other users are also exposed."}, {"lang": "es", "value": "El complemento LearnPress \u2013 WordPress LMS Plugin para WordPress es vulnerable a la referencia directa de objetos inseguros en todas las versiones hasta la 4.2.6.3 incluida debido a la falta de validaci\u00f3n en una clave controlada por el usuario al buscar informaci\u00f3n de pedido. Esto hace posible que los atacantes autenticados obtengan informaci\u00f3n sobre los pedidos realizados por otros usuarios e invitados, que pueden aprovecharse para inscribirse en cursos pagos que compraron los invitados. Tambi\u00e9n quedan expuestos los correos electr\u00f3nicos de otros usuarios."}], "metrics": {"cvssMetricV31": [{"source": "security@wordfence.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 3.9, "impactScore": 2.5}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "baseScore": 5.4, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 2.5}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-639"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:thimpress:learnpress:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "4.2.6.4", "matchCriteriaId": "3A49C601-BDD9-4F3D-9159-6617A460BFD9"}]}]}], "references": [{"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3042945%40learnpress%2Ftags%2F4.2.6.3&new=3061851%40learnpress%2Ftags%2F4.2.6.4", "source": "security@wordfence.com", "tags": ["Broken Link"]}, {"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0c410d91-08cc-496d-9c8e-c57f107399da?source=cve", "source": "security@wordfence.com", "tags": ["Third Party Advisory"]}, {"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3042945%40learnpress%2Ftags%2F4.2.6.3&new=3061851%40learnpress%2Ftags%2F4.2.6.4", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Broken Link"]}, {"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0c410d91-08cc-496d-9c8e-c57f107399da?source=cve", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-13191.json b/cve/2024/CVE-2024-13191.json index 7aba69752b3..af3a9b1d425 100644 --- a/cve/2024/CVE-2024-13191.json +++ b/cve/2024/CVE-2024-13191.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-13191", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-08T23:15:08.807", "lastModified": "2025-01-08T23:15:08.807", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "A vulnerability, which was classified as critical, has been found in ZeroWdd myblog 1.0. This issue affects the function upload of the file src/main/java/com/wdd/myblog/controller/admin/uploadController.java. The manipulation of the argument file leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."}], "metrics": {"cvssMetricV40": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "baseScore": 5.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "LOW", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "LOW", "vulnerableSystemIntegrity": "LOW", "vulnerableSystemAvailability": "LOW", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED"}}], "cvssMetricV31": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "baseScore": 6.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.8, "impactScore": 3.4}], "cvssMetricV2": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL"}, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "cna@vuldb.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-284"}, {"lang": "en", "value": "CWE-434"}]}], "references": [{"url": "https://github.com/ZeroWdd/myblog/issues/3", "source": "cna@vuldb.com"}, {"url": "https://github.com/ZeroWdd/myblog/issues/3#issue-2759839215", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?ctiid.290783", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?id.290783", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?submit.469229", "source": "cna@vuldb.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-13191", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-08T23:15:08.807", "lastModified": "2025-01-09T17:15:11.267", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "A vulnerability, which was classified as critical, has been found in ZeroWdd myblog 1.0. This issue affects the function upload of the file src/main/java/com/wdd/myblog/controller/admin/uploadController.java. The manipulation of the argument file leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."}, {"lang": "es", "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en ZeroWdd myblog 1.0. Este problema afecta a la funci\u00f3n de carga del archivo src/main/java/com/wdd/myblog/controller/admin/uploadController.java. La manipulaci\u00f3n del archivo de argumentos provoca una carga sin restricciones. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse."}], "metrics": {"cvssMetricV40": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "baseScore": 5.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "LOW", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "LOW", "vulnerableSystemIntegrity": "LOW", "vulnerableSystemAvailability": "LOW", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED"}}], "cvssMetricV31": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "baseScore": 6.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.8, "impactScore": 3.4}], "cvssMetricV2": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL"}, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "cna@vuldb.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-284"}, {"lang": "en", "value": "CWE-434"}]}], "references": [{"url": "https://github.com/ZeroWdd/myblog/issues/3", "source": "cna@vuldb.com"}, {"url": "https://github.com/ZeroWdd/myblog/issues/3#issue-2759839215", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?ctiid.290783", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?id.290783", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?submit.469229", "source": "cna@vuldb.com"}, {"url": "https://github.com/ZeroWdd/myblog/issues/3", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"}, {"url": "https://github.com/ZeroWdd/myblog/issues/3#issue-2759839215", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-13192.json b/cve/2024/CVE-2024-13192.json index 162a5121f33..131d9b50168 100644 --- a/cve/2024/CVE-2024-13192.json +++ b/cve/2024/CVE-2024-13192.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-13192", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-08T23:15:09.017", "lastModified": "2025-01-08T23:15:09.017", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "A vulnerability, which was classified as problematic, was found in ZeroWdd myblog 1.0. Affected is the function update of the file src/main/java/com/wdd/myblog/controller/admin/BlogController.java. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."}], "metrics": {"cvssMetricV40": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "baseScore": 5.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "LOW", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "LOW", "vulnerableSystemAvailability": "NONE", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED"}}], "cvssMetricV31": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "baseScore": 3.5, "baseSeverity": "LOW", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.1, "impactScore": 1.4}], "cvssMetricV2": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE"}, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "cna@vuldb.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}, {"lang": "en", "value": "CWE-94"}]}], "references": [{"url": "https://github.com/ZeroWdd/myblog/issues/4", "source": "cna@vuldb.com"}, {"url": "https://github.com/ZeroWdd/myblog/issues/4#issue-2759845658", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?ctiid.290784", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?id.290784", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?submit.469232", "source": "cna@vuldb.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-13192", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-08T23:15:09.017", "lastModified": "2025-01-09T17:15:11.420", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "A vulnerability, which was classified as problematic, was found in ZeroWdd myblog 1.0. Affected is the function update of the file src/main/java/com/wdd/myblog/controller/admin/BlogController.java. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."}, {"lang": "es", "value": "En ZeroWdd myblog 1.0 se ha detectado una vulnerabilidad clasificada como problem\u00e1tica. La funci\u00f3n de actualizaci\u00f3n del archivo src/main/java/com/wdd/myblog/controller/admin/BlogController.java se ve afectada. La manipulaci\u00f3n provoca ataques de cross site scripting. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."}], "metrics": {"cvssMetricV40": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "baseScore": 5.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "LOW", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "LOW", "vulnerableSystemAvailability": "NONE", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED"}}], "cvssMetricV31": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "baseScore": 3.5, "baseSeverity": "LOW", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.1, "impactScore": 1.4}], "cvssMetricV2": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE"}, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "cna@vuldb.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-79"}, {"lang": "en", "value": "CWE-94"}]}], "references": [{"url": "https://github.com/ZeroWdd/myblog/issues/4", "source": "cna@vuldb.com"}, {"url": "https://github.com/ZeroWdd/myblog/issues/4#issue-2759845658", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?ctiid.290784", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?id.290784", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?submit.469232", "source": "cna@vuldb.com"}, {"url": "https://github.com/ZeroWdd/myblog/issues/4", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-13193.json b/cve/2024/CVE-2024-13193.json index 00791e42eb3..3ff2ae13527 100644 --- a/cve/2024/CVE-2024-13193.json +++ b/cve/2024/CVE-2024-13193.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-13193", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-08T23:15:09.220", "lastModified": "2025-01-08T23:15:09.220", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "A vulnerability has been found in SEMCMS up to 4.8 and classified as critical. Affected by this vulnerability is an unknown functionality of the file SEMCMS_Images.php of the component Image Library Management Page. The manipulation leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."}], "metrics": {"cvssMetricV40": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "baseScore": 5.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "LOW", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "LOW", "vulnerableSystemIntegrity": "LOW", "vulnerableSystemAvailability": "LOW", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED"}}], "cvssMetricV31": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "baseScore": 6.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.8, "impactScore": 3.4}], "cvssMetricV2": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL"}, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "cna@vuldb.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-74"}, {"lang": "en", "value": "CWE-89"}]}], "references": [{"url": "https://github.com/Upgradeextension/SEMCMS/blob/main/README.md", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?ctiid.290785", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?id.290785", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?submit.469563", "source": "cna@vuldb.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-13193", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-08T23:15:09.220", "lastModified": "2025-01-09T17:15:11.553", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "A vulnerability has been found in SEMCMS up to 4.8 and classified as critical. Affected by this vulnerability is an unknown functionality of the file SEMCMS_Images.php of the component Image Library Management Page. The manipulation leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."}, {"lang": "es", "value": "Se ha encontrado una vulnerabilidad en SEMCMS hasta la versi\u00f3n 4.8 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo SEMCMS_Images.php del componente Image Library Management Page. La manipulaci\u00f3n conduce a una inyecci\u00f3n SQL. El ataque se puede ejecutar de forma remota. El exploit se ha divulgado al p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."}], "metrics": {"cvssMetricV40": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "baseScore": 5.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "LOW", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "LOW", "vulnerableSystemIntegrity": "LOW", "vulnerableSystemAvailability": "LOW", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED"}}], "cvssMetricV31": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "baseScore": 6.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.8, "impactScore": 3.4}], "cvssMetricV2": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL"}, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "cna@vuldb.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-74"}, {"lang": "en", "value": "CWE-89"}]}], "references": [{"url": "https://github.com/Upgradeextension/SEMCMS/blob/main/README.md", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?ctiid.290785", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?id.290785", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?submit.469563", "source": "cna@vuldb.com"}, {"url": "https://github.com/Upgradeextension/SEMCMS/blob/main/README.md", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-13194.json b/cve/2024/CVE-2024-13194.json index f90966dfdb9..2e4875a2309 100644 --- a/cve/2024/CVE-2024-13194.json +++ b/cve/2024/CVE-2024-13194.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-13194", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T00:15:25.357", "lastModified": "2025-01-09T00:15:25.357", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "A vulnerability was found in Sucms 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/admin_members.php?ac=search. The manipulation of the argument uid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."}], "metrics": {"cvssMetricV40": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "baseScore": 5.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "LOW", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "LOW", "vulnerableSystemIntegrity": "LOW", "vulnerableSystemAvailability": "LOW", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED"}}], "cvssMetricV31": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "baseScore": 6.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.8, "impactScore": 3.4}], "cvssMetricV2": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL"}, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "cna@vuldb.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-74"}, {"lang": "en", "value": "CWE-89"}]}], "references": [{"url": "https://github.com/Upgradeextension/Sucms-v1.0SQLinjection/blob/main/README.md", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?ctiid.290786", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?id.290786", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?submit.469566", "source": "cna@vuldb.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-13194", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T00:15:25.357", "lastModified": "2025-01-09T17:15:11.690", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "A vulnerability was found in Sucms 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/admin_members.php?ac=search. The manipulation of the argument uid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."}, {"lang": "es", "value": "Se encontr\u00f3 una vulnerabilidad en Sucms 1.0 y se clasific\u00f3 como cr\u00edtica. Este problema afecta a algunas funciones desconocidas del archivo /admin/admin_members.php?ac=search. La manipulaci\u00f3n del argumento uid conduce a una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."}], "metrics": {"cvssMetricV40": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "baseScore": 5.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "LOW", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "LOW", "vulnerableSystemIntegrity": "LOW", "vulnerableSystemAvailability": "LOW", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED"}}], "cvssMetricV31": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "baseScore": 6.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.8, "impactScore": 3.4}], "cvssMetricV2": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL"}, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "cna@vuldb.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-74"}, {"lang": "en", "value": "CWE-89"}]}], "references": [{"url": "https://github.com/Upgradeextension/Sucms-v1.0SQLinjection/blob/main/README.md", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?ctiid.290786", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?id.290786", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?submit.469566", "source": "cna@vuldb.com"}, {"url": "https://github.com/Upgradeextension/Sucms-v1.0SQLinjection/blob/main/README.md", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-13195.json b/cve/2024/CVE-2024-13195.json index 0eea92cfe6b..32917cca13a 100644 --- a/cve/2024/CVE-2024-13195.json +++ b/cve/2024/CVE-2024-13195.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-13195", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T00:15:25.570", "lastModified": "2025-01-09T00:15:25.570", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "A vulnerability was found in donglight bookstore\u7535\u5546\u4e66\u57ce\u7cfb\u7edf\u8bf4\u660e 1.0.0. It has been classified as critical. This affects the function getHtml of the file src/main/java/org/zdd/bookstore/rawl/HttpUtil.java. The manipulation of the argument url leads to server-side request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."}], "metrics": {"cvssMetricV40": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "baseScore": 5.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "LOW", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "LOW", "vulnerableSystemIntegrity": "LOW", "vulnerableSystemAvailability": "LOW", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED"}}], "cvssMetricV31": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "baseScore": 6.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.8, "impactScore": 3.4}], "cvssMetricV2": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL"}, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "cna@vuldb.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-918"}]}], "references": [{"url": "https://github.com/donglight/bookstore/issues/11", "source": "cna@vuldb.com"}, {"url": "https://github.com/donglight/bookstore/issues/11#issue-2760929273", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?ctiid.290787", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?id.290787", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?submit.469689", "source": "cna@vuldb.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-13195", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T00:15:25.570", "lastModified": "2025-01-09T17:15:11.827", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "A vulnerability was found in donglight bookstore\u7535\u5546\u4e66\u57ce\u7cfb\u7edf\u8bf4\u660e 1.0.0. It has been classified as critical. This affects the function getHtml of the file src/main/java/org/zdd/bookstore/rawl/HttpUtil.java. The manipulation of the argument url leads to server-side request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."}, {"lang": "es", "value": "Se ha encontrado una vulnerabilidad en donglight bookstore???????? 1.0.0. Se ha clasificado como cr\u00edtica. Afecta a la funci\u00f3n getHtml del archivo src/main/java/org/zdd/bookstore/rawl/HttpUtil.java. La manipulaci\u00f3n del argumento url conduce a server-side request forgery. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."}], "metrics": {"cvssMetricV40": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "baseScore": 5.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "LOW", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "LOW", "vulnerableSystemIntegrity": "LOW", "vulnerableSystemAvailability": "LOW", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED"}}], "cvssMetricV31": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "baseScore": 6.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.8, "impactScore": 3.4}], "cvssMetricV2": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL"}, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "cna@vuldb.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-918"}]}], "references": [{"url": "https://github.com/donglight/bookstore/issues/11", "source": "cna@vuldb.com"}, {"url": "https://github.com/donglight/bookstore/issues/11#issue-2760929273", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?ctiid.290787", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?id.290787", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?submit.469689", "source": "cna@vuldb.com"}, {"url": "https://github.com/donglight/bookstore/issues/11", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"}, {"url": "https://github.com/donglight/bookstore/issues/11#issue-2760929273", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-13196.json b/cve/2024/CVE-2024-13196.json index 916e3b24ad3..e8db6b9007c 100644 --- a/cve/2024/CVE-2024-13196.json +++ b/cve/2024/CVE-2024-13196.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-13196", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T00:15:25.760", "lastModified": "2025-01-09T00:15:25.760", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "A vulnerability was found in donglight bookstore\u7535\u5546\u4e66\u57ce\u7cfb\u7edf\u8bf4\u660e 1.0.0. It has been declared as problematic. This vulnerability affects the function BookSearchList of the file src/main/java/org/zdd/bookstore/web/controller/BookInfoController.java. The manipulation of the argument keywords leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."}], "metrics": {"cvssMetricV40": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "baseScore": 5.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "LOW", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "LOW", "vulnerableSystemAvailability": "NONE", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED"}}], "cvssMetricV31": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "baseScore": 3.5, "baseSeverity": "LOW", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.1, "impactScore": 1.4}], "cvssMetricV2": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE"}, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "cna@vuldb.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}, {"lang": "en", "value": "CWE-94"}]}], "references": [{"url": "https://github.com/donglight/bookstore/issues/12", "source": "cna@vuldb.com"}, {"url": "https://github.com/donglight/bookstore/issues/12#issue-2760934170", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?ctiid.290788", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?id.290788", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?submit.469771", "source": "cna@vuldb.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-13196", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T00:15:25.760", "lastModified": "2025-01-09T17:15:11.957", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "A vulnerability was found in donglight bookstore\u7535\u5546\u4e66\u57ce\u7cfb\u7edf\u8bf4\u660e 1.0.0. It has been declared as problematic. This vulnerability affects the function BookSearchList of the file src/main/java/org/zdd/bookstore/web/controller/BookInfoController.java. The manipulation of the argument keywords leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."}, {"lang": "es", "value": "Se ha encontrado una vulnerabilidad en donglight bookstore???????? 1.0.0. Se ha declarado como problem\u00e1tica. Esta vulnerabilidad afecta a la funci\u00f3n BookSearchList del archivo src/main/java/org/zdd/bookstore/web/controller/BookInfoController.java. La manipulaci\u00f3n de las palabras clave del argumento provoca cross site scripting. El ataque se puede iniciar de forma remota. La vulnerabilidad se ha hecho p\u00fablica y puede utilizarse."}], "metrics": {"cvssMetricV40": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "baseScore": 5.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "LOW", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "LOW", "vulnerableSystemAvailability": "NONE", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED"}}], "cvssMetricV31": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "baseScore": 3.5, "baseSeverity": "LOW", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.1, "impactScore": 1.4}], "cvssMetricV2": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE"}, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "cna@vuldb.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-79"}, {"lang": "en", "value": "CWE-94"}]}], "references": [{"url": "https://github.com/donglight/bookstore/issues/12", "source": "cna@vuldb.com"}, {"url": "https://github.com/donglight/bookstore/issues/12#issue-2760934170", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?ctiid.290788", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?id.290788", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?submit.469771", "source": "cna@vuldb.com"}, {"url": "https://github.com/donglight/bookstore/issues/12", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"}, {"url": "https://github.com/donglight/bookstore/issues/12#issue-2760934170", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-13202.json b/cve/2024/CVE-2024-13202.json index 368f25d4f08..7ba0809710b 100644 --- a/cve/2024/CVE-2024-13202.json +++ b/cve/2024/CVE-2024-13202.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-13202", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T03:15:24.220", "lastModified": "2025-01-09T03:15:24.220", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "A vulnerability was found in wander-chu SpringBoot-Blog 1.0 and classified as problematic. This issue affects the function modifiyArticle of the file src/main/java/com/my/blog/website/controller/admin/PageController.java of the component Blog Article Handler. The manipulation of the argument content leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."}], "metrics": {"cvssMetricV40": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "baseScore": 5.1, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "HIGH", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "LOW", "vulnerableSystemAvailability": "NONE", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED"}}], "cvssMetricV31": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", "baseScore": 2.4, "baseSeverity": "LOW", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 0.9, "impactScore": 1.4}], "cvssMetricV2": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N", "baseScore": 3.3, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "MULTIPLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE"}, "baseSeverity": "LOW", "exploitabilityScore": 6.4, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "cna@vuldb.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}, {"lang": "en", "value": "CWE-94"}]}], "references": [{"url": "https://github.com/wander-chu/SpringBoot-Blog/issues/7", "source": "cna@vuldb.com"}, {"url": "https://github.com/wander-chu/SpringBoot-Blog/issues/7#issue-2761643235", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?ctiid.290795", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?id.290795", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?submit.470914", "source": "cna@vuldb.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-13202", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T03:15:24.220", "lastModified": "2025-01-09T17:15:12.110", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "A vulnerability was found in wander-chu SpringBoot-Blog 1.0 and classified as problematic. This issue affects the function modifiyArticle of the file src/main/java/com/my/blog/website/controller/admin/PageController.java of the component Blog Article Handler. The manipulation of the argument content leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."}, {"lang": "es", "value": "Se ha encontrado una vulnerabilidad en wander-chu SpringBoot-Blog 1.0 y se ha clasificado como problem\u00e1tica. Este problema afecta a la funci\u00f3n modifiyArticle del archivo src/main/java/com/my/blog/website/controller/admin/PageController.java del componente Blog Article Handler. La manipulaci\u00f3n del contenido del argumento provoca cross site scripting. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."}], "metrics": {"cvssMetricV40": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "baseScore": 5.1, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "HIGH", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "LOW", "vulnerableSystemAvailability": "NONE", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED"}}], "cvssMetricV31": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", "baseScore": 2.4, "baseSeverity": "LOW", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 0.9, "impactScore": 1.4}], "cvssMetricV2": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N", "baseScore": 3.3, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "MULTIPLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE"}, "baseSeverity": "LOW", "exploitabilityScore": 6.4, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "cna@vuldb.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-79"}, {"lang": "en", "value": "CWE-94"}]}], "references": [{"url": "https://github.com/wander-chu/SpringBoot-Blog/issues/7", "source": "cna@vuldb.com"}, {"url": "https://github.com/wander-chu/SpringBoot-Blog/issues/7#issue-2761643235", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?ctiid.290795", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?id.290795", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?submit.470914", "source": "cna@vuldb.com"}, {"url": "https://github.com/wander-chu/SpringBoot-Blog/issues/7#issue-2761643235", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-13203.json b/cve/2024/CVE-2024-13203.json index 8a9c518dc64..ad51095d4c3 100644 --- a/cve/2024/CVE-2024-13203.json +++ b/cve/2024/CVE-2024-13203.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-13203", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T03:15:24.410", "lastModified": "2025-01-09T03:15:24.410", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "A vulnerability was found in kurniaramadhan E-Commerce-PHP 1.0. It has been classified as problematic. Affected is an unknown function. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely. The vendor was contacted early about this disclosure but did not respond in any way."}], "metrics": {"cvssMetricV40": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "baseScore": 6.9, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "NONE", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "LOW", "vulnerableSystemAvailability": "NONE", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED"}}], "cvssMetricV31": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "baseScore": 4.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 1.4}], "cvssMetricV2": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE"}, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "cna@vuldb.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-352"}, {"lang": "en", "value": "CWE-862"}]}], "references": [{"url": "https://vuldb.com/?ctiid.290796", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?id.290796", "source": "cna@vuldb.com"}, {"url": "https://www.websecurityinsights.my.id/2024/12/ecommerce-php-by-kurniaramadhan-sql.html?m=1", "source": "cna@vuldb.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-13203", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T03:15:24.410", "lastModified": "2025-01-09T17:15:12.280", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "A vulnerability was found in kurniaramadhan E-Commerce-PHP 1.0. It has been classified as problematic. Affected is an unknown function. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely. The vendor was contacted early about this disclosure but did not respond in any way."}, {"lang": "es", "value": "Se ha detectado una vulnerabilidad en kurniaramadhan E-Commerce-PHP 1.0. Se ha clasificado como problem\u00e1tica. Se trata de una funci\u00f3n desconocida. La manipulaci\u00f3n conduce a cross-site request forgery. Es posible lanzar el ataque de forma remota. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera."}], "metrics": {"cvssMetricV40": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "baseScore": 6.9, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "NONE", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "LOW", "vulnerableSystemAvailability": "NONE", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED"}}], "cvssMetricV31": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "baseScore": 4.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 1.4}], "cvssMetricV2": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE"}, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "cna@vuldb.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-352"}, {"lang": "en", "value": "CWE-862"}]}], "references": [{"url": "https://vuldb.com/?ctiid.290796", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?id.290796", "source": "cna@vuldb.com"}, {"url": "https://www.websecurityinsights.my.id/2024/12/ecommerce-php-by-kurniaramadhan-sql.html?m=1", "source": "cna@vuldb.com"}, {"url": "https://www.websecurityinsights.my.id/2024/12/ecommerce-php-by-kurniaramadhan-sql.html?m=1", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-1463.json b/cve/2024/CVE-2024-1463.json index 9b90a9a3327..0365b45e669 100644 --- a/cve/2024/CVE-2024-1463.json +++ b/cve/2024/CVE-2024-1463.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-1463", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:17.540", "lastModified": "2024-11-21T08:50:38.330", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "The LearnPress \u2013 WordPress LMS Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Course, Lesson, and Quiz title and content in all versions up to, and including, 4.2.6.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with LP Instructor-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."}, {"lang": "es", "value": "El complemento LearnPress \u2013 WordPress LMS Plugin para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del t\u00edtulo y el contenido del curso, la lecci\u00f3n y el cuestionario en todas las versiones hasta la 4.2.6.3 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel LP Instructor, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."}], "metrics": {"cvssMetricV31": [{"source": "security@wordfence.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N", "baseScore": 4.4, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 1.3, "impactScore": 2.7}]}, "references": [{"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3042945%40learnpress%2Ftags%2F4.2.6.3&new=3061851%40learnpress%2Ftags%2F4.2.6.4", "source": "security@wordfence.com"}, {"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/abb4b617-884b-4e72-812f-5f23a0976ab6?source=cve", "source": "security@wordfence.com"}, {"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3042945%40learnpress%2Ftags%2F4.2.6.3&new=3061851%40learnpress%2Ftags%2F4.2.6.4", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/abb4b617-884b-4e72-812f-5f23a0976ab6?source=cve", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-1463", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:17.540", "lastModified": "2025-01-09T17:37:21.223", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "The LearnPress \u2013 WordPress LMS Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Course, Lesson, and Quiz title and content in all versions up to, and including, 4.2.6.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with LP Instructor-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."}, {"lang": "es", "value": "El complemento LearnPress \u2013 WordPress LMS Plugin para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del t\u00edtulo y el contenido del curso, la lecci\u00f3n y el cuestionario en todas las versiones hasta la 4.2.6.3 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel LP Instructor, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."}], "metrics": {"cvssMetricV31": [{"source": "security@wordfence.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N", "baseScore": 4.4, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 1.3, "impactScore": 2.7}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "baseScore": 4.8, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 1.7, "impactScore": 2.7}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:thimpress:learnpress:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "4.2.6.4", "matchCriteriaId": "3A49C601-BDD9-4F3D-9159-6617A460BFD9"}]}]}], "references": [{"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3042945%40learnpress%2Ftags%2F4.2.6.3&new=3061851%40learnpress%2Ftags%2F4.2.6.4", "source": "security@wordfence.com", "tags": ["Broken Link"]}, {"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/abb4b617-884b-4e72-812f-5f23a0976ab6?source=cve", "source": "security@wordfence.com", "tags": ["Third Party Advisory"]}, {"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3042945%40learnpress%2Ftags%2F4.2.6.3&new=3061851%40learnpress%2Ftags%2F4.2.6.4", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Broken Link"]}, {"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/abb4b617-884b-4e72-812f-5f23a0976ab6?source=cve", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-21652.json b/cve/2024/CVE-2024-21652.json index f887a0e53b2..fc7a90ae59c 100644 --- a/cve/2024/CVE-2024-21652.json +++ b/cve/2024/CVE-2024-21652.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-21652", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-18T18:15:09.697", "lastModified": "2024-11-21T08:54:48.430", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Prior to versions 2.8.13, 2.9.9, and 2.10.4, an attacker can exploit a chain of vulnerabilities, including a Denial of Service (DoS) flaw and in-memory data storage weakness, to effectively bypass the application's brute force login protection. This is a critical security vulnerability that allows attackers to bypass the brute force login protection mechanism. Not only can they crash the service affecting all users, but they can also make unlimited login attempts, increasing the risk of account compromise. Versions 2.8.13, 2.9.9, and 2.10.4 contain a patch for this issue.\n"}, {"lang": "es", "value": "Argo CD es una herramienta declarativa de entrega continua de GitOps para Kubernetes. Antes de las versiones 2.8.13, 2.9.9 y 2.10.4, un atacante pod\u00eda explotar una cadena de vulnerabilidades, incluida una falla de denegaci\u00f3n de servicio (DoS) y una debilidad en el almacenamiento de datos en memoria, para evitar de manera efectiva el inicio de sesi\u00f3n de fuerza bruta de la aplicaci\u00f3n. proteccion. Esta es una vulnerabilidad de seguridad cr\u00edtica que permite a los atacantes eludir el mecanismo de protecci\u00f3n de inicio de sesi\u00f3n de fuerza bruta. No s\u00f3lo pueden bloquear el servicio y afectar a todos los usuarios, sino que tambi\u00e9n pueden realizar intentos de inicio de sesi\u00f3n ilimitados, lo que aumenta el riesgo de que la cuenta se vea comprometida. Las versiones 2.8.13, 2.9.9 y 2.10.4 contienen un parche para este problema."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 5.9}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-307"}]}], "references": [{"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-x32m-mvfj-52xv", "source": "security-advisories@github.com"}, {"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-x32m-mvfj-52xv", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-21652", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-18T18:15:09.697", "lastModified": "2025-01-09T17:07:47.467", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Prior to versions 2.8.13, 2.9.9, and 2.10.4, an attacker can exploit a chain of vulnerabilities, including a Denial of Service (DoS) flaw and in-memory data storage weakness, to effectively bypass the application's brute force login protection. This is a critical security vulnerability that allows attackers to bypass the brute force login protection mechanism. Not only can they crash the service affecting all users, but they can also make unlimited login attempts, increasing the risk of account compromise. Versions 2.8.13, 2.9.9, and 2.10.4 contain a patch for this issue.\n"}, {"lang": "es", "value": "Argo CD es una herramienta declarativa de entrega continua de GitOps para Kubernetes. Antes de las versiones 2.8.13, 2.9.9 y 2.10.4, un atacante pod\u00eda explotar una cadena de vulnerabilidades, incluida una falla de denegaci\u00f3n de servicio (DoS) y una debilidad en el almacenamiento de datos en memoria, para evitar de manera efectiva el inicio de sesi\u00f3n de fuerza bruta de la aplicaci\u00f3n. proteccion. Esta es una vulnerabilidad de seguridad cr\u00edtica que permite a los atacantes eludir el mecanismo de protecci\u00f3n de inicio de sesi\u00f3n de fuerza bruta. No s\u00f3lo pueden bloquear el servicio y afectar a todos los usuarios, sino que tambi\u00e9n pueden realizar intentos de inicio de sesi\u00f3n ilimitados, lo que aumenta el riesgo de que la cuenta se vea comprometida. Las versiones 2.8.13, 2.9.9 y 2.10.4 contienen un parche para este problema."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 5.9}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 5.9}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-307"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-307"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.8.13", "matchCriteriaId": "6312AE1F-68E1-4B95-952B-BCFA03CCC7AD"}, {"vulnerable": true, "criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.9.0", "versionEndExcluding": "2.9.9", "matchCriteriaId": "89CCBDB3-E3A5-4529-9483-556AE5F93775"}, {"vulnerable": true, "criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.10.0", "versionEndExcluding": "2.10.4", "matchCriteriaId": "5FD6C646-5A70-42B0-A92A-DEB525C09A64"}]}]}], "references": [{"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-x32m-mvfj-52xv", "source": "security-advisories@github.com", "tags": ["Vendor Advisory"]}, {"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-x32m-mvfj-52xv", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-21661.json b/cve/2024/CVE-2024-21661.json index 14bdc7110c8..22a157903f1 100644 --- a/cve/2024/CVE-2024-21661.json +++ b/cve/2024/CVE-2024-21661.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-21661", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-18T19:15:06.687", "lastModified": "2024-11-21T08:54:49.030", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Prior to versions 2.8.13, 2.9.9, and 2.10.4, an attacker can exploit a critical flaw in the application to initiate a Denial of Service (DoS) attack, rendering the application inoperable and affecting all users. The issue arises from unsafe manipulation of an array in a multi-threaded environment. The vulnerability is rooted in the application's code, where an array is being modified while it is being iterated over. This is a classic programming error but becomes critically unsafe when executed in a multi-threaded environment. When two threads interact with the same array simultaneously, the application crashes. This is a Denial of Service (DoS) vulnerability. Any attacker can crash the application continuously, making it impossible for legitimate users to access the service. The issue is exacerbated because it does not require authentication, widening the pool of potential attackers. Versions 2.8.13, 2.9.9, and 2.10.4 contain a patch for this issue."}, {"lang": "es", "value": "Argo CD es una herramienta declarativa de entrega continua de GitOps para Kubernetes. Antes de las versiones 2.8.13, 2.9.9 y 2.10.4, un atacante pod\u00eda explotar una falla cr\u00edtica en la aplicaci\u00f3n para iniciar un ataque de denegaci\u00f3n de servicio (DoS), dejando la aplicaci\u00f3n inoperable y afectando a todos los usuarios. El problema surge de la manipulaci\u00f3n insegura de una matriz en un entorno de subprocesos m\u00faltiples. La vulnerabilidad tiene su origen en el c\u00f3digo de la aplicaci\u00f3n, donde se modifica una matriz mientras se itera sobre ella. Este es un error de programaci\u00f3n cl\u00e1sico, pero se vuelve cr\u00edticamente inseguro cuando se ejecuta en un entorno de subprocesos m\u00faltiples. Cuando dos subprocesos interact\u00faan con la misma matriz simult\u00e1neamente, la aplicaci\u00f3n falla. Esta es una vulnerabilidad de denegaci\u00f3n de servicio (DoS). Cualquier atacante puede bloquear la aplicaci\u00f3n continuamente, imposibilitando que los usuarios leg\u00edtimos accedan al servicio. El problema se agrava porque no requiere autenticaci\u00f3n, lo que ampl\u00eda el grupo de atacantes potenciales. Las versiones 2.8.13, 2.9.9 y 2.10.4 contienen un parche para este problema."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.6}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-787"}]}], "references": [{"url": "https://github.com/argoproj/argo-cd/blob/54601c8fd30b86a4c4b7eb449956264372c8bde0/util/session/sessionmanager.go#L302-L311", "source": "security-advisories@github.com"}, {"url": "https://github.com/argoproj/argo-cd/commit/2a22e19e06aaf6a1e734443043310a66c234e345", "source": "security-advisories@github.com"}, {"url": "https://github.com/argoproj/argo-cd/commit/5bbb51ab423f273dda74ab956469843d2db2e208", "source": "security-advisories@github.com"}, {"url": "https://github.com/argoproj/argo-cd/commit/ce04dc5c6f6e92033221ec6d96b74403b065ca8b", "source": "security-advisories@github.com"}, {"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-6v85-wr92-q4p7", "source": "security-advisories@github.com"}, {"url": "https://github.com/argoproj/argo-cd/blob/54601c8fd30b86a4c4b7eb449956264372c8bde0/util/session/sessionmanager.go#L302-L311", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/argoproj/argo-cd/commit/2a22e19e06aaf6a1e734443043310a66c234e345", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/argoproj/argo-cd/commit/5bbb51ab423f273dda74ab956469843d2db2e208", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/argoproj/argo-cd/commit/ce04dc5c6f6e92033221ec6d96b74403b065ca8b", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-6v85-wr92-q4p7", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-21661", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-18T19:15:06.687", "lastModified": "2025-01-09T17:09:38.313", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Prior to versions 2.8.13, 2.9.9, and 2.10.4, an attacker can exploit a critical flaw in the application to initiate a Denial of Service (DoS) attack, rendering the application inoperable and affecting all users. The issue arises from unsafe manipulation of an array in a multi-threaded environment. The vulnerability is rooted in the application's code, where an array is being modified while it is being iterated over. This is a classic programming error but becomes critically unsafe when executed in a multi-threaded environment. When two threads interact with the same array simultaneously, the application crashes. This is a Denial of Service (DoS) vulnerability. Any attacker can crash the application continuously, making it impossible for legitimate users to access the service. The issue is exacerbated because it does not require authentication, widening the pool of potential attackers. Versions 2.8.13, 2.9.9, and 2.10.4 contain a patch for this issue."}, {"lang": "es", "value": "Argo CD es una herramienta declarativa de entrega continua de GitOps para Kubernetes. Antes de las versiones 2.8.13, 2.9.9 y 2.10.4, un atacante pod\u00eda explotar una falla cr\u00edtica en la aplicaci\u00f3n para iniciar un ataque de denegaci\u00f3n de servicio (DoS), dejando la aplicaci\u00f3n inoperable y afectando a todos los usuarios. El problema surge de la manipulaci\u00f3n insegura de una matriz en un entorno de subprocesos m\u00faltiples. La vulnerabilidad tiene su origen en el c\u00f3digo de la aplicaci\u00f3n, donde se modifica una matriz mientras se itera sobre ella. Este es un error de programaci\u00f3n cl\u00e1sico, pero se vuelve cr\u00edticamente inseguro cuando se ejecuta en un entorno de subprocesos m\u00faltiples. Cuando dos subprocesos interact\u00faan con la misma matriz simult\u00e1neamente, la aplicaci\u00f3n falla. Esta es una vulnerabilidad de denegaci\u00f3n de servicio (DoS). Cualquier atacante puede bloquear la aplicaci\u00f3n continuamente, imposibilitando que los usuarios leg\u00edtimos accedan al servicio. El problema se agrava porque no requiere autenticaci\u00f3n, lo que ampl\u00eda el grupo de atacantes potenciales. Las versiones 2.8.13, 2.9.9 y 2.10.4 contienen un parche para este problema."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.6}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.6}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-787"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.8.13", "matchCriteriaId": "6312AE1F-68E1-4B95-952B-BCFA03CCC7AD"}, {"vulnerable": true, "criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.9.0", "versionEndExcluding": "2.9.9", "matchCriteriaId": "89CCBDB3-E3A5-4529-9483-556AE5F93775"}, {"vulnerable": true, "criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.10.0", "versionEndExcluding": "2.10.4", "matchCriteriaId": "5FD6C646-5A70-42B0-A92A-DEB525C09A64"}]}]}], "references": [{"url": "https://github.com/argoproj/argo-cd/blob/54601c8fd30b86a4c4b7eb449956264372c8bde0/util/session/sessionmanager.go#L302-L311", "source": "security-advisories@github.com", "tags": ["Product"]}, {"url": "https://github.com/argoproj/argo-cd/commit/2a22e19e06aaf6a1e734443043310a66c234e345", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/commit/5bbb51ab423f273dda74ab956469843d2db2e208", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/commit/ce04dc5c6f6e92033221ec6d96b74403b065ca8b", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-6v85-wr92-q4p7", "source": "security-advisories@github.com", "tags": ["Exploit", "Vendor Advisory"]}, {"url": "https://github.com/argoproj/argo-cd/blob/54601c8fd30b86a4c4b7eb449956264372c8bde0/util/session/sessionmanager.go#L302-L311", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Product"]}, {"url": "https://github.com/argoproj/argo-cd/commit/2a22e19e06aaf6a1e734443043310a66c234e345", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/commit/5bbb51ab423f273dda74ab956469843d2db2e208", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/commit/ce04dc5c6f6e92033221ec6d96b74403b065ca8b", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-6v85-wr92-q4p7", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-21662.json b/cve/2024/CVE-2024-21662.json index 5544f91ae7a..7b5a192d4aa 100644 --- a/cve/2024/CVE-2024-21662.json +++ b/cve/2024/CVE-2024-21662.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-21662", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-18T19:15:06.870", "lastModified": "2024-11-21T08:54:49.157", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Prior to versions 2.8.13, 2.9.9, and 2.10.4, an attacker can effectively bypass the rate limit and brute force protections by exploiting the application's weak cache-based mechanism. This loophole in security can be combined with other vulnerabilities to attack the default admin account. This flaw undermines a patch for CVE-2020-8827 intended to protect against brute-force attacks. The application's brute force protection relies on a cache mechanism that tracks login attempts for each user. This cache is limited to a `defaultMaxCacheSize` of 1000 entries. An attacker can overflow this cache by bombarding it with login attempts for different users, thereby pushing out the admin account's failed attempts and effectively resetting the rate limit for that account. This is a severe vulnerability that enables attackers to perform brute force attacks at an accelerated rate, especially targeting the default admin account. Users should upgrade to version 2.8.13, 2.9.9, or 2.10.4 to receive a patch."}, {"lang": "es", "value": "Argo CD es una herramienta declarativa de entrega continua de GitOps para Kubernetes. Antes de las versiones 2.8.13, 2.9.9 y 2.10.4, un atacante pod\u00eda eludir eficazmente el l\u00edmite de velocidad y las protecciones de fuerza bruta explotando el d\u00e9bil mecanismo basado en cach\u00e9 de la aplicaci\u00f3n. Esta laguna de seguridad se puede combinar con otras vulnerabilidades para atacar la cuenta de administrador predeterminada. Esta falla socava un parche para CVE-2020-8827 destinado a proteger contra ataques de fuerza bruta. La protecci\u00f3n de fuerza bruta de la aplicaci\u00f3n se basa en un mecanismo de cach\u00e9 que rastrea los intentos de inicio de sesi\u00f3n de cada usuario. Este cach\u00e9 est\u00e1 limitado a un `defaultMaxCacheSize` de 1000 entradas. Un atacante puede desbordar este cach\u00e9 bombarde\u00e1ndolo con intentos de inicio de sesi\u00f3n para diferentes usuarios, eliminando as\u00ed los intentos fallidos de la cuenta de administrador y restableciendo efectivamente el l\u00edmite de velocidad para esa cuenta. Se trata de una vulnerabilidad grave que permite a los atacantes realizar ataques de fuerza bruta a un ritmo acelerado, especialmente dirigidos a la cuenta de administrador predeterminada. Los usuarios deben actualizar a la versi\u00f3n 2.8.13, 2.9.9 o 2.10.4 para recibir un parche."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "availabilityImpact": "NONE"}, "exploitabilityScore": 3.9, "impactScore": 3.6}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-307"}]}], "references": [{"url": "https://argo-cd.readthedocs.io/en/stable/security_considerations/#cve-2020-8827-insufficient-anti-automationanti-brute-force", "source": "security-advisories@github.com"}, {"url": "https://github.com/argoproj/argo-cd/commit/17b0df1168a4c535f6f37e95f25ed7cd81e1fa4d", "source": "security-advisories@github.com"}, {"url": "https://github.com/argoproj/argo-cd/commit/6e181d72b31522f886a2afa029d5b26d7912ec7b", "source": "security-advisories@github.com"}, {"url": "https://github.com/argoproj/argo-cd/commit/cebb6538f7944c87ca2fecb5d17f8baacc431456", "source": "security-advisories@github.com"}, {"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-2vgg-9h6w-m454", "source": "security-advisories@github.com"}, {"url": "https://argo-cd.readthedocs.io/en/stable/security_considerations/#cve-2020-8827-insufficient-anti-automationanti-brute-force", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/argoproj/argo-cd/commit/17b0df1168a4c535f6f37e95f25ed7cd81e1fa4d", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/argoproj/argo-cd/commit/6e181d72b31522f886a2afa029d5b26d7912ec7b", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/argoproj/argo-cd/commit/cebb6538f7944c87ca2fecb5d17f8baacc431456", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-2vgg-9h6w-m454", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-21662", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-18T19:15:06.870", "lastModified": "2025-01-09T17:13:17.787", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Prior to versions 2.8.13, 2.9.9, and 2.10.4, an attacker can effectively bypass the rate limit and brute force protections by exploiting the application's weak cache-based mechanism. This loophole in security can be combined with other vulnerabilities to attack the default admin account. This flaw undermines a patch for CVE-2020-8827 intended to protect against brute-force attacks. The application's brute force protection relies on a cache mechanism that tracks login attempts for each user. This cache is limited to a `defaultMaxCacheSize` of 1000 entries. An attacker can overflow this cache by bombarding it with login attempts for different users, thereby pushing out the admin account's failed attempts and effectively resetting the rate limit for that account. This is a severe vulnerability that enables attackers to perform brute force attacks at an accelerated rate, especially targeting the default admin account. Users should upgrade to version 2.8.13, 2.9.9, or 2.10.4 to receive a patch."}, {"lang": "es", "value": "Argo CD es una herramienta declarativa de entrega continua de GitOps para Kubernetes. Antes de las versiones 2.8.13, 2.9.9 y 2.10.4, un atacante pod\u00eda eludir eficazmente el l\u00edmite de velocidad y las protecciones de fuerza bruta explotando el d\u00e9bil mecanismo basado en cach\u00e9 de la aplicaci\u00f3n. Esta laguna de seguridad se puede combinar con otras vulnerabilidades para atacar la cuenta de administrador predeterminada. Esta falla socava un parche para CVE-2020-8827 destinado a proteger contra ataques de fuerza bruta. La protecci\u00f3n de fuerza bruta de la aplicaci\u00f3n se basa en un mecanismo de cach\u00e9 que rastrea los intentos de inicio de sesi\u00f3n de cada usuario. Este cach\u00e9 est\u00e1 limitado a un `defaultMaxCacheSize` de 1000 entradas. Un atacante puede desbordar este cach\u00e9 bombarde\u00e1ndolo con intentos de inicio de sesi\u00f3n para diferentes usuarios, eliminando as\u00ed los intentos fallidos de la cuenta de administrador y restableciendo efectivamente el l\u00edmite de velocidad para esa cuenta. Se trata de una vulnerabilidad grave que permite a los atacantes realizar ataques de fuerza bruta a un ritmo acelerado, especialmente dirigidos a la cuenta de administrador predeterminada. Los usuarios deben actualizar a la versi\u00f3n 2.8.13, 2.9.9 o 2.10.4 para recibir un parche."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "availabilityImpact": "NONE"}, "exploitabilityScore": 3.9, "impactScore": 3.6}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "baseScore": 9.1, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "NONE"}, "exploitabilityScore": 3.9, "impactScore": 5.2}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-307"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-307"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.8.13", "matchCriteriaId": "6312AE1F-68E1-4B95-952B-BCFA03CCC7AD"}, {"vulnerable": true, "criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.9.0", "versionEndExcluding": "2.9.9", "matchCriteriaId": "89CCBDB3-E3A5-4529-9483-556AE5F93775"}, {"vulnerable": true, "criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.10.0", "versionEndExcluding": "2.10.4", "matchCriteriaId": "5FD6C646-5A70-42B0-A92A-DEB525C09A64"}]}]}], "references": [{"url": "https://argo-cd.readthedocs.io/en/stable/security_considerations/#cve-2020-8827-insufficient-anti-automationanti-brute-force", "source": "security-advisories@github.com", "tags": ["Vendor Advisory"]}, {"url": "https://github.com/argoproj/argo-cd/commit/17b0df1168a4c535f6f37e95f25ed7cd81e1fa4d", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/commit/6e181d72b31522f886a2afa029d5b26d7912ec7b", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/commit/cebb6538f7944c87ca2fecb5d17f8baacc431456", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-2vgg-9h6w-m454", "source": "security-advisories@github.com", "tags": ["Exploit", "Vendor Advisory"]}, {"url": "https://argo-cd.readthedocs.io/en/stable/security_considerations/#cve-2020-8827-insufficient-anti-automationanti-brute-force", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}, {"url": "https://github.com/argoproj/argo-cd/commit/17b0df1168a4c535f6f37e95f25ed7cd81e1fa4d", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/commit/6e181d72b31522f886a2afa029d5b26d7912ec7b", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/commit/cebb6538f7944c87ca2fecb5d17f8baacc431456", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-2vgg-9h6w-m454", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-2181.json b/cve/2024/CVE-2024-2181.json index 71d6fc2f243..c47ba283923 100644 --- a/cve/2024/CVE-2024-2181.json +++ b/cve/2024/CVE-2024-2181.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-2181", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:28.957", "lastModified": "2024-11-21T09:09:12.207", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "The Beaver Builder Addons by WPZOOM plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Button widget in all versions up to, and including, 1.3.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."}, {"lang": "es", "value": "El complemento Beaver Builder Addons de WPZOOM para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del widget de bot\u00f3n en todas las versiones hasta la 1.3.4 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."}], "metrics": {"cvssMetricV31": [{"source": "security@wordfence.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", "baseScore": 6.4, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 3.1, "impactScore": 2.7}]}, "references": [{"url": "https://plugins.trac.wordpress.org/changeset/3046905/wpzoom-addons-for-beaver-builder", "source": "security@wordfence.com"}, {"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6baa44c7-1c13-45ad-9fb5-da06933f3cd0?source=cve", "source": "security@wordfence.com"}, {"url": "https://plugins.trac.wordpress.org/changeset/3046905/wpzoom-addons-for-beaver-builder", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6baa44c7-1c13-45ad-9fb5-da06933f3cd0?source=cve", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-2181", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:28.957", "lastModified": "2025-01-09T17:23:38.353", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "The Beaver Builder Addons by WPZOOM plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Button widget in all versions up to, and including, 1.3.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."}, {"lang": "es", "value": "El complemento Beaver Builder Addons de WPZOOM para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del widget de bot\u00f3n en todas las versiones hasta la 1.3.4 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."}], "metrics": {"cvssMetricV31": [{"source": "security@wordfence.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", "baseScore": 6.4, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 3.1, "impactScore": 2.7}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "baseScore": 5.4, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.3, "impactScore": 2.7}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:wpzoom:beaver_builder_addons:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "1.3.5", "matchCriteriaId": "3AD967ED-D8DA-4DA1-99A3-D4385C2264E6"}]}]}], "references": [{"url": "https://plugins.trac.wordpress.org/changeset/3046905/wpzoom-addons-for-beaver-builder", "source": "security@wordfence.com", "tags": ["Patch"]}, {"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6baa44c7-1c13-45ad-9fb5-da06933f3cd0?source=cve", "source": "security@wordfence.com", "tags": ["Third Party Advisory"]}, {"url": "https://plugins.trac.wordpress.org/changeset/3046905/wpzoom-addons-for-beaver-builder", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6baa44c7-1c13-45ad-9fb5-da06933f3cd0?source=cve", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-2183.json b/cve/2024/CVE-2024-2183.json index 71e5485e8de..c631db4d1f1 100644 --- a/cve/2024/CVE-2024-2183.json +++ b/cve/2024/CVE-2024-2183.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-2183", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:29.127", "lastModified": "2024-11-21T09:09:12.500", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "The Beaver Builder Addons by WPZOOM plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Heading widget in all versions up to, and including, 1.3.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. CVE-2024-30424 is likely a duplicate of this issue."}, {"lang": "es", "value": "El complemento Beaver Builder Addons de WPZOOM para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del widget de encabezado en todas las versiones hasta la 1.3.4 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. Es probable que CVE-2024-30424 sea un duplicado de este problema."}], "metrics": {"cvssMetricV31": [{"source": "security@wordfence.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", "baseScore": 6.4, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 3.1, "impactScore": 2.7}]}, "references": [{"url": "https://plugins.trac.wordpress.org/changeset/3046905/wpzoom-addons-for-beaver-builder", "source": "security@wordfence.com"}, {"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/781987af-3753-46ec-9d56-fb8b6ef42277?source=cve", "source": "security@wordfence.com"}, {"url": "https://plugins.trac.wordpress.org/changeset/3046905/wpzoom-addons-for-beaver-builder", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/781987af-3753-46ec-9d56-fb8b6ef42277?source=cve", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-2183", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:29.127", "lastModified": "2025-01-09T17:18:25.953", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "The Beaver Builder Addons by WPZOOM plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Heading widget in all versions up to, and including, 1.3.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. CVE-2024-30424 is likely a duplicate of this issue."}, {"lang": "es", "value": "El complemento Beaver Builder Addons de WPZOOM para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del widget de encabezado en todas las versiones hasta la 1.3.4 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. Es probable que CVE-2024-30424 sea un duplicado de este problema."}], "metrics": {"cvssMetricV31": [{"source": "security@wordfence.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", "baseScore": 6.4, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 3.1, "impactScore": 2.7}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "baseScore": 5.4, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.3, "impactScore": 2.7}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:wpzoom:beaver_builder_addons:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "1.3.5", "matchCriteriaId": "3AD967ED-D8DA-4DA1-99A3-D4385C2264E6"}]}]}], "references": [{"url": "https://plugins.trac.wordpress.org/changeset/3046905/wpzoom-addons-for-beaver-builder", "source": "security@wordfence.com", "tags": ["Patch"]}, {"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/781987af-3753-46ec-9d56-fb8b6ef42277?source=cve", "source": "security@wordfence.com", "tags": ["Third Party Advisory"]}, {"url": "https://plugins.trac.wordpress.org/changeset/3046905/wpzoom-addons-for-beaver-builder", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/781987af-3753-46ec-9d56-fb8b6ef42277?source=cve", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-2187.json b/cve/2024/CVE-2024-2187.json index 390315d1aa9..68c490c2a86 100644 --- a/cve/2024/CVE-2024-2187.json +++ b/cve/2024/CVE-2024-2187.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-2187", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:29.627", "lastModified": "2024-11-21T09:09:13.087", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "The Beaver Builder Addons by WPZOOM plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Testimonials widget in all versions up to, and including, 1.3.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."}, {"lang": "es", "value": "El complemento Beaver Builder Addons de WPZOOM para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del widget Testimonios en todas las versiones hasta la 1.3.4 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."}], "metrics": {"cvssMetricV31": [{"source": "security@wordfence.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", "baseScore": 6.4, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 3.1, "impactScore": 2.7}]}, "references": [{"url": "https://plugins.trac.wordpress.org/changeset/3046905/wpzoom-addons-for-beaver-builder", "source": "security@wordfence.com"}, {"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/02fceb91-7691-4629-b18b-57959e9f3f62?source=cve", "source": "security@wordfence.com"}, {"url": "https://plugins.trac.wordpress.org/changeset/3046905/wpzoom-addons-for-beaver-builder", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/02fceb91-7691-4629-b18b-57959e9f3f62?source=cve", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-2187", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:29.627", "lastModified": "2025-01-09T17:06:43.647", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "The Beaver Builder Addons by WPZOOM plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Testimonials widget in all versions up to, and including, 1.3.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."}, {"lang": "es", "value": "El complemento Beaver Builder Addons de WPZOOM para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del widget Testimonios en todas las versiones hasta la 1.3.4 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."}], "metrics": {"cvssMetricV31": [{"source": "security@wordfence.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", "baseScore": 6.4, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 3.1, "impactScore": 2.7}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "baseScore": 5.4, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.3, "impactScore": 2.7}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:wpzoom:beaver_builder_addons:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "1.3.5", "matchCriteriaId": "3AD967ED-D8DA-4DA1-99A3-D4385C2264E6"}]}]}], "references": [{"url": "https://plugins.trac.wordpress.org/changeset/3046905/wpzoom-addons-for-beaver-builder", "source": "security@wordfence.com", "tags": ["Patch"]}, {"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/02fceb91-7691-4629-b18b-57959e9f3f62?source=cve", "source": "security@wordfence.com", "tags": ["Third Party Advisory"]}, {"url": "https://plugins.trac.wordpress.org/changeset/3046905/wpzoom-addons-for-beaver-builder", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/02fceb91-7691-4629-b18b-57959e9f3f62?source=cve", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-2201.json b/cve/2024/CVE-2024-2201.json index bf5cdf637d9..19f29391de0 100644 --- a/cve/2024/CVE-2024-2201.json +++ b/cve/2024/CVE-2024-2201.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-2201", "sourceIdentifier": "cret@cert.org", "published": "2024-12-19T21:15:08.103", "lastModified": "2024-12-19T21:15:08.103", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "A cross-privilege Spectre v2 vulnerability allows attackers to bypass all deployed mitigations, including the recent Fine(IBT), and to leak arbitrary Linux kernel memory on Intel systems."}], "metrics": {}, "references": [{"url": "http://www.openwall.com/lists/oss-security/2024/04/09/15", "source": "cret@cert.org"}, {"url": "http://www.openwall.com/lists/oss-security/2024/05/07/7", "source": "cret@cert.org"}, {"url": "http://xenbits.xen.org/xsa/advisory-456.html", "source": "cret@cert.org"}, {"url": "https://github.com/vusec/inspectre-gadget?tab=readme-ov-file", "source": "cret@cert.org"}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QKNCPX7CJUK4I6BRGABAUQK2DMQZUCA/", "source": "cret@cert.org"}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5OK6MH75S7YWD34EWW7QIZTS627RIE3/", "source": "cret@cert.org"}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYAZ7P6YFJ2E3FHKAGIKHWS46KYMMTZH/", "source": "cret@cert.org"}, {"url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/branch-history-injection.htm", "source": "cret@cert.org"}, {"url": "https://www.kb.cert.org/vuls/id/155143", "source": "cret@cert.org"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-2201", "sourceIdentifier": "cret@cert.org", "published": "2024-12-19T21:15:08.103", "lastModified": "2025-01-09T17:15:12.423", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "A cross-privilege Spectre v2 vulnerability allows attackers to bypass all deployed mitigations, including the recent Fine(IBT), and to leak arbitrary Linux kernel memory on Intel systems."}, {"lang": "es", "value": "Una vulnerabilidad de cross-privilege en Spectre v2 permite a los atacantes eludir todas las mitigaciones implementadas, incluida la reciente Fine (IBT), y filtrar memoria arbitraria del kernel de Linux en sistemas Intel."}], "metrics": {"cvssMetricV31": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "baseScore": 4.7, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE"}, "exploitabilityScore": 1.0, "impactScore": 3.6}]}, "references": [{"url": "http://www.openwall.com/lists/oss-security/2024/04/09/15", "source": "cret@cert.org"}, {"url": "http://www.openwall.com/lists/oss-security/2024/05/07/7", "source": "cret@cert.org"}, {"url": "http://xenbits.xen.org/xsa/advisory-456.html", "source": "cret@cert.org"}, {"url": "https://github.com/vusec/inspectre-gadget?tab=readme-ov-file", "source": "cret@cert.org"}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QKNCPX7CJUK4I6BRGABAUQK2DMQZUCA/", "source": "cret@cert.org"}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5OK6MH75S7YWD34EWW7QIZTS627RIE3/", "source": "cret@cert.org"}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYAZ7P6YFJ2E3FHKAGIKHWS46KYMMTZH/", "source": "cret@cert.org"}, {"url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/branch-history-injection.htm", "source": "cret@cert.org"}, {"url": "https://www.kb.cert.org/vuls/id/155143", "source": "cret@cert.org"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-2492.json b/cve/2024/CVE-2024-2492.json index 60c3e8ba9b7..2d9be8622a7 100644 --- a/cve/2024/CVE-2024-2492.json +++ b/cve/2024/CVE-2024-2492.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-2492", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:34.350", "lastModified": "2024-11-21T09:09:52.440", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "The PowerPack Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Twitter Tweet widget in all versions up to, and including, 2.7.18 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."}, {"lang": "es", "value": "El complemento PowerPack Addons para Elementor para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del widget de Tweet de Twitter en todas las versiones hasta la 2.7.18 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."}], "metrics": {"cvssMetricV31": [{"source": "security@wordfence.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", "baseScore": 6.4, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 3.1, "impactScore": 2.7}]}, "references": [{"url": "https://plugins.trac.wordpress.org/changeset/3059841/powerpack-lite-for-elementor", "source": "security@wordfence.com"}, {"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/11386b6a-632c-451a-b726-846f74b6f42d?source=cve", "source": "security@wordfence.com"}, {"url": "https://plugins.trac.wordpress.org/changeset/3059841/powerpack-lite-for-elementor", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/11386b6a-632c-451a-b726-846f74b6f42d?source=cve", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-2492", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:34.350", "lastModified": "2025-01-09T17:01:54.423", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "The PowerPack Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Twitter Tweet widget in all versions up to, and including, 2.7.18 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."}, {"lang": "es", "value": "El complemento PowerPack Addons para Elementor para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del widget de Tweet de Twitter en todas las versiones hasta la 2.7.18 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."}], "metrics": {"cvssMetricV31": [{"source": "security@wordfence.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", "baseScore": 6.4, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 3.1, "impactScore": 2.7}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "baseScore": 5.4, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.3, "impactScore": 2.7}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:ideabox:powerpack_addons_for_elementor:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "2.7.19", "matchCriteriaId": "CD3979F8-819D-4DE3-93BE-DA26C30F856F"}]}]}], "references": [{"url": "https://plugins.trac.wordpress.org/changeset/3059841/powerpack-lite-for-elementor", "source": "security@wordfence.com", "tags": ["Patch"]}, {"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/11386b6a-632c-451a-b726-846f74b6f42d?source=cve", "source": "security@wordfence.com", "tags": ["Third Party Advisory"]}, {"url": "https://plugins.trac.wordpress.org/changeset/3059841/powerpack-lite-for-elementor", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/11386b6a-632c-451a-b726-846f74b6f42d?source=cve", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-25952.json b/cve/2024/CVE-2024-25952.json index 159344f34eb..7e31ae5d6a2 100644 --- a/cve/2024/CVE-2024-25952.json +++ b/cve/2024/CVE-2024-25952.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-25952", "sourceIdentifier": "security_alert@emc.com", "published": "2024-03-28T19:15:47.200", "lastModified": "2024-11-21T09:01:38.220", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Dell PowerScale OneFS versions 8.2.2.x through 9.7.0.x contains an UNIX symbolic link (symlink) following vulnerability. A local high privileged attacker could potentially exploit this vulnerability, leading to denial of service, information tampering."}, {"lang": "es", "value": "Dell PowerScale OneFS versiones 8.2.2.x a 9.7.0.x contiene un enlace simb\u00f3lico UNIX (enlace simb\u00f3lico) despu\u00e9s de la vulnerabilidad. Un atacante local con privilegios elevados podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda denegaci\u00f3n de servicio y manipulaci\u00f3n de informaci\u00f3n."}], "metrics": {"cvssMetricV31": [{"source": "security_alert@emc.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", "baseScore": 6.0, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 0.8, "impactScore": 5.2}]}, "weaknesses": [{"source": "security_alert@emc.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-61"}]}], "references": [{"url": "https://www.dell.com/support/kbdoc/en-us/000223366/dsa-2024-115-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities", "source": "security_alert@emc.com"}, {"url": "https://www.dell.com/support/kbdoc/en-us/000223366/dsa-2024-115-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-25952", "sourceIdentifier": "security_alert@emc.com", "published": "2024-03-28T19:15:47.200", "lastModified": "2025-01-09T16:48:58.557", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Dell PowerScale OneFS versions 8.2.2.x through 9.7.0.x contains an UNIX symbolic link (symlink) following vulnerability. A local high privileged attacker could potentially exploit this vulnerability, leading to denial of service, information tampering."}, {"lang": "es", "value": "Dell PowerScale OneFS versiones 8.2.2.x a 9.7.0.x contiene un enlace simb\u00f3lico UNIX (enlace simb\u00f3lico) despu\u00e9s de la vulnerabilidad. Un atacante local con privilegios elevados podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda denegaci\u00f3n de servicio y manipulaci\u00f3n de informaci\u00f3n."}], "metrics": {"cvssMetricV31": [{"source": "security_alert@emc.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", "baseScore": 6.0, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 0.8, "impactScore": 5.2}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", "baseScore": 6.0, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 0.8, "impactScore": 5.2}]}, "weaknesses": [{"source": "security_alert@emc.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-61"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-59"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*", "versionStartIncluding": "8.2.2.0", "versionEndIncluding": "9.3.0", "matchCriteriaId": "FD13577F-09F5-4A90-849E-BB68DBFE9EBE"}, {"vulnerable": true, "criteria": "cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.4.0", "versionEndIncluding": "9.4.0.16", "matchCriteriaId": "7F47AEAA-B4FE-4181-B797-C059352F758C"}, {"vulnerable": true, "criteria": "cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.5.0.0", "versionEndExcluding": "9.5.0.8", "matchCriteriaId": "48D79CD4-DCF3-4E0B-B864-3DDB95384D0E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.6.1", "versionEndExcluding": "9.7.0.2", "matchCriteriaId": "3E642222-C9E1-4DC4-A23A-3DE1C730BEFE"}]}]}], "references": [{"url": "https://www.dell.com/support/kbdoc/en-us/000223366/dsa-2024-115-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities", "source": "security_alert@emc.com", "tags": ["Vendor Advisory"]}, {"url": "https://www.dell.com/support/kbdoc/en-us/000223366/dsa-2024-115-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-25953.json b/cve/2024/CVE-2024-25953.json index 130e292195d..fd186f79ba9 100644 --- a/cve/2024/CVE-2024-25953.json +++ b/cve/2024/CVE-2024-25953.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-25953", "sourceIdentifier": "security_alert@emc.com", "published": "2024-03-28T19:15:47.393", "lastModified": "2024-11-21T09:01:38.340", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Dell PowerScale OneFS versions 9.4.0.x through 9.7.0.x contains an UNIX symbolic link (symlink) following vulnerability. A local high privileged attacker could potentially exploit this vulnerability, leading to denial of service, information tampering."}, {"lang": "es", "value": "Dell PowerScale OneFS versiones 9.4.0.x a 9.7.0.x contiene un enlace simb\u00f3lico UNIX (enlace simb\u00f3lico) despu\u00e9s de la vulnerabilidad. Un atacante local con privilegios elevados podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda denegaci\u00f3n de servicio y manipulaci\u00f3n de informaci\u00f3n."}], "metrics": {"cvssMetricV31": [{"source": "security_alert@emc.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", "baseScore": 6.0, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 0.8, "impactScore": 5.2}]}, "weaknesses": [{"source": "security_alert@emc.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-61"}]}], "references": [{"url": "https://www.dell.com/support/kbdoc/en-us/000223366/dsa-2024-115-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities", "source": "security_alert@emc.com"}, {"url": "https://www.dell.com/support/kbdoc/en-us/000223366/dsa-2024-115-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-25953", "sourceIdentifier": "security_alert@emc.com", "published": "2024-03-28T19:15:47.393", "lastModified": "2025-01-09T16:50:14.040", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Dell PowerScale OneFS versions 9.4.0.x through 9.7.0.x contains an UNIX symbolic link (symlink) following vulnerability. A local high privileged attacker could potentially exploit this vulnerability, leading to denial of service, information tampering."}, {"lang": "es", "value": "Dell PowerScale OneFS versiones 9.4.0.x a 9.7.0.x contiene un enlace simb\u00f3lico UNIX (enlace simb\u00f3lico) despu\u00e9s de la vulnerabilidad. Un atacante local con privilegios elevados podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda denegaci\u00f3n de servicio y manipulaci\u00f3n de informaci\u00f3n."}], "metrics": {"cvssMetricV31": [{"source": "security_alert@emc.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", "baseScore": 6.0, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 0.8, "impactScore": 5.2}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", "baseScore": 6.0, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 0.8, "impactScore": 5.2}]}, "weaknesses": [{"source": "security_alert@emc.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-61"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-59"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.4.0", "versionEndIncluding": "9.4.0.16", "matchCriteriaId": "7F47AEAA-B4FE-4181-B797-C059352F758C"}, {"vulnerable": true, "criteria": "cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.5.0.0", "versionEndExcluding": "9.5.0.8", "matchCriteriaId": "48D79CD4-DCF3-4E0B-B864-3DDB95384D0E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.6.1", "versionEndExcluding": "9.7.0.2", "matchCriteriaId": "3E642222-C9E1-4DC4-A23A-3DE1C730BEFE"}]}]}], "references": [{"url": "https://www.dell.com/support/kbdoc/en-us/000223366/dsa-2024-115-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities", "source": "security_alert@emc.com", "tags": ["Vendor Advisory"]}, {"url": "https://www.dell.com/support/kbdoc/en-us/000223366/dsa-2024-115-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-25954.json b/cve/2024/CVE-2024-25954.json index 9b61072ce58..f8a44a6a419 100644 --- a/cve/2024/CVE-2024-25954.json +++ b/cve/2024/CVE-2024-25954.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-25954", "sourceIdentifier": "security_alert@emc.com", "published": "2024-03-28T19:15:47.587", "lastModified": "2024-11-21T09:01:38.457", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Dell PowerScale OneFS, versions 9.5.0.x through 9.7.0.x, contain an insufficient session expiration vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to denial of service."}, {"lang": "es", "value": "Dell PowerScale OneFS, versiones 9.5.0.x a 9.7.0.x, contienen una vulnerabilidad de caducidad de sesi\u00f3n insuficiente. Un atacante remoto no autenticado podr\u00eda explotar esta vulnerabilidad y provocar una denegaci\u00f3n de servicio."}], "metrics": {"cvssMetricV31": [{"source": "security_alert@emc.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "baseScore": 5.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "LOW"}, "exploitabilityScore": 3.9, "impactScore": 1.4}]}, "weaknesses": [{"source": "security_alert@emc.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-613"}]}], "references": [{"url": "https://www.dell.com/support/kbdoc/en-us/000223366/dsa-2024-115-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities", "source": "security_alert@emc.com"}, {"url": "https://www.dell.com/support/kbdoc/en-us/000223366/dsa-2024-115-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-25954", "sourceIdentifier": "security_alert@emc.com", "published": "2024-03-28T19:15:47.587", "lastModified": "2025-01-09T16:08:40.410", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Dell PowerScale OneFS, versions 9.5.0.x through 9.7.0.x, contain an insufficient session expiration vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to denial of service."}, {"lang": "es", "value": "Dell PowerScale OneFS, versiones 9.5.0.x a 9.7.0.x, contienen una vulnerabilidad de caducidad de sesi\u00f3n insuficiente. Un atacante remoto no autenticado podr\u00eda explotar esta vulnerabilidad y provocar una denegaci\u00f3n de servicio."}], "metrics": {"cvssMetricV31": [{"source": "security_alert@emc.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "baseScore": 5.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "LOW"}, "exploitabilityScore": 3.9, "impactScore": 1.4}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.6}]}, "weaknesses": [{"source": "security_alert@emc.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-613"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.5.0.0", "versionEndExcluding": "9.5.0.8", "matchCriteriaId": "48D79CD4-DCF3-4E0B-B864-3DDB95384D0E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.6.1", "versionEndExcluding": "9.7.0.2", "matchCriteriaId": "3E642222-C9E1-4DC4-A23A-3DE1C730BEFE"}]}]}], "references": [{"url": "https://www.dell.com/support/kbdoc/en-us/000223366/dsa-2024-115-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities", "source": "security_alert@emc.com", "tags": ["Vendor Advisory"]}, {"url": "https://www.dell.com/support/kbdoc/en-us/000223366/dsa-2024-115-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-25959.json b/cve/2024/CVE-2024-25959.json index e99e8f1c02a..9233f6495b6 100644 --- a/cve/2024/CVE-2024-25959.json +++ b/cve/2024/CVE-2024-25959.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-25959", "sourceIdentifier": "security_alert@emc.com", "published": "2024-03-28T18:15:07.767", "lastModified": "2024-11-21T09:01:39.063", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Dell PowerScale OneFS versions 9.4.0.x through 9.7.0.x contains an insertion of sensitive information into log file vulnerability. A low privileged local attacker could potentially exploit this vulnerability, leading to sensitive information disclosure, escalation of privileges."}, {"lang": "es", "value": "Dell PowerScale OneFS versiones 9.4.0.x a 9.7.0.x contiene una inserci\u00f3n de informaci\u00f3n confidencial en la vulnerabilidad del archivo de registro. Un atacante local con pocos privilegios podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda la divulgaci\u00f3n de informaci\u00f3n confidencial y una escalada de privilegios."}], "metrics": {"cvssMetricV31": [{"source": "security_alert@emc.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L", "baseScore": 7.9, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.0, "impactScore": 5.3}]}, "weaknesses": [{"source": "security_alert@emc.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-532"}]}], "references": [{"url": "https://www.dell.com/support/kbdoc/en-us/000223366/dsa-2024-115-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities", "source": "security_alert@emc.com"}, {"url": "https://www.dell.com/support/kbdoc/en-us/000223366/dsa-2024-115-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-25959", "sourceIdentifier": "security_alert@emc.com", "published": "2024-03-28T18:15:07.767", "lastModified": "2025-01-09T16:45:52.213", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Dell PowerScale OneFS versions 9.4.0.x through 9.7.0.x contains an insertion of sensitive information into log file vulnerability. A low privileged local attacker could potentially exploit this vulnerability, leading to sensitive information disclosure, escalation of privileges."}, {"lang": "es", "value": "Dell PowerScale OneFS versiones 9.4.0.x a 9.7.0.x contiene una inserci\u00f3n de informaci\u00f3n confidencial en la vulnerabilidad del archivo de registro. Un atacante local con pocos privilegios podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda la divulgaci\u00f3n de informaci\u00f3n confidencial y una escalada de privilegios."}], "metrics": {"cvssMetricV31": [{"source": "security_alert@emc.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L", "baseScore": 7.9, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.0, "impactScore": 5.3}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "baseScore": 5.5, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "security_alert@emc.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-532"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.4.0", "versionEndExcluding": "9.4.0.17", "matchCriteriaId": "F9DD8B8B-4D2C-421B-8C16-304C380599EC"}, {"vulnerable": true, "criteria": "cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.5.0.0", "versionEndExcluding": "9.5.0.8", "matchCriteriaId": "48D79CD4-DCF3-4E0B-B864-3DDB95384D0E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.6.1", "versionEndExcluding": "9.7.0.2", "matchCriteriaId": "3E642222-C9E1-4DC4-A23A-3DE1C730BEFE"}]}]}], "references": [{"url": "https://www.dell.com/support/kbdoc/en-us/000223366/dsa-2024-115-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities", "source": "security_alert@emc.com", "tags": ["Vendor Advisory"]}, {"url": "https://www.dell.com/support/kbdoc/en-us/000223366/dsa-2024-115-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-25960.json b/cve/2024/CVE-2024-25960.json index 7d65ca116cf..e4e3e8fa349 100644 --- a/cve/2024/CVE-2024-25960.json +++ b/cve/2024/CVE-2024-25960.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-25960", "sourceIdentifier": "security_alert@emc.com", "published": "2024-03-28T19:15:47.970", "lastModified": "2024-11-21T09:01:39.187", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Dell PowerScale OneFS versions 8.2.2.x through 9.7.0.x contains a cleartext transmission of sensitive information vulnerability. A local low privileged attacker could potentially exploit this vulnerability, leading to escalation of privileges."}, {"lang": "es", "value": "Dell PowerScale OneFS versiones 8.2.2.x a 9.7.0.x contiene una vulnerabilidad de transmisi\u00f3n de texto plano de informaci\u00f3n confidencial. Un atacante local con pocos privilegios podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda una escalada de privilegios."}], "metrics": {"cvssMetricV31": [{"source": "security_alert@emc.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "baseScore": 7.3, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.3, "impactScore": 5.9}]}, "weaknesses": [{"source": "security_alert@emc.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-319"}]}], "references": [{"url": "https://www.dell.com/support/kbdoc/en-us/000223366/dsa-2024-115-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities", "source": "security_alert@emc.com"}, {"url": "https://www.dell.com/support/kbdoc/en-us/000223366/dsa-2024-115-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-25960", "sourceIdentifier": "security_alert@emc.com", "published": "2024-03-28T19:15:47.970", "lastModified": "2025-01-09T16:24:23.357", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Dell PowerScale OneFS versions 8.2.2.x through 9.7.0.x contains a cleartext transmission of sensitive information vulnerability. A local low privileged attacker could potentially exploit this vulnerability, leading to escalation of privileges."}, {"lang": "es", "value": "Dell PowerScale OneFS versiones 8.2.2.x a 9.7.0.x contiene una vulnerabilidad de transmisi\u00f3n de texto plano de informaci\u00f3n confidencial. Un atacante local con pocos privilegios podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda una escalada de privilegios."}], "metrics": {"cvssMetricV31": [{"source": "security_alert@emc.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "baseScore": 7.3, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.3, "impactScore": 5.9}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.8, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "security_alert@emc.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-319"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*", "versionStartIncluding": "8.2.2.0", "versionEndIncluding": "9.3.0", "matchCriteriaId": "FD13577F-09F5-4A90-849E-BB68DBFE9EBE"}, {"vulnerable": true, "criteria": "cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.4.0", "versionEndExcluding": "9.4.0.17", "matchCriteriaId": "F9DD8B8B-4D2C-421B-8C16-304C380599EC"}, {"vulnerable": true, "criteria": "cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.5.0.0", "versionEndExcluding": "9.5.0.8", "matchCriteriaId": "48D79CD4-DCF3-4E0B-B864-3DDB95384D0E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.6.1", "versionEndExcluding": "9.7.0.2", "matchCriteriaId": "3E642222-C9E1-4DC4-A23A-3DE1C730BEFE"}]}]}], "references": [{"url": "https://www.dell.com/support/kbdoc/en-us/000223366/dsa-2024-115-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities", "source": "security_alert@emc.com", "tags": ["Vendor Advisory"]}, {"url": "https://www.dell.com/support/kbdoc/en-us/000223366/dsa-2024-115-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-25961.json b/cve/2024/CVE-2024-25961.json index 3d7822571dd..dc1ed283d10 100644 --- a/cve/2024/CVE-2024-25961.json +++ b/cve/2024/CVE-2024-25961.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-25961", "sourceIdentifier": "security_alert@emc.com", "published": "2024-03-28T18:15:08.013", "lastModified": "2024-11-21T09:01:39.303", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Dell PowerScale OneFS versions 8.2.2.x through 9.7.0.x contains an improper privilege management vulnerability. A local high privileged attacker could potentially exploit this vulnerability, leading to escalation of privileges."}, {"lang": "es", "value": "Dell PowerScale OneFS versiones 8.2.2.x a 9.7.0.x contiene una vulnerabilidad de administraci\u00f3n de privilegios inadecuada. Un atacante local con privilegios elevados podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda una escalada de privilegios."}], "metrics": {"cvssMetricV31": [{"source": "security_alert@emc.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", "baseScore": 6.0, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 0.8, "impactScore": 5.2}]}, "weaknesses": [{"source": "security_alert@emc.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-269"}]}], "references": [{"url": "https://www.dell.com/support/kbdoc/en-us/000223366/dsa-2024-115-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities", "source": "security_alert@emc.com"}, {"url": "https://www.dell.com/support/kbdoc/en-us/000223366/dsa-2024-115-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-25961", "sourceIdentifier": "security_alert@emc.com", "published": "2024-03-28T18:15:08.013", "lastModified": "2025-01-09T16:48:12.033", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Dell PowerScale OneFS versions 8.2.2.x through 9.7.0.x contains an improper privilege management vulnerability. A local high privileged attacker could potentially exploit this vulnerability, leading to escalation of privileges."}, {"lang": "es", "value": "Dell PowerScale OneFS versiones 8.2.2.x a 9.7.0.x contiene una vulnerabilidad de administraci\u00f3n de privilegios inadecuada. Un atacante local con privilegios elevados podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda una escalada de privilegios."}], "metrics": {"cvssMetricV31": [{"source": "security_alert@emc.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", "baseScore": 6.0, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 0.8, "impactScore": 5.2}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "baseScore": 6.7, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 0.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "security_alert@emc.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-269"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*", "versionStartIncluding": "8.2.2.0", "versionEndIncluding": "9.3.0", "matchCriteriaId": "FD13577F-09F5-4A90-849E-BB68DBFE9EBE"}, {"vulnerable": true, "criteria": "cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.4.0", "versionEndIncluding": "9.4.0.16", "matchCriteriaId": "7F47AEAA-B4FE-4181-B797-C059352F758C"}, {"vulnerable": true, "criteria": "cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.5.0.0", "versionEndExcluding": "9.5.0.8", "matchCriteriaId": "48D79CD4-DCF3-4E0B-B864-3DDB95384D0E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.6.1", "versionEndExcluding": "9.7.0.2", "matchCriteriaId": "3E642222-C9E1-4DC4-A23A-3DE1C730BEFE"}]}]}], "references": [{"url": "https://www.dell.com/support/kbdoc/en-us/000223366/dsa-2024-115-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities", "source": "security_alert@emc.com", "tags": ["Vendor Advisory"]}, {"url": "https://www.dell.com/support/kbdoc/en-us/000223366/dsa-2024-115-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-25963.json b/cve/2024/CVE-2024-25963.json index a93bb7df789..cf6c8814bc5 100644 --- a/cve/2024/CVE-2024-25963.json +++ b/cve/2024/CVE-2024-25963.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-25963", "sourceIdentifier": "security_alert@emc.com", "published": "2024-03-28T19:15:48.173", "lastModified": "2024-11-21T09:01:39.543", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Dell PowerScale OneFS, versions 8.2.2.x through 9.5.0.x contains a use of a broken cryptographic algorithm vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to information disclosure."}, {"lang": "es", "value": "Dell PowerScale OneFS, versiones 8.2.2.x a 9.5.0.x contiene el uso de una vulnerabilidad de algoritmo criptogr\u00e1fico roto. Un atacante remoto no autenticado podr\u00eda explotar esta vulnerabilidad y provocar la divulgaci\u00f3n de informaci\u00f3n."}], "metrics": {"cvssMetricV31": [{"source": "security_alert@emc.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "baseScore": 5.9, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.2, "impactScore": 3.6}]}, "weaknesses": [{"source": "security_alert@emc.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-327"}]}], "references": [{"url": "https://www.dell.com/support/kbdoc/en-us/000223366/dsa-2024-115-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities", "source": "security_alert@emc.com"}, {"url": "https://www.dell.com/support/kbdoc/en-us/000223366/dsa-2024-115-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-25963", "sourceIdentifier": "security_alert@emc.com", "published": "2024-03-28T19:15:48.173", "lastModified": "2025-01-09T16:39:54.173", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Dell PowerScale OneFS, versions 8.2.2.x through 9.5.0.x contains a use of a broken cryptographic algorithm vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to information disclosure."}, {"lang": "es", "value": "Dell PowerScale OneFS, versiones 8.2.2.x a 9.5.0.x contiene el uso de una vulnerabilidad de algoritmo criptogr\u00e1fico roto. Un atacante remoto no autenticado podr\u00eda explotar esta vulnerabilidad y provocar la divulgaci\u00f3n de informaci\u00f3n."}], "metrics": {"cvssMetricV31": [{"source": "security_alert@emc.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "baseScore": 5.9, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.2, "impactScore": 3.6}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE"}, "exploitabilityScore": 3.9, "impactScore": 3.6}]}, "weaknesses": [{"source": "security_alert@emc.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-327"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*", "versionStartIncluding": "8.2.2.0", "versionEndIncluding": "9.3.0", "matchCriteriaId": "FD13577F-09F5-4A90-849E-BB68DBFE9EBE"}, {"vulnerable": true, "criteria": "cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.4.0", "versionEndIncluding": "9.4.0.16", "matchCriteriaId": "7F47AEAA-B4FE-4181-B797-C059352F758C"}, {"vulnerable": true, "criteria": "cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.5.0.0", "versionEndExcluding": "9.5.0.8", "matchCriteriaId": "48D79CD4-DCF3-4E0B-B864-3DDB95384D0E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.6.1", "versionEndIncluding": "9.7.0.0", "matchCriteriaId": "CF28800C-8B2E-4B44-83B4-92B79E733C73"}]}]}], "references": [{"url": "https://www.dell.com/support/kbdoc/en-us/000223366/dsa-2024-115-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities", "source": "security_alert@emc.com", "tags": ["Vendor Advisory"]}, {"url": "https://www.dell.com/support/kbdoc/en-us/000223366/dsa-2024-115-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-25964.json b/cve/2024/CVE-2024-25964.json index e6420f973bc..74ca2c3847a 100644 --- a/cve/2024/CVE-2024-25964.json +++ b/cve/2024/CVE-2024-25964.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-25964", "sourceIdentifier": "security_alert@emc.com", "published": "2024-03-25T09:15:09.477", "lastModified": "2024-11-21T09:01:39.663", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Dell PowerScale OneFS 9.5.0.x through 9.7.0.x contain a covert timing channel vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to denial of service."}, {"lang": "es", "value": "Vulnerabilidad de inyecci\u00f3n SQL en el sistema CIGESv2, a trav\u00e9s de /ajaxServiciosAtencion.php, en el par\u00e1metro 'idServicio'. La explotaci\u00f3n de esta vulnerabilidad podr\u00eda permitir a un usuario remoto recuperar todos los datos almacenados en la base de datos enviando una consulta SQL especialmente manipulada."}], "metrics": {"cvssMetricV31": [{"source": "security_alert@emc.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "baseScore": 5.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "LOW"}, "exploitabilityScore": 3.9, "impactScore": 1.4}]}, "weaknesses": [{"source": "security_alert@emc.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-385"}]}], "references": [{"url": "https://www.dell.com/support/kbdoc/en-us/000222691/dsa-2024-062-security-update-for-dell-powerscale-onefs-for-proprietary-code-vulnerabilities", "source": "security_alert@emc.com"}, {"url": "https://www.dell.com/support/kbdoc/en-us/000222691/dsa-2024-062-security-update-for-dell-powerscale-onefs-for-proprietary-code-vulnerabilities", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-25964", "sourceIdentifier": "security_alert@emc.com", "published": "2024-03-25T09:15:09.477", "lastModified": "2025-01-09T16:44:51.983", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Dell PowerScale OneFS 9.5.0.x through 9.7.0.x contain a covert timing channel vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to denial of service."}, {"lang": "es", "value": "Vulnerabilidad de inyecci\u00f3n SQL en el sistema CIGESv2, a trav\u00e9s de /ajaxServiciosAtencion.php, en el par\u00e1metro 'idServicio'. La explotaci\u00f3n de esta vulnerabilidad podr\u00eda permitir a un usuario remoto recuperar todos los datos almacenados en la base de datos enviando una consulta SQL especialmente manipulada."}], "metrics": {"cvssMetricV31": [{"source": "security_alert@emc.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "baseScore": 5.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "LOW"}, "exploitabilityScore": 3.9, "impactScore": 1.4}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.6}]}, "weaknesses": [{"source": "security_alert@emc.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-385"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.5.0.0", "versionEndExcluding": "9.5.0.7", "matchCriteriaId": "F071B492-8628-4AEE-8F7C-607414A47C58"}, {"vulnerable": true, "criteria": "cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.6.1", "versionEndExcluding": "9.7.0.1", "matchCriteriaId": "E9CD858A-BE31-4538-B700-60946A32CD60"}]}]}], "references": [{"url": "https://www.dell.com/support/kbdoc/en-us/000222691/dsa-2024-062-security-update-for-dell-powerscale-onefs-for-proprietary-code-vulnerabilities", "source": "security_alert@emc.com", "tags": ["Vendor Advisory"]}, {"url": "https://www.dell.com/support/kbdoc/en-us/000222691/dsa-2024-062-security-update-for-dell-powerscale-onefs-for-proprietary-code-vulnerabilities", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-25965.json b/cve/2024/CVE-2024-25965.json index 6cacdda596e..ebb4788980f 100644 --- a/cve/2024/CVE-2024-25965.json +++ b/cve/2024/CVE-2024-25965.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-25965", "sourceIdentifier": "security_alert@emc.com", "published": "2024-05-14T16:16:14.220", "lastModified": "2024-11-21T09:01:39.787", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Dell PowerScale OneFS versions 8.2.x through 9.7.0.2 contains an external control of file name or path vulnerability. A local high privilege attacker could potentially exploit this vulnerability, leading to denial of service."}, {"lang": "es", "value": "Dell PowerScale OneFS versiones 8.2.x a 9.7.0.2 contiene un control externo de la vulnerabilidad de la ruta o el nombre del archivo. Un atacante local con privilegios elevados podr\u00eda explotar esta vulnerabilidad y provocar una denegaci\u00f3n de servicio."}], "metrics": {"cvssMetricV31": [{"source": "security_alert@emc.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:H/A:H", "baseScore": 6.1, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 0.6, "impactScore": 5.5}]}, "weaknesses": [{"source": "security_alert@emc.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-73"}]}], "references": [{"url": "https://www.dell.com/support/kbdoc/en-us/000224860/dsa-2024-163-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities", "source": "security_alert@emc.com"}, {"url": "https://www.dell.com/support/kbdoc/en-us/000224860/dsa-2024-163-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-25965", "sourceIdentifier": "security_alert@emc.com", "published": "2024-05-14T16:16:14.220", "lastModified": "2025-01-09T16:42:17.140", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Dell PowerScale OneFS versions 8.2.x through 9.7.0.2 contains an external control of file name or path vulnerability. A local high privilege attacker could potentially exploit this vulnerability, leading to denial of service."}, {"lang": "es", "value": "Dell PowerScale OneFS versiones 8.2.x a 9.7.0.2 contiene un control externo de la vulnerabilidad de la ruta o el nombre del archivo. Un atacante local con privilegios elevados podr\u00eda explotar esta vulnerabilidad y provocar una denegaci\u00f3n de servicio."}], "metrics": {"cvssMetricV31": [{"source": "security_alert@emc.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:H/A:H", "baseScore": 6.1, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 0.6, "impactScore": 5.5}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "baseScore": 4.4, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 0.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "security_alert@emc.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-73"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*", "versionStartIncluding": "8.2.0", "versionEndIncluding": "9.3.0", "matchCriteriaId": "0F4EA23E-8719-4CAF-9B77-211F8B7351A8"}, {"vulnerable": true, "criteria": "cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.4.0", "versionEndIncluding": "9.4.0.17", "matchCriteriaId": "48A18231-D2DC-4665-AA0D-F525DA7A6219"}, {"vulnerable": true, "criteria": "cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.5.0.0", "versionEndExcluding": "9.5.0.8", "matchCriteriaId": "48D79CD4-DCF3-4E0B-B864-3DDB95384D0E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.6.0", "versionEndExcluding": "9.7.0.3", "matchCriteriaId": "0252F020-DDF0-4C20-B527-AAF2F345ED4B"}]}]}], "references": [{"url": "https://www.dell.com/support/kbdoc/en-us/000224860/dsa-2024-163-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities", "source": "security_alert@emc.com", "tags": ["Vendor Advisory"]}, {"url": "https://www.dell.com/support/kbdoc/en-us/000224860/dsa-2024-163-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-25966.json b/cve/2024/CVE-2024-25966.json index ad6ac9588ae..c35de8a0045 100644 --- a/cve/2024/CVE-2024-25966.json +++ b/cve/2024/CVE-2024-25966.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-25966", "sourceIdentifier": "security_alert@emc.com", "published": "2024-05-14T16:16:15.943", "lastModified": "2024-11-21T09:01:39.910", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Dell PowerScale OneFS versions 8.2.x through 9.7.0.2 contains an improper handling of unexpected data type vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to denial of service."}, {"lang": "es", "value": "Dell PowerScale OneFS versiones 8.2.x a 9.7.0.2 contiene un manejo inadecuado de la vulnerabilidad de tipo de datos inesperado. Un atacante remoto no autenticado podr\u00eda explotar esta vulnerabilidad y provocar una denegaci\u00f3n de servicio."}], "metrics": {"cvssMetricV31": [{"source": "security_alert@emc.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "baseScore": 5.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "LOW"}, "exploitabilityScore": 3.9, "impactScore": 1.4}]}, "weaknesses": [{"source": "security_alert@emc.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-241"}]}], "references": [{"url": "https://www.dell.com/support/kbdoc/en-us/000224860/dsa-2024-163-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities", "source": "security_alert@emc.com"}, {"url": "https://www.dell.com/support/kbdoc/en-us/000224860/dsa-2024-163-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-25966", "sourceIdentifier": "security_alert@emc.com", "published": "2024-05-14T16:16:15.943", "lastModified": "2025-01-09T16:43:32.690", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Dell PowerScale OneFS versions 8.2.x through 9.7.0.2 contains an improper handling of unexpected data type vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to denial of service."}, {"lang": "es", "value": "Dell PowerScale OneFS versiones 8.2.x a 9.7.0.2 contiene un manejo inadecuado de la vulnerabilidad de tipo de datos inesperado. Un atacante remoto no autenticado podr\u00eda explotar esta vulnerabilidad y provocar una denegaci\u00f3n de servicio."}], "metrics": {"cvssMetricV31": [{"source": "security_alert@emc.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "baseScore": 5.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "LOW"}, "exploitabilityScore": 3.9, "impactScore": 1.4}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.6}]}, "weaknesses": [{"source": "security_alert@emc.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-241"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*", "versionStartIncluding": "8.2.0", "versionEndIncluding": "9.3.0", "matchCriteriaId": "0F4EA23E-8719-4CAF-9B77-211F8B7351A8"}, {"vulnerable": true, "criteria": "cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.4.0", "versionEndExcluding": "9.4.0.18", "matchCriteriaId": "73BBDFEE-C17A-4428-B494-01A0C37B77E4"}, {"vulnerable": true, "criteria": "cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.5.0.0", "versionEndExcluding": "9.5.0.8", "matchCriteriaId": "48D79CD4-DCF3-4E0B-B864-3DDB95384D0E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.6.0", "versionEndExcluding": "9.7.0.3", "matchCriteriaId": "0252F020-DDF0-4C20-B527-AAF2F345ED4B"}]}]}], "references": [{"url": "https://www.dell.com/support/kbdoc/en-us/000224860/dsa-2024-163-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities", "source": "security_alert@emc.com", "tags": ["Vendor Advisory"]}, {"url": "https://www.dell.com/support/kbdoc/en-us/000224860/dsa-2024-163-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-26873.json b/cve/2024/CVE-2024-26873.json index 5821e265f0f..877592aa144 100644 --- a/cve/2024/CVE-2024-26873.json +++ b/cve/2024/CVE-2024-26873.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-26873", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T11:15:09.610", "lastModified": "2024-11-21T09:03:15.877", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: hisi_sas: Fix a deadlock issue related to automatic dump\n\nIf we issue a disabling PHY command, the device attached with it will go\noffline, if a 2 bit ECC error occurs at the same time, a hung task may be\nfound:\n\n[ 4613.652388] INFO: task kworker/u256:0:165233 blocked for more than 120 seconds.\n[ 4613.666297] \"echo 0 > /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\n[ 4613.674809] task:kworker/u256:0 state:D stack: 0 pid:165233 ppid: 2 flags:0x00000208\n[ 4613.683959] Workqueue: 0000:74:02.0_disco_q sas_revalidate_domain [libsas]\n[ 4613.691518] Call trace:\n[ 4613.694678] __switch_to+0xf8/0x17c\n[ 4613.698872] __schedule+0x660/0xee0\n[ 4613.703063] schedule+0xac/0x240\n[ 4613.706994] schedule_timeout+0x500/0x610\n[ 4613.711705] __down+0x128/0x36c\n[ 4613.715548] down+0x240/0x2d0\n[ 4613.719221] hisi_sas_internal_abort_timeout+0x1bc/0x260 [hisi_sas_main]\n[ 4613.726618] sas_execute_internal_abort+0x144/0x310 [libsas]\n[ 4613.732976] sas_execute_internal_abort_dev+0x44/0x60 [libsas]\n[ 4613.739504] hisi_sas_internal_task_abort_dev.isra.0+0xbc/0x1b0 [hisi_sas_main]\n[ 4613.747499] hisi_sas_dev_gone+0x174/0x250 [hisi_sas_main]\n[ 4613.753682] sas_notify_lldd_dev_gone+0xec/0x2e0 [libsas]\n[ 4613.759781] sas_unregister_common_dev+0x4c/0x7a0 [libsas]\n[ 4613.765962] sas_destruct_devices+0xb8/0x120 [libsas]\n[ 4613.771709] sas_do_revalidate_domain.constprop.0+0x1b8/0x31c [libsas]\n[ 4613.778930] sas_revalidate_domain+0x60/0xa4 [libsas]\n[ 4613.784716] process_one_work+0x248/0x950\n[ 4613.789424] worker_thread+0x318/0x934\n[ 4613.793878] kthread+0x190/0x200\n[ 4613.797810] ret_from_fork+0x10/0x18\n[ 4613.802121] INFO: task kworker/u256:4:316722 blocked for more than 120 seconds.\n[ 4613.816026] \"echo 0 > /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\n[ 4613.824538] task:kworker/u256:4 state:D stack: 0 pid:316722 ppid: 2 flags:0x00000208\n[ 4613.833670] Workqueue: 0000:74:02.0 hisi_sas_rst_work_handler [hisi_sas_main]\n[ 4613.841491] Call trace:\n[ 4613.844647] __switch_to+0xf8/0x17c\n[ 4613.848852] __schedule+0x660/0xee0\n[ 4613.853052] schedule+0xac/0x240\n[ 4613.856984] schedule_timeout+0x500/0x610\n[ 4613.861695] __down+0x128/0x36c\n[ 4613.865542] down+0x240/0x2d0\n[ 4613.869216] hisi_sas_controller_prereset+0x58/0x1fc [hisi_sas_main]\n[ 4613.876324] hisi_sas_rst_work_handler+0x40/0x8c [hisi_sas_main]\n[ 4613.883019] process_one_work+0x248/0x950\n[ 4613.887732] worker_thread+0x318/0x934\n[ 4613.892204] kthread+0x190/0x200\n[ 4613.896118] ret_from_fork+0x10/0x18\n[ 4613.900423] INFO: task kworker/u256:1:348985 blocked for more than 121 seconds.\n[ 4613.914341] \"echo 0 > /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\n[ 4613.922852] task:kworker/u256:1 state:D stack: 0 pid:348985 ppid: 2 flags:0x00000208\n[ 4613.931984] Workqueue: 0000:74:02.0_event_q sas_port_event_worker [libsas]\n[ 4613.939549] Call trace:\n[ 4613.942702] __switch_to+0xf8/0x17c\n[ 4613.946892] __schedule+0x660/0xee0\n[ 4613.951083] schedule+0xac/0x240\n[ 4613.955015] schedule_timeout+0x500/0x610\n[ 4613.959725] wait_for_common+0x200/0x610\n[ 4613.964349] wait_for_completion+0x3c/0x5c\n[ 4613.969146] flush_workqueue+0x198/0x790\n[ 4613.973776] sas_porte_broadcast_rcvd+0x1e8/0x320 [libsas]\n[ 4613.979960] sas_port_event_worker+0x54/0xa0 [libsas]\n[ 4613.985708] process_one_work+0x248/0x950\n[ 4613.990420] worker_thread+0x318/0x934\n[ 4613.994868] kthread+0x190/0x200\n[ 4613.998800] ret_from_fork+0x10/0x18\n\nThis is because when the device goes offline, we obtain the hisi_hba\nsemaphore and send the ABORT_DEV command to the device. However, the\ninternal abort timed out due to the 2 bit ECC error and triggers automatic\ndump. In addition, since the hisi_hba semaphore has been obtained, the dump\ncannot be executed and the controller cannot be reset.\n\nTherefore, the deadlocks occur on the following circular dependencies\n---truncated---"}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: hisi_sas: soluciona un problema de interbloqueo relacionado con el volcado autom\u00e1tico. Si emitimos un comando de desactivaci\u00f3n PHY, el dispositivo conectado se desconectar\u00e1 si se produce un error ECC de 2 bits en el Al mismo tiempo, se puede encontrar una tarea colgada: [ 4613.652388] INFORMACI\u00d3N: tarea kworker/u256:0:165233 bloqueada durante m\u00e1s de 120 segundos. [4613.666297] \"echo 0 > /proc/sys/kernel/hung_task_timeout_secs\" desactiva este mensaje. [ 4613.674809] tarea:kworker/u256:0 estado:D pila: 0 pid:165233 ppid: 2 banderas:0x00000208 [ 4613.683959] Cola de trabajo: 0000:74:02.0_disco_q sas_revalidate_domain [libsas] [ 4613.691518] Rastreo de llamadas: [4613.694678] __switch_to +0xf8/0x17c [ 4613.698872] __programaci\u00f3n+0x660/0xee0 [ 4613.703063] programaci\u00f3n+0xac/0x240 [ 4613.706994] programaci\u00f3n_timeout+0x500/0x610 [ 4613.711705] c [ 4613.715548] abajo+0x240/0x2d0 [ 4613.719221] hisi_sas_internal_abort_timeout+0x1bc /0x260 [hisi_sas_main] [ 4613.726618] sas_execute_internal_abort+0x144/0x310 [libsas] [ 4613.732976] sas_execute_internal_abort_dev+0x44/0x60 [libsas] [ 4613.739504] _dev.isra.0+0xbc/0x1b0 [hisi_sas_main] [ 4613.747499] hisi_sas_dev_gone+0x174/0x250 [hisi_sas_main] [ 4613.753682] sas_notify_lldd_dev_gone+0xec/0x2e0 [libsas] [ 4613.759781] sas_unregister_common_dev+0x4c/0x7a0 [libsas] [ 4613.765962] sas_destruct_devices+0xb8/0x120 [libsas] [ 4613.771709] sas_do_revalidate_domain.constprop.0+0x1b8/0x31c [libsas ] [ 4613.778930] sas_revalidate_domain+0x60/0xa4 [libsas] [ 4613.784716] Process_one_work+0x248/0x950 [ 4613.789424] trabajador_thread+0x318/0x934 [ 4613.793878] 0x200 [4613.797810] ret_from_fork+0x10/0x18 [4613.802121] INFORMACI\u00d3N: tarea kworker/u256:4:316722 bloqueado durante m\u00e1s de 120 segundos. [4613.816026] \"echo 0 > /proc/sys/kernel/hung_task_timeout_secs\" desactiva este mensaje. [ 4613.824538] tarea:kworker/u256:4 estado:D pila: 0 pid:316722 ppid: 2 banderas:0x00000208 [ 4613.833670] Cola de trabajo: 0000:74:02.0 hisi_sas_rst_work_handler [hisi_sas_main] [ 4613.841491 ] Rastreo de llamadas: [4613.844647] __switch_to+ 0xf8/0x17c [ 4613.848852] __programaci\u00f3n+0x660/0xee0 [ 4613.853052] programaci\u00f3n+0xac/0x240 [ 4613.856984] programaci\u00f3n_timeout+0x500/0x610 [ 4613.861695] c [ 4613.865542] abajo+0x240/0x2d0 [ 4613.869216] hisi_sas_controller_prereset+0x58/ 0x1fc [hisi_sas_main] [ 4613.876324] hisi_sas_rst_work_handler+0x40/0x8c [hisi_sas_main] [ 4613.883019] Process_one_work+0x248/0x950 [ 4613.887732] trabajador_thread+0x318/0x934 [ 461 3.892204] kthread+0x190/0x200 [ 4613.896118] ret_from_fork+0x10/0x18 [ 4613.900423] INFORMACI\u00d3N: tarea kworker/u256:1:348985 bloqueada durante m\u00e1s de 121 segundos. [4613.914341] \"echo 0 > /proc/sys/kernel/hung_task_timeout_secs\" desactiva este mensaje. [ 4613.922852] tarea:kworker/u256:1 estado:D pila: 0 pid:348985 ppid: 2 banderas:0x00000208 [ 4613.931984] Cola de trabajo: 0000:74:02.0_event_q sas_port_event_worker [libsas] [ 4613.939549] Rastreo de llamadas: [4613.942702] __switch_to +0xf8/0x17c [ 4613.946892] __schedule+0x660/0xee0 [ 4613.951083] Schedule+0xac/0x240 [ 4613.955015] Schedule_timeout+0x500/0x610 [ 4613.959725] x610 [ 4613.964349] espera_para_compleci\u00f3n+0x3c/0x5c [ 4613.969146] descarga_cola de trabajo+0x198 /0x790 [ 4613.973776] sas_porte_broadcast_rcvd+0x1e8/0x320 [libsas] [ 4613.979960] sas_port_event_worker+0x54/0xa0 [libsas] [ 4613.985708] Process_one_work+0x248/0x950 [ 4613.9 90420] hilo_trabajador+0x318/0x934 [ 4613.994868] kthread+0x190/0x200 [ 4613.998800 ] ret_from_fork+0x10/0x18 Esto se debe a que cuando el dispositivo se desconecta, obtenemos el sem\u00e1foro hisi_hba y enviamos el comando ABORT_DEV al dispositivo. Sin embargo, el aborto interno expir\u00f3 debido al error ECC de 2 bits y activa el volcado autom\u00e1tico. Adem\u00e1s, dado que se obtuvo el sem\u00e1foro hisi_hba, el volcado no se puede ejecutar y el controlador no se puede restablecer. Por lo tanto, los interbloqueos ocurren en las siguientes dependencias circulares ---truncadas---"}], "metrics": {}, "references": [{"url": "https://git.kernel.org/stable/c/3c4f53b2c341ec6428b98cb51a89a09b025d0953", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/85c98073ffcfe9e46abfb9c66f3364467119d563", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/e022dd3b875315a2d2001a512e98d1dc8c991f4a", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/3c4f53b2c341ec6428b98cb51a89a09b025d0953", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://git.kernel.org/stable/c/85c98073ffcfe9e46abfb9c66f3364467119d563", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://git.kernel.org/stable/c/e022dd3b875315a2d2001a512e98d1dc8c991f4a", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-26873", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T11:15:09.610", "lastModified": "2025-01-09T16:15:37.910", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: hisi_sas: Fix a deadlock issue related to automatic dump\n\nIf we issue a disabling PHY command, the device attached with it will go\noffline, if a 2 bit ECC error occurs at the same time, a hung task may be\nfound:\n\n[ 4613.652388] INFO: task kworker/u256:0:165233 blocked for more than 120 seconds.\n[ 4613.666297] \"echo 0 > /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\n[ 4613.674809] task:kworker/u256:0 state:D stack: 0 pid:165233 ppid: 2 flags:0x00000208\n[ 4613.683959] Workqueue: 0000:74:02.0_disco_q sas_revalidate_domain [libsas]\n[ 4613.691518] Call trace:\n[ 4613.694678] __switch_to+0xf8/0x17c\n[ 4613.698872] __schedule+0x660/0xee0\n[ 4613.703063] schedule+0xac/0x240\n[ 4613.706994] schedule_timeout+0x500/0x610\n[ 4613.711705] __down+0x128/0x36c\n[ 4613.715548] down+0x240/0x2d0\n[ 4613.719221] hisi_sas_internal_abort_timeout+0x1bc/0x260 [hisi_sas_main]\n[ 4613.726618] sas_execute_internal_abort+0x144/0x310 [libsas]\n[ 4613.732976] sas_execute_internal_abort_dev+0x44/0x60 [libsas]\n[ 4613.739504] hisi_sas_internal_task_abort_dev.isra.0+0xbc/0x1b0 [hisi_sas_main]\n[ 4613.747499] hisi_sas_dev_gone+0x174/0x250 [hisi_sas_main]\n[ 4613.753682] sas_notify_lldd_dev_gone+0xec/0x2e0 [libsas]\n[ 4613.759781] sas_unregister_common_dev+0x4c/0x7a0 [libsas]\n[ 4613.765962] sas_destruct_devices+0xb8/0x120 [libsas]\n[ 4613.771709] sas_do_revalidate_domain.constprop.0+0x1b8/0x31c [libsas]\n[ 4613.778930] sas_revalidate_domain+0x60/0xa4 [libsas]\n[ 4613.784716] process_one_work+0x248/0x950\n[ 4613.789424] worker_thread+0x318/0x934\n[ 4613.793878] kthread+0x190/0x200\n[ 4613.797810] ret_from_fork+0x10/0x18\n[ 4613.802121] INFO: task kworker/u256:4:316722 blocked for more than 120 seconds.\n[ 4613.816026] \"echo 0 > /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\n[ 4613.824538] task:kworker/u256:4 state:D stack: 0 pid:316722 ppid: 2 flags:0x00000208\n[ 4613.833670] Workqueue: 0000:74:02.0 hisi_sas_rst_work_handler [hisi_sas_main]\n[ 4613.841491] Call trace:\n[ 4613.844647] __switch_to+0xf8/0x17c\n[ 4613.848852] __schedule+0x660/0xee0\n[ 4613.853052] schedule+0xac/0x240\n[ 4613.856984] schedule_timeout+0x500/0x610\n[ 4613.861695] __down+0x128/0x36c\n[ 4613.865542] down+0x240/0x2d0\n[ 4613.869216] hisi_sas_controller_prereset+0x58/0x1fc [hisi_sas_main]\n[ 4613.876324] hisi_sas_rst_work_handler+0x40/0x8c [hisi_sas_main]\n[ 4613.883019] process_one_work+0x248/0x950\n[ 4613.887732] worker_thread+0x318/0x934\n[ 4613.892204] kthread+0x190/0x200\n[ 4613.896118] ret_from_fork+0x10/0x18\n[ 4613.900423] INFO: task kworker/u256:1:348985 blocked for more than 121 seconds.\n[ 4613.914341] \"echo 0 > /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\n[ 4613.922852] task:kworker/u256:1 state:D stack: 0 pid:348985 ppid: 2 flags:0x00000208\n[ 4613.931984] Workqueue: 0000:74:02.0_event_q sas_port_event_worker [libsas]\n[ 4613.939549] Call trace:\n[ 4613.942702] __switch_to+0xf8/0x17c\n[ 4613.946892] __schedule+0x660/0xee0\n[ 4613.951083] schedule+0xac/0x240\n[ 4613.955015] schedule_timeout+0x500/0x610\n[ 4613.959725] wait_for_common+0x200/0x610\n[ 4613.964349] wait_for_completion+0x3c/0x5c\n[ 4613.969146] flush_workqueue+0x198/0x790\n[ 4613.973776] sas_porte_broadcast_rcvd+0x1e8/0x320 [libsas]\n[ 4613.979960] sas_port_event_worker+0x54/0xa0 [libsas]\n[ 4613.985708] process_one_work+0x248/0x950\n[ 4613.990420] worker_thread+0x318/0x934\n[ 4613.994868] kthread+0x190/0x200\n[ 4613.998800] ret_from_fork+0x10/0x18\n\nThis is because when the device goes offline, we obtain the hisi_hba\nsemaphore and send the ABORT_DEV command to the device. However, the\ninternal abort timed out due to the 2 bit ECC error and triggers automatic\ndump. In addition, since the hisi_hba semaphore has been obtained, the dump\ncannot be executed and the controller cannot be reset.\n\nTherefore, the deadlocks occur on the following circular dependencies\n---truncated---"}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: hisi_sas: soluciona un problema de interbloqueo relacionado con el volcado autom\u00e1tico. Si emitimos un comando de desactivaci\u00f3n PHY, el dispositivo conectado se desconectar\u00e1 si se produce un error ECC de 2 bits en el Al mismo tiempo, se puede encontrar una tarea colgada: [ 4613.652388] INFORMACI\u00d3N: tarea kworker/u256:0:165233 bloqueada durante m\u00e1s de 120 segundos. [4613.666297] \"echo 0 > /proc/sys/kernel/hung_task_timeout_secs\" desactiva este mensaje. [ 4613.674809] tarea:kworker/u256:0 estado:D pila: 0 pid:165233 ppid: 2 banderas:0x00000208 [ 4613.683959] Cola de trabajo: 0000:74:02.0_disco_q sas_revalidate_domain [libsas] [ 4613.691518] Rastreo de llamadas: [4613.694678] __switch_to +0xf8/0x17c [ 4613.698872] __programaci\u00f3n+0x660/0xee0 [ 4613.703063] programaci\u00f3n+0xac/0x240 [ 4613.706994] programaci\u00f3n_timeout+0x500/0x610 [ 4613.711705] c [ 4613.715548] abajo+0x240/0x2d0 [ 4613.719221] hisi_sas_internal_abort_timeout+0x1bc /0x260 [hisi_sas_main] [ 4613.726618] sas_execute_internal_abort+0x144/0x310 [libsas] [ 4613.732976] sas_execute_internal_abort_dev+0x44/0x60 [libsas] [ 4613.739504] _dev.isra.0+0xbc/0x1b0 [hisi_sas_main] [ 4613.747499] hisi_sas_dev_gone+0x174/0x250 [hisi_sas_main] [ 4613.753682] sas_notify_lldd_dev_gone+0xec/0x2e0 [libsas] [ 4613.759781] sas_unregister_common_dev+0x4c/0x7a0 [libsas] [ 4613.765962] sas_destruct_devices+0xb8/0x120 [libsas] [ 4613.771709] sas_do_revalidate_domain.constprop.0+0x1b8/0x31c [libsas ] [ 4613.778930] sas_revalidate_domain+0x60/0xa4 [libsas] [ 4613.784716] Process_one_work+0x248/0x950 [ 4613.789424] trabajador_thread+0x318/0x934 [ 4613.793878] 0x200 [4613.797810] ret_from_fork+0x10/0x18 [4613.802121] INFORMACI\u00d3N: tarea kworker/u256:4:316722 bloqueado durante m\u00e1s de 120 segundos. [4613.816026] \"echo 0 > /proc/sys/kernel/hung_task_timeout_secs\" desactiva este mensaje. [ 4613.824538] tarea:kworker/u256:4 estado:D pila: 0 pid:316722 ppid: 2 banderas:0x00000208 [ 4613.833670] Cola de trabajo: 0000:74:02.0 hisi_sas_rst_work_handler [hisi_sas_main] [ 4613.841491 ] Rastreo de llamadas: [4613.844647] __switch_to+ 0xf8/0x17c [ 4613.848852] __programaci\u00f3n+0x660/0xee0 [ 4613.853052] programaci\u00f3n+0xac/0x240 [ 4613.856984] programaci\u00f3n_timeout+0x500/0x610 [ 4613.861695] c [ 4613.865542] abajo+0x240/0x2d0 [ 4613.869216] hisi_sas_controller_prereset+0x58/ 0x1fc [hisi_sas_main] [ 4613.876324] hisi_sas_rst_work_handler+0x40/0x8c [hisi_sas_main] [ 4613.883019] Process_one_work+0x248/0x950 [ 4613.887732] trabajador_thread+0x318/0x934 [ 461 3.892204] kthread+0x190/0x200 [ 4613.896118] ret_from_fork+0x10/0x18 [ 4613.900423] INFORMACI\u00d3N: tarea kworker/u256:1:348985 bloqueada durante m\u00e1s de 121 segundos. [4613.914341] \"echo 0 > /proc/sys/kernel/hung_task_timeout_secs\" desactiva este mensaje. [ 4613.922852] tarea:kworker/u256:1 estado:D pila: 0 pid:348985 ppid: 2 banderas:0x00000208 [ 4613.931984] Cola de trabajo: 0000:74:02.0_event_q sas_port_event_worker [libsas] [ 4613.939549] Rastreo de llamadas: [4613.942702] __switch_to +0xf8/0x17c [ 4613.946892] __schedule+0x660/0xee0 [ 4613.951083] Schedule+0xac/0x240 [ 4613.955015] Schedule_timeout+0x500/0x610 [ 4613.959725] x610 [ 4613.964349] espera_para_compleci\u00f3n+0x3c/0x5c [ 4613.969146] descarga_cola de trabajo+0x198 /0x790 [ 4613.973776] sas_porte_broadcast_rcvd+0x1e8/0x320 [libsas] [ 4613.979960] sas_port_event_worker+0x54/0xa0 [libsas] [ 4613.985708] Process_one_work+0x248/0x950 [ 4613.9 90420] hilo_trabajador+0x318/0x934 [ 4613.994868] kthread+0x190/0x200 [ 4613.998800 ] ret_from_fork+0x10/0x18 Esto se debe a que cuando el dispositivo se desconecta, obtenemos el sem\u00e1foro hisi_hba y enviamos el comando ABORT_DEV al dispositivo. Sin embargo, el aborto interno expir\u00f3 debido al error ECC de 2 bits y activa el volcado autom\u00e1tico. Adem\u00e1s, dado que se obtuvo el sem\u00e1foro hisi_hba, el volcado no se puede ejecutar y el controlador no se puede restablecer. Por lo tanto, los interbloqueos ocurren en las siguientes dependencias circulares ---truncadas---"}], "metrics": {}, "references": [{"url": "https://git.kernel.org/stable/c/3c4f53b2c341ec6428b98cb51a89a09b025d0953", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/85c98073ffcfe9e46abfb9c66f3364467119d563", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/a47f0b03149af538af4442ff0702eac430ace1cb", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/e022dd3b875315a2d2001a512e98d1dc8c991f4a", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/3c4f53b2c341ec6428b98cb51a89a09b025d0953", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://git.kernel.org/stable/c/85c98073ffcfe9e46abfb9c66f3364467119d563", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://git.kernel.org/stable/c/e022dd3b875315a2d2001a512e98d1dc8c991f4a", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-27299.json b/cve/2024/CVE-2024-27299.json index 5aaf8c4f7b1..04e88014d54 100644 --- a/cve/2024/CVE-2024-27299.json +++ b/cve/2024/CVE-2024-27299.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-27299", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-25T19:15:57.563", "lastModified": "2024-11-21T09:04:16.593", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. A SQL injection vulnerability has been discovered in the the \"Add News\" functionality due to improper escaping of the email address. This allows any authenticated user with the rights to add/edit FAQ news to exploit this vulnerability to exfiltrate data, take over accounts and in some cases, even achieve RCE. The vulnerable field lies in the `authorEmail` field which uses PHP's `FILTER_VALIDATE_EMAIL` filter. This filter is insufficient in protecting against SQL injection attacks and should still be properly escaped. However, in this version of phpMyFAQ (3.2.5), this field is not escaped properly can be used together with other fields to fully exploit the SQL injection vulnerability. This vulnerability is fixed in 3.2.6."}, {"lang": "es", "value": "phpMyFAQ es una aplicaci\u00f3n web de preguntas frecuentes de c\u00f3digo abierto para PHP 8.1+ y MySQL, PostgreSQL y otras bases de datos. Se ha descubierto una vulnerabilidad de inyecci\u00f3n SQL en la funcionalidad \"Agregar noticias\" debido a un escape incorrecto de la direcci\u00f3n de correo electr\u00f3nico. Esto permite que cualquier usuario autenticado con derechos para agregar/editar noticias de preguntas frecuentes aproveche esta vulnerabilidad para filtrar datos, hacerse cargo de cuentas y, en algunos casos, incluso lograr RCE. El campo vulnerable se encuentra en el campo `authorEmail` que utiliza el filtro `FILTER_VALIDATE_EMAIL` de PHP. Este filtro es insuficiente para proteger contra ataques de inyecci\u00f3n SQL y aun as\u00ed se debe escapar correctamente. Sin embargo, en esta versi\u00f3n de phpMyFAQ (3.2.5), este campo no tiene el formato de escape adecuado y puede usarse junto con otros campos para explotar completamente la vulnerabilidad de inyecci\u00f3n SQL. Esta vulnerabilidad se soluciona en 3.2.6."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 8.8, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-89"}]}], "references": [{"url": "https://drive.google.com/drive/folders/1BFL8GHIBxSUxu0TneYf66KjFA0A4RZga?usp=sharing", "source": "security-advisories@github.com"}, {"url": "https://github.com/thorsten/phpMyFAQ/commit/1b68a5f89fb65996c56285fa636b818de8608011", "source": "security-advisories@github.com"}, {"url": "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-qgxx-4xv5-6hcw", "source": "security-advisories@github.com"}, {"url": "https://drive.google.com/drive/folders/1BFL8GHIBxSUxu0TneYf66KjFA0A4RZga?usp=sharing", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/thorsten/phpMyFAQ/commit/1b68a5f89fb65996c56285fa636b818de8608011", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-qgxx-4xv5-6hcw", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-27299", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-25T19:15:57.563", "lastModified": "2025-01-09T17:27:11.167", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. A SQL injection vulnerability has been discovered in the the \"Add News\" functionality due to improper escaping of the email address. This allows any authenticated user with the rights to add/edit FAQ news to exploit this vulnerability to exfiltrate data, take over accounts and in some cases, even achieve RCE. The vulnerable field lies in the `authorEmail` field which uses PHP's `FILTER_VALIDATE_EMAIL` filter. This filter is insufficient in protecting against SQL injection attacks and should still be properly escaped. However, in this version of phpMyFAQ (3.2.5), this field is not escaped properly can be used together with other fields to fully exploit the SQL injection vulnerability. This vulnerability is fixed in 3.2.6."}, {"lang": "es", "value": "phpMyFAQ es una aplicaci\u00f3n web de preguntas frecuentes de c\u00f3digo abierto para PHP 8.1+ y MySQL, PostgreSQL y otras bases de datos. Se ha descubierto una vulnerabilidad de inyecci\u00f3n SQL en la funcionalidad \"Agregar noticias\" debido a un escape incorrecto de la direcci\u00f3n de correo electr\u00f3nico. Esto permite que cualquier usuario autenticado con derechos para agregar/editar noticias de preguntas frecuentes aproveche esta vulnerabilidad para filtrar datos, hacerse cargo de cuentas y, en algunos casos, incluso lograr RCE. El campo vulnerable se encuentra en el campo `authorEmail` que utiliza el filtro `FILTER_VALIDATE_EMAIL` de PHP. Este filtro es insuficiente para proteger contra ataques de inyecci\u00f3n SQL y aun as\u00ed se debe escapar correctamente. Sin embargo, en esta versi\u00f3n de phpMyFAQ (3.2.5), este campo no tiene el formato de escape adecuado y puede usarse junto con otros campos para explotar completamente la vulnerabilidad de inyecci\u00f3n SQL. Esta vulnerabilidad se soluciona en 3.2.6."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 8.8, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 5.9}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 8.8, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-89"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-89"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:3.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "99BD7923-9316-46E2-B3C4-33105AD9E901"}]}]}], "references": [{"url": "https://drive.google.com/drive/folders/1BFL8GHIBxSUxu0TneYf66KjFA0A4RZga?usp=sharing", "source": "security-advisories@github.com", "tags": ["Exploit"]}, {"url": "https://github.com/thorsten/phpMyFAQ/commit/1b68a5f89fb65996c56285fa636b818de8608011", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-qgxx-4xv5-6hcw", "source": "security-advisories@github.com", "tags": ["Exploit", "Vendor Advisory"]}, {"url": "https://drive.google.com/drive/folders/1BFL8GHIBxSUxu0TneYf66KjFA0A4RZga?usp=sharing", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit"]}, {"url": "https://github.com/thorsten/phpMyFAQ/commit/1b68a5f89fb65996c56285fa636b818de8608011", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-qgxx-4xv5-6hcw", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-27300.json b/cve/2024/CVE-2024-27300.json index 82ff829e4b1..ef0101e9868 100644 --- a/cve/2024/CVE-2024-27300.json +++ b/cve/2024/CVE-2024-27300.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-27300", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-25T19:15:57.807", "lastModified": "2024-11-21T09:04:16.727", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. The `email` field in phpMyFAQ's user control panel page is vulnerable to stored XSS attacks due to the inadequacy of PHP's `FILTER_VALIDATE_EMAIL` function, which only validates the email format, not its content. This vulnerability enables an attacker to execute arbitrary client-side JavaScript within the context of another user's phpMyFAQ session. This vulnerability is fixed in 3.2.6."}, {"lang": "es", "value": "phpMyFAQ es una aplicaci\u00f3n web de preguntas frecuentes de c\u00f3digo abierto para PHP 8.1+ y MySQL, PostgreSQL y otras bases de datos. El campo `email` en la p\u00e1gina del panel de control de usuario de phpMyFAQ es vulnerable a ataques XSS almacenados debido a la insuficiencia de la funci\u00f3n `FILTER_VALIDATE_EMAIL` de PHP, que solo valida el formato del correo electr\u00f3nico, no su contenido. Esta vulnerabilidad permite a un atacante ejecutar JavaScript arbitrario del lado del cliente dentro del contexto de la sesi\u00f3n phpMyFAQ de otro usuario. Esta vulnerabilidad se soluciona en 3.2.6."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", "baseScore": 5.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.1, "impactScore": 3.4}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://github.com/thorsten/phpMyFAQ/commit/09336b0ff0e0a04aa0c97c5975651af4769d2459", "source": "security-advisories@github.com"}, {"url": "https://github.com/thorsten/phpMyFAQ/commit/de90315c9bd4ead5fe6ba5586f6b016843aa8209", "source": "security-advisories@github.com"}, {"url": "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-q7g6-xfh2-vhpx", "source": "security-advisories@github.com"}, {"url": "https://github.com/thorsten/phpMyFAQ/commit/09336b0ff0e0a04aa0c97c5975651af4769d2459", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/thorsten/phpMyFAQ/commit/de90315c9bd4ead5fe6ba5586f6b016843aa8209", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-q7g6-xfh2-vhpx", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-27300", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-25T19:15:57.807", "lastModified": "2025-01-09T17:16:12.273", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. The `email` field in phpMyFAQ's user control panel page is vulnerable to stored XSS attacks due to the inadequacy of PHP's `FILTER_VALIDATE_EMAIL` function, which only validates the email format, not its content. This vulnerability enables an attacker to execute arbitrary client-side JavaScript within the context of another user's phpMyFAQ session. This vulnerability is fixed in 3.2.6."}, {"lang": "es", "value": "phpMyFAQ es una aplicaci\u00f3n web de preguntas frecuentes de c\u00f3digo abierto para PHP 8.1+ y MySQL, PostgreSQL y otras bases de datos. El campo `email` en la p\u00e1gina del panel de control de usuario de phpMyFAQ es vulnerable a ataques XSS almacenados debido a la insuficiencia de la funci\u00f3n `FILTER_VALIDATE_EMAIL` de PHP, que solo valida el formato del correo electr\u00f3nico, no su contenido. Esta vulnerabilidad permite a un atacante ejecutar JavaScript arbitrario del lado del cliente dentro del contexto de la sesi\u00f3n phpMyFAQ de otro usuario. Esta vulnerabilidad se soluciona en 3.2.6."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", "baseScore": 5.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.1, "impactScore": 3.4}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "baseScore": 5.4, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.3, "impactScore": 2.7}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-79"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:3.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "99BD7923-9316-46E2-B3C4-33105AD9E901"}]}]}], "references": [{"url": "https://github.com/thorsten/phpMyFAQ/commit/09336b0ff0e0a04aa0c97c5975651af4769d2459", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/thorsten/phpMyFAQ/commit/de90315c9bd4ead5fe6ba5586f6b016843aa8209", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-q7g6-xfh2-vhpx", "source": "security-advisories@github.com", "tags": ["Exploit", "Vendor Advisory"]}, {"url": "https://github.com/thorsten/phpMyFAQ/commit/09336b0ff0e0a04aa0c97c5975651af4769d2459", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/thorsten/phpMyFAQ/commit/de90315c9bd4ead5fe6ba5586f6b016843aa8209", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-q7g6-xfh2-vhpx", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-28105.json b/cve/2024/CVE-2024-28105.json index 50ad34633d4..5cade185d08 100644 --- a/cve/2024/CVE-2024-28105.json +++ b/cve/2024/CVE-2024-28105.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-28105", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-25T19:15:58.020", "lastModified": "2024-11-21T09:05:49.490", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. The category image upload function in phpmyfaq is vulnerable to manipulation of the `Content-type` and `lang` parameters, allowing attackers to upload malicious files with a .php extension, potentially leading to remote code execution (RCE) on the system. This vulnerability is fixed in 3.2.6."}, {"lang": "es", "value": "phpMyFAQ es una aplicaci\u00f3n web de preguntas frecuentes de c\u00f3digo abierto para PHP 8.1+ y MySQL, PostgreSQL y otras bases de datos. La funci\u00f3n de carga de im\u00e1genes de categor\u00eda en phpmyfaq es vulnerable a la manipulaci\u00f3n de los par\u00e1metros `Content-type` y `lang`, lo que permite a los atacantes cargar archivos maliciosos con una extensi\u00f3n .php, lo que potencialmente conduce a la ejecuci\u00f3n remota de c\u00f3digo (RCE) en el sistema. Esta vulnerabilidad se soluciona en 3.2.6."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.2, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.2, "impactScore": 5.9}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-434"}]}], "references": [{"url": "https://github.com/thorsten/phpMyFAQ/commit/9136883776af67dfdb0e8cf14f5e0ca22bf4f2e7", "source": "security-advisories@github.com"}, {"url": "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-pwh2-fpfr-x5gf", "source": "security-advisories@github.com"}, {"url": "https://github.com/thorsten/phpMyFAQ/commit/9136883776af67dfdb0e8cf14f5e0ca22bf4f2e7", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-pwh2-fpfr-x5gf", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-28105", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-25T19:15:58.020", "lastModified": "2025-01-09T17:14:59.820", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. The category image upload function in phpmyfaq is vulnerable to manipulation of the `Content-type` and `lang` parameters, allowing attackers to upload malicious files with a .php extension, potentially leading to remote code execution (RCE) on the system. This vulnerability is fixed in 3.2.6."}, {"lang": "es", "value": "phpMyFAQ es una aplicaci\u00f3n web de preguntas frecuentes de c\u00f3digo abierto para PHP 8.1+ y MySQL, PostgreSQL y otras bases de datos. La funci\u00f3n de carga de im\u00e1genes de categor\u00eda en phpmyfaq es vulnerable a la manipulaci\u00f3n de los par\u00e1metros `Content-type` y `lang`, lo que permite a los atacantes cargar archivos maliciosos con una extensi\u00f3n .php, lo que potencialmente conduce a la ejecuci\u00f3n remota de c\u00f3digo (RCE) en el sistema. Esta vulnerabilidad se soluciona en 3.2.6."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.2, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.2, "impactScore": 5.9}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.2, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.2, "impactScore": 5.9}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-434"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-434"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:3.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "99BD7923-9316-46E2-B3C4-33105AD9E901"}]}]}], "references": [{"url": "https://github.com/thorsten/phpMyFAQ/commit/9136883776af67dfdb0e8cf14f5e0ca22bf4f2e7", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-pwh2-fpfr-x5gf", "source": "security-advisories@github.com", "tags": ["Exploit", "Vendor Advisory"]}, {"url": "https://github.com/thorsten/phpMyFAQ/commit/9136883776af67dfdb0e8cf14f5e0ca22bf4f2e7", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-pwh2-fpfr-x5gf", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-28106.json b/cve/2024/CVE-2024-28106.json index a45104629b8..1a042171369 100644 --- a/cve/2024/CVE-2024-28106.json +++ b/cve/2024/CVE-2024-28106.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-28106", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-25T19:15:58.263", "lastModified": "2024-11-21T09:05:49.623", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. By manipulating the news parameter in a POST request, an attacker can inject malicious JavaScript code. Upon browsing to the compromised news page, the XSS payload triggers. This vulnerability is fixed in 3.2.6."}, {"lang": "es", "value": "phpMyFAQ es una aplicaci\u00f3n web de preguntas frecuentes de c\u00f3digo abierto para PHP 8.1+ y MySQL, PostgreSQL y otras bases de datos. Al manipular el par\u00e1metro de noticias en una solicitud POST, un atacante puede inyectar c\u00f3digo JavaScript malicioso. Al navegar a la p\u00e1gina de noticias comprometida, se activa la carga \u00fatil XSS. Esta vulnerabilidad se soluciona en 3.2.6."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", "baseScore": 4.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 0.9, "impactScore": 3.4}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://github.com/thorsten/phpMyFAQ/commit/c94b3deadd87789389e1fad162bc3dd595c0e15a", "source": "security-advisories@github.com"}, {"url": "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-6p68-36m6-392r", "source": "security-advisories@github.com"}, {"url": "https://github.com/thorsten/phpMyFAQ/commit/c94b3deadd87789389e1fad162bc3dd595c0e15a", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-6p68-36m6-392r", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-28106", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-25T19:15:58.263", "lastModified": "2025-01-09T17:30:11.107", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. By manipulating the news parameter in a POST request, an attacker can inject malicious JavaScript code. Upon browsing to the compromised news page, the XSS payload triggers. This vulnerability is fixed in 3.2.6."}, {"lang": "es", "value": "phpMyFAQ es una aplicaci\u00f3n web de preguntas frecuentes de c\u00f3digo abierto para PHP 8.1+ y MySQL, PostgreSQL y otras bases de datos. Al manipular el par\u00e1metro de noticias en una solicitud POST, un atacante puede inyectar c\u00f3digo JavaScript malicioso. Al navegar a la p\u00e1gina de noticias comprometida, se activa la carga \u00fatil XSS. Esta vulnerabilidad se soluciona en 3.2.6."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", "baseScore": 4.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 0.9, "impactScore": 3.4}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "baseScore": 5.4, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.3, "impactScore": 2.7}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-79"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:3.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "99BD7923-9316-46E2-B3C4-33105AD9E901"}]}]}], "references": [{"url": "https://github.com/thorsten/phpMyFAQ/commit/c94b3deadd87789389e1fad162bc3dd595c0e15a", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-6p68-36m6-392r", "source": "security-advisories@github.com", "tags": ["Exploit", "Vendor Advisory"]}, {"url": "https://github.com/thorsten/phpMyFAQ/commit/c94b3deadd87789389e1fad162bc3dd595c0e15a", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-6p68-36m6-392r", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-28107.json b/cve/2024/CVE-2024-28107.json index e6a52c381bf..a27e4036ff8 100644 --- a/cve/2024/CVE-2024-28107.json +++ b/cve/2024/CVE-2024-28107.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-28107", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-25T19:15:58.477", "lastModified": "2024-11-21T09:05:49.743", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. A SQL injection vulnerability has been discovered in the `insertentry` & `saveentry` when modifying records due to improper escaping of the email address. This allows any authenticated user with the rights to add/edit FAQ news to exploit this vulnerability to exfiltrate data, take over accounts and in some cases, even achieve RCE. This vulnerability is fixed in 3.2.6."}, {"lang": "es", "value": "phpMyFAQ es una aplicaci\u00f3n web de preguntas frecuentes de c\u00f3digo abierto para PHP 8.1+ y MySQL, PostgreSQL y otras bases de datos. Se ha descubierto una vulnerabilidad de inyecci\u00f3n SQL en `insertentry` y `saveentry` al modificar registros debido a un escape inadecuado de la direcci\u00f3n de correo electr\u00f3nico. Esto permite que cualquier usuario autenticado con derechos para agregar/editar noticias de preguntas frecuentes aproveche esta vulnerabilidad para filtrar datos, hacerse cargo de cuentas y, en algunos casos, incluso lograr RCE. Esta vulnerabilidad se soluciona en 3.2.6."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 8.8, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-89"}]}], "references": [{"url": "https://github.com/thorsten/phpMyFAQ/commit/d0fae62a72615d809e6710861c1a7f67ac893007", "source": "security-advisories@github.com"}, {"url": "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-2grw-mc9r-822r", "source": "security-advisories@github.com"}, {"url": "https://github.com/thorsten/phpMyFAQ/commit/d0fae62a72615d809e6710861c1a7f67ac893007", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-2grw-mc9r-822r", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-28107", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-25T19:15:58.477", "lastModified": "2025-01-09T17:01:02.587", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. A SQL injection vulnerability has been discovered in the `insertentry` & `saveentry` when modifying records due to improper escaping of the email address. This allows any authenticated user with the rights to add/edit FAQ news to exploit this vulnerability to exfiltrate data, take over accounts and in some cases, even achieve RCE. This vulnerability is fixed in 3.2.6."}, {"lang": "es", "value": "phpMyFAQ es una aplicaci\u00f3n web de preguntas frecuentes de c\u00f3digo abierto para PHP 8.1+ y MySQL, PostgreSQL y otras bases de datos. Se ha descubierto una vulnerabilidad de inyecci\u00f3n SQL en `insertentry` y `saveentry` al modificar registros debido a un escape inadecuado de la direcci\u00f3n de correo electr\u00f3nico. Esto permite que cualquier usuario autenticado con derechos para agregar/editar noticias de preguntas frecuentes aproveche esta vulnerabilidad para filtrar datos, hacerse cargo de cuentas y, en algunos casos, incluso lograr RCE. Esta vulnerabilidad se soluciona en 3.2.6."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 8.8, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 5.9}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 8.8, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-89"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-89"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:3.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "99BD7923-9316-46E2-B3C4-33105AD9E901"}]}]}], "references": [{"url": "https://github.com/thorsten/phpMyFAQ/commit/d0fae62a72615d809e6710861c1a7f67ac893007", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-2grw-mc9r-822r", "source": "security-advisories@github.com", "tags": ["Exploit", "Vendor Advisory"]}, {"url": "https://github.com/thorsten/phpMyFAQ/commit/d0fae62a72615d809e6710861c1a7f67ac893007", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-2grw-mc9r-822r", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-28108.json b/cve/2024/CVE-2024-28108.json index 5bef1f896a5..fc51859c8a0 100644 --- a/cve/2024/CVE-2024-28108.json +++ b/cve/2024/CVE-2024-28108.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-28108", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-25T19:15:58.700", "lastModified": "2024-11-21T09:05:49.880", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. Due to insufficient validation on the `contentLink` parameter, it is possible for unauthenticated users to inject HTML code to the page which might affect other users. _Also, requires that adding new FAQs is allowed for guests and that the admin doesn't check the content of a newly added FAQ._ This vulnerability is fixed in 3.2.6."}, {"lang": "es", "value": "phpMyFAQ es una aplicaci\u00f3n web de preguntas frecuentes de c\u00f3digo abierto para PHP 8.1+ y MySQL, PostgreSQL y otras bases de datos. Debido a una validaci\u00f3n insuficiente del par\u00e1metro \"contentLink\", es posible que usuarios no autenticados inyecten c\u00f3digo HTML en la p\u00e1gina, lo que podr\u00eda afectar a otros usuarios. _Adem\u00e1s, requiere que se permita agregar nuevas preguntas frecuentes a los invitados y que el administrador no verifique el contenido de las preguntas frecuentes reci\u00e9n agregadas._ Esta vulnerabilidad se corrigi\u00f3 en 3.2.6."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N", "baseScore": 4.7, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 1.6, "impactScore": 2.7}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-79"}, {"lang": "en", "value": "CWE-80"}]}], "references": [{"url": "https://github.com/thorsten/phpMyFAQ/commit/4fed1d9602f0635260f789fe85995789d94d6634", "source": "security-advisories@github.com"}, {"url": "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-48vw-jpf8-hwqh", "source": "security-advisories@github.com"}, {"url": "https://github.com/thorsten/phpMyFAQ/commit/4fed1d9602f0635260f789fe85995789d94d6634", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-48vw-jpf8-hwqh", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-28108", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-25T19:15:58.700", "lastModified": "2025-01-09T17:00:12.770", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. Due to insufficient validation on the `contentLink` parameter, it is possible for unauthenticated users to inject HTML code to the page which might affect other users. _Also, requires that adding new FAQs is allowed for guests and that the admin doesn't check the content of a newly added FAQ._ This vulnerability is fixed in 3.2.6."}, {"lang": "es", "value": "phpMyFAQ es una aplicaci\u00f3n web de preguntas frecuentes de c\u00f3digo abierto para PHP 8.1+ y MySQL, PostgreSQL y otras bases de datos. Debido a una validaci\u00f3n insuficiente del par\u00e1metro \"contentLink\", es posible que usuarios no autenticados inyecten c\u00f3digo HTML en la p\u00e1gina, lo que podr\u00eda afectar a otros usuarios. _Adem\u00e1s, requiere que se permita agregar nuevas preguntas frecuentes a los invitados y que el administrador no verifique el contenido de las preguntas frecuentes reci\u00e9n agregadas._ Esta vulnerabilidad se corrigi\u00f3 en 3.2.6."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N", "baseScore": 4.7, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 1.6, "impactScore": 2.7}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "baseScore": 6.1, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 2.7}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-79"}, {"lang": "en", "value": "CWE-80"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:3.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "99BD7923-9316-46E2-B3C4-33105AD9E901"}]}]}], "references": [{"url": "https://github.com/thorsten/phpMyFAQ/commit/4fed1d9602f0635260f789fe85995789d94d6634", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-48vw-jpf8-hwqh", "source": "security-advisories@github.com", "tags": ["Exploit", "Vendor Advisory"]}, {"url": "https://github.com/thorsten/phpMyFAQ/commit/4fed1d9602f0635260f789fe85995789d94d6634", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-48vw-jpf8-hwqh", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-28175.json b/cve/2024/CVE-2024-28175.json index 9deb2e6493e..ce39a07e2f6 100644 --- a/cve/2024/CVE-2024-28175.json +++ b/cve/2024/CVE-2024-28175.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-28175", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-13T21:16:00.570", "lastModified": "2024-11-21T09:05:57.817", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Due to the improper URL protocols filtering of links specified in the `link.argocd.argoproj.io` annotations in the application summary component, an attacker can achieve cross-site scripting with elevated permissions. All unpatched versions of Argo CD starting with v1.0.0 are vulnerable to a cross-site scripting (XSS) bug allowing a malicious user to inject a javascript: link in the UI. When clicked by a victim user, the script will execute with the victim's permissions (up to and including admin). This vulnerability allows an attacker to perform arbitrary actions on behalf of the victim via the API, such as creating, modifying, and deleting Kubernetes resources. A patch for this vulnerability has been released in Argo CD versions v2.10.3 v2.9.8, and v2.8.12. There are no completely-safe workarounds besides upgrading. The safest alternative, if upgrading is not possible, would be to create a Kubernetes admission controller to reject any resources with an annotation starting with link.argocd.argoproj.io or reject the resource if the value use an improper URL protocol. This validation will need to be applied in all clusters managed by ArgoCD.\n\n"}, {"lang": "es", "value": "Argo CD es una herramienta declarativa de entrega continua de GitOps para Kubernetes. Debido al filtrado inadecuado de los protocolos URL de los enlaces especificados en las anotaciones `link.argocd.argoproj.io` en el componente de resumen de la aplicaci\u00f3n, un atacante puede lograr Cross Site Scripting con permisos elevados. Todas las versiones sin parches de Argo CD que comienzan con v1.0.0 son vulnerables a un error de Cross Site Scripting (XSS) que permite a un usuario malintencionado inyectar un enlace javascript: en la interfaz de usuario. Cuando un usuario v\u00edctima hace clic en \u00e9l, el script se ejecutar\u00e1 con los permisos de la v\u00edctima (hasta administrador incluido). Esta vulnerabilidad permite a un atacante realizar acciones arbitrarias en nombre de la v\u00edctima a trav\u00e9s de la API, como crear, modificar y eliminar recursos de Kubernetes. Se lanz\u00f3 un parche para esta vulnerabilidad en las versiones de Argo CD v2.10.3 v2.9.8 y v2.8.12. No existen soluciones alternativas completamente seguras adem\u00e1s de actualizar. La alternativa m\u00e1s segura, si no es posible la actualizaci\u00f3n, ser\u00eda crear un controlador de admisi\u00f3n de Kubernetes para rechazar cualquier recurso con una anotaci\u00f3n que comience con link.argocd.argoproj.io o rechazar el recurso si el valor utiliza un protocolo URL inadecuado. Esta validaci\u00f3n deber\u00e1 aplicarse en todos los cl\u00fasteres gestionados por ArgoCD."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "baseScore": 9.0, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.3, "impactScore": 6.0}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://github.com/argoproj/argo-cd/commit/479b5544b57dc9ef767d49f7003f39602c480b71", "source": "security-advisories@github.com"}, {"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-jwv5-8mqv-g387", "source": "security-advisories@github.com"}, {"url": "https://github.com/argoproj/argo-cd/commit/479b5544b57dc9ef767d49f7003f39602c480b71", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-jwv5-8mqv-g387", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-28175", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-13T21:16:00.570", "lastModified": "2025-01-09T17:05:59.063", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Due to the improper URL protocols filtering of links specified in the `link.argocd.argoproj.io` annotations in the application summary component, an attacker can achieve cross-site scripting with elevated permissions. All unpatched versions of Argo CD starting with v1.0.0 are vulnerable to a cross-site scripting (XSS) bug allowing a malicious user to inject a javascript: link in the UI. When clicked by a victim user, the script will execute with the victim's permissions (up to and including admin). This vulnerability allows an attacker to perform arbitrary actions on behalf of the victim via the API, such as creating, modifying, and deleting Kubernetes resources. A patch for this vulnerability has been released in Argo CD versions v2.10.3 v2.9.8, and v2.8.12. There are no completely-safe workarounds besides upgrading. The safest alternative, if upgrading is not possible, would be to create a Kubernetes admission controller to reject any resources with an annotation starting with link.argocd.argoproj.io or reject the resource if the value use an improper URL protocol. This validation will need to be applied in all clusters managed by ArgoCD.\n\n"}, {"lang": "es", "value": "Argo CD es una herramienta declarativa de entrega continua de GitOps para Kubernetes. Debido al filtrado inadecuado de los protocolos URL de los enlaces especificados en las anotaciones `link.argocd.argoproj.io` en el componente de resumen de la aplicaci\u00f3n, un atacante puede lograr Cross Site Scripting con permisos elevados. Todas las versiones sin parches de Argo CD que comienzan con v1.0.0 son vulnerables a un error de Cross Site Scripting (XSS) que permite a un usuario malintencionado inyectar un enlace javascript: en la interfaz de usuario. Cuando un usuario v\u00edctima hace clic en \u00e9l, el script se ejecutar\u00e1 con los permisos de la v\u00edctima (hasta administrador incluido). Esta vulnerabilidad permite a un atacante realizar acciones arbitrarias en nombre de la v\u00edctima a trav\u00e9s de la API, como crear, modificar y eliminar recursos de Kubernetes. Se lanz\u00f3 un parche para esta vulnerabilidad en las versiones de Argo CD v2.10.3 v2.9.8 y v2.8.12. No existen soluciones alternativas completamente seguras adem\u00e1s de actualizar. La alternativa m\u00e1s segura, si no es posible la actualizaci\u00f3n, ser\u00eda crear un controlador de admisi\u00f3n de Kubernetes para rechazar cualquier recurso con una anotaci\u00f3n que comience con link.argocd.argoproj.io o rechazar el recurso si el valor utiliza un protocolo URL inadecuado. Esta validaci\u00f3n deber\u00e1 aplicarse en todos los cl\u00fasteres gestionados por ArgoCD."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "baseScore": 9.0, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.3, "impactScore": 6.0}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "baseScore": 5.4, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.3, "impactScore": 2.7}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-79"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*", "versionStartIncluding": "1.0.0", "versionEndExcluding": "2.8.12", "matchCriteriaId": "E0393269-E1BA-4E3B-9A76-6EECFD36FDA5"}, {"vulnerable": true, "criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.9.0", "versionEndExcluding": "2.9.8", "matchCriteriaId": "CFDD1F75-11BA-4CB4-BAD8-7A2DC23339D7"}, {"vulnerable": true, "criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.10.0", "versionEndExcluding": "2.10.3", "matchCriteriaId": "91F1733A-B8C1-4676-96B5-C9EF16E9C23B"}]}]}], "references": [{"url": "https://github.com/argoproj/argo-cd/commit/479b5544b57dc9ef767d49f7003f39602c480b71", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-jwv5-8mqv-g387", "source": "security-advisories@github.com", "tags": ["Vendor Advisory"]}, {"url": "https://github.com/argoproj/argo-cd/commit/479b5544b57dc9ef767d49f7003f39602c480b71", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-jwv5-8mqv-g387", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-28248.json b/cve/2024/CVE-2024-28248.json index 6240b73ce2f..b16e7386f6b 100644 --- a/cve/2024/CVE-2024-28248.json +++ b/cve/2024/CVE-2024-28248.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-28248", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-18T22:15:08.220", "lastModified": "2024-11-21T09:06:05.573", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Starting in version 1.13.9 and prior to versions 1.13.13, 1.14.8, and 1.15.2, Cilium's HTTP policies are not consistently applied to all traffic in the scope of the policies, leading to HTTP traffic being incorrectly and intermittently forwarded when it should be dropped. This issue has been patched in Cilium 1.15.2, 1.14.8, and 1.13.13. There are no known workarounds for this issue."}, {"lang": "es", "value": "Cilium es una soluci\u00f3n de redes, observabilidad y seguridad con un plano de datos basado en eBPF. A partir de la versi\u00f3n 1.13.9 y antes de las versiones 1.13.13, 1.14.8 y 1.15.2, las pol\u00edticas HTTP de Cilium no se aplican de manera consistente a todo el tr\u00e1fico en el alcance de las pol\u00edticas, lo que lleva a que el tr\u00e1fico HTTP se reenv\u00ede de manera incorrecta e intermitente cuando deber\u00eda dejarse caer. Este problema se solucion\u00f3 en Cilium 1.15.2, 1.14.8 y 1.13.13. No se conocen workarounds para este problema."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", "baseScore": 7.2, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 3.9, "impactScore": 2.7}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-693"}]}], "references": [{"url": "https://docs.cilium.io/en/stable/security/policy/language/#http", "source": "security-advisories@github.com"}, {"url": "https://github.com/cilium/cilium/releases/tag/v1.13.13", "source": "security-advisories@github.com"}, {"url": "https://github.com/cilium/cilium/releases/tag/v1.14.8", "source": "security-advisories@github.com"}, {"url": "https://github.com/cilium/cilium/releases/tag/v1.15.2", "source": "security-advisories@github.com"}, {"url": "https://github.com/cilium/cilium/security/advisories/GHSA-68mj-9pjq-mc85", "source": "security-advisories@github.com"}, {"url": "https://docs.cilium.io/en/stable/security/policy/language/#http", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/cilium/cilium/releases/tag/v1.13.13", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/cilium/cilium/releases/tag/v1.14.8", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/cilium/cilium/releases/tag/v1.15.2", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/cilium/cilium/security/advisories/GHSA-68mj-9pjq-mc85", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-28248", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-18T22:15:08.220", "lastModified": "2025-01-09T16:40:56.910", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Starting in version 1.13.9 and prior to versions 1.13.13, 1.14.8, and 1.15.2, Cilium's HTTP policies are not consistently applied to all traffic in the scope of the policies, leading to HTTP traffic being incorrectly and intermittently forwarded when it should be dropped. This issue has been patched in Cilium 1.15.2, 1.14.8, and 1.13.13. There are no known workarounds for this issue."}, {"lang": "es", "value": "Cilium es una soluci\u00f3n de redes, observabilidad y seguridad con un plano de datos basado en eBPF. A partir de la versi\u00f3n 1.13.9 y antes de las versiones 1.13.13, 1.14.8 y 1.15.2, las pol\u00edticas HTTP de Cilium no se aplican de manera consistente a todo el tr\u00e1fico en el alcance de las pol\u00edticas, lo que lleva a que el tr\u00e1fico HTTP se reenv\u00ede de manera incorrecta e intermitente cuando deber\u00eda dejarse caer. Este problema se solucion\u00f3 en Cilium 1.15.2, 1.14.8 y 1.13.13. No se conocen workarounds para este problema."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", "baseScore": 7.2, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 3.9, "impactScore": 2.7}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", "baseScore": 7.2, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 3.9, "impactScore": 2.7}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-693"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:cilium:cilium:*:*:*:*:*:*:*:*", "versionStartIncluding": "1.13.9", "versionEndExcluding": "1.13.13", "matchCriteriaId": "85626379-99C9-4C7D-BB9A-544D1A8D04DA"}, {"vulnerable": true, "criteria": "cpe:2.3:a:cilium:cilium:*:*:*:*:*:*:*:*", "versionStartIncluding": "1.14.0", "versionEndExcluding": "1.14.8", "matchCriteriaId": "50C01BB2-3804-450F-846D-DE7A23112DF6"}, {"vulnerable": true, "criteria": "cpe:2.3:a:cilium:cilium:*:*:*:*:*:*:*:*", "versionStartIncluding": "1.15.0", "versionEndExcluding": "1.15.2", "matchCriteriaId": "9938037D-85A4-4964-B593-33015AEFC8DB"}]}]}], "references": [{"url": "https://docs.cilium.io/en/stable/security/policy/language/#http", "source": "security-advisories@github.com", "tags": ["Product"]}, {"url": "https://github.com/cilium/cilium/releases/tag/v1.13.13", "source": "security-advisories@github.com", "tags": ["Release Notes"]}, {"url": "https://github.com/cilium/cilium/releases/tag/v1.14.8", "source": "security-advisories@github.com", "tags": ["Release Notes"]}, {"url": "https://github.com/cilium/cilium/releases/tag/v1.15.2", "source": "security-advisories@github.com", "tags": ["Release Notes"]}, {"url": "https://github.com/cilium/cilium/security/advisories/GHSA-68mj-9pjq-mc85", "source": "security-advisories@github.com", "tags": ["Vendor Advisory"]}, {"url": "https://docs.cilium.io/en/stable/security/policy/language/#http", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Product"]}, {"url": "https://github.com/cilium/cilium/releases/tag/v1.13.13", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Release Notes"]}, {"url": "https://github.com/cilium/cilium/releases/tag/v1.14.8", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Release Notes"]}, {"url": "https://github.com/cilium/cilium/releases/tag/v1.15.2", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Release Notes"]}, {"url": "https://github.com/cilium/cilium/security/advisories/GHSA-68mj-9pjq-mc85", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-28249.json b/cve/2024/CVE-2024-28249.json index 1701a0f7636..7e2c6eb070a 100644 --- a/cve/2024/CVE-2024-28249.json +++ b/cve/2024/CVE-2024-28249.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-28249", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-18T22:15:08.503", "lastModified": "2024-11-21T09:06:05.707", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Prior to versions 1.13.13, 1.14.8, and 1.15.2, in Cilium clusters with IPsec enabled and traffic matching Layer 7 policies, IPsec-eligible traffic between a node's Envoy proxy and pods on other nodes is sent unencrypted and IPsec-eligible traffic between a node's DNS proxy and pods on other nodes is sent unencrypted. This issue has been resolved in Cilium 1.15.2, 1.14.8, and 1.13.13. There is no known workaround for this issue."}, {"lang": "es", "value": "Cilium es una soluci\u00f3n de redes, observabilidad y seguridad con un plano de datos basado en eBPF. Antes de las versiones 1.13.13, 1.14.8 y 1.15.2, en los cl\u00fasteres de Cilium con IPsec habilitado y el tr\u00e1fico que coincide con las pol\u00edticas de Capa 7, el tr\u00e1fico elegible para IPsec entre el proxy Envoy de un nodo y los pods en otros nodos se env\u00eda sin cifrar y es elegible para IPsec. El tr\u00e1fico entre el proxy DNS de un nodo y los pods de otros nodos se env\u00eda sin cifrar. Este problema se resolvi\u00f3 en Cilium 1.15.2, 1.14.8 y 1.13.13. No se conoce ning\u00fan workaround para este problema."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "baseScore": 6.1, "baseSeverity": "MEDIUM", "attackVector": "ADJACENT_NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE"}, "exploitabilityScore": 1.6, "impactScore": 4.0}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-311"}]}], "references": [{"url": "https://github.com/cilium/cilium/releases/tag/v1.13.13", "source": "security-advisories@github.com"}, {"url": "https://github.com/cilium/cilium/releases/tag/v1.14.8", "source": "security-advisories@github.com"}, {"url": "https://github.com/cilium/cilium/releases/tag/v1.15.2", "source": "security-advisories@github.com"}, {"url": "https://github.com/cilium/cilium/security/advisories/GHSA-j89h-qrvr-xc36", "source": "security-advisories@github.com"}, {"url": "https://github.com/cilium/cilium/releases/tag/v1.13.13", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/cilium/cilium/releases/tag/v1.14.8", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/cilium/cilium/releases/tag/v1.15.2", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/cilium/cilium/security/advisories/GHSA-j89h-qrvr-xc36", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-28249", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-18T22:15:08.503", "lastModified": "2025-01-09T16:46:53.507", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Prior to versions 1.13.13, 1.14.8, and 1.15.2, in Cilium clusters with IPsec enabled and traffic matching Layer 7 policies, IPsec-eligible traffic between a node's Envoy proxy and pods on other nodes is sent unencrypted and IPsec-eligible traffic between a node's DNS proxy and pods on other nodes is sent unencrypted. This issue has been resolved in Cilium 1.15.2, 1.14.8, and 1.13.13. There is no known workaround for this issue."}, {"lang": "es", "value": "Cilium es una soluci\u00f3n de redes, observabilidad y seguridad con un plano de datos basado en eBPF. Antes de las versiones 1.13.13, 1.14.8 y 1.15.2, en los cl\u00fasteres de Cilium con IPsec habilitado y el tr\u00e1fico que coincide con las pol\u00edticas de Capa 7, el tr\u00e1fico elegible para IPsec entre el proxy Envoy de un nodo y los pods en otros nodos se env\u00eda sin cifrar y es elegible para IPsec. El tr\u00e1fico entre el proxy DNS de un nodo y los pods de otros nodos se env\u00eda sin cifrar. Este problema se resolvi\u00f3 en Cilium 1.15.2, 1.14.8 y 1.13.13. No se conoce ning\u00fan workaround para este problema."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "baseScore": 6.1, "baseSeverity": "MEDIUM", "attackVector": "ADJACENT_NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE"}, "exploitabilityScore": 1.6, "impactScore": 4.0}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "baseScore": 6.1, "baseSeverity": "MEDIUM", "attackVector": "ADJACENT_NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE"}, "exploitabilityScore": 1.6, "impactScore": 4.0}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-311"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-319"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:cilium:cilium:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.13.13", "matchCriteriaId": "7ED07032-14A2-48C9-AE92-68A5E05DBA58"}, {"vulnerable": true, "criteria": "cpe:2.3:a:cilium:cilium:*:*:*:*:*:*:*:*", "versionStartIncluding": "1.14.0", "versionEndExcluding": "1.14.8", "matchCriteriaId": "50C01BB2-3804-450F-846D-DE7A23112DF6"}, {"vulnerable": true, "criteria": "cpe:2.3:a:cilium:cilium:*:*:*:*:*:*:*:*", "versionStartIncluding": "1.15.0", "versionEndExcluding": "1.15.2", "matchCriteriaId": "9938037D-85A4-4964-B593-33015AEFC8DB"}]}]}], "references": [{"url": "https://github.com/cilium/cilium/releases/tag/v1.13.13", "source": "security-advisories@github.com", "tags": ["Release Notes"]}, {"url": "https://github.com/cilium/cilium/releases/tag/v1.14.8", "source": "security-advisories@github.com", "tags": ["Release Notes"]}, {"url": "https://github.com/cilium/cilium/releases/tag/v1.15.2", "source": "security-advisories@github.com", "tags": ["Release Notes"]}, {"url": "https://github.com/cilium/cilium/security/advisories/GHSA-j89h-qrvr-xc36", "source": "security-advisories@github.com", "tags": ["Vendor Advisory"]}, {"url": "https://github.com/cilium/cilium/releases/tag/v1.13.13", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Release Notes"]}, {"url": "https://github.com/cilium/cilium/releases/tag/v1.14.8", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Release Notes"]}, {"url": "https://github.com/cilium/cilium/releases/tag/v1.15.2", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Release Notes"]}, {"url": "https://github.com/cilium/cilium/security/advisories/GHSA-j89h-qrvr-xc36", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-28250.json b/cve/2024/CVE-2024-28250.json index dd4b76ba196..2e27df0b4dc 100644 --- a/cve/2024/CVE-2024-28250.json +++ b/cve/2024/CVE-2024-28250.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-28250", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-18T22:15:08.750", "lastModified": "2024-11-21T09:06:05.833", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Starting in version 1.14.0 and prior to versions 1.14.8 and 1.15.2, In Cilium clusters with WireGuard enabled and traffic matching Layer 7 policies Wireguard-eligible traffic that is sent between a node's Envoy proxy and pods on other nodes is sent unencrypted and Wireguard-eligible traffic that is sent between a node's DNS proxy and pods on other nodes is sent unencrypted. This issue has been resolved in Cilium 1.14.8 and 1.15.2 in in native routing mode (`routingMode=native`) and in Cilium 1.14.4 in tunneling mode (`routingMode=tunnel`). Not that in tunneling mode, `encryption.wireguard.encapsulate` must be set to `true`. There is no known workaround for this issue."}, {"lang": "es", "value": "Cilium es una soluci\u00f3n de redes, observabilidad y seguridad con un plano de datos basado en eBPF. A partir de la versi\u00f3n 1.14.0 y anteriores a las versiones 1.14.8 y 1.15.2, en los cl\u00fasteres de Cilium con WireGuard habilitado y el tr\u00e1fico que coincide con las pol\u00edticas de Capa 7, el tr\u00e1fico elegible para Wireguard que se env\u00eda entre el proxy Envoy de un nodo y los pods de otros nodos se env\u00eda sin cifrar. y el tr\u00e1fico elegible para Wireguard que se env\u00eda entre el proxy DNS de un nodo y los pods de otros nodos se env\u00eda sin cifrar. Este problema se resolvi\u00f3 en Cilium 1.14.8 y 1.15.2 en modo de enrutamiento nativo (`routingMode=native`) y en Cilium 1.14.4 en modo de t\u00fanel (`routingMode=tunnel`). No es que en modo t\u00fanel, `encryption.wireguard.encapsulate` deba establecerse en `true`. No se conoce ning\u00fan workaround para este problema."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "baseScore": 6.1, "baseSeverity": "MEDIUM", "attackVector": "ADJACENT_NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE"}, "exploitabilityScore": 1.6, "impactScore": 4.0}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-311"}]}], "references": [{"url": "https://github.com/cilium/cilium/releases/tag/v1.13.13", "source": "security-advisories@github.com"}, {"url": "https://github.com/cilium/cilium/releases/tag/v1.14.8", "source": "security-advisories@github.com"}, {"url": "https://github.com/cilium/cilium/releases/tag/v1.15.2", "source": "security-advisories@github.com"}, {"url": "https://github.com/cilium/cilium/security/advisories/GHSA-v6q2-4qr3-5cw6", "source": "security-advisories@github.com"}, {"url": "https://github.com/cilium/cilium/releases/tag/v1.13.13", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/cilium/cilium/releases/tag/v1.14.8", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/cilium/cilium/releases/tag/v1.15.2", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/cilium/cilium/security/advisories/GHSA-v6q2-4qr3-5cw6", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-28250", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-18T22:15:08.750", "lastModified": "2025-01-09T16:47:40.047", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Starting in version 1.14.0 and prior to versions 1.14.8 and 1.15.2, In Cilium clusters with WireGuard enabled and traffic matching Layer 7 policies Wireguard-eligible traffic that is sent between a node's Envoy proxy and pods on other nodes is sent unencrypted and Wireguard-eligible traffic that is sent between a node's DNS proxy and pods on other nodes is sent unencrypted. This issue has been resolved in Cilium 1.14.8 and 1.15.2 in in native routing mode (`routingMode=native`) and in Cilium 1.14.4 in tunneling mode (`routingMode=tunnel`). Not that in tunneling mode, `encryption.wireguard.encapsulate` must be set to `true`. There is no known workaround for this issue."}, {"lang": "es", "value": "Cilium es una soluci\u00f3n de redes, observabilidad y seguridad con un plano de datos basado en eBPF. A partir de la versi\u00f3n 1.14.0 y anteriores a las versiones 1.14.8 y 1.15.2, en los cl\u00fasteres de Cilium con WireGuard habilitado y el tr\u00e1fico que coincide con las pol\u00edticas de Capa 7, el tr\u00e1fico elegible para Wireguard que se env\u00eda entre el proxy Envoy de un nodo y los pods de otros nodos se env\u00eda sin cifrar. y el tr\u00e1fico elegible para Wireguard que se env\u00eda entre el proxy DNS de un nodo y los pods de otros nodos se env\u00eda sin cifrar. Este problema se resolvi\u00f3 en Cilium 1.14.8 y 1.15.2 en modo de enrutamiento nativo (`routingMode=native`) y en Cilium 1.14.4 en modo de t\u00fanel (`routingMode=tunnel`). No es que en modo t\u00fanel, `encryption.wireguard.encapsulate` deba establecerse en `true`. No se conoce ning\u00fan workaround para este problema."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "baseScore": 6.1, "baseSeverity": "MEDIUM", "attackVector": "ADJACENT_NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE"}, "exploitabilityScore": 1.6, "impactScore": 4.0}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "baseScore": 6.1, "baseSeverity": "MEDIUM", "attackVector": "ADJACENT_NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE"}, "exploitabilityScore": 1.6, "impactScore": 4.0}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-311"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-319"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:cilium:cilium:*:*:*:*:*:*:*:*", "versionStartIncluding": "1.14.0", "versionEndExcluding": "1.14.8", "matchCriteriaId": "50C01BB2-3804-450F-846D-DE7A23112DF6"}, {"vulnerable": true, "criteria": "cpe:2.3:a:cilium:cilium:*:*:*:*:*:*:*:*", "versionStartIncluding": "1.15.0", "versionEndExcluding": "1.15.2", "matchCriteriaId": "9938037D-85A4-4964-B593-33015AEFC8DB"}]}]}], "references": [{"url": "https://github.com/cilium/cilium/releases/tag/v1.13.13", "source": "security-advisories@github.com", "tags": ["Release Notes"]}, {"url": "https://github.com/cilium/cilium/releases/tag/v1.14.8", "source": "security-advisories@github.com", "tags": ["Release Notes"]}, {"url": "https://github.com/cilium/cilium/releases/tag/v1.15.2", "source": "security-advisories@github.com", "tags": ["Release Notes"]}, {"url": "https://github.com/cilium/cilium/security/advisories/GHSA-v6q2-4qr3-5cw6", "source": "security-advisories@github.com", "tags": ["Vendor Advisory"]}, {"url": "https://github.com/cilium/cilium/releases/tag/v1.13.13", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Release Notes"]}, {"url": "https://github.com/cilium/cilium/releases/tag/v1.14.8", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Release Notes"]}, {"url": "https://github.com/cilium/cilium/releases/tag/v1.15.2", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Release Notes"]}, {"url": "https://github.com/cilium/cilium/security/advisories/GHSA-v6q2-4qr3-5cw6", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-29020.json b/cve/2024/CVE-2024-29020.json index cc7fada3b58..3cd31bbc7dc 100644 --- a/cve/2024/CVE-2024-29020.json +++ b/cve/2024/CVE-2024-29020.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-29020", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-29T15:15:11.437", "lastModified": "2024-11-21T09:07:23.237", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "JumpServer is an open source bastion host and an operation and maintenance security audit system. An authorized attacker can obtain sensitive information contained within playbook files if they manage to learn the playbook_id of another user. This breach of confidentiality can lead to information disclosure and exposing sensitive data. This vulnerability is fixed in v3.10.6."}, {"lang": "es", "value": "JumpServer es un host basti\u00f3n de c\u00f3digo abierto y un sistema de auditor\u00eda de seguridad de operaci\u00f3n y mantenimiento. Un atacante autorizado puede obtener informaci\u00f3n confidencial contenida en los archivos del libro de jugadas si logra conocer el ID del libro de jugadas de otro usuario. Esta violaci\u00f3n de la confidencialidad puede llevar a la divulgaci\u00f3n de informaci\u00f3n y a la exposici\u00f3n de datos confidenciales. Esta vulnerabilidad se solucion\u00f3 en v3.10.6."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L", "baseScore": 4.6, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 1.2, "impactScore": 3.4}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-639"}]}], "references": [{"url": "https://github.com/jumpserver/jumpserver/security/advisories/GHSA-7mqc-23hr-cr62", "source": "security-advisories@github.com"}, {"url": "https://github.com/jumpserver/jumpserver/security/advisories/GHSA-7mqc-23hr-cr62", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-29020", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-29T15:15:11.437", "lastModified": "2025-01-09T17:20:18.197", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "JumpServer is an open source bastion host and an operation and maintenance security audit system. An authorized attacker can obtain sensitive information contained within playbook files if they manage to learn the playbook_id of another user. This breach of confidentiality can lead to information disclosure and exposing sensitive data. This vulnerability is fixed in v3.10.6."}, {"lang": "es", "value": "JumpServer es un host basti\u00f3n de c\u00f3digo abierto y un sistema de auditor\u00eda de seguridad de operaci\u00f3n y mantenimiento. Un atacante autorizado puede obtener informaci\u00f3n confidencial contenida en los archivos del libro de jugadas si logra conocer el ID del libro de jugadas de otro usuario. Esta violaci\u00f3n de la confidencialidad puede llevar a la divulgaci\u00f3n de informaci\u00f3n y a la exposici\u00f3n de datos confidenciales. Esta vulnerabilidad se solucion\u00f3 en v3.10.6."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L", "baseScore": 4.6, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 1.2, "impactScore": 3.4}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "baseScore": 5.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE"}, "exploitabilityScore": 1.6, "impactScore": 3.6}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-639"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-639"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.0.0", "versionEndExcluding": "3.10.6", "matchCriteriaId": "07104EF2-D3BA-4E56-95DB-23114EF726F7"}]}]}], "references": [{"url": "https://github.com/jumpserver/jumpserver/security/advisories/GHSA-7mqc-23hr-cr62", "source": "security-advisories@github.com", "tags": ["Vendor Advisory"]}, {"url": "https://github.com/jumpserver/jumpserver/security/advisories/GHSA-7mqc-23hr-cr62", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-29024.json b/cve/2024/CVE-2024-29024.json index 0bb2a8d981b..29f41977142 100644 --- a/cve/2024/CVE-2024-29024.json +++ b/cve/2024/CVE-2024-29024.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-29024", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-29T15:15:11.707", "lastModified": "2024-11-21T09:07:23.763", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "JumpServer is an open source bastion host and an operation and maintenance security audit system.\nAn authenticated user can exploit the Insecure Direct Object Reference (IDOR) vulnerability in the file manager's bulk transfer by manipulating job IDs to upload malicious files, potentially compromising the integrity and security of the system. This vulnerability is fixed in v3.10.6."}, {"lang": "es", "value": "JumpServer es un host basti\u00f3n de c\u00f3digo abierto y un sistema de auditor\u00eda de seguridad de operaci\u00f3n y mantenimiento. Un usuario autenticado puede aprovechar la vulnerabilidad de referencia directa de objetos inseguros (IDOR) en la transferencia masiva del administrador de archivos manipulando los ID de los trabajos para cargar archivos maliciosos, comprometiendo potencialmente la integridad y seguridad del sistema. Esta vulnerabilidad se solucion\u00f3 en v3.10.6."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L", "baseScore": 4.6, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 1.2, "impactScore": 3.4}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-639"}]}], "references": [{"url": "https://github.com/jumpserver/jumpserver/security/advisories/GHSA-8wqm-rfc7-q27q", "source": "security-advisories@github.com"}, {"url": "https://github.com/jumpserver/jumpserver/security/advisories/GHSA-8wqm-rfc7-q27q", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-29024", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-29T15:15:11.707", "lastModified": "2025-01-09T17:32:54.613", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "JumpServer is an open source bastion host and an operation and maintenance security audit system.\nAn authenticated user can exploit the Insecure Direct Object Reference (IDOR) vulnerability in the file manager's bulk transfer by manipulating job IDs to upload malicious files, potentially compromising the integrity and security of the system. This vulnerability is fixed in v3.10.6."}, {"lang": "es", "value": "JumpServer es un host basti\u00f3n de c\u00f3digo abierto y un sistema de auditor\u00eda de seguridad de operaci\u00f3n y mantenimiento. Un usuario autenticado puede aprovechar la vulnerabilidad de referencia directa de objetos inseguros (IDOR) en la transferencia masiva del administrador de archivos manipulando los ID de los trabajos para cargar archivos maliciosos, comprometiendo potencialmente la integridad y seguridad del sistema. Esta vulnerabilidad se solucion\u00f3 en v3.10.6."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L", "baseScore": 4.6, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 1.2, "impactScore": 3.4}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N", "baseScore": 5.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "availabilityImpact": "NONE"}, "exploitabilityScore": 1.6, "impactScore": 3.6}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-639"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-639"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.0.0", "versionEndExcluding": "3.10.6", "matchCriteriaId": "07104EF2-D3BA-4E56-95DB-23114EF726F7"}]}]}], "references": [{"url": "https://github.com/jumpserver/jumpserver/security/advisories/GHSA-8wqm-rfc7-q27q", "source": "security-advisories@github.com", "tags": ["Vendor Advisory"]}, {"url": "https://github.com/jumpserver/jumpserver/security/advisories/GHSA-8wqm-rfc7-q27q", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-29179.json b/cve/2024/CVE-2024-29179.json index 3635d806fe3..9c7203b0901 100644 --- a/cve/2024/CVE-2024-29179.json +++ b/cve/2024/CVE-2024-29179.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-29179", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-25T21:15:47.050", "lastModified": "2024-11-21T09:07:44.327", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. An attacker with admin privileges can upload an attachment containing JS code without extension and the application will render it as HTML which allows for XSS attacks."}, {"lang": "es", "value": "phpMyFAQ es una aplicaci\u00f3n web de preguntas frecuentes de c\u00f3digo abierto para PHP 8.1+ y MySQL, PostgreSQL y otras bases de datos. Un atacante con privilegios de administrador puede cargar un archivo adjunto que contenga c\u00f3digo JS sin extensi\u00f3n y la aplicaci\u00f3n lo representar\u00e1 como HTML, lo que permite ataques XSS."}], "metrics": {"cvssMetricV30": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", "baseScore": 4.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 0.9, "impactScore": 3.4}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-hm8r-95g3-5hj9", "source": "security-advisories@github.com"}, {"url": "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-hm8r-95g3-5hj9", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-29179", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-25T21:15:47.050", "lastModified": "2025-01-09T16:59:41.167", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. An attacker with admin privileges can upload an attachment containing JS code without extension and the application will render it as HTML which allows for XSS attacks."}, {"lang": "es", "value": "phpMyFAQ es una aplicaci\u00f3n web de preguntas frecuentes de c\u00f3digo abierto para PHP 8.1+ y MySQL, PostgreSQL y otras bases de datos. Un atacante con privilegios de administrador puede cargar un archivo adjunto que contenga c\u00f3digo JS sin extensi\u00f3n y la aplicaci\u00f3n lo representar\u00e1 como HTML, lo que permite ataques XSS."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "baseScore": 4.8, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 1.7, "impactScore": 2.7}], "cvssMetricV30": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", "baseScore": 4.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 0.9, "impactScore": 3.4}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-79"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:3.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "99BD7923-9316-46E2-B3C4-33105AD9E901"}]}]}], "references": [{"url": "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-hm8r-95g3-5hj9", "source": "security-advisories@github.com", "tags": ["Exploit", "Vendor Advisory"]}, {"url": "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-hm8r-95g3-5hj9", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-29196.json b/cve/2024/CVE-2024-29196.json index d6c8a3c6a68..8930f683ed2 100644 --- a/cve/2024/CVE-2024-29196.json +++ b/cve/2024/CVE-2024-29196.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-29196", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-26T03:15:13.517", "lastModified": "2024-11-21T09:07:46.660", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. There is a Path Traversal vulnerability in Attachments that allows attackers with admin rights to upload malicious files to other locations of the web root. This vulnerability is fixed in 3.2.6."}, {"lang": "es", "value": "phpMyFAQ es una aplicaci\u00f3n web de preguntas frecuentes de c\u00f3digo abierto para PHP 8.1+ y MySQL, PostgreSQL y otras bases de datos. Existe una vulnerabilidad de Path Traversal en los archivos adjuntos que permite a los atacantes con derechos de administrador cargar archivos maliciosos en otras ubicaciones de la ra\u00edz web. Esta vulnerabilidad se soluciona en 3.2.6."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N", "baseScore": 3.8, "baseSeverity": "LOW", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 1.2, "impactScore": 2.5}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-22"}]}], "references": [{"url": "https://github.com/thorsten/phpMyFAQ/commit/7ae2559f079cd5fc9948b6fdfb87581f93840f62", "source": "security-advisories@github.com"}, {"url": "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-mmh6-5cpf-2c72", "source": "security-advisories@github.com"}, {"url": "https://github.com/thorsten/phpMyFAQ/commit/7ae2559f079cd5fc9948b6fdfb87581f93840f62", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-mmh6-5cpf-2c72", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-29196", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-26T03:15:13.517", "lastModified": "2025-01-09T16:58:38.057", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. There is a Path Traversal vulnerability in Attachments that allows attackers with admin rights to upload malicious files to other locations of the web root. This vulnerability is fixed in 3.2.6."}, {"lang": "es", "value": "phpMyFAQ es una aplicaci\u00f3n web de preguntas frecuentes de c\u00f3digo abierto para PHP 8.1+ y MySQL, PostgreSQL y otras bases de datos. Existe una vulnerabilidad de Path Traversal en los archivos adjuntos que permite a los atacantes con derechos de administrador cargar archivos maliciosos en otras ubicaciones de la ra\u00edz web. Esta vulnerabilidad se soluciona en 3.2.6."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N", "baseScore": 3.8, "baseSeverity": "LOW", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 1.2, "impactScore": 2.5}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N", "baseScore": 2.7, "baseSeverity": "LOW", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 1.2, "impactScore": 1.4}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-22"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-22"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:3.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "99BD7923-9316-46E2-B3C4-33105AD9E901"}]}]}], "references": [{"url": "https://github.com/thorsten/phpMyFAQ/commit/7ae2559f079cd5fc9948b6fdfb87581f93840f62", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-mmh6-5cpf-2c72", "source": "security-advisories@github.com", "tags": ["Exploit", "Vendor Advisory"]}, {"url": "https://github.com/thorsten/phpMyFAQ/commit/7ae2559f079cd5fc9948b6fdfb87581f93840f62", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-mmh6-5cpf-2c72", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-29201.json b/cve/2024/CVE-2024-29201.json index 958fbf9e979..2ddb49bb021 100644 --- a/cve/2024/CVE-2024-29201.json +++ b/cve/2024/CVE-2024-29201.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-29201", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-29T15:15:11.963", "lastModified": "2024-11-21T09:07:47.373", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "JumpServer is an open source bastion host and an operation and maintenance security audit system. Attackers can bypass the input validation mechanism in JumpServer's Ansible to execute arbitrary code within the Celery container. Since the Celery container runs with root privileges and has database access, attackers could steal sensitive information from all hosts or manipulate the database. This vulnerability is fixed in v3.10.7."}, {"lang": "es", "value": "JumpServer es un host basti\u00f3n de c\u00f3digo abierto y un sistema de auditor\u00eda de seguridad de operaci\u00f3n y mantenimiento. Los atacantes pueden eludir el mecanismo de validaci\u00f3n de entrada en Ansible de JumpServer para ejecutar c\u00f3digo arbitrario dentro del contenedor Celery. Dado que el contenedor Celery se ejecuta con privilegios de root y tiene acceso a la base de datos, los atacantes podr\u00edan robar informaci\u00f3n confidencial de todos los hosts o manipular la base de datos. Esta vulnerabilidad se solucion\u00f3 en v3.10.7."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "baseScore": 9.9, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.1, "impactScore": 6.0}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-94"}]}], "references": [{"url": "https://github.com/jumpserver/jumpserver/security/advisories/GHSA-pjpp-cm9x-6rwj", "source": "security-advisories@github.com"}, {"url": "https://github.com/jumpserver/jumpserver/security/advisories/GHSA-pjpp-cm9x-6rwj", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-29201", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-29T15:15:11.963", "lastModified": "2025-01-09T17:27:57.507", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "JumpServer is an open source bastion host and an operation and maintenance security audit system. Attackers can bypass the input validation mechanism in JumpServer's Ansible to execute arbitrary code within the Celery container. Since the Celery container runs with root privileges and has database access, attackers could steal sensitive information from all hosts or manipulate the database. This vulnerability is fixed in v3.10.7."}, {"lang": "es", "value": "JumpServer es un host basti\u00f3n de c\u00f3digo abierto y un sistema de auditor\u00eda de seguridad de operaci\u00f3n y mantenimiento. Los atacantes pueden eludir el mecanismo de validaci\u00f3n de entrada en Ansible de JumpServer para ejecutar c\u00f3digo arbitrario dentro del contenedor Celery. Dado que el contenedor Celery se ejecuta con privilegios de root y tiene acceso a la base de datos, los atacantes podr\u00edan robar informaci\u00f3n confidencial de todos los hosts o manipular la base de datos. Esta vulnerabilidad se solucion\u00f3 en v3.10.7."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "baseScore": 9.9, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.1, "impactScore": 6.0}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "baseScore": 9.9, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.1, "impactScore": 6.0}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-94"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-94"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.0.0", "versionEndExcluding": "3.10.7", "matchCriteriaId": "5D9BDDB1-9645-419E-A682-7693BC8A7141"}]}]}], "references": [{"url": "https://github.com/jumpserver/jumpserver/security/advisories/GHSA-pjpp-cm9x-6rwj", "source": "security-advisories@github.com", "tags": ["Exploit", "Vendor Advisory"]}, {"url": "https://github.com/jumpserver/jumpserver/security/advisories/GHSA-pjpp-cm9x-6rwj", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-29202.json b/cve/2024/CVE-2024-29202.json index 344666ad7c2..f5c2a709ba8 100644 --- a/cve/2024/CVE-2024-29202.json +++ b/cve/2024/CVE-2024-29202.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-29202", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-29T15:15:12.223", "lastModified": "2024-11-21T09:07:48.547", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "JumpServer is an open source bastion host and an operation and maintenance security audit system. Attackers can exploit a Jinja2 template injection vulnerability in JumpServer's Ansible to execute arbitrary code within the Celery container. Since the Celery container runs with root privileges and has database access, attackers could steal sensitive information from all hosts or manipulate the database. This vulnerability is fixed in v3.10.7.\n\n"}, {"lang": "es", "value": "JumpServer es un host basti\u00f3n de c\u00f3digo abierto y un sistema de auditor\u00eda de seguridad de operaci\u00f3n y mantenimiento. Los atacantes pueden aprovechar una vulnerabilidad de inyecci\u00f3n de plantilla Jinja2 en Ansible de JumpServer para ejecutar c\u00f3digo arbitrario dentro del contenedor Celery. Dado que el contenedor Celery se ejecuta con privilegios de root y tiene acceso a la base de datos, los atacantes podr\u00edan robar informaci\u00f3n confidencial de todos los hosts o manipular la base de datos. Esta vulnerabilidad se solucion\u00f3 en v3.10.7."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "baseScore": 9.9, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.1, "impactScore": 6.0}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-94"}]}], "references": [{"url": "https://github.com/jumpserver/jumpserver/security/advisories/GHSA-2vvr-vmvx-73ch", "source": "security-advisories@github.com"}, {"url": "https://github.com/jumpserver/jumpserver/security/advisories/GHSA-2vvr-vmvx-73ch", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-29202", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-29T15:15:12.223", "lastModified": "2025-01-09T17:25:13.830", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "JumpServer is an open source bastion host and an operation and maintenance security audit system. Attackers can exploit a Jinja2 template injection vulnerability in JumpServer's Ansible to execute arbitrary code within the Celery container. Since the Celery container runs with root privileges and has database access, attackers could steal sensitive information from all hosts or manipulate the database. This vulnerability is fixed in v3.10.7.\n\n"}, {"lang": "es", "value": "JumpServer es un host basti\u00f3n de c\u00f3digo abierto y un sistema de auditor\u00eda de seguridad de operaci\u00f3n y mantenimiento. Los atacantes pueden aprovechar una vulnerabilidad de inyecci\u00f3n de plantilla Jinja2 en Ansible de JumpServer para ejecutar c\u00f3digo arbitrario dentro del contenedor Celery. Dado que el contenedor Celery se ejecuta con privilegios de root y tiene acceso a la base de datos, los atacantes podr\u00edan robar informaci\u00f3n confidencial de todos los hosts o manipular la base de datos. Esta vulnerabilidad se solucion\u00f3 en v3.10.7."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "baseScore": 9.9, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.1, "impactScore": 6.0}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "baseScore": 9.9, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.1, "impactScore": 6.0}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-94"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-94"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.0.0", "versionEndExcluding": "3.10.7", "matchCriteriaId": "5D9BDDB1-9645-419E-A682-7693BC8A7141"}]}]}], "references": [{"url": "https://github.com/jumpserver/jumpserver/security/advisories/GHSA-2vvr-vmvx-73ch", "source": "security-advisories@github.com", "tags": ["Exploit", "Vendor Advisory"]}, {"url": "https://github.com/jumpserver/jumpserver/security/advisories/GHSA-2vvr-vmvx-73ch", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-30262.json b/cve/2024/CVE-2024-30262.json index ab65724b05d..d34efc8ceeb 100644 --- a/cve/2024/CVE-2024-30262.json +++ b/cve/2024/CVE-2024-30262.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-30262", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-09T17:16:02.850", "lastModified": "2024-11-21T09:11:34.673", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Contao is an open source content management system. Prior to version 4.13.40, when a frontend member changes their password in the personal data or the password lost module, the corresponding remember-me tokens are not removed. If someone compromises an account and is able to get a remember-me token, changing the password would not be enough to reclaim control over the account. Version 4.13.40 contains a fix for the issue. As a workaround, disable \"Allow auto login\" in the login module.\n"}, {"lang": "es", "value": "Contao es un sistema de gesti\u00f3n de contenidos de c\u00f3digo abierto. Antes de la versi\u00f3n 4.13.40, cuando un miembro del frontend cambia su contrase\u00f1a en los datos personales o en el m\u00f3dulo de contrase\u00f1a perdida, los tokens de recordarme correspondientes no se eliminan. Si alguien compromete una cuenta y puede obtener un token de recuerdo, cambiar la contrase\u00f1a no ser\u00eda suficiente para recuperar el control de la cuenta. La versi\u00f3n 4.13.40 contiene una soluci\u00f3n para el problema. Como workaround, deshabilite \"Permitir inicio de sesi\u00f3n autom\u00e1tico\" en el m\u00f3dulo de inicio de sesi\u00f3n."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N", "baseScore": 5.9, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 1.6, "impactScore": 4.2}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-384"}, {"lang": "en", "value": "CWE-613"}]}], "references": [{"url": "https://github.com/contao/contao/commit/3032baa456f607169ffae82a8920354adb338fe9", "source": "security-advisories@github.com"}, {"url": "https://github.com/contao/contao/security/advisories/GHSA-r4r6-j2j3-7pp5", "source": "security-advisories@github.com"}, {"url": "https://github.com/contao/contao/commit/3032baa456f607169ffae82a8920354adb338fe9", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/contao/contao/security/advisories/GHSA-r4r6-j2j3-7pp5", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-30262", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-09T17:16:02.850", "lastModified": "2025-01-09T17:51:27.337", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Contao is an open source content management system. Prior to version 4.13.40, when a frontend member changes their password in the personal data or the password lost module, the corresponding remember-me tokens are not removed. If someone compromises an account and is able to get a remember-me token, changing the password would not be enough to reclaim control over the account. Version 4.13.40 contains a fix for the issue. As a workaround, disable \"Allow auto login\" in the login module.\n"}, {"lang": "es", "value": "Contao es un sistema de gesti\u00f3n de contenidos de c\u00f3digo abierto. Antes de la versi\u00f3n 4.13.40, cuando un miembro del frontend cambia su contrase\u00f1a en los datos personales o en el m\u00f3dulo de contrase\u00f1a perdida, los tokens de recordarme correspondientes no se eliminan. Si alguien compromete una cuenta y puede obtener un token de recuerdo, cambiar la contrase\u00f1a no ser\u00eda suficiente para recuperar el control de la cuenta. La versi\u00f3n 4.13.40 contiene una soluci\u00f3n para el problema. Como workaround, deshabilite \"Permitir inicio de sesi\u00f3n autom\u00e1tico\" en el m\u00f3dulo de inicio de sesi\u00f3n."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N", "baseScore": 5.9, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 1.6, "impactScore": 4.2}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "baseScore": 7.1, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 4.2}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-384"}, {"lang": "en", "value": "CWE-613"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-613"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "versionEndExcluding": "4.13.40", "matchCriteriaId": "481B6B86-03CA-4612-99A8-18381D0E16F2"}]}]}], "references": [{"url": "https://github.com/contao/contao/commit/3032baa456f607169ffae82a8920354adb338fe9", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/contao/contao/security/advisories/GHSA-r4r6-j2j3-7pp5", "source": "security-advisories@github.com", "tags": ["Vendor Advisory"]}, {"url": "https://github.com/contao/contao/commit/3032baa456f607169ffae82a8920354adb338fe9", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/contao/contao/security/advisories/GHSA-r4r6-j2j3-7pp5", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-30376.json b/cve/2024/CVE-2024-30376.json index bd72d996c99..ea1351253fa 100644 --- a/cve/2024/CVE-2024-30376.json +++ b/cve/2024/CVE-2024-30376.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-30376", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-11-22T20:15:08.667", "lastModified": "2024-11-22T20:15:08.667", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Famatech Advanced IP Scanner Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Famatech Advanced IP Scanner. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the application's use of Qt. The application loads Qt plugins from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of an administrator. Was ZDI-CAN-20768."}, {"lang": "es", "value": "Vulnerabilidad de escalada de privilegios locales en el elemento de ruta de b\u00fasqueda no controlada de Famatech Advanced IP Scanner. Esta vulnerabilidad permite a los atacantes locales escalar privilegios en las instalaciones afectadas de Famatech Advanced IP Scanner. Un atacante primero debe obtener la capacidad de ejecutar c\u00f3digo con pocos privilegios en el sistema de destino para explotar esta vulnerabilidad. La falla espec\u00edfica existe dentro del uso de Qt por parte de la aplicaci\u00f3n. La aplicaci\u00f3n carga complementos de Qt desde una ubicaci\u00f3n no segura. Un atacante puede aprovechar esta vulnerabilidad para escalar privilegios y ejecutar c\u00f3digo arbitrario en el contexto de un administrador. Era ZDI-CAN-20768."}], "metrics": {"cvssMetricV30": [{"source": "zdi-disclosures@trendmicro.com", "type": "Secondary", "cvssData": {"version": "3.0", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "baseScore": 7.3, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.3, "impactScore": 5.9}]}, "weaknesses": [{"source": "zdi-disclosures@trendmicro.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-427"}]}], "references": [{"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-670/", "source": "zdi-disclosures@trendmicro.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-30376", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-11-22T20:15:08.667", "lastModified": "2025-01-09T16:08:38.383", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Famatech Advanced IP Scanner Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Famatech Advanced IP Scanner. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the application's use of Qt. The application loads Qt plugins from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of an administrator. Was ZDI-CAN-20768."}, {"lang": "es", "value": "Vulnerabilidad de escalada de privilegios locales en el elemento de ruta de b\u00fasqueda no controlada de Famatech Advanced IP Scanner. Esta vulnerabilidad permite a los atacantes locales escalar privilegios en las instalaciones afectadas de Famatech Advanced IP Scanner. Un atacante primero debe obtener la capacidad de ejecutar c\u00f3digo con pocos privilegios en el sistema de destino para explotar esta vulnerabilidad. La falla espec\u00edfica existe dentro del uso de Qt por parte de la aplicaci\u00f3n. La aplicaci\u00f3n carga complementos de Qt desde una ubicaci\u00f3n no segura. Un atacante puede aprovechar esta vulnerabilidad para escalar privilegios y ejecutar c\u00f3digo arbitrario en el contexto de un administrador. Era ZDI-CAN-20768."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "baseScore": 7.3, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.3, "impactScore": 5.9}], "cvssMetricV30": [{"source": "zdi-disclosures@trendmicro.com", "type": "Secondary", "cvssData": {"version": "3.0", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "baseScore": 7.3, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.3, "impactScore": 5.9}]}, "weaknesses": [{"source": "zdi-disclosures@trendmicro.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-427"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:radmin:advanced_ip_scanner:2.5.4594.1:*:*:*:*:*:*:*", "matchCriteriaId": "F623A44A-5585-4774-B14D-F6607A9F1F59"}]}]}], "references": [{"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-670/", "source": "zdi-disclosures@trendmicro.com", "tags": ["Third Party Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-30962.json b/cve/2024/CVE-2024-30962.json index bd1ac13c659..a2bae4f1c8c 100644 --- a/cve/2024/CVE-2024-30962.json +++ b/cve/2024/CVE-2024-30962.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-30962", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-05T23:15:05.147", "lastModified": "2024-12-18T17:44:24.507", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Buffer Overflow vulnerability in Open Robotics Robotic Operating System 2 (ROS2) navigation2- ROS2-humble and navigation 2-humble allows a local attacker to execute arbitrary code via the nav2_amcl process"}, {"lang": "es", "value": "La vulnerabilidad de desbordamiento de b\u00fafer en Open Robotics Robotic Operating System 2 (ROS2) navigation2- ROS2-humble y navigation 2-humble permite que un atacante local ejecute c\u00f3digo arbitrario a trav\u00e9s del proceso nav2_amcl"}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.8, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-120"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*", "matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361"}, {"vulnerable": true, "criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:iron:*:*:*:*:*:*", "matchCriteriaId": "D710838C-3A7E-4BFA-BD6D-02C38627BB7E"}]}]}], "references": [{"url": "https://github.com/GoesM/ROS-CVE-CNVDs", "source": "cve@mitre.org", "tags": ["Third Party Advisory"]}, {"url": "https://github.com/ros-planning/navigation2/issues/4177", "source": "cve@mitre.org", "tags": ["Exploit", "Issue Tracking"]}, {"url": "https://github.com/ros-planning/navigation2/pull/4206", "source": "cve@mitre.org", "tags": ["Third Party Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-30962", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-05T23:15:05.147", "lastModified": "2025-01-09T17:15:12.600", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "Buffer Overflow vulnerability in Open Robotics Robotic Operating System 2 (ROS2) navigation2- ROS2-humble and navigation 2-humble allows a local attacker to execute arbitrary code via the nav2_amcl process"}, {"lang": "es", "value": "La vulnerabilidad de desbordamiento de b\u00fafer en Open Robotics Robotic Operating System 2 (ROS2) navigation2- ROS2-humble y navigation 2-humble permite que un atacante local ejecute c\u00f3digo arbitrario a trav\u00e9s del proceso nav2_amcl"}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.8, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.8, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-120"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-94"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*", "matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361"}, {"vulnerable": true, "criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:iron:*:*:*:*:*:*", "matchCriteriaId": "D710838C-3A7E-4BFA-BD6D-02C38627BB7E"}]}]}], "references": [{"url": "https://github.com/GoesM/ROS-CVE-CNVDs", "source": "cve@mitre.org", "tags": ["Third Party Advisory"]}, {"url": "https://github.com/ros-planning/navigation2/issues/4177", "source": "cve@mitre.org", "tags": ["Exploit", "Issue Tracking"]}, {"url": "https://github.com/ros-planning/navigation2/pull/4206", "source": "cve@mitre.org", "tags": ["Third Party Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-31214.json b/cve/2024/CVE-2024-31214.json index 4941e7e9390..1dece828f6b 100644 --- a/cve/2024/CVE-2024-31214.json +++ b/cve/2024/CVE-2024-31214.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-31214", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-10T18:15:07.350", "lastModified": "2024-11-21T09:13:03.403", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Traccar is an open source GPS tracking system. Traccar versions 5.1 through 5.12 allow arbitrary files to be uploaded through the device image upload API. Attackers have full control over the file contents, full control over the directory where the file is stored, full control over the file extension, and partial control over the file name. While it's not for an attacker to overwrite an existing file, an attacker can create new files with certain names and attacker-controlled extensions anywhere on the file system. This can potentially lead to remote code execution, XSS, DOS, etc. The default install of Traccar makes this vulnerability more severe. Self-registration is enabled by default, allowing anyone to create an account to exploit this vulnerability. Traccar also runs by default with root/system privileges, allowing files to be placed anywhere on the file system. Version 6.0 contains a fix for the issue. One may also turn off self-registration by default, as that would make most vulnerabilities in the application much harder to exploit by default and reduce the severity considerably.\n"}, {"lang": "es", "value": "Traccar es un sistema de rastreo GPS de c\u00f3digo abierto. Las versiones 5.1 a 5.12 de Traccar permiten cargar archivos arbitrarios a trav\u00e9s de la API de carga de im\u00e1genes del dispositivo. Los atacantes tienen control total sobre el contenido del archivo, control total sobre el directorio donde se almacena el archivo, control total sobre la extensi\u00f3n del archivo y control parcial sobre el nombre del archivo. Si bien no le corresponde a un atacante sobrescribir un archivo existente, un atacante puede crear nuevos archivos con ciertos nombres y extensiones controladas por el atacante en cualquier parte del sistema de archivos. Esto puede conducir potencialmente a la ejecuci\u00f3n remota de c\u00f3digo, XSS, DOS, etc. La instalaci\u00f3n predeterminada de Traccar hace que esta vulnerabilidad sea m\u00e1s grave. El autorregistro est\u00e1 habilitado de forma predeterminada, lo que permite que cualquiera cree una cuenta para explotar esta vulnerabilidad. Traccar tambi\u00e9n se ejecuta de forma predeterminada con privilegios de root/sistema, lo que permite colocar archivos en cualquier parte del sistema de archivos. La versi\u00f3n 6.0 contiene una soluci\u00f3n para el problema. Tambi\u00e9n se puede desactivar el autorregistro de forma predeterminada, ya que eso har\u00eda que la mayor\u00eda de las vulnerabilidades de la aplicaci\u00f3n sean mucho m\u00e1s dif\u00edciles de explotar de forma predeterminada y reducir\u00eda considerablemente la gravedad."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "baseScore": 9.6, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 6.0}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-434"}]}], "references": [{"url": "https://github.com/traccar/traccar/blob/master/src/main/java/org/traccar/model/Device.java#L56", "source": "security-advisories@github.com"}, {"url": "https://github.com/traccar/traccar/blob/v5.12/src/main/java/org/traccar/api/resource/DeviceResource.java#L191", "source": "security-advisories@github.com"}, {"url": "https://github.com/traccar/traccar/commit/3fbdcd81566bc72e319ec05c77cf8a4120b87b8f", "source": "security-advisories@github.com"}, {"url": "https://github.com/traccar/traccar/security/advisories/GHSA-3gxq-f2qj-c8v9", "source": "security-advisories@github.com"}, {"url": "https://github.com/traccar/traccar/blob/master/src/main/java/org/traccar/model/Device.java#L56", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/traccar/traccar/blob/v5.12/src/main/java/org/traccar/api/resource/DeviceResource.java#L191", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/traccar/traccar/commit/3fbdcd81566bc72e319ec05c77cf8a4120b87b8f", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/traccar/traccar/security/advisories/GHSA-3gxq-f2qj-c8v9", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-31214", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-10T18:15:07.350", "lastModified": "2025-01-09T16:14:43.407", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Traccar is an open source GPS tracking system. Traccar versions 5.1 through 5.12 allow arbitrary files to be uploaded through the device image upload API. Attackers have full control over the file contents, full control over the directory where the file is stored, full control over the file extension, and partial control over the file name. While it's not for an attacker to overwrite an existing file, an attacker can create new files with certain names and attacker-controlled extensions anywhere on the file system. This can potentially lead to remote code execution, XSS, DOS, etc. The default install of Traccar makes this vulnerability more severe. Self-registration is enabled by default, allowing anyone to create an account to exploit this vulnerability. Traccar also runs by default with root/system privileges, allowing files to be placed anywhere on the file system. Version 6.0 contains a fix for the issue. One may also turn off self-registration by default, as that would make most vulnerabilities in the application much harder to exploit by default and reduce the severity considerably.\n"}, {"lang": "es", "value": "Traccar es un sistema de rastreo GPS de c\u00f3digo abierto. Las versiones 5.1 a 5.12 de Traccar permiten cargar archivos arbitrarios a trav\u00e9s de la API de carga de im\u00e1genes del dispositivo. Los atacantes tienen control total sobre el contenido del archivo, control total sobre el directorio donde se almacena el archivo, control total sobre la extensi\u00f3n del archivo y control parcial sobre el nombre del archivo. Si bien no le corresponde a un atacante sobrescribir un archivo existente, un atacante puede crear nuevos archivos con ciertos nombres y extensiones controladas por el atacante en cualquier parte del sistema de archivos. Esto puede conducir potencialmente a la ejecuci\u00f3n remota de c\u00f3digo, XSS, DOS, etc. La instalaci\u00f3n predeterminada de Traccar hace que esta vulnerabilidad sea m\u00e1s grave. El autorregistro est\u00e1 habilitado de forma predeterminada, lo que permite que cualquiera cree una cuenta para explotar esta vulnerabilidad. Traccar tambi\u00e9n se ejecuta de forma predeterminada con privilegios de root/sistema, lo que permite colocar archivos en cualquier parte del sistema de archivos. La versi\u00f3n 6.0 contiene una soluci\u00f3n para el problema. Tambi\u00e9n se puede desactivar el autorregistro de forma predeterminada, ya que eso har\u00eda que la mayor\u00eda de las vulnerabilidades de la aplicaci\u00f3n sean mucho m\u00e1s dif\u00edciles de explotar de forma predeterminada y reducir\u00eda considerablemente la gravedad."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "baseScore": 9.6, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 6.0}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "baseScore": 9.6, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 6.0}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-434"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-434"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:traccar:traccar:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.1", "versionEndIncluding": "5.12", "matchCriteriaId": "27A24D4B-A938-44B4-8630-B3A2F3B97900"}]}]}], "references": [{"url": "https://github.com/traccar/traccar/blob/master/src/main/java/org/traccar/model/Device.java#L56", "source": "security-advisories@github.com", "tags": ["Product"]}, {"url": "https://github.com/traccar/traccar/blob/v5.12/src/main/java/org/traccar/api/resource/DeviceResource.java#L191", "source": "security-advisories@github.com", "tags": ["Product"]}, {"url": "https://github.com/traccar/traccar/commit/3fbdcd81566bc72e319ec05c77cf8a4120b87b8f", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/traccar/traccar/security/advisories/GHSA-3gxq-f2qj-c8v9", "source": "security-advisories@github.com", "tags": ["Exploit", "Vendor Advisory"]}, {"url": "https://github.com/traccar/traccar/blob/master/src/main/java/org/traccar/model/Device.java#L56", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Product"]}, {"url": "https://github.com/traccar/traccar/blob/v5.12/src/main/java/org/traccar/api/resource/DeviceResource.java#L191", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Product"]}, {"url": "https://github.com/traccar/traccar/commit/3fbdcd81566bc72e319ec05c77cf8a4120b87b8f", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/traccar/traccar/security/advisories/GHSA-3gxq-f2qj-c8v9", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-31278.json b/cve/2024/CVE-2024-31278.json index 98512c44182..72cd626bdaa 100644 --- a/cve/2024/CVE-2024-31278.json +++ b/cve/2024/CVE-2024-31278.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-31278", "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-10T16:15:13.483", "lastModified": "2024-11-21T09:13:10.977", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Leap13 Premium Addons for Elementor.This issue affects Premium Addons for Elementor: from n/a through 4.10.22.\n\n"}, {"lang": "es", "value": "Vulnerabilidad de exposici\u00f3n de informaci\u00f3n confidencial a un actor no autorizado en los complementos Premium de Leap13 para Elementor. Este problema afecta a los complementos Premium de Elementor: desde n/a hasta 4.10.22."}], "metrics": {"cvssMetricV31": [{"source": "audit@patchstack.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "baseScore": 4.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 1.4}]}, "weaknesses": [{"source": "audit@patchstack.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-200"}]}], "references": [{"url": "https://patchstack.com/database/vulnerability/premium-addons-for-elementor/wordpress-premium-addons-for-elementor-plugin-4-10-22-sensitive-data-exposure-vulnerability?_s_id=cve", "source": "audit@patchstack.com"}, {"url": "https://patchstack.com/database/vulnerability/premium-addons-for-elementor/wordpress-premium-addons-for-elementor-plugin-4-10-22-sensitive-data-exposure-vulnerability?_s_id=cve", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-31278", "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-10T16:15:13.483", "lastModified": "2025-01-09T17:15:33.957", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Leap13 Premium Addons for Elementor.This issue affects Premium Addons for Elementor: from n/a through 4.10.22.\n\n"}, {"lang": "es", "value": "Vulnerabilidad de exposici\u00f3n de informaci\u00f3n confidencial a un actor no autorizado en los complementos Premium de Leap13 para Elementor. Este problema afecta a los complementos Premium de Elementor: desde n/a hasta 4.10.22."}], "metrics": {"cvssMetricV31": [{"source": "audit@patchstack.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "baseScore": 4.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 1.4}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "audit@patchstack.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-200"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-922"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:leap13:premium_addons_for_elementor:*:*:*:*:*:wordpress:*:*", "versionEndIncluding": "4.10.22", "matchCriteriaId": "576A3771-51C0-4EED-885B-502161566B2C"}]}]}], "references": [{"url": "https://patchstack.com/database/vulnerability/premium-addons-for-elementor/wordpress-premium-addons-for-elementor-plugin-4-10-22-sensitive-data-exposure-vulnerability?_s_id=cve", "source": "audit@patchstack.com", "tags": ["Third Party Advisory"]}, {"url": "https://patchstack.com/database/vulnerability/premium-addons-for-elementor/wordpress-premium-addons-for-elementor-plugin-4-10-22-sensitive-data-exposure-vulnerability?_s_id=cve", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-31464.json b/cve/2024/CVE-2024-31464.json index 7fb540694e4..ae5399082ac 100644 --- a/cve/2024/CVE-2024-31464.json +++ b/cve/2024/CVE-2024-31464.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-31464", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-10T19:15:49.413", "lastModified": "2024-11-21T09:13:34.883", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "XWiki Platform is a generic wiki platform. Starting in version 5.0-rc-1 and prior to versions 14.10.19, 15.5.4, and 15.9-rc-1, it is possible to access the hash of a password by using the diff feature of the history whenever the object storing the password is deleted. Using that vulnerability it's possible for an attacker to have access to the hash password of a user if they have rights to edit the users' page. With the default right scheme in XWiki this vulnerability is normally prevented on user profiles, except by users with Admin rights. Note that this vulnerability also impacts any extensions that might use passwords stored in xobjects: for those usecases it depends on the right of those pages. There is currently no way to be 100% sure that this vulnerability has been exploited, as an attacker with enough privilege could have deleted the revision where the xobject was deleted after rolling-back the deletion. But again, this operation requires high privileges on the target page (Admin right). A page with a user password xobject which have in its history a revision where the object has been deleted should be considered at risk and the password should be changed there. a diff, to ensure it's not coming from a password field. As another mitigation, admins should ensure that the user pages are properly protected: the edit right shouldn't be allowed for other users than Admin and owner of the profile (which is the default right). There is not much workaround possible for a privileged user other than upgrading XWiki."}, {"lang": "es", "value": "XWiki Platform es una plataforma wiki gen\u00e9rica. A partir de la versi\u00f3n 5.0-rc-1 y antes de las versiones 14.10.19, 15.5.4 y 15.9-rc-1, es posible acceder al hash de una contrase\u00f1a utilizando la funci\u00f3n diff del historial siempre que se elimine el objeto que almacena la contrase\u00f1a. Utilizando esa vulnerabilidad, es posible que un atacante tenga acceso al hash de la contrase\u00f1a de un usuario si tiene derechos para editar la p\u00e1gina del usuario. Con el esquema de derechos predeterminado en XWiki, esta vulnerabilidad normalmente se evita en los perfiles de usuario, excepto en el caso de los usuarios con derechos de administrador. Tenga en cuenta que esta vulnerabilidad tambi\u00e9n afecta a cualquier extensi\u00f3n que pueda utilizar contrase\u00f1as almacenadas en xobjects: para esos casos de uso, depende de los derechos de esas p\u00e1ginas. Actualmente no hay forma de estar 100% seguro de que esta vulnerabilidad haya sido explotada, ya que un atacante con suficientes privilegios podr\u00eda haber eliminado la revisi\u00f3n en la que se elimin\u00f3 el xobject despu\u00e9s de revertir la eliminaci\u00f3n. Pero, de nuevo, esta operaci\u00f3n requiere privilegios elevados en la p\u00e1gina de destino (derecho de administrador). Una p\u00e1gina con una contrase\u00f1a de usuario xobject que tenga en su historial una revisi\u00f3n en la que se haya eliminado el objeto debe considerarse en riesgo y la contrase\u00f1a debe cambiarse all\u00ed. un diff, para asegurarse de que no provenga de un campo de contrase\u00f1a. Como otra mitigaci\u00f3n, los administradores deben asegurarse de que las p\u00e1ginas de usuario est\u00e9n protegidas adecuadamente: el derecho de edici\u00f3n no debe permitirse a otros usuarios que no sean el administrador y el propietario del perfil (que es el derecho predeterminado). No hay muchas workarounds posibles para un usuario privilegiado aparte de actualizar XWiki."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", "baseScore": 6.8, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.3, "impactScore": 4.0}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-200"}]}], "references": [{"url": "https://github.com/xwiki/xwiki-platform/commit/9075668a4135cce114ef2a4b72eba3161a9e94c4", "source": "security-advisories@github.com"}, {"url": "https://github.com/xwiki/xwiki-platform/commit/955fb097e02a2a7153f527522ee9eef42447e5d7", "source": "security-advisories@github.com"}, {"url": "https://github.com/xwiki/xwiki-platform/commit/f1eaec1e512220fabd970d053c627e435a1652cf", "source": "security-advisories@github.com"}, {"url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-v782-xr4w-3vqx", "source": "security-advisories@github.com"}, {"url": "https://jira.xwiki.org/browse/XWIKI-19948", "source": "security-advisories@github.com"}, {"url": "https://github.com/xwiki/xwiki-platform/commit/9075668a4135cce114ef2a4b72eba3161a9e94c4", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/xwiki/xwiki-platform/commit/955fb097e02a2a7153f527522ee9eef42447e5d7", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/xwiki/xwiki-platform/commit/f1eaec1e512220fabd970d053c627e435a1652cf", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-v782-xr4w-3vqx", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://jira.xwiki.org/browse/XWIKI-19948", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-31464", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-10T19:15:49.413", "lastModified": "2025-01-09T16:41:19.137", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "XWiki Platform is a generic wiki platform. Starting in version 5.0-rc-1 and prior to versions 14.10.19, 15.5.4, and 15.9-rc-1, it is possible to access the hash of a password by using the diff feature of the history whenever the object storing the password is deleted. Using that vulnerability it's possible for an attacker to have access to the hash password of a user if they have rights to edit the users' page. With the default right scheme in XWiki this vulnerability is normally prevented on user profiles, except by users with Admin rights. Note that this vulnerability also impacts any extensions that might use passwords stored in xobjects: for those usecases it depends on the right of those pages. There is currently no way to be 100% sure that this vulnerability has been exploited, as an attacker with enough privilege could have deleted the revision where the xobject was deleted after rolling-back the deletion. But again, this operation requires high privileges on the target page (Admin right). A page with a user password xobject which have in its history a revision where the object has been deleted should be considered at risk and the password should be changed there. a diff, to ensure it's not coming from a password field. As another mitigation, admins should ensure that the user pages are properly protected: the edit right shouldn't be allowed for other users than Admin and owner of the profile (which is the default right). There is not much workaround possible for a privileged user other than upgrading XWiki."}, {"lang": "es", "value": "XWiki Platform es una plataforma wiki gen\u00e9rica. A partir de la versi\u00f3n 5.0-rc-1 y antes de las versiones 14.10.19, 15.5.4 y 15.9-rc-1, es posible acceder al hash de una contrase\u00f1a utilizando la funci\u00f3n diff del historial siempre que se elimine el objeto que almacena la contrase\u00f1a. Utilizando esa vulnerabilidad, es posible que un atacante tenga acceso al hash de la contrase\u00f1a de un usuario si tiene derechos para editar la p\u00e1gina del usuario. Con el esquema de derechos predeterminado en XWiki, esta vulnerabilidad normalmente se evita en los perfiles de usuario, excepto en el caso de los usuarios con derechos de administrador. Tenga en cuenta que esta vulnerabilidad tambi\u00e9n afecta a cualquier extensi\u00f3n que pueda utilizar contrase\u00f1as almacenadas en xobjects: para esos casos de uso, depende de los derechos de esas p\u00e1ginas. Actualmente no hay forma de estar 100% seguro de que esta vulnerabilidad haya sido explotada, ya que un atacante con suficientes privilegios podr\u00eda haber eliminado la revisi\u00f3n en la que se elimin\u00f3 el xobject despu\u00e9s de revertir la eliminaci\u00f3n. Pero, de nuevo, esta operaci\u00f3n requiere privilegios elevados en la p\u00e1gina de destino (derecho de administrador). Una p\u00e1gina con una contrase\u00f1a de usuario xobject que tenga en su historial una revisi\u00f3n en la que se haya eliminado el objeto debe considerarse en riesgo y la contrase\u00f1a debe cambiarse all\u00ed. un diff, para asegurarse de que no provenga de un campo de contrase\u00f1a. Como otra mitigaci\u00f3n, los administradores deben asegurarse de que las p\u00e1ginas de usuario est\u00e9n protegidas adecuadamente: el derecho de edici\u00f3n no debe permitirse a otros usuarios que no sean el administrador y el propietario del perfil (que es el derecho predeterminado). No hay muchas workarounds posibles para un usuario privilegiado aparte de actualizar XWiki."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", "baseScore": 6.8, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.3, "impactScore": 4.0}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "baseScore": 4.9, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE"}, "exploitabilityScore": 1.2, "impactScore": 3.6}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-200"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-916"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.0", "versionEndExcluding": "14.10.19", "matchCriteriaId": "646936F8-FEA5-4480-8843-2FC229243662"}, {"vulnerable": true, "criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*", "versionStartIncluding": "15.0", "versionEndExcluding": "15.5.4", "matchCriteriaId": "C15AC764-BCCE-4AF3-98F5-28EC637500A4"}, {"vulnerable": true, "criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*", "versionStartIncluding": "15.6", "versionEndExcluding": "15.9", "matchCriteriaId": "3E8A87CB-01A7-4C55-99FF-93FAAC70532B"}]}]}], "references": [{"url": "https://github.com/xwiki/xwiki-platform/commit/9075668a4135cce114ef2a4b72eba3161a9e94c4", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/xwiki/xwiki-platform/commit/955fb097e02a2a7153f527522ee9eef42447e5d7", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/xwiki/xwiki-platform/commit/f1eaec1e512220fabd970d053c627e435a1652cf", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-v782-xr4w-3vqx", "source": "security-advisories@github.com", "tags": ["Vendor Advisory"]}, {"url": "https://jira.xwiki.org/browse/XWIKI-19948", "source": "security-advisories@github.com", "tags": ["Issue Tracking", "Vendor Advisory"]}, {"url": "https://github.com/xwiki/xwiki-platform/commit/9075668a4135cce114ef2a4b72eba3161a9e94c4", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/xwiki/xwiki-platform/commit/955fb097e02a2a7153f527522ee9eef42447e5d7", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/xwiki/xwiki-platform/commit/f1eaec1e512220fabd970d053c627e435a1652cf", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-v782-xr4w-3vqx", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}, {"url": "https://jira.xwiki.org/browse/XWIKI-19948", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Issue Tracking", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-31465.json b/cve/2024/CVE-2024-31465.json index 2eb42623c80..64529f0ad11 100644 --- a/cve/2024/CVE-2024-31465.json +++ b/cve/2024/CVE-2024-31465.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-31465", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-10T20:15:07.833", "lastModified": "2024-11-21T09:13:35.007", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "XWiki Platform is a generic wiki platform. Starting in version 5.0-rc-1 and prior to versions 14.10.20, 15.5.4, and 15.9-rc-1, any user with edit right on any page can execute any code on the server by adding an object of type `XWiki.SearchSuggestSourceClass` to their user profile or any other page. This compromises the confidentiality, integrity and availability of the whole XWiki installation. This vulnerability has been patched in XWiki 14.10.20, 15.5.4 and 15.10 RC1. As a workaround, manually apply the patch to the document `XWiki.SearchSuggestSourceSheet`."}, {"lang": "es", "value": "XWiki Platform es una plataforma wiki gen\u00e9rica. A partir de la versi\u00f3n 5.0-rc-1 y antes de las versiones 14.10.20, 15.5.4 y 15.9-rc-1, cualquier usuario con derecho de edici\u00f3n en cualquier p\u00e1gina puede ejecutar cualquier c\u00f3digo en el servidor agregando un objeto de tipo `XWiki .SearchSuggestSourceClass` a su perfil de usuario o cualquier otra p\u00e1gina. Esto compromete la confidencialidad, integridad y disponibilidad de toda la instalaci\u00f3n de XWiki. Esta vulnerabilidad ha sido parcheada en XWiki 14.10.20, 15.5.4 y 15.10 RC1. Como workaround, aplique manualmente el parche al documento `XWiki.SearchSuggestSourceSheet`."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "baseScore": 9.9, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.1, "impactScore": 6.0}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-95"}]}], "references": [{"url": "https://github.com/xwiki/xwiki-platform/commit/0317a3aa78065e66c86fc725976b06bf7f9b446e", "source": "security-advisories@github.com"}, {"url": "https://github.com/xwiki/xwiki-platform/commit/2740974c32dbb7cc565546d0f04e2374b32b36f7", "source": "security-advisories@github.com"}, {"url": "https://github.com/xwiki/xwiki-platform/commit/6a7f19f6424036fce3d703413137adde950ae809", "source": "security-advisories@github.com"}, {"url": "https://github.com/xwiki/xwiki-platform/commit/6a7f19f6424036fce3d703413137adde950ae809#diff-67b473d2b6397d65b7726c6a13555850b11b10128321adf9e627e656e1d130a5", "source": "security-advisories@github.com"}, {"url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-34fj-r5gq-7395", "source": "security-advisories@github.com"}, {"url": "https://jira.xwiki.org/browse/XWIKI-21474", "source": "security-advisories@github.com"}, {"url": "https://github.com/xwiki/xwiki-platform/commit/0317a3aa78065e66c86fc725976b06bf7f9b446e", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/xwiki/xwiki-platform/commit/2740974c32dbb7cc565546d0f04e2374b32b36f7", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/xwiki/xwiki-platform/commit/6a7f19f6424036fce3d703413137adde950ae809", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/xwiki/xwiki-platform/commit/6a7f19f6424036fce3d703413137adde950ae809#diff-67b473d2b6397d65b7726c6a13555850b11b10128321adf9e627e656e1d130a5", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-34fj-r5gq-7395", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://jira.xwiki.org/browse/XWIKI-21474", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-31465", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-10T20:15:07.833", "lastModified": "2025-01-09T16:49:22.867", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "XWiki Platform is a generic wiki platform. Starting in version 5.0-rc-1 and prior to versions 14.10.20, 15.5.4, and 15.9-rc-1, any user with edit right on any page can execute any code on the server by adding an object of type `XWiki.SearchSuggestSourceClass` to their user profile or any other page. This compromises the confidentiality, integrity and availability of the whole XWiki installation. This vulnerability has been patched in XWiki 14.10.20, 15.5.4 and 15.10 RC1. As a workaround, manually apply the patch to the document `XWiki.SearchSuggestSourceSheet`."}, {"lang": "es", "value": "XWiki Platform es una plataforma wiki gen\u00e9rica. A partir de la versi\u00f3n 5.0-rc-1 y antes de las versiones 14.10.20, 15.5.4 y 15.9-rc-1, cualquier usuario con derecho de edici\u00f3n en cualquier p\u00e1gina puede ejecutar cualquier c\u00f3digo en el servidor agregando un objeto de tipo `XWiki .SearchSuggestSourceClass` a su perfil de usuario o cualquier otra p\u00e1gina. Esto compromete la confidencialidad, integridad y disponibilidad de toda la instalaci\u00f3n de XWiki. Esta vulnerabilidad ha sido parcheada en XWiki 14.10.20, 15.5.4 y 15.10 RC1. Como workaround, aplique manualmente el parche al documento `XWiki.SearchSuggestSourceSheet`."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "baseScore": 9.9, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.1, "impactScore": 6.0}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 8.8, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-95"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-94"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.3", "versionEndExcluding": "14.10.20", "matchCriteriaId": "FA889C6E-72AD-4CFD-AF52-D41503AED17B"}, {"vulnerable": true, "criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*", "versionStartIncluding": "15.0", "versionEndExcluding": "15.5.4", "matchCriteriaId": "C15AC764-BCCE-4AF3-98F5-28EC637500A4"}, {"vulnerable": true, "criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*", "versionStartIncluding": "15.6", "versionEndExcluding": "15.10", "matchCriteriaId": "B214D1C2-C7E5-44D2-95BD-4FFE947436C2"}, {"vulnerable": true, "criteria": "cpe:2.3:a:xwiki:xwiki:5.2:-:*:*:*:*:*:*", "matchCriteriaId": "8BEF0295-1B32-490A-AC23-49C178D31632"}, {"vulnerable": true, "criteria": "cpe:2.3:a:xwiki:xwiki:5.2:milestone2:*:*:*:*:*:*", "matchCriteriaId": "CF4DC7DE-74DF-4911-A552-103C900E61A7"}, {"vulnerable": true, "criteria": "cpe:2.3:a:xwiki:xwiki:5.2:rc1:*:*:*:*:*:*", "matchCriteriaId": "A436711A-10EF-4355-93CF-DDBE3523FAE6"}]}]}], "references": [{"url": "https://github.com/xwiki/xwiki-platform/commit/0317a3aa78065e66c86fc725976b06bf7f9b446e", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/xwiki/xwiki-platform/commit/2740974c32dbb7cc565546d0f04e2374b32b36f7", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/xwiki/xwiki-platform/commit/6a7f19f6424036fce3d703413137adde950ae809", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/xwiki/xwiki-platform/commit/6a7f19f6424036fce3d703413137adde950ae809#diff-67b473d2b6397d65b7726c6a13555850b11b10128321adf9e627e656e1d130a5", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-34fj-r5gq-7395", "source": "security-advisories@github.com", "tags": ["Vendor Advisory"]}, {"url": "https://jira.xwiki.org/browse/XWIKI-21474", "source": "security-advisories@github.com", "tags": ["Exploit", "Vendor Advisory"]}, {"url": "https://github.com/xwiki/xwiki-platform/commit/0317a3aa78065e66c86fc725976b06bf7f9b446e", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/xwiki/xwiki-platform/commit/2740974c32dbb7cc565546d0f04e2374b32b36f7", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/xwiki/xwiki-platform/commit/6a7f19f6424036fce3d703413137adde950ae809", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/xwiki/xwiki-platform/commit/6a7f19f6424036fce3d703413137adde950ae809#diff-67b473d2b6397d65b7726c6a13555850b11b10128321adf9e627e656e1d130a5", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-34fj-r5gq-7395", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}, {"url": "https://jira.xwiki.org/browse/XWIKI-21474", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-31989.json b/cve/2024/CVE-2024-31989.json index f46d020c895..92ac11b87c2 100644 --- a/cve/2024/CVE-2024-31989.json +++ b/cve/2024/CVE-2024-31989.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-31989", "sourceIdentifier": "security-advisories@github.com", "published": "2024-05-21T19:15:09.770", "lastModified": "2024-11-21T09:14:17.543", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. It has been discovered that an unprivileged pod in a different namespace on the same cluster could connect to the Redis server on port 6379. Despite having installed the latest version of the VPC CNI plugin on the EKS cluster, it requires manual enablement through configuration to enforce network policies. This raises concerns that many clients might unknowingly have open access to their Redis servers. This vulnerability could lead to Privilege Escalation to the level of cluster controller, or to information leakage, affecting anyone who does not have strict access controls on their Redis instance. This issue has been patched in version(s) 2.8.19, 2.9.15 and 2.10.10."}, {"lang": "es", "value": "Argo CD es una herramienta declarativa de entrega continua de GitOps para Kubernetes. Se ha descubierto que un pod sin privilegios en un espacio de nombres diferente en el mismo cl\u00faster podr\u00eda conectarse al servidor Redis en el puerto 6379. A pesar de haber instalado la \u00faltima versi\u00f3n del complemento VPC CNI en el cl\u00faster EKS, requiere habilitaci\u00f3n manual a trav\u00e9s de la configuraci\u00f3n para aplicar pol\u00edticas de red. Esto genera preocupaci\u00f3n de que muchos clientes, sin saberlo, puedan tener acceso abierto a sus servidores Redis. Esta vulnerabilidad podr\u00eda provocar una escalada de privilegios al nivel del controlador del cl\u00faster o una fuga de informaci\u00f3n, afectando a cualquiera que no tenga controles de acceso estrictos en su instancia de Redis. Este problema se solucion\u00f3 en las versiones 2.8.19, 2.9.15 y 2.10.10."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "baseScore": 9.0, "baseSeverity": "CRITICAL", "attackVector": "ADJACENT_NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.3, "impactScore": 6.0}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-327"}]}], "references": [{"url": "https://github.com/argoproj/argo-cd/commit/2de0ceade243039c120c28374016c04ff9590d1d", "source": "security-advisories@github.com"}, {"url": "https://github.com/argoproj/argo-cd/commit/35a7d6c7fa1534aceba763d6a68697f36c12e678", "source": "security-advisories@github.com"}, {"url": "https://github.com/argoproj/argo-cd/commit/4e2fe302c3352a0012ecbe7f03476b0e07f7fc6c", "source": "security-advisories@github.com"}, {"url": "https://github.com/argoproj/argo-cd/commit/53570cbd143bced49d4376d6e31bd9c7bd2659ff", "source": "security-advisories@github.com"}, {"url": "https://github.com/argoproj/argo-cd/commit/6ef7b62a0f67e74b4aac2aee31c98ae49dd95d12", "source": "security-advisories@github.com"}, {"url": "https://github.com/argoproj/argo-cd/commit/9552034a80070a93a161bfa330359585f3b85f07", "source": "security-advisories@github.com"}, {"url": "https://github.com/argoproj/argo-cd/commit/bdd889d43969ba738ddd15e1f674d27964048994", "source": "security-advisories@github.com"}, {"url": "https://github.com/argoproj/argo-cd/commit/f1a449e83ee73f8f14d441563b6a31b504f8d8b0", "source": "security-advisories@github.com"}, {"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-9766-5277-j5hr", "source": "security-advisories@github.com"}, {"url": "https://github.com/argoproj/argo-cd/commit/2de0ceade243039c120c28374016c04ff9590d1d", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/argoproj/argo-cd/commit/35a7d6c7fa1534aceba763d6a68697f36c12e678", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/argoproj/argo-cd/commit/4e2fe302c3352a0012ecbe7f03476b0e07f7fc6c", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/argoproj/argo-cd/commit/53570cbd143bced49d4376d6e31bd9c7bd2659ff", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/argoproj/argo-cd/commit/6ef7b62a0f67e74b4aac2aee31c98ae49dd95d12", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/argoproj/argo-cd/commit/9552034a80070a93a161bfa330359585f3b85f07", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/argoproj/argo-cd/commit/bdd889d43969ba738ddd15e1f674d27964048994", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/argoproj/argo-cd/commit/f1a449e83ee73f8f14d441563b6a31b504f8d8b0", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-9766-5277-j5hr", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-31989", "sourceIdentifier": "security-advisories@github.com", "published": "2024-05-21T19:15:09.770", "lastModified": "2025-01-09T16:56:47.220", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. It has been discovered that an unprivileged pod in a different namespace on the same cluster could connect to the Redis server on port 6379. Despite having installed the latest version of the VPC CNI plugin on the EKS cluster, it requires manual enablement through configuration to enforce network policies. This raises concerns that many clients might unknowingly have open access to their Redis servers. This vulnerability could lead to Privilege Escalation to the level of cluster controller, or to information leakage, affecting anyone who does not have strict access controls on their Redis instance. This issue has been patched in version(s) 2.8.19, 2.9.15 and 2.10.10."}, {"lang": "es", "value": "Argo CD es una herramienta declarativa de entrega continua de GitOps para Kubernetes. Se ha descubierto que un pod sin privilegios en un espacio de nombres diferente en el mismo cl\u00faster podr\u00eda conectarse al servidor Redis en el puerto 6379. A pesar de haber instalado la \u00faltima versi\u00f3n del complemento VPC CNI en el cl\u00faster EKS, requiere habilitaci\u00f3n manual a trav\u00e9s de la configuraci\u00f3n para aplicar pol\u00edticas de red. Esto genera preocupaci\u00f3n de que muchos clientes, sin saberlo, puedan tener acceso abierto a sus servidores Redis. Esta vulnerabilidad podr\u00eda provocar una escalada de privilegios al nivel del controlador del cl\u00faster o una fuga de informaci\u00f3n, afectando a cualquiera que no tenga controles de acceso estrictos en su instancia de Redis. Este problema se solucion\u00f3 en las versiones 2.8.19, 2.9.15 y 2.10.10."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "baseScore": 9.0, "baseSeverity": "CRITICAL", "attackVector": "ADJACENT_NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.3, "impactScore": 6.0}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "baseScore": 9.0, "baseSeverity": "CRITICAL", "attackVector": "ADJACENT_NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.3, "impactScore": 6.0}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-327"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-327"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.8.19", "matchCriteriaId": "475A2C91-B3E2-4A69-AEEF-D74F78FC362C"}, {"vulnerable": true, "criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.9.0", "versionEndExcluding": "2.9.15", "matchCriteriaId": "215C1D38-F859-4673-8F7F-F45422529899"}, {"vulnerable": true, "criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.10.0", "versionEndExcluding": "2.10.10", "matchCriteriaId": "9E7EF8CD-8ED1-45BF-8074-D399B318FECD"}, {"vulnerable": true, "criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.11.0", "versionEndExcluding": "2.11.1", "matchCriteriaId": "F626FD3D-7C00-4C34-A131-7ABF40BD1D0E"}]}]}], "references": [{"url": "https://github.com/argoproj/argo-cd/commit/2de0ceade243039c120c28374016c04ff9590d1d", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/commit/35a7d6c7fa1534aceba763d6a68697f36c12e678", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/commit/4e2fe302c3352a0012ecbe7f03476b0e07f7fc6c", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/commit/53570cbd143bced49d4376d6e31bd9c7bd2659ff", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/commit/6ef7b62a0f67e74b4aac2aee31c98ae49dd95d12", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/commit/9552034a80070a93a161bfa330359585f3b85f07", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/commit/bdd889d43969ba738ddd15e1f674d27964048994", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/commit/f1a449e83ee73f8f14d441563b6a31b504f8d8b0", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-9766-5277-j5hr", "source": "security-advisories@github.com", "tags": ["Exploit", "Vendor Advisory"]}, {"url": "https://github.com/argoproj/argo-cd/commit/2de0ceade243039c120c28374016c04ff9590d1d", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/commit/35a7d6c7fa1534aceba763d6a68697f36c12e678", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/commit/4e2fe302c3352a0012ecbe7f03476b0e07f7fc6c", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/commit/53570cbd143bced49d4376d6e31bd9c7bd2659ff", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/commit/6ef7b62a0f67e74b4aac2aee31c98ae49dd95d12", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/commit/9552034a80070a93a161bfa330359585f3b85f07", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/commit/bdd889d43969ba738ddd15e1f674d27964048994", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/commit/f1a449e83ee73f8f14d441563b6a31b504f8d8b0", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-9766-5277-j5hr", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-31990.json b/cve/2024/CVE-2024-31990.json index 204c558488f..eeaa1f658df 100644 --- a/cve/2024/CVE-2024-31990.json +++ b/cve/2024/CVE-2024-31990.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-31990", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-15T20:15:11.127", "lastModified": "2024-11-21T09:14:17.697", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. The API server does not enforce project sourceNamespaces which allows attackers to use the UI to edit resources which should only be mutable via gitops. This vulenrability is fixed in 2.10.7, 2.9.12, and 2.8.16.\n"}, {"lang": "es", "value": "Argo CD es una herramienta declarativa de entrega continua de GitOps para Kubernetes. El servidor API no aplica los espacios de nombres de origen del proyecto, lo que permite a los atacantes usar la interfaz de usuario para editar recursos que solo deber\u00edan poder modificarse a trav\u00e9s de gitops. Esta vulnerabilidad se corrigi\u00f3 en 2.10.7, 2.9.12 y 2.8.16."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H", "baseScore": 4.8, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.2, "impactScore": 3.6}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-863"}]}], "references": [{"url": "https://github.com/argoproj/argo-cd/commit/c514105af739eebedb9dbe89d8a6dd8dfc30bb2c", "source": "security-advisories@github.com"}, {"url": "https://github.com/argoproj/argo-cd/commit/c5a252c4cc260e240e2074794aedb861d07e9ca5", "source": "security-advisories@github.com"}, {"url": "https://github.com/argoproj/argo-cd/commit/e0ff56d89fbd7d066e9c862b30337f6520f13f17", "source": "security-advisories@github.com"}, {"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-2gvw-w6fj-7m3c", "source": "security-advisories@github.com"}, {"url": "https://github.com/argoproj/argo-cd/commit/c514105af739eebedb9dbe89d8a6dd8dfc30bb2c", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/argoproj/argo-cd/commit/c5a252c4cc260e240e2074794aedb861d07e9ca5", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/argoproj/argo-cd/commit/e0ff56d89fbd7d066e9c862b30337f6520f13f17", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-2gvw-w6fj-7m3c", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-31990", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-15T20:15:11.127", "lastModified": "2025-01-09T17:04:35.590", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. The API server does not enforce project sourceNamespaces which allows attackers to use the UI to edit resources which should only be mutable via gitops. This vulenrability is fixed in 2.10.7, 2.9.12, and 2.8.16.\n"}, {"lang": "es", "value": "Argo CD es una herramienta declarativa de entrega continua de GitOps para Kubernetes. El servidor API no aplica los espacios de nombres de origen del proyecto, lo que permite a los atacantes usar la interfaz de usuario para editar recursos que solo deber\u00edan poder modificarse a trav\u00e9s de gitops. Esta vulnerabilidad se corrigi\u00f3 en 2.10.7, 2.9.12 y 2.8.16."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H", "baseScore": 4.8, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.2, "impactScore": 3.6}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "baseScore": 6.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.8, "impactScore": 3.4}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-863"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-863"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.4.0", "versionEndExcluding": "2.8.16", "matchCriteriaId": "9B87AF18-0754-4EA4-B6D6-B29F1DD75590"}, {"vulnerable": true, "criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.9.0", "versionEndExcluding": "2.9.12", "matchCriteriaId": "5FBE3254-59C6-4CA7-AE67-673BA527A8DE"}, {"vulnerable": true, "criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.10.0", "versionEndExcluding": "2.10.7", "matchCriteriaId": "71FAC3BD-2DF6-400F-813C-A98370A10F0A"}]}]}], "references": [{"url": "https://github.com/argoproj/argo-cd/commit/c514105af739eebedb9dbe89d8a6dd8dfc30bb2c", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/commit/c5a252c4cc260e240e2074794aedb861d07e9ca5", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/commit/e0ff56d89fbd7d066e9c862b30337f6520f13f17", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-2gvw-w6fj-7m3c", "source": "security-advisories@github.com", "tags": ["Vendor Advisory"]}, {"url": "https://github.com/argoproj/argo-cd/commit/c514105af739eebedb9dbe89d8a6dd8dfc30bb2c", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/commit/c5a252c4cc260e240e2074794aedb861d07e9ca5", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/commit/e0ff56d89fbd7d066e9c862b30337f6520f13f17", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-2gvw-w6fj-7m3c", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-32038.json b/cve/2024/CVE-2024-32038.json index a23f22fc7d4..74a999c2af3 100644 --- a/cve/2024/CVE-2024-32038.json +++ b/cve/2024/CVE-2024-32038.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-32038", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-19T15:15:50.610", "lastModified": "2024-11-21T09:14:22.157", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Wazuh is a free and open source platform used for threat prevention, detection, and response. There is a buffer overflow hazard in wazuh-analysisd when handling Unicode characters from Windows Eventchannel messages. It impacts Wazuh Manager 3.8.0 and above. This vulnerability is fixed in Wazuh Manager 4.7.2."}, {"lang": "es", "value": "Wazuh es una plataforma gratuita y de c\u00f3digo abierto que se utiliza para la prevenci\u00f3n, detecci\u00f3n y respuesta a amenazas. Existe un riesgo de desbordamiento del b\u00fafer en wazuh-analysisd cuando se manejan caracteres Unicode de mensajes de Windows Eventchannel. Afecta a Wazuh Manager 3.8.0 y superiores. Esta vulnerabilidad se solucion\u00f3 en Wazuh Manager 4.7.2."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 5.9}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-122"}]}], "references": [{"url": "https://github.com/wazuh/wazuh/security/advisories/GHSA-fcpw-v3pg-c327", "source": "security-advisories@github.com"}, {"url": "https://github.com/wazuh/wazuh/security/advisories/GHSA-fcpw-v3pg-c327", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-32038", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-19T15:15:50.610", "lastModified": "2025-01-09T17:38:55.253", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Wazuh is a free and open source platform used for threat prevention, detection, and response. There is a buffer overflow hazard in wazuh-analysisd when handling Unicode characters from Windows Eventchannel messages. It impacts Wazuh Manager 3.8.0 and above. This vulnerability is fixed in Wazuh Manager 4.7.2."}, {"lang": "es", "value": "Wazuh es una plataforma gratuita y de c\u00f3digo abierto que se utiliza para la prevenci\u00f3n, detecci\u00f3n y respuesta a amenazas. Existe un riesgo de desbordamiento del b\u00fafer en wazuh-analysisd cuando se manejan caracteres Unicode de mensajes de Windows Eventchannel. Afecta a Wazuh Manager 3.8.0 y superiores. Esta vulnerabilidad se solucion\u00f3 en Wazuh Manager 4.7.2."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 5.9}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 5.9}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-122"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-787"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:wazuh:wazuh:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.8.0", "versionEndExcluding": "4.7.2", "matchCriteriaId": "72216961-C021-43DF-B94D-099AB12D6190"}]}]}], "references": [{"url": "https://github.com/wazuh/wazuh/security/advisories/GHSA-fcpw-v3pg-c327", "source": "security-advisories@github.com", "tags": ["Vendor Advisory"]}, {"url": "https://github.com/wazuh/wazuh/security/advisories/GHSA-fcpw-v3pg-c327", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-32476.json b/cve/2024/CVE-2024-32476.json index 691bfe82453..9c042f0bc17 100644 --- a/cve/2024/CVE-2024-32476.json +++ b/cve/2024/CVE-2024-32476.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-32476", "sourceIdentifier": "security-advisories@github.com", "published": "2024-05-14T15:36:25.953", "lastModified": "2024-11-21T09:14:59.403", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. There is a Denial of Service (DoS) vulnerability via OOM using jq in ignoreDifferences. This vulnerability has been patched in version(s) 2.10.7, 2.9.12 and 2.8.16."}, {"lang": "es", "value": "Argo CD es una herramienta declarativa de entrega continua de GitOps para Kubernetes. Existe una vulnerabilidad de denegaci\u00f3n de servicio (DoS) a trav\u00e9s de OOM usando jq en ignoreDifferences. Esta vulnerabilidad ha sido parcheada en las versiones 2.10.7, 2.9.12 y 2.8.16."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-400"}]}], "references": [{"url": "https://github.com/argoproj/argo-cd/commit/7893979a1e78d59cedd0ba790ded24e30bb40657", "source": "security-advisories@github.com"}, {"url": "https://github.com/argoproj/argo-cd/commit/9e5cc5a26ff0920a01816231d59fdb5eae032b5a", "source": "security-advisories@github.com"}, {"url": "https://github.com/argoproj/argo-cd/commit/e2df7315fb7d96652186bf7435773a27be330cac", "source": "security-advisories@github.com"}, {"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-9m6p-x4h2-6frq", "source": "security-advisories@github.com"}, {"url": "https://github.com/argoproj/argo-cd/commit/7893979a1e78d59cedd0ba790ded24e30bb40657", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/argoproj/argo-cd/commit/9e5cc5a26ff0920a01816231d59fdb5eae032b5a", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/argoproj/argo-cd/commit/e2df7315fb7d96652186bf7435773a27be330cac", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-9m6p-x4h2-6frq", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-32476", "sourceIdentifier": "security-advisories@github.com", "published": "2024-05-14T15:36:25.953", "lastModified": "2025-01-09T16:59:02.680", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. There is a Denial of Service (DoS) vulnerability via OOM using jq in ignoreDifferences. This vulnerability has been patched in version(s) 2.10.7, 2.9.12 and 2.8.16."}, {"lang": "es", "value": "Argo CD es una herramienta declarativa de entrega continua de GitOps para Kubernetes. Existe una vulnerabilidad de denegaci\u00f3n de servicio (DoS) a trav\u00e9s de OOM usando jq en ignoreDifferences. Esta vulnerabilidad ha sido parcheada en las versiones 2.10.7, 2.9.12 y 2.8.16."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 3.6}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-400"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.1.0", "versionEndExcluding": "2.8.17", "matchCriteriaId": "BC68E1ED-A70A-4238-8AB6-089C61EE46F7"}, {"vulnerable": true, "criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.9.0", "versionEndExcluding": "2.9.13", "matchCriteriaId": "AFF5FA32-4A6D-4E94-8C05-57F73D319626"}, {"vulnerable": true, "criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.10.0", "versionEndExcluding": "2.10.8", "matchCriteriaId": "0021B4B9-8EBF-44FC-BB8D-846F6EAE5D17"}]}]}], "references": [{"url": "https://github.com/argoproj/argo-cd/commit/7893979a1e78d59cedd0ba790ded24e30bb40657", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/commit/9e5cc5a26ff0920a01816231d59fdb5eae032b5a", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/commit/e2df7315fb7d96652186bf7435773a27be330cac", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-9m6p-x4h2-6frq", "source": "security-advisories@github.com", "tags": ["Vendor Advisory"]}, {"url": "https://github.com/argoproj/argo-cd/commit/7893979a1e78d59cedd0ba790ded24e30bb40657", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/commit/9e5cc5a26ff0920a01816231d59fdb5eae032b5a", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/commit/e2df7315fb7d96652186bf7435773a27be330cac", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-9m6p-x4h2-6frq", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-37307.json b/cve/2024/CVE-2024-37307.json index e89c1ba3302..2d7be1e7527 100644 --- a/cve/2024/CVE-2024-37307.json +++ b/cve/2024/CVE-2024-37307.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-37307", "sourceIdentifier": "security-advisories@github.com", "published": "2024-06-13T16:15:11.180", "lastModified": "2024-11-21T09:23:34.600", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Starting in version 1.13.0 and prior to versions 1.13.7, 1.14.12, and 1.15.6, the output of `cilium-bugtool` can contain sensitive data when the tool is run (with the `--envoy-dump` flag set) against Cilium deployments with the Envoy proxy enabled. Users of the TLS inspection, Ingress with TLS termination, Gateway API with TLS termination, and Kafka network policies with API key filtering features are affected. The sensitive data includes the CA certificate, certificate chain, and private key used by Cilium HTTP Network Policies, and when using Ingress/Gateway API and the API keys used in Kafka-related network policy. `cilium-bugtool` is a debugging tool that is typically invoked manually and does not run during the normal operation of a Cilium cluster. This issue has been patched in Cilium v1.15.6, v1.14.12, and v1.13.17. There is no workaround to this issue."}, {"lang": "es", "value": "Cilium es una soluci\u00f3n de redes, observabilidad y seguridad con un plano de datos basado en eBPF. A partir de la versi\u00f3n 1.13.0 y anteriores a las versiones 1.13.7, 1.14.12 y 1.15.6, la salida de `cilium-bugtool` puede contener datos confidenciales cuando se ejecuta la herramienta (con el comando `--envoy-dump` conjunto de indicadores) contra implementaciones de Cilium con el proxy Envoy habilitado. Los usuarios de la inspecci\u00f3n TLS, Ingress con terminaci\u00f3n TLS, Gateway API con terminaci\u00f3n TLS y pol\u00edticas de red Kafka con funciones de filtrado de claves API se ven afectados. Los datos confidenciales incluyen el certificado de CA, la cadena de certificados y la clave privada utilizadas por las pol\u00edticas de red HTTP de Cilium y cuando se utiliza la API de Ingress/Gateway y las claves API utilizadas en la pol\u00edtica de red relacionada con Kafka. `cilium-bugtool` es una herramienta de depuraci\u00f3n que normalmente se invoca manualmente y no se ejecuta durante el funcionamiento normal de un cl\u00faster Cilium. Este problema se solucion\u00f3 en Cilium v1.15.6, v1.14.12 y v1.13.17. No existe workaround para este problema."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N", "baseScore": 7.9, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "NONE"}, "exploitabilityScore": 1.5, "impactScore": 5.8}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-200"}]}], "references": [{"url": "https://github.com/cilium/cilium/commit/0191b1ebcfdd61cefd06da0315a0e7d504167407", "source": "security-advisories@github.com"}, {"url": "https://github.com/cilium/cilium/commit/224e288a5bf40d0bb0f16c9413693b319633431a", "source": "security-advisories@github.com"}, {"url": "https://github.com/cilium/cilium/commit/9299c0fd0024e33397cffc666ff851e82af28741", "source": "security-advisories@github.com"}, {"url": "https://github.com/cilium/cilium/commit/958d7b77274bf2c272d8cdfd812631d644250653", "source": "security-advisories@github.com"}, {"url": "https://github.com/cilium/cilium/commit/9eb25ba40391a9b035d7e66401b862818f4aac4b", "source": "security-advisories@github.com"}, {"url": "https://github.com/cilium/cilium/commit/bf9a1ae1b2d2b2c9cca329d7aa96aa4858032a61", "source": "security-advisories@github.com"}, {"url": "https://github.com/cilium/cilium/security/advisories/GHSA-wh78-7948-358j", "source": "security-advisories@github.com"}, {"url": "https://github.com/cilium/cilium/commit/0191b1ebcfdd61cefd06da0315a0e7d504167407", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/cilium/cilium/commit/224e288a5bf40d0bb0f16c9413693b319633431a", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/cilium/cilium/commit/9299c0fd0024e33397cffc666ff851e82af28741", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/cilium/cilium/commit/958d7b77274bf2c272d8cdfd812631d644250653", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/cilium/cilium/commit/9eb25ba40391a9b035d7e66401b862818f4aac4b", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/cilium/cilium/commit/bf9a1ae1b2d2b2c9cca329d7aa96aa4858032a61", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/cilium/cilium/security/advisories/GHSA-wh78-7948-358j", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-37307", "sourceIdentifier": "security-advisories@github.com", "published": "2024-06-13T16:15:11.180", "lastModified": "2025-01-09T16:37:54.713", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Starting in version 1.13.0 and prior to versions 1.13.7, 1.14.12, and 1.15.6, the output of `cilium-bugtool` can contain sensitive data when the tool is run (with the `--envoy-dump` flag set) against Cilium deployments with the Envoy proxy enabled. Users of the TLS inspection, Ingress with TLS termination, Gateway API with TLS termination, and Kafka network policies with API key filtering features are affected. The sensitive data includes the CA certificate, certificate chain, and private key used by Cilium HTTP Network Policies, and when using Ingress/Gateway API and the API keys used in Kafka-related network policy. `cilium-bugtool` is a debugging tool that is typically invoked manually and does not run during the normal operation of a Cilium cluster. This issue has been patched in Cilium v1.15.6, v1.14.12, and v1.13.17. There is no workaround to this issue."}, {"lang": "es", "value": "Cilium es una soluci\u00f3n de redes, observabilidad y seguridad con un plano de datos basado en eBPF. A partir de la versi\u00f3n 1.13.0 y anteriores a las versiones 1.13.7, 1.14.12 y 1.15.6, la salida de `cilium-bugtool` puede contener datos confidenciales cuando se ejecuta la herramienta (con el comando `--envoy-dump` conjunto de indicadores) contra implementaciones de Cilium con el proxy Envoy habilitado. Los usuarios de la inspecci\u00f3n TLS, Ingress con terminaci\u00f3n TLS, Gateway API con terminaci\u00f3n TLS y pol\u00edticas de red Kafka con funciones de filtrado de claves API se ven afectados. Los datos confidenciales incluyen el certificado de CA, la cadena de certificados y la clave privada utilizadas por las pol\u00edticas de red HTTP de Cilium y cuando se utiliza la API de Ingress/Gateway y las claves API utilizadas en la pol\u00edtica de red relacionada con Kafka. `cilium-bugtool` es una herramienta de depuraci\u00f3n que normalmente se invoca manualmente y no se ejecuta durante el funcionamiento normal de un cl\u00faster Cilium. Este problema se solucion\u00f3 en Cilium v1.15.6, v1.14.12 y v1.13.17. No existe workaround para este problema."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N", "baseScore": 7.9, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "NONE"}, "exploitabilityScore": 1.5, "impactScore": 5.8}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.0, "impactScore": 4.0}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-200"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:cilium:cilium:*:*:*:*:*:*:*:*", "versionStartIncluding": "1.13.0", "versionEndExcluding": "1.13.17", "matchCriteriaId": "FCB429D5-C932-4407-A1E3-46A163289DA4"}, {"vulnerable": true, "criteria": "cpe:2.3:a:cilium:cilium:*:*:*:*:*:*:*:*", "versionStartIncluding": "1.14.0", "versionEndExcluding": "1.14.12", "matchCriteriaId": "A31EBDBF-AF54-4E2F-AD8D-9B6DB65DF016"}, {"vulnerable": true, "criteria": "cpe:2.3:a:cilium:cilium:*:*:*:*:*:*:*:*", "versionStartIncluding": "1.15.0", "versionEndExcluding": "1.15.6", "matchCriteriaId": "60161624-9A84-49CD-BDD9-6FDF5D3D7308"}]}]}], "references": [{"url": "https://github.com/cilium/cilium/commit/0191b1ebcfdd61cefd06da0315a0e7d504167407", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/cilium/cilium/commit/224e288a5bf40d0bb0f16c9413693b319633431a", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/cilium/cilium/commit/9299c0fd0024e33397cffc666ff851e82af28741", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/cilium/cilium/commit/958d7b77274bf2c272d8cdfd812631d644250653", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/cilium/cilium/commit/9eb25ba40391a9b035d7e66401b862818f4aac4b", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/cilium/cilium/commit/bf9a1ae1b2d2b2c9cca329d7aa96aa4858032a61", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/cilium/cilium/security/advisories/GHSA-wh78-7948-358j", "source": "security-advisories@github.com", "tags": ["Vendor Advisory"]}, {"url": "https://github.com/cilium/cilium/commit/0191b1ebcfdd61cefd06da0315a0e7d504167407", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/cilium/cilium/commit/224e288a5bf40d0bb0f16c9413693b319633431a", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/cilium/cilium/commit/9299c0fd0024e33397cffc666ff851e82af28741", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/cilium/cilium/commit/958d7b77274bf2c272d8cdfd812631d644250653", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/cilium/cilium/commit/9eb25ba40391a9b035d7e66401b862818f4aac4b", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/cilium/cilium/commit/bf9a1ae1b2d2b2c9cca329d7aa96aa4858032a61", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/cilium/cilium/security/advisories/GHSA-wh78-7948-358j", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-3933.json b/cve/2024/CVE-2024-3933.json index e2dd7a4be95..98b3db26c79 100644 --- a/cve/2024/CVE-2024-3933.json +++ b/cve/2024/CVE-2024-3933.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-3933", "sourceIdentifier": "emo@eclipse.org", "published": "2024-05-27T06:15:09.367", "lastModified": "2024-11-21T09:30:43.833", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "In Eclipse OpenJ9 release versions prior to 0.44.0 and after 0.13.0, when running with JVM option -Xgc:concurrentScavenge, the sequence generated for System.arrayCopy on the IBM Z platform with hardware and software support for guarded storage [1], could allow access to a buffer with an incorrect length value when executing an arraycopy sequence while the Concurrent Scavenge Garbage Collection cycle is active and the source and destination memory regions for arraycopy overlap. This allows read and write to addresses beyond the end of the array range."}, {"lang": "es", "value": "En las versiones de Eclipse OpenJ9 anteriores a 0.44.0 y posteriores a 0.13.0, cuando se ejecuta con la opci\u00f3n JVM -Xgc:concurrentScavenge, la secuencia generada para System.arrayCopy en la plataforma IBM Z con soporte de hardware y software para almacenamiento protegido [1], podr\u00eda permitir el acceso a un b\u00fafer con un valor de longitud incorrecto al ejecutar una secuencia de copia de matriz mientras el ciclo de recolecci\u00f3n de basura de recuperaci\u00f3n concurrente est\u00e1 activo y las regiones de memoria de origen y destino para la copia de matriz se superponen. Esto permite leer y escribir en direcciones m\u00e1s all\u00e1 del final del rango de la matriz."}], "metrics": {"cvssMetricV31": [{"source": "emo@eclipse.org", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L", "baseScore": 5.3, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "availabilityImpact": "LOW"}, "exploitabilityScore": 1.0, "impactScore": 4.2}]}, "weaknesses": [{"source": "emo@eclipse.org", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-125"}, {"lang": "en", "value": "CWE-787"}, {"lang": "en", "value": "CWE-805"}]}], "references": [{"url": "https://github.com/eclipse/omr/pull/7275", "source": "emo@eclipse.org"}, {"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/21", "source": "emo@eclipse.org"}, {"url": "https://github.com/eclipse/omr/pull/7275", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/21", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-3933", "sourceIdentifier": "emo@eclipse.org", "published": "2024-05-27T06:15:09.367", "lastModified": "2025-01-09T18:00:53.140", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "In Eclipse OpenJ9 release versions prior to 0.44.0 and after 0.13.0, when running with JVM option -Xgc:concurrentScavenge, the sequence generated for System.arrayCopy on the IBM Z platform with hardware and software support for guarded storage [1], could allow access to a buffer with an incorrect length value when executing an arraycopy sequence while the Concurrent Scavenge Garbage Collection cycle is active and the source and destination memory regions for arraycopy overlap. This allows read and write to addresses beyond the end of the array range."}, {"lang": "es", "value": "En las versiones de Eclipse OpenJ9 anteriores a 0.44.0 y posteriores a 0.13.0, cuando se ejecuta con la opci\u00f3n JVM -Xgc:concurrentScavenge, la secuencia generada para System.arrayCopy en la plataforma IBM Z con soporte de hardware y software para almacenamiento protegido [1], podr\u00eda permitir el acceso a un b\u00fafer con un valor de longitud incorrecto al ejecutar una secuencia de copia de matriz mientras el ciclo de recolecci\u00f3n de basura de recuperaci\u00f3n concurrente est\u00e1 activo y las regiones de memoria de origen y destino para la copia de matriz se superponen. Esto permite leer y escribir en direcciones m\u00e1s all\u00e1 del final del rango de la matriz."}], "metrics": {"cvssMetricV31": [{"source": "emo@eclipse.org", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L", "baseScore": 5.3, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "availabilityImpact": "LOW"}, "exploitabilityScore": 1.0, "impactScore": 4.2}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L", "baseScore": 7.3, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "LOW"}, "exploitabilityScore": 1.8, "impactScore": 5.5}]}, "weaknesses": [{"source": "emo@eclipse.org", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-125"}, {"lang": "en", "value": "CWE-787"}, {"lang": "en", "value": "CWE-805"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-125"}, {"lang": "en", "value": "CWE-787"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:eclipse:openj9:*:*:*:*:*:*:*:*", "versionStartIncluding": "0.13.0", "versionEndExcluding": "0.44.0", "matchCriteriaId": "76AC6E23-7314-4C84-8BB7-EF9D7DB1C71C"}]}]}], "references": [{"url": "https://github.com/eclipse/omr/pull/7275", "source": "emo@eclipse.org", "tags": ["Issue Tracking", "Patch"]}, {"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/21", "source": "emo@eclipse.org", "tags": ["Issue Tracking", "Vendor Advisory"]}, {"url": "https://github.com/eclipse/omr/pull/7275", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Issue Tracking", "Patch"]}, {"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/21", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Issue Tracking", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-40634.json b/cve/2024/CVE-2024-40634.json index e1ec5ae78b4..3aa605070c7 100644 --- a/cve/2024/CVE-2024-40634.json +++ b/cve/2024/CVE-2024-40634.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-40634", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-22T18:15:03.770", "lastModified": "2024-11-21T09:31:24.220", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. This report details a security vulnerability in Argo CD, where an unauthenticated attacker can send a specially crafted large JSON payload to the /api/webhook endpoint, causing excessive memory allocation that leads to service disruption by triggering an Out Of Memory (OOM) kill. The issue poses a high risk to the availability of Argo CD deployments. This vulnerability is fixed in 2.11.6, 2.10.15, and 2.9.20.\n"}, {"lang": "es", "value": "Argo CD es una herramienta declarativa de entrega continua de GitOps para Kubernetes. Este informe detalla una vulnerabilidad de seguridad en Argo CD, donde un atacante no autenticado puede enviar un gran payload JSON especialmente manipulado al endpoint /api/webhook, lo que provoca una asignaci\u00f3n excesiva de memoria que conduce a la interrupci\u00f3n del servicio al desencadenar un Out Of Memory (OOM) kill. El problema plantea un alto riesgo para la disponibilidad de las implementaciones de Argo CD. Esta vulnerabilidad se solucion\u00f3 en 2.11.6, 2.10.15 y 2.9.20."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.6}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-400"}]}], "references": [{"url": "https://github.com/argoproj/argo-cd/commit/46c0c0b64deaab1ece70cb701030b76668ad0cdc", "source": "security-advisories@github.com"}, {"url": "https://github.com/argoproj/argo-cd/commit/540e3a57b90eb3655db54793332fac86bcc38b36", "source": "security-advisories@github.com"}, {"url": "https://github.com/argoproj/argo-cd/commit/d881ee78949e23160a0b280bb159e4d3d625a4df", "source": "security-advisories@github.com"}, {"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-jmvp-698c-4x3w", "source": "security-advisories@github.com"}, {"url": "https://github.com/argoproj/argo-cd/commit/46c0c0b64deaab1ece70cb701030b76668ad0cdc", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/argoproj/argo-cd/commit/540e3a57b90eb3655db54793332fac86bcc38b36", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/argoproj/argo-cd/commit/d881ee78949e23160a0b280bb159e4d3d625a4df", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-jmvp-698c-4x3w", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-40634", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-22T18:15:03.770", "lastModified": "2025-01-09T16:55:20.183", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. This report details a security vulnerability in Argo CD, where an unauthenticated attacker can send a specially crafted large JSON payload to the /api/webhook endpoint, causing excessive memory allocation that leads to service disruption by triggering an Out Of Memory (OOM) kill. The issue poses a high risk to the availability of Argo CD deployments. This vulnerability is fixed in 2.11.6, 2.10.15, and 2.9.20.\n"}, {"lang": "es", "value": "Argo CD es una herramienta declarativa de entrega continua de GitOps para Kubernetes. Este informe detalla una vulnerabilidad de seguridad en Argo CD, donde un atacante no autenticado puede enviar un gran payload JSON especialmente manipulado al endpoint /api/webhook, lo que provoca una asignaci\u00f3n excesiva de memoria que conduce a la interrupci\u00f3n del servicio al desencadenar un Out Of Memory (OOM) kill. El problema plantea un alto riesgo para la disponibilidad de las implementaciones de Argo CD. Esta vulnerabilidad se solucion\u00f3 en 2.11.6, 2.10.15 y 2.9.20."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.6}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.6}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-400"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*", "versionStartIncluding": "1.0.0", "versionEndExcluding": "2.9.20", "matchCriteriaId": "1C70E0BA-D4D0-4C05-A0F1-95E13A68BFDB"}, {"vulnerable": true, "criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.10.0", "versionEndExcluding": "2.10.15", "matchCriteriaId": "E18329BB-8F90-4E14-A20B-FF47D16B2D7D"}, {"vulnerable": true, "criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.11.0", "versionEndExcluding": "2.11.6", "matchCriteriaId": "3E953865-3609-4D15-BD82-8A57A3E2EAB5"}]}]}], "references": [{"url": "https://github.com/argoproj/argo-cd/commit/46c0c0b64deaab1ece70cb701030b76668ad0cdc", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/commit/540e3a57b90eb3655db54793332fac86bcc38b36", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/commit/d881ee78949e23160a0b280bb159e4d3d625a4df", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-jmvp-698c-4x3w", "source": "security-advisories@github.com", "tags": ["Exploit", "Vendor Advisory"]}, {"url": "https://github.com/argoproj/argo-cd/commit/46c0c0b64deaab1ece70cb701030b76668ad0cdc", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/commit/540e3a57b90eb3655db54793332fac86bcc38b36", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/commit/d881ee78949e23160a0b280bb159e4d3d625a4df", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-jmvp-698c-4x3w", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-41666.json b/cve/2024/CVE-2024-41666.json index 62462719424..aadcdcd3f42 100644 --- a/cve/2024/CVE-2024-41666.json +++ b/cve/2024/CVE-2024-41666.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-41666", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-24T18:15:05.090", "lastModified": "2024-11-21T09:32:56.193", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Argo CD has a Web-based terminal that allows users to get a shell inside a running pod, just as they would with kubectl exec. Starting in version 2.6.0, when the administrator enables this function and grants permission to the user `p, role:myrole, exec, create, */*, allow`, even if the user revokes this permission, the user can still perform operations in the container, as long as the user keeps the terminal view open for a long time. Although the token expiration and revocation of the user are fixed, however, the fix does not address the situation of revocation of only user `p, role:myrole, exec, create, */*, allow` permissions, which may still lead to the leakage of sensitive information. A patch for this vulnerability has been released in Argo CD versions 2.11.7, 2.10.16, and 2.9.21."}, {"lang": "es", "value": "Argo CD es una herramienta declarativa de entrega continua de GitOps para Kubernetes. Argo CD tiene una terminal basada en web que permite a los usuarios obtener un shell dentro de un pod en ejecuci\u00f3n, tal como lo har\u00edan con kubectl exec. A partir de la versi\u00f3n 2.6.0, cuando el administrador habilita esta funci\u00f3n y otorga permiso al usuario `p, role:myrole, exec, create, */*, enable`, incluso si el usuario revoca este permiso, el usuario a\u00fan puede realizar operaciones en el contenedor, siempre y cuando el usuario mantenga abierta la vista del terminal durante mucho tiempo. Aunque la caducidad del token y la revocaci\u00f3n del usuario est\u00e1n arregladas, la soluci\u00f3n no aborda la situaci\u00f3n de revocaci\u00f3n de permisos \u00fanicamente del usuario `p, role:myrole, exec, create, */*, enable`, lo que a\u00fan puede conducir a la filtraci\u00f3n de informaci\u00f3n sensible. Se lanz\u00f3 un parche para esta vulnerabilidad en las versiones 2.11.7, 2.10.16 y 2.9.21 de Argo CD."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", "baseScore": 4.7, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 1.2, "impactScore": 3.4}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-269"}]}], "references": [{"url": "https://drive.google.com/file/d/1Fynj5Sho8Lf8CETqsNXZyPKlTDdmgJuN/view?usp=sharing", "source": "security-advisories@github.com"}, {"url": "https://github.com/argoproj/argo-cd/commit/05edb2a9ca48f0f10608c1b49fbb0cf7164f6476", "source": "security-advisories@github.com"}, {"url": "https://github.com/argoproj/argo-cd/commit/e96f32d233504101ddac028a5bf8117433d333d6", "source": "security-advisories@github.com"}, {"url": "https://github.com/argoproj/argo-cd/commit/ef535230d8bd8ad7b18aab1ea1063e9751d348c4", "source": "security-advisories@github.com"}, {"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-v8wx-v5jq-qhhw", "source": "security-advisories@github.com"}, {"url": "https://drive.google.com/file/d/1Fynj5Sho8Lf8CETqsNXZyPKlTDdmgJuN/view?usp=sharing", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/argoproj/argo-cd/commit/05edb2a9ca48f0f10608c1b49fbb0cf7164f6476", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/argoproj/argo-cd/commit/e96f32d233504101ddac028a5bf8117433d333d6", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/argoproj/argo-cd/commit/ef535230d8bd8ad7b18aab1ea1063e9751d348c4", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-v8wx-v5jq-qhhw", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-41666", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-24T18:15:05.090", "lastModified": "2025-01-09T16:54:08.037", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Argo CD has a Web-based terminal that allows users to get a shell inside a running pod, just as they would with kubectl exec. Starting in version 2.6.0, when the administrator enables this function and grants permission to the user `p, role:myrole, exec, create, */*, allow`, even if the user revokes this permission, the user can still perform operations in the container, as long as the user keeps the terminal view open for a long time. Although the token expiration and revocation of the user are fixed, however, the fix does not address the situation of revocation of only user `p, role:myrole, exec, create, */*, allow` permissions, which may still lead to the leakage of sensitive information. A patch for this vulnerability has been released in Argo CD versions 2.11.7, 2.10.16, and 2.9.21."}, {"lang": "es", "value": "Argo CD es una herramienta declarativa de entrega continua de GitOps para Kubernetes. Argo CD tiene una terminal basada en web que permite a los usuarios obtener un shell dentro de un pod en ejecuci\u00f3n, tal como lo har\u00edan con kubectl exec. A partir de la versi\u00f3n 2.6.0, cuando el administrador habilita esta funci\u00f3n y otorga permiso al usuario `p, role:myrole, exec, create, */*, enable`, incluso si el usuario revoca este permiso, el usuario a\u00fan puede realizar operaciones en el contenedor, siempre y cuando el usuario mantenga abierta la vista del terminal durante mucho tiempo. Aunque la caducidad del token y la revocaci\u00f3n del usuario est\u00e1n arregladas, la soluci\u00f3n no aborda la situaci\u00f3n de revocaci\u00f3n de permisos \u00fanicamente del usuario `p, role:myrole, exec, create, */*, enable`, lo que a\u00fan puede conducir a la filtraci\u00f3n de informaci\u00f3n sensible. Se lanz\u00f3 un parche para esta vulnerabilidad en las versiones 2.11.7, 2.10.16 y 2.9.21 de Argo CD."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", "baseScore": 4.7, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 1.2, "impactScore": 3.4}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-269"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.6.0", "versionEndExcluding": "2.9.21", "matchCriteriaId": "16C03FB1-4E29-4BB9-8157-4FDA0A57DADC"}, {"vulnerable": true, "criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.10.0", "versionEndExcluding": "2.10.16", "matchCriteriaId": "EFCD9B49-F26A-4AA7-A311-1D29DA39CDA1"}, {"vulnerable": true, "criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.11.0", "versionEndExcluding": "2.11.7", "matchCriteriaId": "D218BAA2-2CE3-48E4-B633-840741F21363"}]}]}], "references": [{"url": "https://drive.google.com/file/d/1Fynj5Sho8Lf8CETqsNXZyPKlTDdmgJuN/view?usp=sharing", "source": "security-advisories@github.com", "tags": ["Exploit"]}, {"url": "https://github.com/argoproj/argo-cd/commit/05edb2a9ca48f0f10608c1b49fbb0cf7164f6476", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/commit/e96f32d233504101ddac028a5bf8117433d333d6", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/commit/ef535230d8bd8ad7b18aab1ea1063e9751d348c4", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-v8wx-v5jq-qhhw", "source": "security-advisories@github.com", "tags": ["Exploit", "Vendor Advisory"]}, {"url": "https://drive.google.com/file/d/1Fynj5Sho8Lf8CETqsNXZyPKlTDdmgJuN/view?usp=sharing", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit"]}, {"url": "https://github.com/argoproj/argo-cd/commit/05edb2a9ca48f0f10608c1b49fbb0cf7164f6476", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/commit/e96f32d233504101ddac028a5bf8117433d333d6", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/commit/ef535230d8bd8ad7b18aab1ea1063e9751d348c4", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-v8wx-v5jq-qhhw", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-4452.json b/cve/2024/CVE-2024-4452.json index c093ea3a991..9ac4bbdb78a 100644 --- a/cve/2024/CVE-2024-4452.json +++ b/cve/2024/CVE-2024-4452.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-4452", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-21T14:15:12.563", "lastModified": "2024-11-21T09:42:51.580", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "The ElementsKit Pro plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018url\u2019 parameter in versions up to, and including, 3.6.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."}, {"lang": "es", "value": " El complemento ElementsKit Pro para WordPress es vulnerable a Cross Site Scripting Almacenado a trav\u00e9s del par\u00e1metro 'url' en versiones hasta la 3.6.1 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con permisos de nivel de colaborador y superiores, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."}], "metrics": {"cvssMetricV31": [{"source": "security@wordfence.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", "baseScore": 6.4, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 3.1, "impactScore": 2.7}]}, "references": [{"url": "https://wpmet.com/plugin/elementskit/", "source": "security@wordfence.com"}, {"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/488ac848-786e-4100-a387-5a40e8fc4175?source=cve", "source": "security@wordfence.com"}, {"url": "https://wpmet.com/plugin/elementskit/", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/488ac848-786e-4100-a387-5a40e8fc4175?source=cve", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-4452", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-21T14:15:12.563", "lastModified": "2025-01-09T17:46:34.190", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "The ElementsKit Pro plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018url\u2019 parameter in versions up to, and including, 3.6.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."}, {"lang": "es", "value": " El complemento ElementsKit Pro para WordPress es vulnerable a Cross Site Scripting Almacenado a trav\u00e9s del par\u00e1metro 'url' en versiones hasta la 3.6.1 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con permisos de nivel de colaborador y superiores, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."}], "metrics": {"cvssMetricV31": [{"source": "security@wordfence.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", "baseScore": 6.4, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 3.1, "impactScore": 2.7}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "baseScore": 5.4, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.3, "impactScore": 2.7}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:wpmet:elementskit:*:*:*:*:pro:wordpress:*:*", "versionEndExcluding": "3.6.2", "matchCriteriaId": "49350E3D-5C97-4857-90E9-CC2C78E9FA76"}]}]}], "references": [{"url": "https://wpmet.com/plugin/elementskit/", "source": "security@wordfence.com", "tags": ["Product"]}, {"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/488ac848-786e-4100-a387-5a40e8fc4175?source=cve", "source": "security@wordfence.com", "tags": ["Third Party Advisory"]}, {"url": "https://wpmet.com/plugin/elementskit/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Product"]}, {"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/488ac848-786e-4100-a387-5a40e8fc4175?source=cve", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-44985.json b/cve/2024/CVE-2024-44985.json index e451f275852..83c4ca4fa46 100644 --- a/cve/2024/CVE-2024-44985.json +++ b/cve/2024/CVE-2024-44985.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-44985", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-04T20:15:07.777", "lastModified": "2024-09-05T17:54:11.313", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: prevent possible UAF in ip6_xmit()\n\nIf skb_expand_head() returns NULL, skb has been freed\nand the associated dst/idev could also have been freed.\n\nWe must use rcu_read_lock() to prevent a possible UAF."}, {"lang": "es", "value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: ipv6: evitar posible UAF en ip6_xmit() Si skb_expand_head() devuelve NULL, skb se ha liberado y el dst/idev asociado tambi\u00e9n podr\u00eda haberse liberado. Debemos utilizar rcu_read_lock() para evitar un posible UAF."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.8, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-416"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.15", "versionEndExcluding": "5.15.166", "matchCriteriaId": "1E86C365-0589-4961-B85C-B76395A12CC0"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.16", "versionEndExcluding": "6.1.107", "matchCriteriaId": "53954FF8-CB48-4302-BC4C-9DA7A88F44A2"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.2", "versionEndExcluding": "6.6.48", "matchCriteriaId": "9DE9201A-CE6B-4726-BABB-8265EA0F8AE4"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.7", "versionEndExcluding": "6.10.7", "matchCriteriaId": "D2AFDFD1-D95A-4EB7-843B-5E7659518B67"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", "matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*", "matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*", "matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754"}]}]}], "references": [{"url": "https://git.kernel.org/stable/c/124b428fe28064c809e4237b0b38e97200a8a4a8", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/2d5ff7e339d04622d8282661df36151906d0e1c7", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/38a21c026ed2cc7232414cb166efc1923f34af17", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/975f764e96f71616b530e300c1bb2ac0ce0c2596", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/fc88d6c1f2895a5775795d82ec581afdff7661d1", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-44985", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-04T20:15:07.777", "lastModified": "2025-01-09T16:15:38.177", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: prevent possible UAF in ip6_xmit()\n\nIf skb_expand_head() returns NULL, skb has been freed\nand the associated dst/idev could also have been freed.\n\nWe must use rcu_read_lock() to prevent a possible UAF."}, {"lang": "es", "value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: ipv6: evitar posible UAF en ip6_xmit() Si skb_expand_head() devuelve NULL, skb se ha liberado y el dst/idev asociado tambi\u00e9n podr\u00eda haberse liberado. Debemos utilizar rcu_read_lock() para evitar un posible UAF."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.8, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-416"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.15", "versionEndExcluding": "5.15.166", "matchCriteriaId": "1E86C365-0589-4961-B85C-B76395A12CC0"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.16", "versionEndExcluding": "6.1.107", "matchCriteriaId": "53954FF8-CB48-4302-BC4C-9DA7A88F44A2"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.2", "versionEndExcluding": "6.6.48", "matchCriteriaId": "9DE9201A-CE6B-4726-BABB-8265EA0F8AE4"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.7", "versionEndExcluding": "6.10.7", "matchCriteriaId": "D2AFDFD1-D95A-4EB7-843B-5E7659518B67"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", "matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*", "matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*", "matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754"}]}]}], "references": [{"url": "https://git.kernel.org/stable/c/124b428fe28064c809e4237b0b38e97200a8a4a8", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/2d5ff7e339d04622d8282661df36151906d0e1c7", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/38a21c026ed2cc7232414cb166efc1923f34af17", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/975f764e96f71616b530e300c1bb2ac0ce0c2596", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/b3a3d5333c13a1be57499581eab4a8fc94d57f36", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/c47e022011719fc5727bca661d662303180535ba", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/fc88d6c1f2895a5775795d82ec581afdff7661d1", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-46601.json b/cve/2024/CVE-2024-46601.json index ff7a589ee7b..c7e532d059b 100644 --- a/cve/2024/CVE-2024-46601.json +++ b/cve/2024/CVE-2024-46601.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-46601", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-07T16:15:34.087", "lastModified": "2025-01-08T20:15:27.920", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Elspec Engineering G5 Digital Fault Recorder Firmware v1.2.1.12 was discovered to contain a buffer overflow."}, {"lang": "es", "value": "Se descubri\u00f3 que Elspec Engineering G5 Digital Fault Recorder Firmware v1.2.1.12 conten\u00eda un desbordamiento de b\u00fafer."}], "metrics": {"cvssMetricV31": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.6}]}, "weaknesses": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-120"}]}], "references": [{"url": "http://elspec.com", "source": "cve@mitre.org"}, {"url": "http://g5.com", "source": "cve@mitre.org"}, {"url": "https://www.elspec-ltd.com/support/security-advisories/", "source": "cve@mitre.org"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-46601", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-07T16:15:34.087", "lastModified": "2025-01-09T16:15:38.330", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Elspec Engineering G5 Digital Fault Recorder Firmware v1.2.1.12 was discovered to contain a buffer overflow."}, {"lang": "es", "value": "Se descubri\u00f3 que Elspec Engineering G5 Digital Fault Recorder Firmware v1.2.1.12 conten\u00eda un desbordamiento de b\u00fafer."}], "metrics": {"cvssMetricV31": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.6}]}, "weaknesses": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-120"}]}], "references": [{"url": "https://www.elspec-ltd.com/support/security-advisories/", "source": "cve@mitre.org"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-46602.json b/cve/2024/CVE-2024-46602.json index ac015c97139..296d06619df 100644 --- a/cve/2024/CVE-2024-46602.json +++ b/cve/2024/CVE-2024-46602.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-46602", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-07T16:15:34.213", "lastModified": "2025-01-07T19:15:32.597", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "An issue was discovered in Elspec G5 digital fault recorder version 1.2.1.12 and earlier. An XML External Entity (XXE) vulnerability may allow an attacker to cause a Denial of Service (DoS) via a crafted XML payload."}], "metrics": {"cvssMetricV31": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.6}]}, "weaknesses": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-611"}]}], "references": [{"url": "http://elspec.com", "source": "cve@mitre.org"}, {"url": "http://g5.com", "source": "cve@mitre.org"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-46602", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-07T16:15:34.213", "lastModified": "2025-01-09T16:15:38.547", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "An issue was discovered in Elspec G5 digital fault recorder version 1.2.1.12 and earlier. An XML External Entity (XXE) vulnerability may allow an attacker to cause a Denial of Service (DoS) via a crafted XML payload."}, {"lang": "es", "value": "Se descubri\u00f3 un problema en la versi\u00f3n 1.2.1.12 y anteriores del registrador de fallas digital Elspec G5. Una vulnerabilidad de entidad externa XML (XXE) puede permitir que un atacante provoque una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una carga XML manipulada."}], "metrics": {"cvssMetricV31": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.6}]}, "weaknesses": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-611"}]}], "references": [{"url": "https://www.elspec-ltd.com/support/security-advisories.", "source": "cve@mitre.org"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-46603.json b/cve/2024/CVE-2024-46603.json index 7c544cb988c..1e53d1dab78 100644 --- a/cve/2024/CVE-2024-46603.json +++ b/cve/2024/CVE-2024-46603.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-46603", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-07T16:15:34.370", "lastModified": "2025-01-07T21:15:11.983", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "An XML External Entity (XXE) vulnerability in Elspec Engineering G5 Digital Fault Recorder Firmware v1.2.1.12 allows attackers to cause a Denial of Service (DoS) via a crafted XML payload."}], "metrics": {"cvssMetricV31": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.6}]}, "weaknesses": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-611"}]}], "references": [{"url": "http://elspec.com", "source": "cve@mitre.org"}, {"url": "http://g5.com", "source": "cve@mitre.org"}, {"url": "https://www.elspec-ltd.com/support/security-advisories/", "source": "cve@mitre.org"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-46603", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-07T16:15:34.370", "lastModified": "2025-01-09T16:15:38.730", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "An XML External Entity (XXE) vulnerability in Elspec Engineering G5 Digital Fault Recorder Firmware v1.2.1.12 allows attackers to cause a Denial of Service (DoS) via a crafted XML payload."}, {"lang": "es", "value": "Una vulnerabilidad de entidad externa XML (XXE) en Elspec Engineering G5 Digital Fault Recorder Firmware v1.2.1.12 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un payload XML manipulada."}], "metrics": {"cvssMetricV31": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.6}]}, "weaknesses": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-611"}]}], "references": [{"url": "https://www.elspec-ltd.com/support/security-advisories/", "source": "cve@mitre.org"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-46756.json b/cve/2024/CVE-2024-46756.json index f4b5e94859d..0b8d3d6f380 100644 --- a/cve/2024/CVE-2024-46756.json +++ b/cve/2024/CVE-2024-46756.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-46756", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-18T08:15:04.260", "lastModified": "2024-09-23T16:29:45.077", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwmon: (w83627ehf) Fix underflows seen when writing limit attributes\n\nDIV_ROUND_CLOSEST() after kstrtol() results in an underflow if a large\nnegative number such as -9223372036854775808 is provided by the user.\nFix it by reordering clamp_val() and DIV_ROUND_CLOSEST() operations."}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: hwmon: (w83627ehf) Se corrigen los desbordamientos de l\u00ednea observados al escribir los atributos de l\u00edmite DIV_ROUND_CLOSEST() despu\u00e9s de que kstrtol() d\u00e9 como resultado un desbordamiento de l\u00ednea si el usuario proporciona un n\u00famero negativo grande, como -9223372036854775808. Se soluciona reordenando las operaciones clamp_val() y DIV_ROUND_CLOSEST()."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.8, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-191"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "4.19.322", "matchCriteriaId": "29162FB8-5FA4-4DC4-86CE-5EB0CAEEF2F3"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.20", "versionEndExcluding": "5.4.284", "matchCriteriaId": "6265A402-9C3C-438F-BFC5-4194B2568B85"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.5", "versionEndExcluding": "5.10.226", "matchCriteriaId": "864FC17C-501A-4823-A643-6F35D65D8A97"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.11", "versionEndExcluding": "5.15.167", "matchCriteriaId": "043405A4-25FE-45D4-A7BB-2A0C3B7D17C1"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.16", "versionEndExcluding": "6.1.110", "matchCriteriaId": "6B1A95FC-7E7E-428B-BB59-F76640C652AE"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.2", "versionEndExcluding": "6.6.51", "matchCriteriaId": "E4529134-BAC4-4776-840B-304009E181A0"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.7", "versionEndExcluding": "6.10.10", "matchCriteriaId": "ACDEE48C-137A-4731-90D0-A675865E1BED"}]}]}], "references": [{"url": "https://git.kernel.org/stable/c/26825b62bd1bd3e53b4f44e0745cb516d5186343", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/56cfdeb2c77291f0b5e4592731adfb6ca8fc7c24", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/5c1de37969b7bc0abcb20b86e91e70caebbd4f89", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/77ab0fd231c4ca873ec6908e761970360acc6df2", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/8fecb75bff1b7d87a071c32a37aa0700f2be379d", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/93cf73a7bfdce683bde3a7bb65f270d3bd24497b", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/cc4be794c8d8c253770103e097ab9dbdb5f99ae1", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/d92f0baf99a7e327dcceab37cce57c38aab1f691", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-46756", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-18T08:15:04.260", "lastModified": "2025-01-09T16:15:38.913", "vulnStatus": "Rejected", "cveTags": [], "descriptions": [{"lang": "en", "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."}], "metrics": {}, "references": []}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-46757.json b/cve/2024/CVE-2024-46757.json index 4ad993f8fe8..a18a80879ce 100644 --- a/cve/2024/CVE-2024-46757.json +++ b/cve/2024/CVE-2024-46757.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-46757", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-18T08:15:04.313", "lastModified": "2024-09-23T16:29:51.650", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwmon: (nct6775-core) Fix underflows seen when writing limit attributes\n\nDIV_ROUND_CLOSEST() after kstrtol() results in an underflow if a large\nnegative number such as -9223372036854775808 is provided by the user.\nFix it by reordering clamp_val() and DIV_ROUND_CLOSEST() operations."}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: hwmon: (nct6775-core) Se corrigen los desbordamientos de l\u00ednea observados al escribir los atributos de l\u00edmite DIV_ROUND_CLOSEST() despu\u00e9s de que kstrtol() genere un desbordamiento de l\u00ednea si el usuario proporciona un n\u00famero negativo grande, como -9223372036854775808. Se soluciona reordenando las operaciones clamp_val() y DIV_ROUND_CLOSEST()."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.8, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-191"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "4.19.322", "matchCriteriaId": "29162FB8-5FA4-4DC4-86CE-5EB0CAEEF2F3"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.20", "versionEndExcluding": "5.4.284", "matchCriteriaId": "6265A402-9C3C-438F-BFC5-4194B2568B85"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.5", "versionEndExcluding": "5.10.226", "matchCriteriaId": "864FC17C-501A-4823-A643-6F35D65D8A97"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.11", "versionEndExcluding": "5.15.167", "matchCriteriaId": "043405A4-25FE-45D4-A7BB-2A0C3B7D17C1"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.16", "versionEndExcluding": "6.1.110", "matchCriteriaId": "6B1A95FC-7E7E-428B-BB59-F76640C652AE"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.2", "versionEndExcluding": "6.6.51", "matchCriteriaId": "E4529134-BAC4-4776-840B-304009E181A0"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.7", "versionEndExcluding": "6.10.10", "matchCriteriaId": "ACDEE48C-137A-4731-90D0-A675865E1BED"}]}]}], "references": [{"url": "https://git.kernel.org/stable/c/02bb3b4c7d5695ff4be01e0f55676bba49df435e", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/0403e10bf0824bf0ec2bb135d4cf1c0cc3bf4bf0", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/0c23e18cef20b989a9fd7cb0a745e1259b969159", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/298a55f11edd811f2189b74eb8f53dee34d4f14c", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/2f695544084a559f181cafdfd3f864c5ff9dd1db", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/8a1e958e26640ce015abdbb75c8896301b9bf398", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/996221b030995cc5f5baa4a642201d64b62a17cd", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/d6035c55fa9afefc23f85f57eff1d4a1d82c5b10", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-46757", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-18T08:15:04.313", "lastModified": "2025-01-09T16:16:01.010", "vulnStatus": "Rejected", "cveTags": [], "descriptions": [{"lang": "en", "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."}], "metrics": {}, "references": []}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-46758.json b/cve/2024/CVE-2024-46758.json index bd26effbc5d..4144fe9bb9a 100644 --- a/cve/2024/CVE-2024-46758.json +++ b/cve/2024/CVE-2024-46758.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-46758", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-18T08:15:04.367", "lastModified": "2024-09-23T16:29:24.767", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwmon: (lm95234) Fix underflows seen when writing limit attributes\n\nDIV_ROUND_CLOSEST() after kstrtol() results in an underflow if a large\nnegative number such as -9223372036854775808 is provided by the user.\nFix it by reordering clamp_val() and DIV_ROUND_CLOSEST() operations."}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: hwmon: (lm95234) Se corrigen los desbordamientos de l\u00ednea observados al escribir los atributos de l\u00edmite DIV_ROUND_CLOSEST() despu\u00e9s de que kstrtol() genere un desbordamiento de l\u00ednea si el usuario proporciona un n\u00famero negativo grande, como -9223372036854775808. Se soluciona reordenando las operaciones clamp_val() y DIV_ROUND_CLOSEST()."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.8, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-191"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "4.19.322", "matchCriteriaId": "29162FB8-5FA4-4DC4-86CE-5EB0CAEEF2F3"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.20", "versionEndExcluding": "5.4.284", "matchCriteriaId": "6265A402-9C3C-438F-BFC5-4194B2568B85"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.5", "versionEndExcluding": "5.10.226", "matchCriteriaId": "864FC17C-501A-4823-A643-6F35D65D8A97"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.11", "versionEndExcluding": "5.15.167", "matchCriteriaId": "043405A4-25FE-45D4-A7BB-2A0C3B7D17C1"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.16", "versionEndExcluding": "6.1.110", "matchCriteriaId": "6B1A95FC-7E7E-428B-BB59-F76640C652AE"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.2", "versionEndExcluding": "6.6.51", "matchCriteriaId": "E4529134-BAC4-4776-840B-304009E181A0"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.7", "versionEndExcluding": "6.10.10", "matchCriteriaId": "ACDEE48C-137A-4731-90D0-A675865E1BED"}]}]}], "references": [{"url": "https://git.kernel.org/stable/c/0fc27747633aa419f9af40e7bdfa00d2ec94ea81", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/16f42953231be1e7be77bc24005270d9e0d9d2ee", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/438453dfbbdcf4be26891492644aa3ecbb42c336", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/46e4fd338d5bdbaf60e41cda625b24949d2af201", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/59c1fb9874a01c9abc49a0a32f192a7e7b4e2650", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/93f0f5721d0cca45dac50af1ae6f9a9826c699fd", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/af64e3e1537896337405f880c1e9ac1f8c0c6198", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/da765bebd90e1b92bdbc3c6a27a3f3cc81529ab6", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-46758", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-18T08:15:04.367", "lastModified": "2025-01-09T16:16:11.213", "vulnStatus": "Rejected", "cveTags": [], "descriptions": [{"lang": "en", "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."}], "metrics": {}, "references": []}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-46972.json b/cve/2024/CVE-2024-46972.json index b63a35da634..5123a865183 100644 --- a/cve/2024/CVE-2024-46972.json +++ b/cve/2024/CVE-2024-46972.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-46972", "sourceIdentifier": "367425dc-4d06-4041-9650-c2dc6aaa27ce", "published": "2024-12-28T05:15:08.497", "lastModified": "2024-12-28T05:15:08.497", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Software installed and run as a non-privileged user may conduct improper GPU system calls to trigger use-after-free kernel exceptions."}], "metrics": {}, "weaknesses": [{"source": "367425dc-4d06-4041-9650-c2dc6aaa27ce", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-911"}]}], "references": [{"url": "https://www.imaginationtech.com/gpu-driver-vulnerabilities/", "source": "367425dc-4d06-4041-9650-c2dc6aaa27ce"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-46972", "sourceIdentifier": "367425dc-4d06-4041-9650-c2dc6aaa27ce", "published": "2024-12-28T05:15:08.497", "lastModified": "2025-01-09T17:15:15.030", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Software installed and run as a non-privileged user may conduct improper GPU system calls to trigger use-after-free kernel exceptions."}, {"lang": "es", "value": "El software instalado y ejecutado como un usuario sin privilegios puede realizar llamadas al sistema de GPU indebidas para activar excepciones de kernel de use-after-free."}], "metrics": {"cvssMetricV31": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.8, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "367425dc-4d06-4041-9650-c2dc6aaa27ce", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-911"}]}], "references": [{"url": "https://www.imaginationtech.com/gpu-driver-vulnerabilities/", "source": "367425dc-4d06-4041-9650-c2dc6aaa27ce"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-47475.json b/cve/2024/CVE-2024-47475.json index 669d37c2892..a628bdcee1d 100644 --- a/cve/2024/CVE-2024-47475.json +++ b/cve/2024/CVE-2024-47475.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-47475", "sourceIdentifier": "security_alert@emc.com", "published": "2025-01-06T17:15:37.423", "lastModified": "2025-01-06T17:15:37.423", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Dell PowerScale OneFS 8.2.2.x through 9.8.0.x contains an incorrect permission assignment for critical resource vulnerability. A locally authenticated attacker could potentially exploit this vulnerability, leading to denial of service."}], "metrics": {"cvssMetricV31": [{"source": "security_alert@emc.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "baseScore": 5.0, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.3, "impactScore": 3.6}]}, "weaknesses": [{"source": "security_alert@emc.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-732"}]}], "references": [{"url": "https://www.dell.com/support/kbdoc/en-us/000242681/dsa-2024-417-security-update-for-dell-powerscale-onefs-for-security-vulnerability", "source": "security_alert@emc.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-47475", "sourceIdentifier": "security_alert@emc.com", "published": "2025-01-06T17:15:37.423", "lastModified": "2025-01-09T16:04:01.680", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Dell PowerScale OneFS 8.2.2.x through 9.8.0.x contains an incorrect permission assignment for critical resource vulnerability. A locally authenticated attacker could potentially exploit this vulnerability, leading to denial of service."}, {"lang": "es", "value": "Dell PowerScale OneFS 8.2.2.x a 9.8.0.x contiene una asignaci\u00f3n de permisos incorrecta para una vulnerabilidad de recursos cr\u00edticos. Un atacante autenticado localmente podr\u00eda aprovechar esta vulnerabilidad, lo que provocar\u00eda una denegaci\u00f3n de servicio."}], "metrics": {"cvssMetricV31": [{"source": "security_alert@emc.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "baseScore": 5.0, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.3, "impactScore": 3.6}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "baseScore": 5.5, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "security_alert@emc.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-732"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*", "versionStartIncluding": "8.2.2", "versionEndExcluding": "9.4.0.20", "matchCriteriaId": "7E486BCD-9723-4D6F-8715-DBF89A5EA984"}, {"vulnerable": true, "criteria": "cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.5.0.0", "versionEndIncluding": "9.5.0.8", "matchCriteriaId": "1231FE55-A5D1-4535-8395-A84DC01A3F61"}, {"vulnerable": true, "criteria": "cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.6.0", "versionEndIncluding": "9.7.0.3", "matchCriteriaId": "84C7CC7A-E811-4AA2-81CD-6C1BE9463CC4"}, {"vulnerable": true, "criteria": "cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.8.0.0", "versionEndIncluding": "9.8.0.2", "matchCriteriaId": "4F6E34FF-B6C5-41A0-A62A-42CDB0EBDE8C"}]}]}], "references": [{"url": "https://www.dell.com/support/kbdoc/en-us/000242681/dsa-2024-417-security-update-for-dell-powerscale-onefs-for-security-vulnerability", "source": "security_alert@emc.com", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-47726.json b/cve/2024/CVE-2024-47726.json index c3355f5f697..388c9a3bc81 100644 --- a/cve/2024/CVE-2024-47726.json +++ b/cve/2024/CVE-2024-47726.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-47726", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:02.767", "lastModified": "2024-10-24T14:24:15.993", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to wait dio completion\n\nIt should wait all existing dio write IOs before block removal,\notherwise, previous direct write IO may overwrite data in the\nblock which may be reused by other inode."}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: f2fs: correcci\u00f3n para esperar la finalizaci\u00f3n de dio Se debe esperar todas las E/S de escritura de dio existentes antes de eliminar el bloque; de lo contrario, las E/S de escritura directa anteriores pueden sobrescribir los datos en el bloque que pueden ser reutilizados por otro inodo."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.11.2", "matchCriteriaId": "2235E7DC-717F-4BE0-AC47-34A75D29E6BD"}]}]}], "references": [{"url": "https://git.kernel.org/stable/c/96cfeb0389530ae32ade8a48ae3ae1ac3b6c009d", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/e3db757ff9b7101ae68650ac5f6dd5743b68164e", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-47726", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:02.767", "lastModified": "2025-01-09T16:16:20.367", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to wait dio completion\n\nIt should wait all existing dio write IOs before block removal,\notherwise, previous direct write IO may overwrite data in the\nblock which may be reused by other inode."}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: f2fs: correcci\u00f3n para esperar la finalizaci\u00f3n de dio Se debe esperar todas las E/S de escritura de dio existentes antes de eliminar el bloque; de lo contrario, las E/S de escritura directa anteriores pueden sobrescribir los datos en el bloque que pueden ser reutilizados por otro inodo."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.11.2", "matchCriteriaId": "2235E7DC-717F-4BE0-AC47-34A75D29E6BD"}]}]}], "references": [{"url": "https://git.kernel.org/stable/c/96cfeb0389530ae32ade8a48ae3ae1ac3b6c009d", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/c2a7fc514637f640ff55c3f3e3ed879970814a3f", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/e3db757ff9b7101ae68650ac5f6dd5743b68164e", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-49998.json b/cve/2024/CVE-2024-49998.json index fe327e0330c..0d13a0bb0db 100644 --- a/cve/2024/CVE-2024-49998.json +++ b/cve/2024/CVE-2024-49998.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-49998", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T18:15:19.907", "lastModified": "2024-10-30T22:04:10.400", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: dsa: improve shutdown sequence\n\nAlexander Sverdlin presents 2 problems during shutdown with the\nlan9303 driver. One is specific to lan9303 and the other just happens\nto reproduce there.\n\nThe first problem is that lan9303 is unique among DSA drivers in that it\ncalls dev_get_drvdata() at \"arbitrary runtime\" (not probe, not shutdown,\nnot remove):\n\nphy_state_machine()\n-> ...\n -> dsa_user_phy_read()\n -> ds->ops->phy_read()\n -> lan9303_phy_read()\n -> chip->ops->phy_read()\n -> lan9303_mdio_phy_read()\n -> dev_get_drvdata()\n\nBut we never stop the phy_state_machine(), so it may continue to run\nafter dsa_switch_shutdown(). Our common pattern in all DSA drivers is\nto set drvdata to NULL to suppress the remove() method that may come\nafterwards. But in this case it will result in an NPD.\n\nThe second problem is that the way in which we set\ndp->conduit->dsa_ptr = NULL; is concurrent with receive packet\nprocessing. dsa_switch_rcv() checks once whether dev->dsa_ptr is NULL,\nbut afterwards, rather than continuing to use that non-NULL value,\ndev->dsa_ptr is dereferenced again and again without NULL checks:\ndsa_conduit_find_user() and many other places. In between dereferences,\nthere is no locking to ensure that what was valid once continues to be\nvalid.\n\nBoth problems have the common aspect that closing the conduit interface\nsolves them.\n\nIn the first case, dev_close(conduit) triggers the NETDEV_GOING_DOWN\nevent in dsa_user_netdevice_event() which closes user ports as well.\ndsa_port_disable_rt() calls phylink_stop(), which synchronously stops\nthe phylink state machine, and ds->ops->phy_read() will thus no longer\ncall into the driver after this point.\n\nIn the second case, dev_close(conduit) should do this, as per\nDocumentation/networking/driver.rst:\n\n| Quiescence\n| ----------\n|\n| After the ndo_stop routine has been called, the hardware must\n| not receive or transmit any data. All in flight packets must\n| be aborted. If necessary, poll or wait for completion of\n| any reset commands.\n\nSo it should be sufficient to ensure that later, when we zeroize\nconduit->dsa_ptr, there will be no concurrent dsa_switch_rcv() call\non this conduit.\n\nThe addition of the netif_device_detach() function is to ensure that\nioctls, rtnetlinks and ethtool requests on the user ports no longer\npropagate down to the driver - we're no longer prepared to handle them.\n\nThe race condition actually did not exist when commit 0650bf52b31f\n(\"net: dsa: be compatible with masters which unregister on shutdown\")\nfirst introduced dsa_switch_shutdown(). It was created later, when we\nstopped unregistering the user interfaces from a bad spot, and we just\nreplaced that sequence with a racy zeroization of conduit->dsa_ptr\n(one which doesn't ensure that the interfaces aren't up)."}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: dsa: mejorar la secuencia de apagado Alexander Sverdlin presenta 2 problemas durante el apagado con el controlador lan9303. Uno es espec\u00edfico de lan9303 y el otro simplemente se reproduce all\u00ed. El primer problema es que lan9303 es \u00fanico entre los controladores DSA en el sentido de que llama a dev_get_drvdata() en un \"tiempo de ejecuci\u00f3n arbitrario\" (no sondeo, no apagado, no eliminaci\u00f3n): phy_state_machine() -> ... -> dsa_user_phy_read() -> ds->ops->phy_read() -> lan9303_phy_read() -> chip->ops->phy_read() -> lan9303_mdio_phy_read() -> dev_get_drvdata() Pero nunca detenemos phy_state_machine(), por lo que puede continuar ejecut\u00e1ndose despu\u00e9s de dsa_switch_shutdown(). Nuestro patr\u00f3n com\u00fan en todos los controladores DSA es establecer drvdata en NULL para suprimir el m\u00e9todo remove() que puede venir despu\u00e9s. Pero en este caso resultar\u00e1 en un NPD. El segundo problema es que la forma en que establecemos dp->conduit->dsa_ptr = NULL; es concurrente con el procesamiento de paquetes de recepci\u00f3n. dsa_switch_rcv() verifica una vez si dev->dsa_ptr es NULL, pero despu\u00e9s, en lugar de continuar usando ese valor no NULL, dev->dsa_ptr se desreferencia una y otra vez sin verificaciones NULL: dsa_conduit_find_user() y muchos otros lugares. Entre desreferencias, no hay bloqueo para asegurar que lo que era v\u00e1lido una vez contin\u00faa siendo v\u00e1lido. Ambos problemas tienen el aspecto com\u00fan de que cerrar la interfaz del conducto los resuelve. En el primer caso, dev_close(conduit) activa el evento NETDEV_GOING_DOWN en dsa_user_netdevice_event() que tambi\u00e9n cierra los puertos de usuario. dsa_port_disable_rt() llama a phylink_stop(), que detiene sincr\u00f3nicamente la m\u00e1quina de estado de phylink, y ds->ops->phy_read() ya no llamar\u00e1 al controlador despu\u00e9s de este punto. En el segundo caso, dev_close(conduit) deber\u00eda hacer esto, seg\u00fan Documentation/networking/driver.rst: | Quiescence | ---------- | | Despu\u00e9s de que se haya llamado a la rutina ndo_stop, el hardware no debe recibir ni transmitir ning\u00fan dato. Todos los paquetes en tr\u00e1nsito deben ser abortados. Si es necesario, sondee o espere a que se completen los comandos de reinicio. Por lo tanto, deber\u00eda ser suficiente para garantizar que m\u00e1s adelante, cuando pongamos a cero conduit->dsa_ptr, no habr\u00e1 ninguna llamada dsa_switch_rcv() concurrente en este conducto. La adici\u00f3n de la funci\u00f3n netif_device_detach() es para garantizar que las solicitudes ioctls, rtnetlinks y ethtool en los puertos de usuario ya no se propaguen al controlador; ya no estamos preparados para manejarlas. La condici\u00f3n de ejecuci\u00f3n en realidad no exist\u00eda cuando el commit 0650bf52b31f (\"net: dsa: sea compatible con los maestros que cancelan el registro al apagar\") introdujo por primera vez dsa_switch_shutdown(). Se cre\u00f3 m\u00e1s tarde, cuando dejamos de cancelar el registro de las interfaces de usuario desde un lugar incorrecto y simplemente reemplazamos esa secuencia con una puesta a cero de ejecuci\u00f3n de conduit->dsa_ptr (que no garantiza que las interfaces no est\u00e9n activas)."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "baseScore": 4.7, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.0, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-367"}, {"lang": "en", "value": "CWE-476"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.15.155", "versionEndExcluding": "5.16", "matchCriteriaId": "5E1DEA80-F82B-404D-9BFF-B251D28EECE1"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.16.10", "versionEndExcluding": "5.17", "matchCriteriaId": "EC68CAC9-3619-42EC-A9B1-3CB0ACC2EE27"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.17", "versionEndExcluding": "6.10.14", "matchCriteriaId": "76DE2BAD-A9E3-4933-B8B4-9ED1212F1DF1"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.11", "versionEndExcluding": "6.11.3", "matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", "matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"}]}]}], "references": [{"url": "https://git.kernel.org/stable/c/6c24a03a61a245fe34d47582898331fa034b6ccd", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/ab5d3420a1120950703dbdc33698b28a6ebc3d23", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/b4a65d479213fe84ecb14e328271251eebe69492", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-49998", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T18:15:19.907", "lastModified": "2025-01-09T16:16:20.520", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: dsa: improve shutdown sequence\n\nAlexander Sverdlin presents 2 problems during shutdown with the\nlan9303 driver. One is specific to lan9303 and the other just happens\nto reproduce there.\n\nThe first problem is that lan9303 is unique among DSA drivers in that it\ncalls dev_get_drvdata() at \"arbitrary runtime\" (not probe, not shutdown,\nnot remove):\n\nphy_state_machine()\n-> ...\n -> dsa_user_phy_read()\n -> ds->ops->phy_read()\n -> lan9303_phy_read()\n -> chip->ops->phy_read()\n -> lan9303_mdio_phy_read()\n -> dev_get_drvdata()\n\nBut we never stop the phy_state_machine(), so it may continue to run\nafter dsa_switch_shutdown(). Our common pattern in all DSA drivers is\nto set drvdata to NULL to suppress the remove() method that may come\nafterwards. But in this case it will result in an NPD.\n\nThe second problem is that the way in which we set\ndp->conduit->dsa_ptr = NULL; is concurrent with receive packet\nprocessing. dsa_switch_rcv() checks once whether dev->dsa_ptr is NULL,\nbut afterwards, rather than continuing to use that non-NULL value,\ndev->dsa_ptr is dereferenced again and again without NULL checks:\ndsa_conduit_find_user() and many other places. In between dereferences,\nthere is no locking to ensure that what was valid once continues to be\nvalid.\n\nBoth problems have the common aspect that closing the conduit interface\nsolves them.\n\nIn the first case, dev_close(conduit) triggers the NETDEV_GOING_DOWN\nevent in dsa_user_netdevice_event() which closes user ports as well.\ndsa_port_disable_rt() calls phylink_stop(), which synchronously stops\nthe phylink state machine, and ds->ops->phy_read() will thus no longer\ncall into the driver after this point.\n\nIn the second case, dev_close(conduit) should do this, as per\nDocumentation/networking/driver.rst:\n\n| Quiescence\n| ----------\n|\n| After the ndo_stop routine has been called, the hardware must\n| not receive or transmit any data. All in flight packets must\n| be aborted. If necessary, poll or wait for completion of\n| any reset commands.\n\nSo it should be sufficient to ensure that later, when we zeroize\nconduit->dsa_ptr, there will be no concurrent dsa_switch_rcv() call\non this conduit.\n\nThe addition of the netif_device_detach() function is to ensure that\nioctls, rtnetlinks and ethtool requests on the user ports no longer\npropagate down to the driver - we're no longer prepared to handle them.\n\nThe race condition actually did not exist when commit 0650bf52b31f\n(\"net: dsa: be compatible with masters which unregister on shutdown\")\nfirst introduced dsa_switch_shutdown(). It was created later, when we\nstopped unregistering the user interfaces from a bad spot, and we just\nreplaced that sequence with a racy zeroization of conduit->dsa_ptr\n(one which doesn't ensure that the interfaces aren't up)."}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: dsa: mejorar la secuencia de apagado Alexander Sverdlin presenta 2 problemas durante el apagado con el controlador lan9303. Uno es espec\u00edfico de lan9303 y el otro simplemente se reproduce all\u00ed. El primer problema es que lan9303 es \u00fanico entre los controladores DSA en el sentido de que llama a dev_get_drvdata() en un \"tiempo de ejecuci\u00f3n arbitrario\" (no sondeo, no apagado, no eliminaci\u00f3n): phy_state_machine() -> ... -> dsa_user_phy_read() -> ds->ops->phy_read() -> lan9303_phy_read() -> chip->ops->phy_read() -> lan9303_mdio_phy_read() -> dev_get_drvdata() Pero nunca detenemos phy_state_machine(), por lo que puede continuar ejecut\u00e1ndose despu\u00e9s de dsa_switch_shutdown(). Nuestro patr\u00f3n com\u00fan en todos los controladores DSA es establecer drvdata en NULL para suprimir el m\u00e9todo remove() que puede venir despu\u00e9s. Pero en este caso resultar\u00e1 en un NPD. El segundo problema es que la forma en que establecemos dp->conduit->dsa_ptr = NULL; es concurrente con el procesamiento de paquetes de recepci\u00f3n. dsa_switch_rcv() verifica una vez si dev->dsa_ptr es NULL, pero despu\u00e9s, en lugar de continuar usando ese valor no NULL, dev->dsa_ptr se desreferencia una y otra vez sin verificaciones NULL: dsa_conduit_find_user() y muchos otros lugares. Entre desreferencias, no hay bloqueo para asegurar que lo que era v\u00e1lido una vez contin\u00faa siendo v\u00e1lido. Ambos problemas tienen el aspecto com\u00fan de que cerrar la interfaz del conducto los resuelve. En el primer caso, dev_close(conduit) activa el evento NETDEV_GOING_DOWN en dsa_user_netdevice_event() que tambi\u00e9n cierra los puertos de usuario. dsa_port_disable_rt() llama a phylink_stop(), que detiene sincr\u00f3nicamente la m\u00e1quina de estado de phylink, y ds->ops->phy_read() ya no llamar\u00e1 al controlador despu\u00e9s de este punto. En el segundo caso, dev_close(conduit) deber\u00eda hacer esto, seg\u00fan Documentation/networking/driver.rst: | Quiescence | ---------- | | Despu\u00e9s de que se haya llamado a la rutina ndo_stop, el hardware no debe recibir ni transmitir ning\u00fan dato. Todos los paquetes en tr\u00e1nsito deben ser abortados. Si es necesario, sondee o espere a que se completen los comandos de reinicio. Por lo tanto, deber\u00eda ser suficiente para garantizar que m\u00e1s adelante, cuando pongamos a cero conduit->dsa_ptr, no habr\u00e1 ninguna llamada dsa_switch_rcv() concurrente en este conducto. La adici\u00f3n de la funci\u00f3n netif_device_detach() es para garantizar que las solicitudes ioctls, rtnetlinks y ethtool en los puertos de usuario ya no se propaguen al controlador; ya no estamos preparados para manejarlas. La condici\u00f3n de ejecuci\u00f3n en realidad no exist\u00eda cuando el commit 0650bf52b31f (\"net: dsa: sea compatible con los maestros que cancelan el registro al apagar\") introdujo por primera vez dsa_switch_shutdown(). Se cre\u00f3 m\u00e1s tarde, cuando dejamos de cancelar el registro de las interfaces de usuario desde un lugar incorrecto y simplemente reemplazamos esa secuencia con una puesta a cero de ejecuci\u00f3n de conduit->dsa_ptr (que no garantiza que las interfaces no est\u00e9n activas)."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "baseScore": 4.7, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.0, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-367"}, {"lang": "en", "value": "CWE-476"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.15.155", "versionEndExcluding": "5.16", "matchCriteriaId": "5E1DEA80-F82B-404D-9BFF-B251D28EECE1"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.16.10", "versionEndExcluding": "5.17", "matchCriteriaId": "EC68CAC9-3619-42EC-A9B1-3CB0ACC2EE27"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.17", "versionEndExcluding": "6.10.14", "matchCriteriaId": "76DE2BAD-A9E3-4933-B8B4-9ED1212F1DF1"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.11", "versionEndExcluding": "6.11.3", "matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", "matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"}]}]}], "references": [{"url": "https://git.kernel.org/stable/c/6c24a03a61a245fe34d47582898331fa034b6ccd", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/87bd909a7014e32790e8c759d5b7694a95778ca5", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/ab5d3420a1120950703dbdc33698b28a6ebc3d23", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/b4a65d479213fe84ecb14e328271251eebe69492", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-50121.json b/cve/2024/CVE-2024-50121.json index 51a354d822a..9794c95c5f7 100644 --- a/cve/2024/CVE-2024-50121.json +++ b/cve/2024/CVE-2024-50121.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-50121", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-05T18:15:15.080", "lastModified": "2025-01-02T14:15:07.980", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: cancel nfsd_shrinker_work using sync mode in nfs4_state_shutdown_net\n\nIn the normal case, when we excute `echo 0 > /proc/fs/nfsd/threads`, the\nfunction `nfs4_state_destroy_net` in `nfs4_state_shutdown_net` will\nrelease all resources related to the hashed `nfs4_client`. If the\n`nfsd_client_shrinker` is running concurrently, the `expire_client`\nfunction will first unhash this client and then destroy it. This can\nlead to the following warning. Additionally, numerous use-after-free\nerrors may occur as well.\n\nnfsd_client_shrinker echo 0 > /proc/fs/nfsd/threads\n\nexpire_client nfsd_shutdown_net\n unhash_client ...\n nfs4_state_shutdown_net\n /* won't wait shrinker exit */\n /* cancel_work(&nn->nfsd_shrinker_work)\n * nfsd_file for this /* won't destroy unhashed client1 */\n * client1 still alive nfs4_state_destroy_net\n */\n\n nfsd_file_cache_shutdown\n /* trigger warning */\n kmem_cache_destroy(nfsd_file_slab)\n kmem_cache_destroy(nfsd_file_mark_slab)\n /* release nfsd_file and mark */\n __destroy_client\n\n====================================================================\nBUG nfsd_file (Not tainted): Objects remaining in nfsd_file on\n__kmem_cache_shutdown()\n--------------------------------------------------------------------\nCPU: 4 UID: 0 PID: 764 Comm: sh Not tainted 6.12.0-rc3+ #1\n\n dump_stack_lvl+0x53/0x70\n slab_err+0xb0/0xf0\n __kmem_cache_shutdown+0x15c/0x310\n kmem_cache_destroy+0x66/0x160\n nfsd_file_cache_shutdown+0xac/0x210 [nfsd]\n nfsd_destroy_serv+0x251/0x2a0 [nfsd]\n nfsd_svc+0x125/0x1e0 [nfsd]\n write_threads+0x16a/0x2a0 [nfsd]\n nfsctl_transaction_write+0x74/0xa0 [nfsd]\n vfs_write+0x1a5/0x6d0\n ksys_write+0xc1/0x160\n do_syscall_64+0x5f/0x170\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\n====================================================================\nBUG nfsd_file_mark (Tainted: G B W ): Objects remaining\nnfsd_file_mark on __kmem_cache_shutdown()\n--------------------------------------------------------------------\n\n dump_stack_lvl+0x53/0x70\n slab_err+0xb0/0xf0\n __kmem_cache_shutdown+0x15c/0x310\n kmem_cache_destroy+0x66/0x160\n nfsd_file_cache_shutdown+0xc8/0x210 [nfsd]\n nfsd_destroy_serv+0x251/0x2a0 [nfsd]\n nfsd_svc+0x125/0x1e0 [nfsd]\n write_threads+0x16a/0x2a0 [nfsd]\n nfsctl_transaction_write+0x74/0xa0 [nfsd]\n vfs_write+0x1a5/0x6d0\n ksys_write+0xc1/0x160\n do_syscall_64+0x5f/0x170\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nTo resolve this issue, cancel `nfsd_shrinker_work` using synchronous\nmode in nfs4_state_shutdown_net."}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nfsd: cancelar nfsd_shrinker_work usando el modo de sincronizaci\u00f3n en nfs4_state_shutdown_net. En el caso normal, cuando ejecutamos `echo 0 > /proc/fs/nfsd/threads`, la funci\u00f3n `nfs4_state_destroy_net` en `nfs4_state_shutdown_net` liberar\u00e1 todos los recursos relacionados con el `nfs4_client` con hash. Si `nfsd_client_shrinker` se est\u00e1 ejecutando simult\u00e1neamente, la funci\u00f3n `expire_client` primero deshar\u00e1 el hash de este cliente y luego lo destruir\u00e1. Esto puede generar la siguiente advertencia. Adem\u00e1s, tambi\u00e9n pueden ocurrir numerosos errores de use-after-free. nfsd_client_shrinker echo 0 > /proc/fs/nfsd/threads expire_client nfsd_shutdown_net unhash_client ... nfs4_state_shutdown_net /* no esperar\u00e1 a que el reductor salga */ /* cancel_work(&nn->nfsd_shrinker_work) * nfsd_file para esto /* no destruir\u00e1 el cliente1 sin hash */ * el cliente1 sigue activo nfs4_state_destroy_net */ nfsd_file_cache_shutdown /* advertencia de activaci\u00f3n */ kmem_cache_destroy(nfsd_file_slab) kmem_cache_destroy(nfsd_file_mark_slab) /* liberar nfsd_file y marcar */ __destroy_client ============================================================================ ERROR nfsd_file (no contaminado): objetos restantes en nfsd_file en __kmem_cache_shutdown() -------------------------------------------------------------------- CPU: 4 UID: 0 PID: 764 Comm: sh No contaminado 6.12.0-rc3+ #1 dump_stack_lvl+0x53/0x70 slab_err+0xb0/0xf0 __kmem_cache_shutdown+0x15c/0x310 kmem_cache_destroy+0x66/0x160 nfsd_file_cache_shutdown+0xac/0x210 [nfsd] nfsd_destroy_serv+0x251/0x2a0 [nfsd] nfsd_svc+0x125/0x1e0 [nfsd] write_threads+0x16a/0x2a0 [nfsd] nfsctl_transaction_write+0x74/0xa0 [nfsd] vfs_write+0x1a5/0x6d0 ksys_write+0xc1/0x160 do_syscall_64+0x5f/0x170 entry_SYSCALL_64_after_hwframe+0x76/0x7e ========================================================================= ERROR nfsd_file_mark (Corrompido: GBW): Objetos que permanecen en nfsd_file_mark en __kmem_cache_shutdown() -------------------------------------------------------------------- dump_stack_lvl+0x53/0x70 slab_err+0xb0/0xf0 __kmem_cache_shutdown+0x15c/0x310 kmem_cache_destroy+0x66/0x160 nfsd_file_cache_shutdown+0xc8/0x210 [nfsd] Para resolver este problema, cancele `nfsd_shrinker_work` usando el modo sincr\u00f3nico en nfs4_state_shutdown_net."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.8, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.8, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-416"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-416"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.10.220", "versionEndExcluding": "5.15", "matchCriteriaId": "0A0CD37F-23BB-4BB4-89CC-E109F94FA5EB"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.15.154", "versionEndExcluding": "6.1", "matchCriteriaId": "0E48233A-9E5E-4F9C-851A-119D82BE30F8"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.2", "versionEndExcluding": "6.6.59", "matchCriteriaId": "5D15CA59-D15C-4ACD-8B03-A072DEAD2081"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.7", "versionEndExcluding": "6.11.6", "matchCriteriaId": "E4486B12-007B-4794-9857-F07145637AA1"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", "matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", "matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*", "matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*", "matchCriteriaId": "E0F717D8-3014-4F84-8086-0124B2111379"}]}]}], "references": [{"url": "https://git.kernel.org/stable/c/36775f42e039b01d4abe8998bf66771a37d3cdcc", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/add1df5eba163a3a6ece11cb85890e2e410baaea", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/d5ff2fb2e7167e9483846e34148e60c0c016a1f6", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/f965dc0f099a54fca100acf6909abe52d0c85328", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-50121", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-05T18:15:15.080", "lastModified": "2025-01-09T16:16:20.687", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: cancel nfsd_shrinker_work using sync mode in nfs4_state_shutdown_net\n\nIn the normal case, when we excute `echo 0 > /proc/fs/nfsd/threads`, the\nfunction `nfs4_state_destroy_net` in `nfs4_state_shutdown_net` will\nrelease all resources related to the hashed `nfs4_client`. If the\n`nfsd_client_shrinker` is running concurrently, the `expire_client`\nfunction will first unhash this client and then destroy it. This can\nlead to the following warning. Additionally, numerous use-after-free\nerrors may occur as well.\n\nnfsd_client_shrinker echo 0 > /proc/fs/nfsd/threads\n\nexpire_client nfsd_shutdown_net\n unhash_client ...\n nfs4_state_shutdown_net\n /* won't wait shrinker exit */\n /* cancel_work(&nn->nfsd_shrinker_work)\n * nfsd_file for this /* won't destroy unhashed client1 */\n * client1 still alive nfs4_state_destroy_net\n */\n\n nfsd_file_cache_shutdown\n /* trigger warning */\n kmem_cache_destroy(nfsd_file_slab)\n kmem_cache_destroy(nfsd_file_mark_slab)\n /* release nfsd_file and mark */\n __destroy_client\n\n====================================================================\nBUG nfsd_file (Not tainted): Objects remaining in nfsd_file on\n__kmem_cache_shutdown()\n--------------------------------------------------------------------\nCPU: 4 UID: 0 PID: 764 Comm: sh Not tainted 6.12.0-rc3+ #1\n\n dump_stack_lvl+0x53/0x70\n slab_err+0xb0/0xf0\n __kmem_cache_shutdown+0x15c/0x310\n kmem_cache_destroy+0x66/0x160\n nfsd_file_cache_shutdown+0xac/0x210 [nfsd]\n nfsd_destroy_serv+0x251/0x2a0 [nfsd]\n nfsd_svc+0x125/0x1e0 [nfsd]\n write_threads+0x16a/0x2a0 [nfsd]\n nfsctl_transaction_write+0x74/0xa0 [nfsd]\n vfs_write+0x1a5/0x6d0\n ksys_write+0xc1/0x160\n do_syscall_64+0x5f/0x170\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\n====================================================================\nBUG nfsd_file_mark (Tainted: G B W ): Objects remaining\nnfsd_file_mark on __kmem_cache_shutdown()\n--------------------------------------------------------------------\n\n dump_stack_lvl+0x53/0x70\n slab_err+0xb0/0xf0\n __kmem_cache_shutdown+0x15c/0x310\n kmem_cache_destroy+0x66/0x160\n nfsd_file_cache_shutdown+0xc8/0x210 [nfsd]\n nfsd_destroy_serv+0x251/0x2a0 [nfsd]\n nfsd_svc+0x125/0x1e0 [nfsd]\n write_threads+0x16a/0x2a0 [nfsd]\n nfsctl_transaction_write+0x74/0xa0 [nfsd]\n vfs_write+0x1a5/0x6d0\n ksys_write+0xc1/0x160\n do_syscall_64+0x5f/0x170\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nTo resolve this issue, cancel `nfsd_shrinker_work` using synchronous\nmode in nfs4_state_shutdown_net."}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nfsd: cancelar nfsd_shrinker_work usando el modo de sincronizaci\u00f3n en nfs4_state_shutdown_net. En el caso normal, cuando ejecutamos `echo 0 > /proc/fs/nfsd/threads`, la funci\u00f3n `nfs4_state_destroy_net` en `nfs4_state_shutdown_net` liberar\u00e1 todos los recursos relacionados con el `nfs4_client` con hash. Si `nfsd_client_shrinker` se est\u00e1 ejecutando simult\u00e1neamente, la funci\u00f3n `expire_client` primero deshar\u00e1 el hash de este cliente y luego lo destruir\u00e1. Esto puede generar la siguiente advertencia. Adem\u00e1s, tambi\u00e9n pueden ocurrir numerosos errores de use-after-free. nfsd_client_shrinker echo 0 > /proc/fs/nfsd/threads expire_client nfsd_shutdown_net unhash_client ... nfs4_state_shutdown_net /* no esperar\u00e1 a que el reductor salga */ /* cancel_work(&nn->nfsd_shrinker_work) * nfsd_file para esto /* no destruir\u00e1 el cliente1 sin hash */ * el cliente1 sigue activo nfs4_state_destroy_net */ nfsd_file_cache_shutdown /* advertencia de activaci\u00f3n */ kmem_cache_destroy(nfsd_file_slab) kmem_cache_destroy(nfsd_file_mark_slab) /* liberar nfsd_file y marcar */ __destroy_client ============================================================================ ERROR nfsd_file (no contaminado): objetos restantes en nfsd_file en __kmem_cache_shutdown() -------------------------------------------------------------------- CPU: 4 UID: 0 PID: 764 Comm: sh No contaminado 6.12.0-rc3+ #1 dump_stack_lvl+0x53/0x70 slab_err+0xb0/0xf0 __kmem_cache_shutdown+0x15c/0x310 kmem_cache_destroy+0x66/0x160 nfsd_file_cache_shutdown+0xac/0x210 [nfsd] nfsd_destroy_serv+0x251/0x2a0 [nfsd] nfsd_svc+0x125/0x1e0 [nfsd] write_threads+0x16a/0x2a0 [nfsd] nfsctl_transaction_write+0x74/0xa0 [nfsd] vfs_write+0x1a5/0x6d0 ksys_write+0xc1/0x160 do_syscall_64+0x5f/0x170 entry_SYSCALL_64_after_hwframe+0x76/0x7e ========================================================================= ERROR nfsd_file_mark (Corrompido: GBW): Objetos que permanecen en nfsd_file_mark en __kmem_cache_shutdown() -------------------------------------------------------------------- dump_stack_lvl+0x53/0x70 slab_err+0xb0/0xf0 __kmem_cache_shutdown+0x15c/0x310 kmem_cache_destroy+0x66/0x160 nfsd_file_cache_shutdown+0xc8/0x210 [nfsd] Para resolver este problema, cancele `nfsd_shrinker_work` usando el modo sincr\u00f3nico en nfs4_state_shutdown_net."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.8, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.8, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-416"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-416"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.10.220", "versionEndExcluding": "5.15", "matchCriteriaId": "0A0CD37F-23BB-4BB4-89CC-E109F94FA5EB"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.15.154", "versionEndExcluding": "6.1", "matchCriteriaId": "0E48233A-9E5E-4F9C-851A-119D82BE30F8"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.2", "versionEndExcluding": "6.6.59", "matchCriteriaId": "5D15CA59-D15C-4ACD-8B03-A072DEAD2081"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.7", "versionEndExcluding": "6.11.6", "matchCriteriaId": "E4486B12-007B-4794-9857-F07145637AA1"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", "matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", "matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*", "matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*", "matchCriteriaId": "E0F717D8-3014-4F84-8086-0124B2111379"}]}]}], "references": [{"url": "https://git.kernel.org/stable/c/36775f42e039b01d4abe8998bf66771a37d3cdcc", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/5ade4382de16c34d9259cb548f36ec5c4555913c", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/add1df5eba163a3a6ece11cb85890e2e410baaea", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/d5ff2fb2e7167e9483846e34148e60c0c016a1f6", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/f67138dd338cb564ade7d3755c8cd4f68b46d397", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/f965dc0f099a54fca100acf6909abe52d0c85328", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-53099.json b/cve/2024/CVE-2024-53099.json index 17766c054d6..c549b182acd 100644 --- a/cve/2024/CVE-2024-53099.json +++ b/cve/2024/CVE-2024-53099.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-53099", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-25T22:15:16.433", "lastModified": "2025-01-02T14:15:08.300", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Check validity of link->type in bpf_link_show_fdinfo()\n\nIf a newly-added link type doesn't invoke BPF_LINK_TYPE(), accessing\nbpf_link_type_strs[link->type] may result in an out-of-bounds access.\n\nTo spot such missed invocations early in the future, checking the\nvalidity of link->type in bpf_link_show_fdinfo() and emitting a warning\nwhen such invocations are missed."}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf: comprobar la validez de link->type en bpf_link_show_fdinfo() Si un tipo de enlace reci\u00e9n a\u00f1adido no invoca BPF_LINK_TYPE(), acceder a bpf_link_type_strs[link->type] puede dar como resultado un acceso fuera de los l\u00edmites. Para detectar dichas invocaciones fallidas de forma temprana en el futuro, se debe comprobar la validez de link->type en bpf_link_show_fdinfo() y emitir una advertencia cuando se omiten dichas invocaciones."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "baseScore": 7.1, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.2}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-125"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.6.62", "matchCriteriaId": "E6074648-EE3E-4378-87E7-509F45D0245A"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.7", "versionEndExcluding": "6.11.9", "matchCriteriaId": "759504D4-BE53-492C-BA9B-70F6A9F409CA"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", "matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", "matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*", "matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*", "matchCriteriaId": "E0F717D8-3014-4F84-8086-0124B2111379"}]}]}], "references": [{"url": "https://git.kernel.org/stable/c/4e8074bb33d18f56af30a0252cb3606d27eb1c13", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/8421d4c8762bd022cb491f2f0f7019ef51b4f0a7", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/b3eb1b6a9f745d6941b345f0fae014dc8bb06d36", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/d5092b0a1aaf35d77ebd8d33384d7930bec5cb5d", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-53099", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-25T22:15:16.433", "lastModified": "2025-01-09T16:16:20.940", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Check validity of link->type in bpf_link_show_fdinfo()\n\nIf a newly-added link type doesn't invoke BPF_LINK_TYPE(), accessing\nbpf_link_type_strs[link->type] may result in an out-of-bounds access.\n\nTo spot such missed invocations early in the future, checking the\nvalidity of link->type in bpf_link_show_fdinfo() and emitting a warning\nwhen such invocations are missed."}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf: comprobar la validez de link->type en bpf_link_show_fdinfo() Si un tipo de enlace reci\u00e9n a\u00f1adido no invoca BPF_LINK_TYPE(), acceder a bpf_link_type_strs[link->type] puede dar como resultado un acceso fuera de los l\u00edmites. Para detectar dichas invocaciones fallidas de forma temprana en el futuro, se debe comprobar la validez de link->type en bpf_link_show_fdinfo() y emitir una advertencia cuando se omiten dichas invocaciones."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "baseScore": 7.1, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.2}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-125"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.6.62", "matchCriteriaId": "E6074648-EE3E-4378-87E7-509F45D0245A"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.7", "versionEndExcluding": "6.11.9", "matchCriteriaId": "759504D4-BE53-492C-BA9B-70F6A9F409CA"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", "matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", "matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*", "matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*", "matchCriteriaId": "E0F717D8-3014-4F84-8086-0124B2111379"}]}]}], "references": [{"url": "https://git.kernel.org/stable/c/24fec234d2ba9ca3c14e545ebe3fd6dcb47f074d", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/4e8074bb33d18f56af30a0252cb3606d27eb1c13", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/79f87a6ec39fb5968049a6775a528bf58b25c20a", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/8421d4c8762bd022cb491f2f0f7019ef51b4f0a7", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/b3eb1b6a9f745d6941b345f0fae014dc8bb06d36", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/d5092b0a1aaf35d77ebd8d33384d7930bec5cb5d", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-53149.json b/cve/2024/CVE-2024-53149.json index eb5cc10cf97..dbb3aea7c02 100644 --- a/cve/2024/CVE-2024-53149.json +++ b/cve/2024/CVE-2024-53149.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-53149", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-24T12:15:23.007", "lastModified": "2025-01-07T16:36:45.343", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: typec: ucsi: glink: fix off-by-one in connector_status\n\nUCSI connector's indices start from 1 up to 3, PMIC_GLINK_MAX_PORTS.\nCorrect the condition in the pmic_glink_ucsi_connector_status()\ncallback, fixing Type-C orientation reporting for the third USB-C\nconnector."}, {"lang": "es", "value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: usb: typec: ucsi: glink: fix off-by-one in Connector_status Los \u00edndices del conector UCSI comienzan desde 1 hasta 3, PMIC_GLINK_MAX_PORTS. Corrija la condici\u00f3n en la devoluci\u00f3n de llamada pmic_glink_ucsi_connector_status(), arreglando el informe de orientaci\u00f3n tipo C para el tercer conector USB-C."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "baseScore": 4.6, "baseSeverity": "MEDIUM", "attackVector": "PHYSICAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 0.9, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-193"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.10", "versionEndExcluding": "6.11.11", "matchCriteriaId": "158A6B22-9260-41D7-965A-A81798A5A969"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.12", "versionEndExcluding": "6.12.2", "matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776"}]}]}], "references": [{"url": "https://git.kernel.org/stable/c/4a22918810980897393fa1776ea3877e4baf8cca", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/6ba6f7f29e0dff47a2799e60dcd1b5c29cd811a5", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/9a5a8b5bd72169aa7a8ec800ef57be2f2cb4d9b2", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-53149", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-24T12:15:23.007", "lastModified": "2025-01-09T16:16:21.097", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: typec: ucsi: glink: fix off-by-one in connector_status\n\nUCSI connector's indices start from 1 up to 3, PMIC_GLINK_MAX_PORTS.\nCorrect the condition in the pmic_glink_ucsi_connector_status()\ncallback, fixing Type-C orientation reporting for the third USB-C\nconnector."}, {"lang": "es", "value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: usb: typec: ucsi: glink: fix off-by-one in Connector_status Los \u00edndices del conector UCSI comienzan desde 1 hasta 3, PMIC_GLINK_MAX_PORTS. Corrija la condici\u00f3n en la devoluci\u00f3n de llamada pmic_glink_ucsi_connector_status(), arreglando el informe de orientaci\u00f3n tipo C para el tercer conector USB-C."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "baseScore": 4.6, "baseSeverity": "MEDIUM", "attackVector": "PHYSICAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 0.9, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-193"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.10", "versionEndExcluding": "6.11.11", "matchCriteriaId": "158A6B22-9260-41D7-965A-A81798A5A969"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.12", "versionEndExcluding": "6.12.2", "matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776"}]}]}], "references": [{"url": "https://git.kernel.org/stable/c/4a22918810980897393fa1776ea3877e4baf8cca", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/6ba6f7f29e0dff47a2799e60dcd1b5c29cd811a5", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/8a2273e5c1beb285729aa001422967b4711c53fe", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/9a5a8b5bd72169aa7a8ec800ef57be2f2cb4d9b2", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-53159.json b/cve/2024/CVE-2024-53159.json index 32e9e889a1a..2abd47b618a 100644 --- a/cve/2024/CVE-2024-53159.json +++ b/cve/2024/CVE-2024-53159.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-53159", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-24T12:15:24.217", "lastModified": "2024-12-24T12:15:24.217", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwmon: (nct6775-core) Fix overflows seen when writing limit attributes\n\nDIV_ROUND_CLOSEST() after kstrtoul() results in an overflow if a large\nnumber such as 18446744073709551615 is provided by the user.\nFix it by reordering clamp_val() and DIV_ROUND_CLOSEST() operations."}], "metrics": {}, "references": [{"url": "https://git.kernel.org/stable/c/57ee12b6c514146c19b6a159013b48727a012960", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/685c10269c41d23d7a2b85d3fd6b6345390c8746", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/a4712e4485f5c388bbe0d0e8f52978241ab34a29", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/ae703f8ff083c5267af30d6c8cf096d562623b3b", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/dfa8bedfffcae87976b34a45a724deb9c3a0a88e", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-53159", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-24T12:15:24.217", "lastModified": "2025-01-09T16:16:21.233", "vulnStatus": "Rejected", "cveTags": [], "descriptions": [{"lang": "en", "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."}], "metrics": {}, "references": []}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-53164.json b/cve/2024/CVE-2024-53164.json index 3e2b834bac8..f4b6126b23f 100644 --- a/cve/2024/CVE-2024-53164.json +++ b/cve/2024/CVE-2024-53164.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-53164", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T14:15:23.480", "lastModified": "2024-12-27T14:15:23.480", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: sched: fix ordering of qlen adjustment\n\nChanges to sch->q.qlen around qdisc_tree_reduce_backlog() need to happen\n_before_ a call to said function because otherwise it may fail to notify\nparent qdiscs when the child is about to become empty."}], "metrics": {}, "references": [{"url": "https://git.kernel.org/stable/c/489422e2befff88a1de52b2acebe7b333bded025", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/5eb7de8cd58e73851cd37ff8d0666517d9926948", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/97e13434b5da8e91bdf965352fad2141d13d72d3", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/e3e54ad9eff8bdaa70f897e5342e34b76109497f", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-53164", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T14:15:23.480", "lastModified": "2025-01-09T16:16:21.297", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: sched: fix ordering of qlen adjustment\n\nChanges to sch->q.qlen around qdisc_tree_reduce_backlog() need to happen\n_before_ a call to said function because otherwise it may fail to notify\nparent qdiscs when the child is about to become empty."}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: sched: corregir el orden del ajuste de qlen Los cambios en sch->q.qlen en torno a qdisc_tree_reduce_backlog() deben realizarse _antes_ de una llamada a dicha funci\u00f3n porque, de lo contrario, puede fallar en notificar a los qdisc principales cuando el secundario est\u00e1 a punto de vaciarse."}], "metrics": {}, "references": [{"url": "https://git.kernel.org/stable/c/33db36b3c53d0fda2699ea39ba72bee4de8336e8", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/44782565e1e6174c94bddfa72ac7267cd09c1648", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/489422e2befff88a1de52b2acebe7b333bded025", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/5e473f462a16f1a34e49ea4289a667d2e4f35b52", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/5eb7de8cd58e73851cd37ff8d0666517d9926948", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/97e13434b5da8e91bdf965352fad2141d13d72d3", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/e3e54ad9eff8bdaa70f897e5342e34b76109497f", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-53179.json b/cve/2024/CVE-2024-53179.json index 866a6457d73..17b57589758 100644 --- a/cve/2024/CVE-2024-53179.json +++ b/cve/2024/CVE-2024-53179.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-53179", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T14:15:25.307", "lastModified": "2024-12-27T14:15:25.307", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix use-after-free of signing key\n\nCustomers have reported use-after-free in @ses->auth_key.response with\nSMB2.1 + sign mounts which occurs due to following race:\n\ntask A task B\ncifs_mount()\n dfs_mount_share()\n get_session()\n cifs_mount_get_session() cifs_send_recv()\n cifs_get_smb_ses() compound_send_recv()\n cifs_setup_session() smb2_setup_request()\n kfree_sensitive() smb2_calc_signature()\n crypto_shash_setkey() *UAF*\n\nFix this by ensuring that we have a valid @ses->auth_key.response by\nchecking whether @ses->ses_status is SES_GOOD or SES_EXITING with\n@ses->ses_lock held. After commit 24a9799aa8ef (\"smb: client: fix UAF\nin smb2_reconnect_server()\"), we made sure to call ->logoff() only\nwhen @ses was known to be good (e.g. valid ->auth_key.response), so\nit's safe to access signing key when @ses->ses_status == SES_EXITING."}], "metrics": {}, "references": [{"url": "https://git.kernel.org/stable/c/0e2b654a3848bf9da3b0d54c1ccf3f1b8c635591", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/343d7fe6df9e247671440a932b6a73af4fa86d95", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-53179", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T14:15:25.307", "lastModified": "2025-01-09T16:16:21.440", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix use-after-free of signing key\n\nCustomers have reported use-after-free in @ses->auth_key.response with\nSMB2.1 + sign mounts which occurs due to following race:\n\ntask A task B\ncifs_mount()\n dfs_mount_share()\n get_session()\n cifs_mount_get_session() cifs_send_recv()\n cifs_get_smb_ses() compound_send_recv()\n cifs_setup_session() smb2_setup_request()\n kfree_sensitive() smb2_calc_signature()\n crypto_shash_setkey() *UAF*\n\nFix this by ensuring that we have a valid @ses->auth_key.response by\nchecking whether @ses->ses_status is SES_GOOD or SES_EXITING with\n@ses->ses_lock held. After commit 24a9799aa8ef (\"smb: client: fix UAF\nin smb2_reconnect_server()\"), we made sure to call ->logoff() only\nwhen @ses was known to be good (e.g. valid ->auth_key.response), so\nit's safe to access signing key when @ses->ses_status == SES_EXITING."}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: smb: cliente: se corrige el use-after-free de la clave de firma Los clientes han informado sobre el use-after-free en @ses->auth_key.response con SMB2.1 + montajes de firma que se producen debido a la siguiente ejecuci\u00f3n: tarea A tarea B cifs_mount() dfs_mount_share() get_session() cifs_mount_get_session() cifs_send_recv() cifs_get_smb_ses() Compound_send_recv() cifs_setup_session() smb2_setup_request() kfree_sensitive() smb2_calc_signature() crypto_shash_setkey() *UAF* Solucione esto asegur\u00e1ndose de que tenemos un @ses->auth_key.response v\u00e1lido comprobando si @ses->ses_status es SES_GOOD o SES_EXITING con @ses->ses_lock Despu\u00e9s de el commit 24a9799aa8ef (\"smb: cliente: corregir UAF en smb2_reconnect_server()\"), nos aseguramos de llamar a ->logoff() solo cuando se sab\u00eda que @ses era correcto (por ejemplo, ->auth_key.response v\u00e1lido), por lo que es seguro acceder a la clave de firma cuando @ses->ses_status == SES_EXITING."}], "metrics": {}, "references": [{"url": "https://git.kernel.org/stable/c/0e2b654a3848bf9da3b0d54c1ccf3f1b8c635591", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/343d7fe6df9e247671440a932b6a73af4fa86d95", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/39619c65ab4bbb3e78c818f537687653e112764d", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-53522.json b/cve/2024/CVE-2024-53522.json index d7f9c3f296f..5118f44c908 100644 --- a/cve/2024/CVE-2024-53522.json +++ b/cve/2024/CVE-2024-53522.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-53522", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-07T20:15:30.083", "lastModified": "2025-01-08T16:15:35.343", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Bangkok Medical Software HOSxP XE v4.64.11.3 was discovered to contain a hardcoded IDEA Key-IV pair in the HOSxPXE4.exe and HOS-WIN32.INI components. This allows attackers to access sensitive information."}, {"lang": "es", "value": "Se descubri\u00f3 que Bangkok Medical Software HOSxP XE v4.64.11.3 conten\u00eda un par de claves IDEA-IV codificadas de forma r\u00edgida en los componentes HOSxPXE4.exe y HOS-WIN32.INI. Esto permite a los atacantes acceder a informaci\u00f3n confidencial."}], "metrics": {"cvssMetricV31": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE"}, "exploitabilityScore": 3.9, "impactScore": 3.6}]}, "weaknesses": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-331"}]}], "references": [{"url": "http://bangkok.com", "source": "cve@mitre.org"}, {"url": "http://hosxp.com", "source": "cve@mitre.org"}, {"url": "https://www.safecloud.co.th/researches/blog/CVE-2024-53522", "source": "cve@mitre.org"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-53522", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-07T20:15:30.083", "lastModified": "2025-01-09T16:16:21.560", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Bangkok Medical Software HOSxP XE v4.64.11.3 was discovered to contain a hardcoded IDEA Key-IV pair in the HOSxPXE4.exe and HOS-WIN32.INI components. This allows attackers to access sensitive information."}, {"lang": "es", "value": "Se descubri\u00f3 que Bangkok Medical Software HOSxP XE v4.64.11.3 conten\u00eda un par de claves IDEA-IV codificadas de forma r\u00edgida en los componentes HOSxPXE4.exe y HOS-WIN32.INI. Esto permite a los atacantes acceder a informaci\u00f3n confidencial."}], "metrics": {"cvssMetricV31": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE"}, "exploitabilityScore": 3.9, "impactScore": 3.6}]}, "weaknesses": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-331"}]}], "references": [{"url": "http://bangkok.com", "source": "cve@mitre.org"}, {"url": "http://hosxp.com", "source": "cve@mitre.org"}, {"url": "http://hosxp.net", "source": "cve@mitre.org"}, {"url": "https://www.safecloud.co.th/researches/blog/CVE-2024-53522", "source": "cve@mitre.org"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-53564.json b/cve/2024/CVE-2024-53564.json index ea5a1a21696..eddae177305 100644 --- a/cve/2024/CVE-2024-53564.json +++ b/cve/2024/CVE-2024-53564.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-53564", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-02T18:15:11.353", "lastModified": "2025-01-09T01:15:08.627", "vulnStatus": "Awaiting Analysis", "cveTags": [{"sourceIdentifier": "cve@mitre.org", "tags": ["disputed"]}], "descriptions": [{"lang": "en", "value": "A vulnerability was discovered in FreePBX 17.0.19.17. It does not verify the type of uploaded (valid FreePBX module) files, allowing high-privilege administrators to insert unwanted files. NOTE: the Supplier's position is that there is no risk beyond what high-privilege administrators are intentionally allowed to do."}, {"lang": "es", "value": " Una vulnerabilidad de carga de archivos arbitrarios autenticados en el componente /module_admin/upload.php de freepbx v17.0.19.17 permite a los atacantes ejecutar c\u00f3digo arbitrario mediante la carga de un archivo manipulado espec\u00edficamente."}], "metrics": {"cvssMetricV31": [{"source": "cve@mitre.org", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N", "baseScore": 2.2, "baseSeverity": "LOW", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 0.7, "impactScore": 1.4}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 8.8, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "cve@mitre.org", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-434"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-94"}]}], "references": [{"url": "https://gist.github.com/hyp164D1/490732de230edf97423f6d95b0d2f903", "source": "cve@mitre.org"}, {"url": "https://gist.github.com/hyp164D1/d419bdf3e7e352088a21631d0f452a8c", "source": "cve@mitre.org"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-53564", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-02T18:15:11.353", "lastModified": "2025-01-09T17:15:15.423", "vulnStatus": "Awaiting Analysis", "cveTags": [{"sourceIdentifier": "cve@mitre.org", "tags": ["disputed"]}], "descriptions": [{"lang": "en", "value": "A vulnerability was discovered in FreePBX 17.0.19.17. It does not verify the type of uploaded (valid FreePBX module) files, allowing high-privilege administrators to insert unwanted files. NOTE: the Supplier's position is that there is no risk beyond what high-privilege administrators are intentionally allowed to do."}, {"lang": "es", "value": " Una vulnerabilidad de carga de archivos arbitrarios autenticados en el componente /module_admin/upload.php de freepbx v17.0.19.17 permite a los atacantes ejecutar c\u00f3digo arbitrario mediante la carga de un archivo manipulado espec\u00edficamente."}], "metrics": {"cvssMetricV31": [{"source": "cve@mitre.org", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N", "baseScore": 2.2, "baseSeverity": "LOW", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 0.7, "impactScore": 1.4}]}, "weaknesses": [{"source": "cve@mitre.org", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-434"}]}], "references": [{"url": "https://gist.github.com/hyp164D1/490732de230edf97423f6d95b0d2f903", "source": "cve@mitre.org"}, {"url": "https://gist.github.com/hyp164D1/d419bdf3e7e352088a21631d0f452a8c", "source": "cve@mitre.org"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-53706.json b/cve/2024/CVE-2024-53706.json index 5b88516a3e5..28df73eacf9 100644 --- a/cve/2024/CVE-2024-53706.json +++ b/cve/2024/CVE-2024-53706.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-53706", "sourceIdentifier": "PSIRT@sonicwall.com", "published": "2025-01-09T07:15:27.520", "lastModified": "2025-01-09T07:15:27.520", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "A vulnerability in the Gen7 SonicOS Cloud platform NSv, allows a remote authenticated local low-privileged attacker to elevate privileges to `root` and potentially lead to code execution."}], "metrics": {}, "weaknesses": [{"source": "PSIRT@sonicwall.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-269"}]}], "references": [{"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0003", "source": "PSIRT@sonicwall.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-53706", "sourceIdentifier": "PSIRT@sonicwall.com", "published": "2025-01-09T07:15:27.520", "lastModified": "2025-01-09T16:16:21.743", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "A vulnerability in the Gen7 SonicOS Cloud platform NSv, allows a remote authenticated local low-privileged attacker to elevate privileges to `root` and potentially lead to code execution."}, {"lang": "es", "value": "Una vulnerabilidad en Gen7 SonicOS Cloud platform NSv permite que un atacante local autenticado de forma remota y con bajos privilegios eleve los privilegios a \"superusuario\" y potencialmente conduzca a la ejecuci\u00f3n de c\u00f3digo."}], "metrics": {"cvssMetricV31": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.8, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "PSIRT@sonicwall.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-269"}]}], "references": [{"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0003", "source": "PSIRT@sonicwall.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-55539.json b/cve/2024/CVE-2024-55539.json index 794bcdc0578..15b8d98d055 100644 --- a/cve/2024/CVE-2024-55539.json +++ b/cve/2024/CVE-2024-55539.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-55539", "sourceIdentifier": "security@acronis.com", "published": "2024-12-23T14:15:06.270", "lastModified": "2024-12-23T14:15:06.270", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Weak algorithm used to sign RPM package. The following products are affected: Acronis Cyber Protect Cloud Agent (Linux) before build 39185."}], "metrics": {"cvssMetricV30": [{"source": "security@acronis.com", "type": "Secondary", "cvssData": {"version": "3.0", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N", "baseScore": 2.5, "baseSeverity": "LOW", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 1.0, "impactScore": 1.4}]}, "weaknesses": [{"source": "security@acronis.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-327"}]}], "references": [{"url": "https://security-advisory.acronis.com/advisories/SEC-5825", "source": "security@acronis.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-55539", "sourceIdentifier": "security@acronis.com", "published": "2024-12-23T14:15:06.270", "lastModified": "2025-01-09T17:15:16.057", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Weak algorithm used to sign RPM package. The following products are affected: Acronis Cyber Protect Cloud Agent (Linux) before build 39185."}, {"lang": "es", "value": "Algoritmo d\u00e9bil utilizado para firmar el paquete RPM. Los siguientes productos se ven afectados: Acronis Cyber Protect Cloud Agent (Linux) antes de la compilaci\u00f3n 39185."}], "metrics": {"cvssMetricV31": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N", "baseScore": 2.5, "baseSeverity": "LOW", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 1.0, "impactScore": 1.4}], "cvssMetricV30": [{"source": "security@acronis.com", "type": "Secondary", "cvssData": {"version": "3.0", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N", "baseScore": 2.5, "baseSeverity": "LOW", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 1.0, "impactScore": 1.4}]}, "weaknesses": [{"source": "security@acronis.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-327"}]}], "references": [{"url": "https://security-advisory.acronis.com/advisories/SEC-5825", "source": "security@acronis.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-56582.json b/cve/2024/CVE-2024-56582.json index 457cc592040..af7a0f31eda 100644 --- a/cve/2024/CVE-2024-56582.json +++ b/cve/2024/CVE-2024-56582.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-56582", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:17.333", "lastModified": "2024-12-27T15:15:17.333", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix use-after-free in btrfs_encoded_read_endio()\n\nShinichiro reported the following use-after free that sometimes is\nhappening in our CI system when running fstests' btrfs/284 on a TCMU\nrunner device:\n\n BUG: KASAN: slab-use-after-free in lock_release+0x708/0x780\n Read of size 8 at addr ffff888106a83f18 by task kworker/u80:6/219\n\n CPU: 8 UID: 0 PID: 219 Comm: kworker/u80:6 Not tainted 6.12.0-rc6-kts+ #15\n Hardware name: Supermicro Super Server/X11SPi-TF, BIOS 3.3 02/21/2020\n Workqueue: btrfs-endio btrfs_end_bio_work [btrfs]\n Call Trace:\n \n dump_stack_lvl+0x6e/0xa0\n ? lock_release+0x708/0x780\n print_report+0x174/0x505\n ? lock_release+0x708/0x780\n ? __virt_addr_valid+0x224/0x410\n ? lock_release+0x708/0x780\n kasan_report+0xda/0x1b0\n ? lock_release+0x708/0x780\n ? __wake_up+0x44/0x60\n lock_release+0x708/0x780\n ? __pfx_lock_release+0x10/0x10\n ? __pfx_do_raw_spin_lock+0x10/0x10\n ? lock_is_held_type+0x9a/0x110\n _raw_spin_unlock_irqrestore+0x1f/0x60\n __wake_up+0x44/0x60\n btrfs_encoded_read_endio+0x14b/0x190 [btrfs]\n btrfs_check_read_bio+0x8d9/0x1360 [btrfs]\n ? lock_release+0x1b0/0x780\n ? trace_lock_acquire+0x12f/0x1a0\n ? __pfx_btrfs_check_read_bio+0x10/0x10 [btrfs]\n ? process_one_work+0x7e3/0x1460\n ? lock_acquire+0x31/0xc0\n ? process_one_work+0x7e3/0x1460\n process_one_work+0x85c/0x1460\n ? __pfx_process_one_work+0x10/0x10\n ? assign_work+0x16c/0x240\n worker_thread+0x5e6/0xfc0\n ? __pfx_worker_thread+0x10/0x10\n kthread+0x2c3/0x3a0\n ? __pfx_kthread+0x10/0x10\n ret_from_fork+0x31/0x70\n ? __pfx_kthread+0x10/0x10\n ret_from_fork_asm+0x1a/0x30\n \n\n Allocated by task 3661:\n kasan_save_stack+0x30/0x50\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0xaa/0xb0\n btrfs_encoded_read_regular_fill_pages+0x16c/0x6d0 [btrfs]\n send_extent_data+0xf0f/0x24a0 [btrfs]\n process_extent+0x48a/0x1830 [btrfs]\n changed_cb+0x178b/0x2ea0 [btrfs]\n btrfs_ioctl_send+0x3bf9/0x5c20 [btrfs]\n _btrfs_ioctl_send+0x117/0x330 [btrfs]\n btrfs_ioctl+0x184a/0x60a0 [btrfs]\n __x64_sys_ioctl+0x12e/0x1a0\n do_syscall_64+0x95/0x180\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\n Freed by task 3661:\n kasan_save_stack+0x30/0x50\n kasan_save_track+0x14/0x30\n kasan_save_free_info+0x3b/0x70\n __kasan_slab_free+0x4f/0x70\n kfree+0x143/0x490\n btrfs_encoded_read_regular_fill_pages+0x531/0x6d0 [btrfs]\n send_extent_data+0xf0f/0x24a0 [btrfs]\n process_extent+0x48a/0x1830 [btrfs]\n changed_cb+0x178b/0x2ea0 [btrfs]\n btrfs_ioctl_send+0x3bf9/0x5c20 [btrfs]\n _btrfs_ioctl_send+0x117/0x330 [btrfs]\n btrfs_ioctl+0x184a/0x60a0 [btrfs]\n __x64_sys_ioctl+0x12e/0x1a0\n do_syscall_64+0x95/0x180\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\n The buggy address belongs to the object at ffff888106a83f00\n which belongs to the cache kmalloc-rnd-07-96 of size 96\n The buggy address is located 24 bytes inside of\n freed 96-byte region [ffff888106a83f00, ffff888106a83f60)\n\n The buggy address belongs to the physical page:\n page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888106a83800 pfn:0x106a83\n flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff)\n page_type: f5(slab)\n raw: 0017ffffc0000000 ffff888100053680 ffffea0004917200 0000000000000004\n raw: ffff888106a83800 0000000080200019 00000001f5000000 0000000000000000\n page dumped because: kasan: bad access detected\n\n Memory state around the buggy address:\n ffff888106a83e00: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc\n ffff888106a83e80: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc\n >ffff888106a83f00: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc\n ^\n ffff888106a83f80: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc\n ffff888106a84000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n ==================================================================\n\nFurther analyzing the trace and \n---truncated---"}], "metrics": {}, "references": [{"url": "https://git.kernel.org/stable/c/05b36b04d74a517d6675bf2f90829ff1ac7e28dc", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/f8a5129e4a9fc3f6aa3f137513253b51b31b94d4", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-56582", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:17.333", "lastModified": "2025-01-09T16:16:21.920", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix use-after-free in btrfs_encoded_read_endio()\n\nShinichiro reported the following use-after free that sometimes is\nhappening in our CI system when running fstests' btrfs/284 on a TCMU\nrunner device:\n\n BUG: KASAN: slab-use-after-free in lock_release+0x708/0x780\n Read of size 8 at addr ffff888106a83f18 by task kworker/u80:6/219\n\n CPU: 8 UID: 0 PID: 219 Comm: kworker/u80:6 Not tainted 6.12.0-rc6-kts+ #15\n Hardware name: Supermicro Super Server/X11SPi-TF, BIOS 3.3 02/21/2020\n Workqueue: btrfs-endio btrfs_end_bio_work [btrfs]\n Call Trace:\n \n dump_stack_lvl+0x6e/0xa0\n ? lock_release+0x708/0x780\n print_report+0x174/0x505\n ? lock_release+0x708/0x780\n ? __virt_addr_valid+0x224/0x410\n ? lock_release+0x708/0x780\n kasan_report+0xda/0x1b0\n ? lock_release+0x708/0x780\n ? __wake_up+0x44/0x60\n lock_release+0x708/0x780\n ? __pfx_lock_release+0x10/0x10\n ? __pfx_do_raw_spin_lock+0x10/0x10\n ? lock_is_held_type+0x9a/0x110\n _raw_spin_unlock_irqrestore+0x1f/0x60\n __wake_up+0x44/0x60\n btrfs_encoded_read_endio+0x14b/0x190 [btrfs]\n btrfs_check_read_bio+0x8d9/0x1360 [btrfs]\n ? lock_release+0x1b0/0x780\n ? trace_lock_acquire+0x12f/0x1a0\n ? __pfx_btrfs_check_read_bio+0x10/0x10 [btrfs]\n ? process_one_work+0x7e3/0x1460\n ? lock_acquire+0x31/0xc0\n ? process_one_work+0x7e3/0x1460\n process_one_work+0x85c/0x1460\n ? __pfx_process_one_work+0x10/0x10\n ? assign_work+0x16c/0x240\n worker_thread+0x5e6/0xfc0\n ? __pfx_worker_thread+0x10/0x10\n kthread+0x2c3/0x3a0\n ? __pfx_kthread+0x10/0x10\n ret_from_fork+0x31/0x70\n ? __pfx_kthread+0x10/0x10\n ret_from_fork_asm+0x1a/0x30\n \n\n Allocated by task 3661:\n kasan_save_stack+0x30/0x50\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0xaa/0xb0\n btrfs_encoded_read_regular_fill_pages+0x16c/0x6d0 [btrfs]\n send_extent_data+0xf0f/0x24a0 [btrfs]\n process_extent+0x48a/0x1830 [btrfs]\n changed_cb+0x178b/0x2ea0 [btrfs]\n btrfs_ioctl_send+0x3bf9/0x5c20 [btrfs]\n _btrfs_ioctl_send+0x117/0x330 [btrfs]\n btrfs_ioctl+0x184a/0x60a0 [btrfs]\n __x64_sys_ioctl+0x12e/0x1a0\n do_syscall_64+0x95/0x180\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\n Freed by task 3661:\n kasan_save_stack+0x30/0x50\n kasan_save_track+0x14/0x30\n kasan_save_free_info+0x3b/0x70\n __kasan_slab_free+0x4f/0x70\n kfree+0x143/0x490\n btrfs_encoded_read_regular_fill_pages+0x531/0x6d0 [btrfs]\n send_extent_data+0xf0f/0x24a0 [btrfs]\n process_extent+0x48a/0x1830 [btrfs]\n changed_cb+0x178b/0x2ea0 [btrfs]\n btrfs_ioctl_send+0x3bf9/0x5c20 [btrfs]\n _btrfs_ioctl_send+0x117/0x330 [btrfs]\n btrfs_ioctl+0x184a/0x60a0 [btrfs]\n __x64_sys_ioctl+0x12e/0x1a0\n do_syscall_64+0x95/0x180\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\n The buggy address belongs to the object at ffff888106a83f00\n which belongs to the cache kmalloc-rnd-07-96 of size 96\n The buggy address is located 24 bytes inside of\n freed 96-byte region [ffff888106a83f00, ffff888106a83f60)\n\n The buggy address belongs to the physical page:\n page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888106a83800 pfn:0x106a83\n flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff)\n page_type: f5(slab)\n raw: 0017ffffc0000000 ffff888100053680 ffffea0004917200 0000000000000004\n raw: ffff888106a83800 0000000080200019 00000001f5000000 0000000000000000\n page dumped because: kasan: bad access detected\n\n Memory state around the buggy address:\n ffff888106a83e00: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc\n ffff888106a83e80: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc\n >ffff888106a83f00: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc\n ^\n ffff888106a83f80: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc\n ffff888106a84000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n ==================================================================\n\nFurther analyzing the trace and \n---truncated---"}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: btrfs: correcci\u00f3n de use-after-free en btrfs_encoded_read_endio() Shinichiro inform\u00f3 el siguiente use-after-free que a veces sucede en nuestro sistema CI cuando se ejecuta btrfs/284 de fstests en un dispositivo ejecutor de TCMU: ERROR: KASAN: slab-use-after-free en lock_release+0x708/0x780 Lectura de tama\u00f1o 8 en la direcci\u00f3n ffff888106a83f18 por la tarea kworker/u80:6/219 CPU: 8 UID: 0 PID: 219 Comm: kworker/u80:6 No contaminado 6.12.0-rc6-kts+ #15 Nombre del hardware: Supermicro Super Server/X11SPi-TF, BIOS 3.3 21/02/2020 Cola de trabajo: btrfs-endio btrfs_end_bio_work [btrfs] Seguimiento de llamadas: dump_stack_lvl+0x6e/0xa0 ? lock_release+0x708/0x780 print_report+0x174/0x505 ? lock_release+0x708/0x780 ? __virt_addr_valid+0x224/0x410 ? lock_release+0x708/0x780 kasan_report+0xda/0x1b0 ? lock_release+0x708/0x780 ? __wake_up+0x44/0x60 lock_release+0x708/0x780 ? __pfx_lock_release+0x10/0x10 ? __pfx_do_raw_spin_lock+0x10/0x10 ? bloqueo_se_retiene_tipo+0x9a/0x110 _raw_spin_unlock_irqrestore+0x1f/0x60 __wake_up+0x44/0x60 btrfs_encoded_read_endio+0x14b/0x190 [btrfs] btrfs_check_read_bio+0x8d9/0x1360 [btrfs] ? bloqueo_liberaci\u00f3n+0x1b0/0x780 ? trace_lock_acquire+0x12f/0x1a0 ? __pfx_btrfs_check_read_bio+0x10/0x10 [btrfs] ? proceso_una_obra+0x7e3/0x1460 ? bloqueo_adquirir+0x31/0xc0 ? proceso_uno_trabajo+0x7e3/0x1460 proceso_uno_trabajo+0x85c/0x1460 ? __pfx_proceso_uno_trabajo+0x10/0x10 ? asignar_trabajo+0x16c/0x240 subproceso_trabajador+0x5e6/0xfc0 ? __pfx_subproceso_trabajador+0x10/0x10 kthread+0x2c3/0x3a0 ? __pfx_kthread+0x10/0x10 retirar_de_bifurcaci\u00f3n+0x31/0x70 ? __pfx_kthread+0x10/0x10 ret_from_fork_asm+0x1a/0x30 Asignado por la tarea 3661: kasan_save_stack+0x30/0x50 kasan_save_track+0x14/0x30 __kasan_kmalloc+0xaa/0xb0 btrfs_encoded_read_regular_fill_pages+0x16c/0x6d0 [btrfs] send_extent_data+0xf0f/0x24a0 [btrfs] process_extent+0x48a/0x1830 [btrfs] changed_cb+0x178b/0x2ea0 [btrfs] btrfs_ioctl_send+0x3bf9/0x5c20 [btrfs] _btrfs_ioctl_send+0x117/0x330 [btrfs] btrfs_ioctl+0x184a/0x60a0 [btrfs] __x64_sys_ioctl+0x12e/0x1a0 do_syscall_64+0x95/0x180 entry_SYSCALL_64_after_hwframe+0x76/0x7e Liberado por la tarea 3661: kasan_save_stack+0x30/0x50 kasan_save_track+0x14/0x30 kasan_save_free_info+0x3b/0x70 __kasan_slab_free+0x4f/0x70 kfree+0x143/0x490 btrfs_encoded_read_regular_fill_pages+0x531/0x6d0 [btrfs] enviar_datos_de_extensi\u00f3n+0xf0f/0x24a0 [btrfs] procesar_extensi\u00f3n+0x48a/0x1830 [btrfs] cambiar_cb+0x178b/0x2ea0 [btrfs] btrfs_ioctl_send+0x3bf9/0x5c20 [btrfs] _btrfs_ioctl_send+0x117/0x330 [btrfs] btrfs_ioctl+0x184a/0x60a0 [btrfs] __x64_sys_ioctl+0x12e/0x1a0 hacer_llamada_al_sistema_64+0x95/0x180 entry_SYSCALL_64_after_hwframe+0x76/0x7e La direcci\u00f3n con errores pertenece al objeto en ffff888106a83f00 que pertenece a la cach\u00e9 kmalloc-rnd-07-96 de tama\u00f1o 96 La direcci\u00f3n con errores se encuentra 24 bytes dentro de la regi\u00f3n liberada de 96 bytes [ffff888106a83f00, ffff888106a83f60) La direcci\u00f3n con errores pertenece a la p\u00e1gina f\u00edsica: page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888106a83800 pfn:0x106a83 flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) page_type: f5(slab) raw: 0017ffffc0000000 ffff888100053680 ffffea0004917200 0000000000000004 sin procesar: ffff888106a83800 0000000080200019 00000001f5000000 0000000000000000 p\u00e1gina volcada porque: kasan: se detect\u00f3 un acceso incorrecto Estado de la memoria alrededor de la direcci\u00f3n con errores: ffff888106a83e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc ffff888106a83e80: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc >ffff888106a83f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc ^ ffff888106a83f80: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc ffff888106a84000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 == ..."}], "metrics": {}, "references": [{"url": "https://git.kernel.org/stable/c/05b36b04d74a517d6675bf2f90829ff1ac7e28dc", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/6228f13f1996a4feb9b601d6644bf0bfe03671dd", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/a40de0330af4fb7bc6b354250c24f294f8b826a0", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/f8a5129e4a9fc3f6aa3f137513253b51b31b94d4", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-56588.json b/cve/2024/CVE-2024-56588.json index a9e0f084623..76a535a3967 100644 --- a/cve/2024/CVE-2024-56588.json +++ b/cve/2024/CVE-2024-56588.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-56588", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:18.040", "lastModified": "2025-01-08T21:48:24.173", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: hisi_sas: Create all dump files during debugfs initialization\n\nFor the current debugfs of hisi_sas, after user triggers dump, the\ndriver allocate memory space to save the register information and create\ndebugfs files to display the saved information. In this process, the\ndebugfs files created after each dump.\n\nTherefore, when the dump is triggered while the driver is unbind, the\nfollowing hang occurs:\n\n[67840.853907] Unable to handle kernel NULL pointer dereference at virtual address 00000000000000a0\n[67840.862947] Mem abort info:\n[67840.865855] ESR = 0x0000000096000004\n[67840.869713] EC = 0x25: DABT (current EL), IL = 32 bits\n[67840.875125] SET = 0, FnV = 0\n[67840.878291] EA = 0, S1PTW = 0\n[67840.881545] FSC = 0x04: level 0 translation fault\n[67840.886528] Data abort info:\n[67840.889524] ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000\n[67840.895117] CM = 0, WnR = 0, TnD = 0, TagAccess = 0\n[67840.900284] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n[67840.905709] user pgtable: 4k pages, 48-bit VAs, pgdp=0000002803a1f000\n[67840.912263] [00000000000000a0] pgd=0000000000000000, p4d=0000000000000000\n[67840.919177] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP\n[67840.996435] pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[67841.003628] pc : down_write+0x30/0x98\n[67841.007546] lr : start_creating.part.0+0x60/0x198\n[67841.012495] sp : ffff8000b979ba20\n[67841.016046] x29: ffff8000b979ba20 x28: 0000000000000010 x27: 0000000000024b40\n[67841.023412] x26: 0000000000000012 x25: ffff20202b355ae8 x24: ffff20202b35a8c8\n[67841.030779] x23: ffffa36877928208 x22: ffffa368b4972240 x21: ffff8000b979bb18\n[67841.038147] x20: ffff00281dc1e3c0 x19: fffffffffffffffe x18: 0000000000000020\n[67841.045515] x17: 0000000000000000 x16: ffffa368b128a530 x15: ffffffffffffffff\n[67841.052888] x14: ffff8000b979bc18 x13: ffffffffffffffff x12: ffff8000b979bb18\n[67841.060263] x11: 0000000000000000 x10: 0000000000000000 x9 : ffffa368b1289b18\n[67841.067640] x8 : 0000000000000012 x7 : 0000000000000000 x6 : 00000000000003a9\n[67841.075014] x5 : 0000000000000000 x4 : ffff002818c5cb00 x3 : 0000000000000001\n[67841.082388] x2 : 0000000000000000 x1 : ffff002818c5cb00 x0 : 00000000000000a0\n[67841.089759] Call trace:\n[67841.092456] down_write+0x30/0x98\n[67841.096017] start_creating.part.0+0x60/0x198\n[67841.100613] debugfs_create_dir+0x48/0x1f8\n[67841.104950] debugfs_create_files_v3_hw+0x88/0x348 [hisi_sas_v3_hw]\n[67841.111447] debugfs_snapshot_regs_v3_hw+0x708/0x798 [hisi_sas_v3_hw]\n[67841.118111] debugfs_trigger_dump_v3_hw_write+0x9c/0x120 [hisi_sas_v3_hw]\n[67841.125115] full_proxy_write+0x68/0xc8\n[67841.129175] vfs_write+0xd8/0x3f0\n[67841.132708] ksys_write+0x70/0x108\n[67841.136317] __arm64_sys_write+0x24/0x38\n[67841.140440] invoke_syscall+0x50/0x128\n[67841.144385] el0_svc_common.constprop.0+0xc8/0xf0\n[67841.149273] do_el0_svc+0x24/0x38\n[67841.152773] el0_svc+0x38/0xd8\n[67841.156009] el0t_64_sync_handler+0xc0/0xc8\n[67841.160361] el0t_64_sync+0x1a4/0x1a8\n[67841.164189] Code: b9000882 d2800002 d2800023 f9800011 (c85ffc05)\n[67841.170443] ---[ end trace 0000000000000000 ]---\n\nTo fix this issue, create all directories and files during debugfs\ninitialization. In this way, the driver only needs to allocate memory\nspace to save information each time the user triggers dumping."}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: hisi_sas: Crear todos los archivos de volcado durante la inicializaci\u00f3n de debugfs Para el debugfs actual de hisi_sas, despu\u00e9s de que el usuario active el volcado, el controlador asigna espacio de memoria para guardar la informaci\u00f3n de registro y crear archivos de debugfs para mostrar la informaci\u00f3n guardada. En este proceso, los archivos de debugfs creados despu\u00e9s de cada volcado. Por lo tanto, cuando se activa el volcado mientras el controlador est\u00e1 desvinculado, se produce el siguiente bloqueo: [67840.853907] No se puede gestionar la desreferencia del puntero NULL del n\u00facleo en la direcci\u00f3n virtual 00000000000000a0 [67840.862947] Informaci\u00f3n de interrupci\u00f3n de memoria: [67840.865855] ESR = 0x0000000096000004 [67840.869713] EC = 0x25: DABT (EL actual), IL = 32 bits [67840.875125] SET = 0, FnV = 0 [67840.878291] EA = 0, S1PTW = 0 [67840.881545] FSC = 0x04: error de traducci\u00f3n de nivel 0 [67840.886528] Informaci\u00f3n de cancelaci\u00f3n de datos: [67840.889524] ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000 [67840.895117] CM = 0, WnR = 0, TnD = 0, TagAccess = 0 [67840.900284] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [67840.905709] pgtable de usuario: p\u00e1ginas de 4k, VA de 48 bits, pgdp=0000002803a1f000 [67840.912263] [00000000000000a0] pgd=0000000000000000, p4d=0000000000000000 [67840.919177] Error interno: Oops: 0000000096000004 [#1] PREEMPT SMP [67840.996435] pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [67841.003628] pc : down_write+0x30/0x98 [67841.007546] lr : start_creating.part.0+0x60/0x198 [67841.012495] sp : ffff8000b979ba20 [67841.016046] x29: ffff8000b979ba20 x28: 0000000000000010 x27: 0000000000024b40 [67841.023412] x26: 0000000000000012 x25: ffff20202b355ae8 x24: ffff20202b35a8c8 [67841.030779] x23: ffffa36877928208 x22: ffffa368b4972240 x21: ffff8000b979bb18 [67841.038147] x20: ffff00281dc1e3c0 x19: ffffffffffffffffe x18: 0000000000000020 [67841.045515] x17: 00000000000000000 x16: ffffa368b128a530 x15: ffffffffffffffff [67841.052888] x14: ffff8000b979bc18 x13: ffffffffffffffff x12: ffff8000b979bb18 [67841.060263] x11: 000000000000000 x10: 0000000000000000 x9: ffffa368b1289b18 [67841.067640] x8 : 0000000000000012 x7 : 0000000000000000 x6 : 00000000000003a9 [67841.075014] x5 : 0000000000000000 x4 : ffff002818c5cb00 x3 : 0000000000000001 [67841.082388] x2 : 000000000000000 x1 : ffff002818c5cb00 x0 : 00000000000000a0 [67841.089759] Seguimiento de llamadas: [67841.092456] escritura_inactiva+0x30/0x98 [67841.096017] creaci\u00f3n_iniciativa.parte.0+0x60/0x198 [67841.100613] creaci\u00f3n_directorio_debugfs+0x48/0x1f8 [67841.104950] creaci\u00f3n_archivos_debugfs_v3_hw+0x88/0x348 [hisi_sas_v3_hw] [67841.111447] registros_instant\u00e1neos_debugfs_v3_hw+0x708/0x798 [hisi_sas_v3_hw] [67841.118111] escritura_activadora_debugfs_v3_hw+0x9c/0x120 [hisi_sas_v3_hw] [67841.125115] escritura de proxy completo+0x68/0xc8 [67841.129175] escritura de vfs+0xd8/0x3f0 [67841.132708] escritura de ksys+0x70/0x108 [67841.136317] escritura de __arm64_sys+0x24/0x38 [67841.140440] llamada al sistema invocada+0x50/0x128 [67841.144385] el0_svc_common.constprop.0+0xc8/0xf0 [67841.149273] do_el0_svc+0x24/0x38 [67841.152773] el0_svc+0x38/0xd8 [67841.156009] el0t_64_sync_handler+0xc0/0xc8 [67841.160361] el0t_64_sync+0x1a4/0x1a8 [67841.164189] C\u00f3digo: b9000882 d2800002 d2800023 f9800011 (c85ffc05) [67841.170443] ---[ fin del seguimiento 000000000000000 ]--- Para solucionar este problema, cree todos los directorios y archivos durante la inicializaci\u00f3n de debugfs. De esta manera, el controlador solo necesita asignar espacio de memoria para guardar la informaci\u00f3n cada vez que el usuario activa el volcado."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "baseScore": 5.5, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-476"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.12.5", "matchCriteriaId": "75E05E0A-C898-433A-8E50-6D9EC8646A64"}]}]}], "references": [{"url": "https://git.kernel.org/stable/c/6c55f99123075e5429850b41b06f7dfffcb708eb", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/9f564f15f88490b484e02442dc4c4b11640ea172", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-56588", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:18.040", "lastModified": "2025-01-09T16:16:22.040", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: hisi_sas: Create all dump files during debugfs initialization\n\nFor the current debugfs of hisi_sas, after user triggers dump, the\ndriver allocate memory space to save the register information and create\ndebugfs files to display the saved information. In this process, the\ndebugfs files created after each dump.\n\nTherefore, when the dump is triggered while the driver is unbind, the\nfollowing hang occurs:\n\n[67840.853907] Unable to handle kernel NULL pointer dereference at virtual address 00000000000000a0\n[67840.862947] Mem abort info:\n[67840.865855] ESR = 0x0000000096000004\n[67840.869713] EC = 0x25: DABT (current EL), IL = 32 bits\n[67840.875125] SET = 0, FnV = 0\n[67840.878291] EA = 0, S1PTW = 0\n[67840.881545] FSC = 0x04: level 0 translation fault\n[67840.886528] Data abort info:\n[67840.889524] ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000\n[67840.895117] CM = 0, WnR = 0, TnD = 0, TagAccess = 0\n[67840.900284] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n[67840.905709] user pgtable: 4k pages, 48-bit VAs, pgdp=0000002803a1f000\n[67840.912263] [00000000000000a0] pgd=0000000000000000, p4d=0000000000000000\n[67840.919177] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP\n[67840.996435] pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[67841.003628] pc : down_write+0x30/0x98\n[67841.007546] lr : start_creating.part.0+0x60/0x198\n[67841.012495] sp : ffff8000b979ba20\n[67841.016046] x29: ffff8000b979ba20 x28: 0000000000000010 x27: 0000000000024b40\n[67841.023412] x26: 0000000000000012 x25: ffff20202b355ae8 x24: ffff20202b35a8c8\n[67841.030779] x23: ffffa36877928208 x22: ffffa368b4972240 x21: ffff8000b979bb18\n[67841.038147] x20: ffff00281dc1e3c0 x19: fffffffffffffffe x18: 0000000000000020\n[67841.045515] x17: 0000000000000000 x16: ffffa368b128a530 x15: ffffffffffffffff\n[67841.052888] x14: ffff8000b979bc18 x13: ffffffffffffffff x12: ffff8000b979bb18\n[67841.060263] x11: 0000000000000000 x10: 0000000000000000 x9 : ffffa368b1289b18\n[67841.067640] x8 : 0000000000000012 x7 : 0000000000000000 x6 : 00000000000003a9\n[67841.075014] x5 : 0000000000000000 x4 : ffff002818c5cb00 x3 : 0000000000000001\n[67841.082388] x2 : 0000000000000000 x1 : ffff002818c5cb00 x0 : 00000000000000a0\n[67841.089759] Call trace:\n[67841.092456] down_write+0x30/0x98\n[67841.096017] start_creating.part.0+0x60/0x198\n[67841.100613] debugfs_create_dir+0x48/0x1f8\n[67841.104950] debugfs_create_files_v3_hw+0x88/0x348 [hisi_sas_v3_hw]\n[67841.111447] debugfs_snapshot_regs_v3_hw+0x708/0x798 [hisi_sas_v3_hw]\n[67841.118111] debugfs_trigger_dump_v3_hw_write+0x9c/0x120 [hisi_sas_v3_hw]\n[67841.125115] full_proxy_write+0x68/0xc8\n[67841.129175] vfs_write+0xd8/0x3f0\n[67841.132708] ksys_write+0x70/0x108\n[67841.136317] __arm64_sys_write+0x24/0x38\n[67841.140440] invoke_syscall+0x50/0x128\n[67841.144385] el0_svc_common.constprop.0+0xc8/0xf0\n[67841.149273] do_el0_svc+0x24/0x38\n[67841.152773] el0_svc+0x38/0xd8\n[67841.156009] el0t_64_sync_handler+0xc0/0xc8\n[67841.160361] el0t_64_sync+0x1a4/0x1a8\n[67841.164189] Code: b9000882 d2800002 d2800023 f9800011 (c85ffc05)\n[67841.170443] ---[ end trace 0000000000000000 ]---\n\nTo fix this issue, create all directories and files during debugfs\ninitialization. In this way, the driver only needs to allocate memory\nspace to save information each time the user triggers dumping."}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: hisi_sas: Crear todos los archivos de volcado durante la inicializaci\u00f3n de debugfs Para el debugfs actual de hisi_sas, despu\u00e9s de que el usuario active el volcado, el controlador asigna espacio de memoria para guardar la informaci\u00f3n de registro y crear archivos de debugfs para mostrar la informaci\u00f3n guardada. En este proceso, los archivos de debugfs creados despu\u00e9s de cada volcado. Por lo tanto, cuando se activa el volcado mientras el controlador est\u00e1 desvinculado, se produce el siguiente bloqueo: [67840.853907] No se puede gestionar la desreferencia del puntero NULL del n\u00facleo en la direcci\u00f3n virtual 00000000000000a0 [67840.862947] Informaci\u00f3n de interrupci\u00f3n de memoria: [67840.865855] ESR = 0x0000000096000004 [67840.869713] EC = 0x25: DABT (EL actual), IL = 32 bits [67840.875125] SET = 0, FnV = 0 [67840.878291] EA = 0, S1PTW = 0 [67840.881545] FSC = 0x04: error de traducci\u00f3n de nivel 0 [67840.886528] Informaci\u00f3n de cancelaci\u00f3n de datos: [67840.889524] ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000 [67840.895117] CM = 0, WnR = 0, TnD = 0, TagAccess = 0 [67840.900284] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [67840.905709] pgtable de usuario: p\u00e1ginas de 4k, VA de 48 bits, pgdp=0000002803a1f000 [67840.912263] [00000000000000a0] pgd=0000000000000000, p4d=0000000000000000 [67840.919177] Error interno: Oops: 0000000096000004 [#1] PREEMPT SMP [67840.996435] pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [67841.003628] pc : down_write+0x30/0x98 [67841.007546] lr : start_creating.part.0+0x60/0x198 [67841.012495] sp : ffff8000b979ba20 [67841.016046] x29: ffff8000b979ba20 x28: 0000000000000010 x27: 0000000000024b40 [67841.023412] x26: 0000000000000012 x25: ffff20202b355ae8 x24: ffff20202b35a8c8 [67841.030779] x23: ffffa36877928208 x22: ffffa368b4972240 x21: ffff8000b979bb18 [67841.038147] x20: ffff00281dc1e3c0 x19: ffffffffffffffffe x18: 0000000000000020 [67841.045515] x17: 00000000000000000 x16: ffffa368b128a530 x15: ffffffffffffffff [67841.052888] x14: ffff8000b979bc18 x13: ffffffffffffffff x12: ffff8000b979bb18 [67841.060263] x11: 000000000000000 x10: 0000000000000000 x9: ffffa368b1289b18 [67841.067640] x8 : 0000000000000012 x7 : 0000000000000000 x6 : 00000000000003a9 [67841.075014] x5 : 0000000000000000 x4 : ffff002818c5cb00 x3 : 0000000000000001 [67841.082388] x2 : 000000000000000 x1 : ffff002818c5cb00 x0 : 00000000000000a0 [67841.089759] Seguimiento de llamadas: [67841.092456] escritura_inactiva+0x30/0x98 [67841.096017] creaci\u00f3n_iniciativa.parte.0+0x60/0x198 [67841.100613] creaci\u00f3n_directorio_debugfs+0x48/0x1f8 [67841.104950] creaci\u00f3n_archivos_debugfs_v3_hw+0x88/0x348 [hisi_sas_v3_hw] [67841.111447] registros_instant\u00e1neos_debugfs_v3_hw+0x708/0x798 [hisi_sas_v3_hw] [67841.118111] escritura_activadora_debugfs_v3_hw+0x9c/0x120 [hisi_sas_v3_hw] [67841.125115] escritura de proxy completo+0x68/0xc8 [67841.129175] escritura de vfs+0xd8/0x3f0 [67841.132708] escritura de ksys+0x70/0x108 [67841.136317] escritura de __arm64_sys+0x24/0x38 [67841.140440] llamada al sistema invocada+0x50/0x128 [67841.144385] el0_svc_common.constprop.0+0xc8/0xf0 [67841.149273] do_el0_svc+0x24/0x38 [67841.152773] el0_svc+0x38/0xd8 [67841.156009] el0t_64_sync_handler+0xc0/0xc8 [67841.160361] el0t_64_sync+0x1a4/0x1a8 [67841.164189] C\u00f3digo: b9000882 d2800002 d2800023 f9800011 (c85ffc05) [67841.170443] ---[ fin del seguimiento 000000000000000 ]--- Para solucionar este problema, cree todos los directorios y archivos durante la inicializaci\u00f3n de debugfs. De esta manera, el controlador solo necesita asignar espacio de memoria para guardar la informaci\u00f3n cada vez que el usuario activa el volcado."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "baseScore": 5.5, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-476"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.12.5", "matchCriteriaId": "75E05E0A-C898-433A-8E50-6D9EC8646A64"}]}]}], "references": [{"url": "https://git.kernel.org/stable/c/6c55f99123075e5429850b41b06f7dfffcb708eb", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/7c8c50c9855a9e1b0d1e3680e5ad839002a9deb5", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/9f564f15f88490b484e02442dc4c4b11640ea172", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-56599.json b/cve/2024/CVE-2024-56599.json index e422f3f3f63..1815c3eb7d2 100644 --- a/cve/2024/CVE-2024-56599.json +++ b/cve/2024/CVE-2024-56599.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-56599", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:19.307", "lastModified": "2025-01-08T21:48:04.090", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath10k: avoid NULL pointer error during sdio remove\n\nWhen running 'rmmod ath10k', ath10k_sdio_remove() will free sdio\nworkqueue by destroy_workqueue(). But if CONFIG_INIT_ON_FREE_DEFAULT_ON\nis set to yes, kernel panic will happen:\nCall trace:\n destroy_workqueue+0x1c/0x258\n ath10k_sdio_remove+0x84/0x94\n sdio_bus_remove+0x50/0x16c\n device_release_driver_internal+0x188/0x25c\n device_driver_detach+0x20/0x2c\n\nThis is because during 'rmmod ath10k', ath10k_sdio_remove() will call\nath10k_core_destroy() before destroy_workqueue(). wiphy_dev_release()\nwill finally be called in ath10k_core_destroy(). This function will free\nstruct cfg80211_registered_device *rdev and all its members, including\nwiphy, dev and the pointer of sdio workqueue. Then the pointer of sdio\nworkqueue will be set to NULL due to CONFIG_INIT_ON_FREE_DEFAULT_ON.\n\nAfter device release, destroy_workqueue() will use NULL pointer then the\nkernel panic happen.\n\nCall trace:\nath10k_sdio_remove\n ->ath10k_core_unregister\n \u2026\u2026\n ->ath10k_core_stop\n ->ath10k_hif_stop\n ->ath10k_sdio_irq_disable\n ->ath10k_hif_power_down\n ->del_timer_sync(&ar_sdio->sleep_timer)\n ->ath10k_core_destroy\n ->ath10k_mac_destroy\n ->ieee80211_free_hw\n ->wiphy_free\n \u2026\u2026\n ->wiphy_dev_release\n ->destroy_workqueue\n\nNeed to call destroy_workqueue() before ath10k_core_destroy(), free\nthe work queue buffer first and then free pointer of work queue by\nath10k_core_destroy(). This order matches the error path order in\nath10k_sdio_probe().\n\nNo work will be queued on sdio workqueue between it is destroyed and\nath10k_core_destroy() is called. Based on the call_stack above, the\nreason is:\nOnly ath10k_sdio_sleep_timer_handler(), ath10k_sdio_hif_tx_sg() and\nath10k_sdio_irq_disable() will queue work on sdio workqueue.\nSleep timer will be deleted before ath10k_core_destroy() in\nath10k_hif_power_down().\nath10k_sdio_irq_disable() only be called in ath10k_hif_stop().\nath10k_core_unregister() will call ath10k_hif_power_down() to stop hif\nbus, so ath10k_sdio_hif_tx_sg() won't be called anymore.\n\nTested-on: QCA6174 hw3.2 SDIO WLAN.RMH.4.4.1-00189"}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: ath10k: evitar error de puntero NULL durante la eliminaci\u00f3n de sdio Al ejecutar 'rmmod ath10k', ath10k_sdio_remove() liberar\u00e1 la cola de trabajo de sdio mediante destroy_workqueue(). Pero si CONFIG_INIT_ON_FREE_DEFAULT_ON est\u00e1 configurado en s\u00ed, se producir\u00e1 un p\u00e1nico del kernel: Rastreo de llamada: destroy_workqueue+0x1c/0x258 ath10k_sdio_remove+0x84/0x94 sdio_bus_remove+0x50/0x16c device_release_driver_internal+0x188/0x25c device_driver_detach+0x20/0x2c Esto se debe a que durante 'rmmod ath10k', ath10k_sdio_remove() llamar\u00e1 a ath10k_core_destroy() antes de destroy_workqueue(). wiphy_dev_release() finalmente se llamar\u00e1 en ath10k_core_destroy(). Esta funci\u00f3n liberar\u00e1 la estructura cfg80211_registered_device *rdev y todos sus miembros, incluidos wiphy, dev y el puntero de sdio workqueue. Luego, el puntero de sdio workqueue se establecer\u00e1 en NULL debido a CONFIG_INIT_ON_FREE_DEFAULT_ON. Despu\u00e9s de liberar el dispositivo, destroy_workqueue() usar\u00e1 el puntero NULL y luego se producir\u00e1 el p\u00e1nico del kernel. Rastreo de llamadas: ath10k_sdio_remove ->ath10k_core_unregister \u2026\u2026 ->ath10k_core_stop ->ath10k_hif_stop ->ath10k_sdio_irq_disable ->ath10k_hif_power_down ->del_timer_sync(&ar_sdio->sleep_timer) ->ath10k_core_destroy ->ath10k_mac_destroy ->ieee80211_free_hw ->wiphy_free \u2026\u2026 ->wiphy_dev_release ->destroy_workqueue Es necesario llamar a destroy_workqueue() antes de ath10k_core_destroy(), primero liberar el b\u00fafer de la cola de trabajo y luego liberar el puntero de la cola de trabajo mediante ath10k_core_destroy(). Este orden coincide con el orden de la ruta de error en ath10k_sdio_probe(). No se pondr\u00e1 en cola ning\u00fan trabajo en la cola de trabajo de sdio entre su destrucci\u00f3n y la llamada a ath10k_core_destroy(). Seg\u00fan la pila de llamadas anterior, el motivo es el siguiente: solo ath10k_sdio_sleep_timer_handler(), ath10k_sdio_hif_tx_sg() y ath10k_sdio_irq_disable() pondr\u00e1n en cola el trabajo en la cola de trabajo de sdio. El temporizador de suspensi\u00f3n se eliminar\u00e1 antes de ath10k_core_destroy() en ath10k_hif_power_down(). ath10k_sdio_irq_disable() solo se llamar\u00e1 en ath10k_hif_stop(). ath10k_core_unregister() llamar\u00e1 a ath10k_hif_power_down() para detener el bus hif, por lo que ya no se llamar\u00e1 ath10k_sdio_hif_tx_sg(). Probado en: QCA6174 hw3.2 SDIO WLAN.RMH.4.4.1-00189"}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "baseScore": 5.5, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-476"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.12.5", "matchCriteriaId": "75E05E0A-C898-433A-8E50-6D9EC8646A64"}]}]}], "references": [{"url": "https://git.kernel.org/stable/c/543c0924d446b21f35701ca084d7feca09511220", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/95c38953cb1ecf40399a676a1f85dfe2b5780a9a", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-56599", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:19.307", "lastModified": "2025-01-09T16:16:22.167", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath10k: avoid NULL pointer error during sdio remove\n\nWhen running 'rmmod ath10k', ath10k_sdio_remove() will free sdio\nworkqueue by destroy_workqueue(). But if CONFIG_INIT_ON_FREE_DEFAULT_ON\nis set to yes, kernel panic will happen:\nCall trace:\n destroy_workqueue+0x1c/0x258\n ath10k_sdio_remove+0x84/0x94\n sdio_bus_remove+0x50/0x16c\n device_release_driver_internal+0x188/0x25c\n device_driver_detach+0x20/0x2c\n\nThis is because during 'rmmod ath10k', ath10k_sdio_remove() will call\nath10k_core_destroy() before destroy_workqueue(). wiphy_dev_release()\nwill finally be called in ath10k_core_destroy(). This function will free\nstruct cfg80211_registered_device *rdev and all its members, including\nwiphy, dev and the pointer of sdio workqueue. Then the pointer of sdio\nworkqueue will be set to NULL due to CONFIG_INIT_ON_FREE_DEFAULT_ON.\n\nAfter device release, destroy_workqueue() will use NULL pointer then the\nkernel panic happen.\n\nCall trace:\nath10k_sdio_remove\n ->ath10k_core_unregister\n \u2026\u2026\n ->ath10k_core_stop\n ->ath10k_hif_stop\n ->ath10k_sdio_irq_disable\n ->ath10k_hif_power_down\n ->del_timer_sync(&ar_sdio->sleep_timer)\n ->ath10k_core_destroy\n ->ath10k_mac_destroy\n ->ieee80211_free_hw\n ->wiphy_free\n \u2026\u2026\n ->wiphy_dev_release\n ->destroy_workqueue\n\nNeed to call destroy_workqueue() before ath10k_core_destroy(), free\nthe work queue buffer first and then free pointer of work queue by\nath10k_core_destroy(). This order matches the error path order in\nath10k_sdio_probe().\n\nNo work will be queued on sdio workqueue between it is destroyed and\nath10k_core_destroy() is called. Based on the call_stack above, the\nreason is:\nOnly ath10k_sdio_sleep_timer_handler(), ath10k_sdio_hif_tx_sg() and\nath10k_sdio_irq_disable() will queue work on sdio workqueue.\nSleep timer will be deleted before ath10k_core_destroy() in\nath10k_hif_power_down().\nath10k_sdio_irq_disable() only be called in ath10k_hif_stop().\nath10k_core_unregister() will call ath10k_hif_power_down() to stop hif\nbus, so ath10k_sdio_hif_tx_sg() won't be called anymore.\n\nTested-on: QCA6174 hw3.2 SDIO WLAN.RMH.4.4.1-00189"}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: ath10k: evitar error de puntero NULL durante la eliminaci\u00f3n de sdio Al ejecutar 'rmmod ath10k', ath10k_sdio_remove() liberar\u00e1 la cola de trabajo de sdio mediante destroy_workqueue(). Pero si CONFIG_INIT_ON_FREE_DEFAULT_ON est\u00e1 configurado en s\u00ed, se producir\u00e1 un p\u00e1nico del kernel: Rastreo de llamada: destroy_workqueue+0x1c/0x258 ath10k_sdio_remove+0x84/0x94 sdio_bus_remove+0x50/0x16c device_release_driver_internal+0x188/0x25c device_driver_detach+0x20/0x2c Esto se debe a que durante 'rmmod ath10k', ath10k_sdio_remove() llamar\u00e1 a ath10k_core_destroy() antes de destroy_workqueue(). wiphy_dev_release() finalmente se llamar\u00e1 en ath10k_core_destroy(). Esta funci\u00f3n liberar\u00e1 la estructura cfg80211_registered_device *rdev y todos sus miembros, incluidos wiphy, dev y el puntero de sdio workqueue. Luego, el puntero de sdio workqueue se establecer\u00e1 en NULL debido a CONFIG_INIT_ON_FREE_DEFAULT_ON. Despu\u00e9s de liberar el dispositivo, destroy_workqueue() usar\u00e1 el puntero NULL y luego se producir\u00e1 el p\u00e1nico del kernel. Rastreo de llamadas: ath10k_sdio_remove ->ath10k_core_unregister \u2026\u2026 ->ath10k_core_stop ->ath10k_hif_stop ->ath10k_sdio_irq_disable ->ath10k_hif_power_down ->del_timer_sync(&ar_sdio->sleep_timer) ->ath10k_core_destroy ->ath10k_mac_destroy ->ieee80211_free_hw ->wiphy_free \u2026\u2026 ->wiphy_dev_release ->destroy_workqueue Es necesario llamar a destroy_workqueue() antes de ath10k_core_destroy(), primero liberar el b\u00fafer de la cola de trabajo y luego liberar el puntero de la cola de trabajo mediante ath10k_core_destroy(). Este orden coincide con el orden de la ruta de error en ath10k_sdio_probe(). No se pondr\u00e1 en cola ning\u00fan trabajo en la cola de trabajo de sdio entre su destrucci\u00f3n y la llamada a ath10k_core_destroy(). Seg\u00fan la pila de llamadas anterior, el motivo es el siguiente: solo ath10k_sdio_sleep_timer_handler(), ath10k_sdio_hif_tx_sg() y ath10k_sdio_irq_disable() pondr\u00e1n en cola el trabajo en la cola de trabajo de sdio. El temporizador de suspensi\u00f3n se eliminar\u00e1 antes de ath10k_core_destroy() en ath10k_hif_power_down(). ath10k_sdio_irq_disable() solo se llamar\u00e1 en ath10k_hif_stop(). ath10k_core_unregister() llamar\u00e1 a ath10k_hif_power_down() para detener el bus hif, por lo que ya no se llamar\u00e1 ath10k_sdio_hif_tx_sg(). Probado en: QCA6174 hw3.2 SDIO WLAN.RMH.4.4.1-00189"}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "baseScore": 5.5, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-476"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.12.5", "matchCriteriaId": "75E05E0A-C898-433A-8E50-6D9EC8646A64"}]}]}], "references": [{"url": "https://git.kernel.org/stable/c/543c0924d446b21f35701ca084d7feca09511220", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/95c38953cb1ecf40399a676a1f85dfe2b5780a9a", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/b35de9e01fc79c7baac666fb2dcb4ba7698a1d97", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-56607.json b/cve/2024/CVE-2024-56607.json index 5479e7050bf..007adfaa4af 100644 --- a/cve/2024/CVE-2024-56607.json +++ b/cve/2024/CVE-2024-56607.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-56607", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:20.180", "lastModified": "2024-12-27T15:15:20.180", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath12k: fix atomic calls in ath12k_mac_op_set_bitrate_mask()\n\nWhen I try to manually set bitrates:\n\niw wlan0 set bitrates legacy-2.4 1\n\nI get sleeping from invalid context error, see below. Fix that by switching to\nuse recently introduced ieee80211_iterate_stations_mtx().\n\nDo note that WCN6855 firmware is still crashing, I'm not sure if that firmware\neven supports bitrate WMI commands and should we consider disabling\nath12k_mac_op_set_bitrate_mask() for WCN6855? But that's for another patch.\n\nBUG: sleeping function called from invalid context at drivers/net/wireless/ath/ath12k/wmi.c:420\nin_atomic(): 0, irqs_disabled(): 0, non_block: 0, pid: 2236, name: iw\npreempt_count: 0, expected: 0\nRCU nest depth: 1, expected: 0\n3 locks held by iw/2236:\n #0: ffffffffabc6f1d8 (cb_lock){++++}-{3:3}, at: genl_rcv+0x14/0x40\n #1: ffff888138410810 (&rdev->wiphy.mtx){+.+.}-{3:3}, at: nl80211_pre_doit+0x54d/0x800 [cfg80211]\n #2: ffffffffab2cfaa0 (rcu_read_lock){....}-{1:2}, at: ieee80211_iterate_stations_atomic+0x2f/0x200 [mac80211]\nCPU: 3 UID: 0 PID: 2236 Comm: iw Not tainted 6.11.0-rc7-wt-ath+ #1772\nHardware name: Intel(R) Client Systems NUC8i7HVK/NUC8i7HVB, BIOS HNKBLi70.86A.0067.2021.0528.1339 05/28/2021\nCall Trace:\n \n dump_stack_lvl+0xa4/0xe0\n dump_stack+0x10/0x20\n __might_resched+0x363/0x5a0\n ? __alloc_skb+0x165/0x340\n __might_sleep+0xad/0x160\n ath12k_wmi_cmd_send+0xb1/0x3d0 [ath12k]\n ? ath12k_wmi_init_wcn7850+0xa40/0xa40 [ath12k]\n ? __netdev_alloc_skb+0x45/0x7b0\n ? __asan_memset+0x39/0x40\n ? ath12k_wmi_alloc_skb+0xf0/0x150 [ath12k]\n ? reacquire_held_locks+0x4d0/0x4d0\n ath12k_wmi_set_peer_param+0x340/0x5b0 [ath12k]\n ath12k_mac_disable_peer_fixed_rate+0xa3/0x110 [ath12k]\n ? ath12k_mac_vdev_stop+0x4f0/0x4f0 [ath12k]\n ieee80211_iterate_stations_atomic+0xd4/0x200 [mac80211]\n ath12k_mac_op_set_bitrate_mask+0x5d2/0x1080 [ath12k]\n ? ath12k_mac_vif_chan+0x320/0x320 [ath12k]\n drv_set_bitrate_mask+0x267/0x470 [mac80211]\n ieee80211_set_bitrate_mask+0x4cc/0x8a0 [mac80211]\n ? __this_cpu_preempt_check+0x13/0x20\n nl80211_set_tx_bitrate_mask+0x2bc/0x530 [cfg80211]\n ? nl80211_parse_tx_bitrate_mask+0x2320/0x2320 [cfg80211]\n ? trace_contention_end+0xef/0x140\n ? rtnl_unlock+0x9/0x10\n ? nl80211_pre_doit+0x557/0x800 [cfg80211]\n genl_family_rcv_msg_doit+0x1f0/0x2e0\n ? genl_family_rcv_msg_attrs_parse.isra.0+0x250/0x250\n ? ns_capable+0x57/0xd0\n genl_family_rcv_msg+0x34c/0x600\n ? genl_family_rcv_msg_dumpit+0x310/0x310\n ? __lock_acquire+0xc62/0x1de0\n ? he_set_mcs_mask.isra.0+0x8d0/0x8d0 [cfg80211]\n ? nl80211_parse_tx_bitrate_mask+0x2320/0x2320 [cfg80211]\n ? cfg80211_external_auth_request+0x690/0x690 [cfg80211]\n genl_rcv_msg+0xa0/0x130\n netlink_rcv_skb+0x14c/0x400\n ? genl_family_rcv_msg+0x600/0x600\n ? netlink_ack+0xd70/0xd70\n ? rwsem_optimistic_spin+0x4f0/0x4f0\n ? genl_rcv+0x14/0x40\n ? down_read_killable+0x580/0x580\n ? netlink_deliver_tap+0x13e/0x350\n ? __this_cpu_preempt_check+0x13/0x20\n genl_rcv+0x23/0x40\n netlink_unicast+0x45e/0x790\n ? netlink_attachskb+0x7f0/0x7f0\n netlink_sendmsg+0x7eb/0xdb0\n ? netlink_unicast+0x790/0x790\n ? __this_cpu_preempt_check+0x13/0x20\n ? selinux_socket_sendmsg+0x31/0x40\n ? netlink_unicast+0x790/0x790\n __sock_sendmsg+0xc9/0x160\n ____sys_sendmsg+0x620/0x990\n ? kernel_sendmsg+0x30/0x30\n ? __copy_msghdr+0x410/0x410\n ? __kasan_check_read+0x11/0x20\n ? mark_lock+0xe6/0x1470\n ___sys_sendmsg+0xe9/0x170\n ? copy_msghdr_from_user+0x120/0x120\n ? __lock_acquire+0xc62/0x1de0\n ? do_fault_around+0x2c6/0x4e0\n ? do_user_addr_fault+0x8c1/0xde0\n ? reacquire_held_locks+0x220/0x4d0\n ? do_user_addr_fault+0x8c1/0xde0\n ? __kasan_check_read+0x11/0x20\n ? __fdget+0x4e/0x1d0\n ? sockfd_lookup_light+0x1a/0x170\n __sys_sendmsg+0xd2/0x180\n ? __sys_sendmsg_sock+0x20/0x20\n ? reacquire_held_locks+0x4d0/0x4d0\n ? debug_smp_processor_id+0x17/0x20\n __x64_sys_sendmsg+0x72/0xb0\n ? lockdep_hardirqs_on+0x7d/0x100\n x64_sys_call+0x894/0x9f0\n do_syscall_64+0x64/0x130\n entry_SYSCALL_64_after_\n---truncated---"}], "metrics": {}, "references": [{"url": "https://git.kernel.org/stable/c/2093f062b26805789b73f2af214691475d9baa29", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/8fac3266c68a8e647240b8ac8d0b82f1821edf85", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-56607", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:20.180", "lastModified": "2025-01-09T16:16:22.327", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath12k: fix atomic calls in ath12k_mac_op_set_bitrate_mask()\n\nWhen I try to manually set bitrates:\n\niw wlan0 set bitrates legacy-2.4 1\n\nI get sleeping from invalid context error, see below. Fix that by switching to\nuse recently introduced ieee80211_iterate_stations_mtx().\n\nDo note that WCN6855 firmware is still crashing, I'm not sure if that firmware\neven supports bitrate WMI commands and should we consider disabling\nath12k_mac_op_set_bitrate_mask() for WCN6855? But that's for another patch.\n\nBUG: sleeping function called from invalid context at drivers/net/wireless/ath/ath12k/wmi.c:420\nin_atomic(): 0, irqs_disabled(): 0, non_block: 0, pid: 2236, name: iw\npreempt_count: 0, expected: 0\nRCU nest depth: 1, expected: 0\n3 locks held by iw/2236:\n #0: ffffffffabc6f1d8 (cb_lock){++++}-{3:3}, at: genl_rcv+0x14/0x40\n #1: ffff888138410810 (&rdev->wiphy.mtx){+.+.}-{3:3}, at: nl80211_pre_doit+0x54d/0x800 [cfg80211]\n #2: ffffffffab2cfaa0 (rcu_read_lock){....}-{1:2}, at: ieee80211_iterate_stations_atomic+0x2f/0x200 [mac80211]\nCPU: 3 UID: 0 PID: 2236 Comm: iw Not tainted 6.11.0-rc7-wt-ath+ #1772\nHardware name: Intel(R) Client Systems NUC8i7HVK/NUC8i7HVB, BIOS HNKBLi70.86A.0067.2021.0528.1339 05/28/2021\nCall Trace:\n \n dump_stack_lvl+0xa4/0xe0\n dump_stack+0x10/0x20\n __might_resched+0x363/0x5a0\n ? __alloc_skb+0x165/0x340\n __might_sleep+0xad/0x160\n ath12k_wmi_cmd_send+0xb1/0x3d0 [ath12k]\n ? ath12k_wmi_init_wcn7850+0xa40/0xa40 [ath12k]\n ? __netdev_alloc_skb+0x45/0x7b0\n ? __asan_memset+0x39/0x40\n ? ath12k_wmi_alloc_skb+0xf0/0x150 [ath12k]\n ? reacquire_held_locks+0x4d0/0x4d0\n ath12k_wmi_set_peer_param+0x340/0x5b0 [ath12k]\n ath12k_mac_disable_peer_fixed_rate+0xa3/0x110 [ath12k]\n ? ath12k_mac_vdev_stop+0x4f0/0x4f0 [ath12k]\n ieee80211_iterate_stations_atomic+0xd4/0x200 [mac80211]\n ath12k_mac_op_set_bitrate_mask+0x5d2/0x1080 [ath12k]\n ? ath12k_mac_vif_chan+0x320/0x320 [ath12k]\n drv_set_bitrate_mask+0x267/0x470 [mac80211]\n ieee80211_set_bitrate_mask+0x4cc/0x8a0 [mac80211]\n ? __this_cpu_preempt_check+0x13/0x20\n nl80211_set_tx_bitrate_mask+0x2bc/0x530 [cfg80211]\n ? nl80211_parse_tx_bitrate_mask+0x2320/0x2320 [cfg80211]\n ? trace_contention_end+0xef/0x140\n ? rtnl_unlock+0x9/0x10\n ? nl80211_pre_doit+0x557/0x800 [cfg80211]\n genl_family_rcv_msg_doit+0x1f0/0x2e0\n ? genl_family_rcv_msg_attrs_parse.isra.0+0x250/0x250\n ? ns_capable+0x57/0xd0\n genl_family_rcv_msg+0x34c/0x600\n ? genl_family_rcv_msg_dumpit+0x310/0x310\n ? __lock_acquire+0xc62/0x1de0\n ? he_set_mcs_mask.isra.0+0x8d0/0x8d0 [cfg80211]\n ? nl80211_parse_tx_bitrate_mask+0x2320/0x2320 [cfg80211]\n ? cfg80211_external_auth_request+0x690/0x690 [cfg80211]\n genl_rcv_msg+0xa0/0x130\n netlink_rcv_skb+0x14c/0x400\n ? genl_family_rcv_msg+0x600/0x600\n ? netlink_ack+0xd70/0xd70\n ? rwsem_optimistic_spin+0x4f0/0x4f0\n ? genl_rcv+0x14/0x40\n ? down_read_killable+0x580/0x580\n ? netlink_deliver_tap+0x13e/0x350\n ? __this_cpu_preempt_check+0x13/0x20\n genl_rcv+0x23/0x40\n netlink_unicast+0x45e/0x790\n ? netlink_attachskb+0x7f0/0x7f0\n netlink_sendmsg+0x7eb/0xdb0\n ? netlink_unicast+0x790/0x790\n ? __this_cpu_preempt_check+0x13/0x20\n ? selinux_socket_sendmsg+0x31/0x40\n ? netlink_unicast+0x790/0x790\n __sock_sendmsg+0xc9/0x160\n ____sys_sendmsg+0x620/0x990\n ? kernel_sendmsg+0x30/0x30\n ? __copy_msghdr+0x410/0x410\n ? __kasan_check_read+0x11/0x20\n ? mark_lock+0xe6/0x1470\n ___sys_sendmsg+0xe9/0x170\n ? copy_msghdr_from_user+0x120/0x120\n ? __lock_acquire+0xc62/0x1de0\n ? do_fault_around+0x2c6/0x4e0\n ? do_user_addr_fault+0x8c1/0xde0\n ? reacquire_held_locks+0x220/0x4d0\n ? do_user_addr_fault+0x8c1/0xde0\n ? __kasan_check_read+0x11/0x20\n ? __fdget+0x4e/0x1d0\n ? sockfd_lookup_light+0x1a/0x170\n __sys_sendmsg+0xd2/0x180\n ? __sys_sendmsg_sock+0x20/0x20\n ? reacquire_held_locks+0x4d0/0x4d0\n ? debug_smp_processor_id+0x17/0x20\n __x64_sys_sendmsg+0x72/0xb0\n ? lockdep_hardirqs_on+0x7d/0x100\n x64_sys_call+0x894/0x9f0\n do_syscall_64+0x64/0x130\n entry_SYSCALL_64_after_\n---truncated---"}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: ath12k: arregla llamadas at\u00f3micas en ath12k_mac_op_set_bitrate_mask() Cuando intento configurar manualmente las tasas de bits: iw wlan0 set bitrates legacy-2.4 1 Me aparece un error de suspensi\u00f3n por contexto no v\u00e1lido, consulte a continuaci\u00f3n. Solucione eso cambiando al uso de ieee80211_iterate_stations_mtx() introducido recientemente. Tenga en cuenta que el firmware WCN6855 sigue fallando, no estoy seguro de si ese firmware incluso admite comandos WMI de tasa de bits y \u00bfdeber\u00edamos considerar deshabilitar ath12k_mac_op_set_bitrate_mask() para WCN6855? Pero eso es para otro parche. ERROR: funci\u00f3n inactiva llamada desde un contexto no v\u00e1lido en drivers/net/wireless/ath/ath12k/wmi.c:420 in_atomic(): 0, irqs_disabled(): 0, non_block: 0, pid: 2236, name: iw preempt_count: 0, expected: 0 Profundidad de anidaci\u00f3n de RCU: 1, expected: 0 3 bloqueos mantenidos por iw/2236: #0: ffffffffabc6f1d8 (cb_lock){++++}-{3:3}, en: genl_rcv+0x14/0x40 #1: ffff888138410810 (&rdev->wiphy.mtx){+.+.}-{3:3}, en: nl80211_pre_doit+0x54d/0x800 [cfg80211] #2: ffffffffab2cfaa0 (rcu_read_lock){....}-{1:2}, en: ieee80211_iterate_stations_atomic+0x2f/0x200 [mac80211] CPU: 3 UID: 0 PID: 2236 Comm: iw No contaminado 6.11.0-rc7-wt-ath+ #1772 Nombre del hardware: Intel(R) Client Systems NUC8i7HVK/NUC8i7HVB, BIOS HNKBLi70.86A.0067.2021.0528.1339 28/05/2021 Seguimiento de llamadas: dump_stack_lvl+0xa4/0xe0 dump_stack+0x10/0x20 __might_resched+0x363/0x5a0 ? __alloc_skb+0x165/0x340 __might_sleep+0xad/0x160 ath12k_wmi_cmd_send+0xb1/0x3d0 [ath12k] ? ath12k_wmi_init_wcn7850+0xa40/0xa40 [ath12k] ? __netdev_alloc_skb+0x45/0x7b0 ? __asan_memset+0x39/0x40 ? ath12k_wmi_alloc_skb+0xf0/0x150 [ath12k] ? ath12k_mac_vdev_stop+0x4f0/0x4f0 [ath12k] ieee80211_iterate_stations_atomic+0xd4/0x200 [mac80211] ath12k_mac_op_set_bitrate_mask+0x5d2/0x1080 [ath12k] ? __this_cpu_preempt_check+0x13/0x20 nl80211_set_tx_bitrate_mask+0x2bc/0x530 [cfg80211] ? nl80211_parse_tx_bitrate_mask+0x2320/0x2320 [cfg80211] ? trace_contention_end+0xef/0x140 ? rtnl_unlock+0x9/0x10 ? he_set_mcs_mask.isra.0+0x8d0/0x8d0 [cfg80211] ? genl_rcv_msg+0xa0/0x130 netlink_rcv_skb+0x14c/0x400 ? genl_family_rcv_msg+0x600/0x600 ? netlink_ack+0xd70/0xd70 ? rwsem_optimistic_spin+0x4f0/0x4f0 ? genl_rcv+0x14/0x40 ? down_read_killable+0x580/0x580 ? netlink_deliver_tap+0x13e/0x350 ? __esta_comprobaci\u00f3n_previa_de_cpu+0x13/0x20 genl_rcv+0x23/0x40 netlink_unicast+0x45e/0x790 ? netlink_attachskb+0x7f0/0x7f0 netlink_sendmsg+0x7eb/0xdb0 ? netlink_unicast+0x790/0x790 ? __esta_comprobaci\u00f3n_previa_de_cpu+0x13/0x20 ? selinux_socket_sendmsg+0x31/0x40 ? netlink_unicast+0x790/0x790 __sock_sendmsg+0xc9/0x160 ____sys_sendmsg+0x620/0x990 ? kernel_sendmsg+0x30/0x30 ? __copy_msghdr+0x410/0x410 ? __kasan_check_read+0x11/0x20 ? mark_lock+0xe6/0x1470 ___sys_sendmsg+0xe9/0x170 ? copy_msghdr_from_user+0x120/0x120 ? __lock_acquire+0xc62/0x1de0 ? do_fault_around+0x2c6/0x4e0 ? do_user_addr_fault+0x8c1/0xde0 ? volver a adquirir bloqueos retenidos+0x220/0x4d0 ? do_user_addr_fault+0x8c1/0xde0 ? __kasan_check_read+0x11/0x20 ? __fdget+0x4e/0x1d0 ? sockfd_lookup_light+0x1a/0x170 __sys_sendmsg+0xd2/0x180 ? __sys_sendmsg_sock+0x20/0x20 ? volver a adquirir bloqueos retenidos+0x4d0/0x4d0 ? debug_smp_processor_id+0x17/0x20 __x64_sys_sendmsg+0x72/0xb0 ? lockdep_hardirqs_on+0x7d/0x100 x64_sys_call+0x894/0x9f0 do_syscall_64+0x64/0x130 entrada_SYSCALL_64_after_ ---truncado---"}], "metrics": {}, "references": [{"url": "https://git.kernel.org/stable/c/2093f062b26805789b73f2af214691475d9baa29", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/3ed6b2daa4e9029987885f86835ffbc003d11c01", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/8fac3266c68a8e647240b8ac8d0b82f1821edf85", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-56609.json b/cve/2024/CVE-2024-56609.json index a6969e034e7..73e9be4c492 100644 --- a/cve/2024/CVE-2024-56609.json +++ b/cve/2024/CVE-2024-56609.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-56609", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:20.387", "lastModified": "2024-12-27T15:15:20.387", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtw88: use ieee80211_purge_tx_queue() to purge TX skb\n\nWhen removing kernel modules by:\n rmmod rtw88_8723cs rtw88_8703b rtw88_8723x rtw88_sdio rtw88_core\n\nDriver uses skb_queue_purge() to purge TX skb, but not report tx status\ncausing \"Have pending ack frames!\" warning. Use ieee80211_purge_tx_queue()\nto correct this.\n\nSince ieee80211_purge_tx_queue() doesn't take locks, to prevent racing\nbetween TX work and purge TX queue, flush and destroy TX work in advance.\n\n wlan0: deauthenticating from aa:f5:fd:60:4c:a8 by local\n choice (Reason: 3=DEAUTH_LEAVING)\n ------------[ cut here ]------------\n Have pending ack frames!\n WARNING: CPU: 3 PID: 9232 at net/mac80211/main.c:1691\n ieee80211_free_ack_frame+0x5c/0x90 [mac80211]\n CPU: 3 PID: 9232 Comm: rmmod Tainted: G C\n 6.10.1-200.fc40.aarch64 #1\n Hardware name: pine64 Pine64 PinePhone Braveheart\n (1.1)/Pine64 PinePhone Braveheart (1.1), BIOS 2024.01 01/01/2024\n pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : ieee80211_free_ack_frame+0x5c/0x90 [mac80211]\n lr : ieee80211_free_ack_frame+0x5c/0x90 [mac80211]\n sp : ffff80008c1b37b0\n x29: ffff80008c1b37b0 x28: ffff000003be8000 x27: 0000000000000000\n x26: 0000000000000000 x25: ffff000003dc14b8 x24: ffff80008c1b37d0\n x23: ffff000000ff9f80 x22: 0000000000000000 x21: 000000007fffffff\n x20: ffff80007c7e93d8 x19: ffff00006e66f400 x18: 0000000000000000\n x17: ffff7ffffd2b3000 x16: ffff800083fc0000 x15: 0000000000000000\n x14: 0000000000000000 x13: 2173656d61726620 x12: 6b636120676e6964\n x11: 0000000000000000 x10: 000000000000005d x9 : ffff8000802af2b0\n x8 : ffff80008c1b3430 x7 : 0000000000000001 x6 : 0000000000000001\n x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000\n x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff000003be8000\n Call trace:\n ieee80211_free_ack_frame+0x5c/0x90 [mac80211]\n idr_for_each+0x74/0x110\n ieee80211_free_hw+0x44/0xe8 [mac80211]\n rtw_sdio_remove+0x9c/0xc0 [rtw88_sdio]\n sdio_bus_remove+0x44/0x180\n device_remove+0x54/0x90\n device_release_driver_internal+0x1d4/0x238\n driver_detach+0x54/0xc0\n bus_remove_driver+0x78/0x108\n driver_unregister+0x38/0x78\n sdio_unregister_driver+0x2c/0x40\n rtw_8723cs_driver_exit+0x18/0x1000 [rtw88_8723cs]\n __do_sys_delete_module.isra.0+0x190/0x338\n __arm64_sys_delete_module+0x1c/0x30\n invoke_syscall+0x74/0x100\n el0_svc_common.constprop.0+0x48/0xf0\n do_el0_svc+0x24/0x38\n el0_svc+0x3c/0x158\n el0t_64_sync_handler+0x120/0x138\n el0t_64_sync+0x194/0x198\n ---[ end trace 0000000000000000 ]---"}], "metrics": {}, "references": [{"url": "https://git.kernel.org/stable/c/3e5e4a801aaf4283390cc34959c6c48f910ca5ea", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/9bca6528f20325d30c22236b23116f161d418f6d", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-56609", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:20.387", "lastModified": "2025-01-09T16:16:22.443", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtw88: use ieee80211_purge_tx_queue() to purge TX skb\n\nWhen removing kernel modules by:\n rmmod rtw88_8723cs rtw88_8703b rtw88_8723x rtw88_sdio rtw88_core\n\nDriver uses skb_queue_purge() to purge TX skb, but not report tx status\ncausing \"Have pending ack frames!\" warning. Use ieee80211_purge_tx_queue()\nto correct this.\n\nSince ieee80211_purge_tx_queue() doesn't take locks, to prevent racing\nbetween TX work and purge TX queue, flush and destroy TX work in advance.\n\n wlan0: deauthenticating from aa:f5:fd:60:4c:a8 by local\n choice (Reason: 3=DEAUTH_LEAVING)\n ------------[ cut here ]------------\n Have pending ack frames!\n WARNING: CPU: 3 PID: 9232 at net/mac80211/main.c:1691\n ieee80211_free_ack_frame+0x5c/0x90 [mac80211]\n CPU: 3 PID: 9232 Comm: rmmod Tainted: G C\n 6.10.1-200.fc40.aarch64 #1\n Hardware name: pine64 Pine64 PinePhone Braveheart\n (1.1)/Pine64 PinePhone Braveheart (1.1), BIOS 2024.01 01/01/2024\n pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : ieee80211_free_ack_frame+0x5c/0x90 [mac80211]\n lr : ieee80211_free_ack_frame+0x5c/0x90 [mac80211]\n sp : ffff80008c1b37b0\n x29: ffff80008c1b37b0 x28: ffff000003be8000 x27: 0000000000000000\n x26: 0000000000000000 x25: ffff000003dc14b8 x24: ffff80008c1b37d0\n x23: ffff000000ff9f80 x22: 0000000000000000 x21: 000000007fffffff\n x20: ffff80007c7e93d8 x19: ffff00006e66f400 x18: 0000000000000000\n x17: ffff7ffffd2b3000 x16: ffff800083fc0000 x15: 0000000000000000\n x14: 0000000000000000 x13: 2173656d61726620 x12: 6b636120676e6964\n x11: 0000000000000000 x10: 000000000000005d x9 : ffff8000802af2b0\n x8 : ffff80008c1b3430 x7 : 0000000000000001 x6 : 0000000000000001\n x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000\n x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff000003be8000\n Call trace:\n ieee80211_free_ack_frame+0x5c/0x90 [mac80211]\n idr_for_each+0x74/0x110\n ieee80211_free_hw+0x44/0xe8 [mac80211]\n rtw_sdio_remove+0x9c/0xc0 [rtw88_sdio]\n sdio_bus_remove+0x44/0x180\n device_remove+0x54/0x90\n device_release_driver_internal+0x1d4/0x238\n driver_detach+0x54/0xc0\n bus_remove_driver+0x78/0x108\n driver_unregister+0x38/0x78\n sdio_unregister_driver+0x2c/0x40\n rtw_8723cs_driver_exit+0x18/0x1000 [rtw88_8723cs]\n __do_sys_delete_module.isra.0+0x190/0x338\n __arm64_sys_delete_module+0x1c/0x30\n invoke_syscall+0x74/0x100\n el0_svc_common.constprop.0+0x48/0xf0\n do_el0_svc+0x24/0x38\n el0_svc+0x3c/0x158\n el0t_64_sync_handler+0x120/0x138\n el0t_64_sync+0x194/0x198\n ---[ end trace 0000000000000000 ]---"}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: rtw88: use ieee80211_purge_tx_queue() para purgar TX skb Al eliminar m\u00f3dulos del kernel mediante: rmmod rtw88_8723cs rtw88_8703b rtw88_8723x rtw88_sdio rtw88_core El controlador usa skb_queue_purge() para purgar TX skb, pero no informa el estado de la tx, lo que provoca la advertencia \"\u00a1Tiene marcos de reconocimiento pendientes!\". Use ieee80211_purge_tx_queue() para corregir esto. Dado que ieee80211_purge_tx_queue() no toma bloqueos, para evitar ejecuci\u00f3ns entre el trabajo de TX y la cola de purga de TX, vac\u00ede y destruya el trabajo de TX con anticipaci\u00f3n. wlan0: desautenticando desde aa:f5:fd:60:4c:a8 por elecci\u00f3n local (Raz\u00f3n: 3=DEAUTH_LEAVING) ------------[ cortar aqu\u00ed ]------------ \u00a1Hay marcos de reconocimiento pendientes! ADVERTENCIA: CPU: 3 PID: 9232 en net/mac80211/main.c:1691 ieee80211_free_ack_frame+0x5c/0x90 [mac80211] CPU: 3 PID: 9232 Comm: rmmod Contaminado: GC 6.10.1-200.fc40.aarch64 #1 Nombre del hardware: pine64 Pine64 PinePhone Braveheart (1.1)/Pine64 PinePhone Braveheart (1.1), BIOS 2024.01 01/01/2024 pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : ieee80211_free_ack_frame+0x5c/0x90 [mac80211] lr : ieee80211_free_ack_frame+0x5c/0x90 [mac80211] sp : ffff80008c1b37b0 x29: ffff80008c1b37b0 x28: ffff000003be8000 x27: 0000000000000000 x26: 0000000000000000 x25: ffff000003dc14b8 x24: ffff80008c1b37d0 x23: ffff000000ff9f80 x22: 0000000000000000 x21: 000000007fffffff x20: ffff80007c7e93d8 x19: ffff00006e66f400 x18: 0000000000000000 x17: ffff7ffffd2b3000 x16: ffff800083fc0000 x15: 0000000000000000 x14: 0000000000000000 x13: 2173656d61726620 x12: 6b636120676e6964 x11: 000000000000000 x10: 000000000000005d x9: ffff8000802af2b0 x8: ffff80008c1b3430 x7: 00000000000000001 x6 : 0000000000000001 x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000 x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff000003be8000 Rastreo de llamadas: ieee80211_free_ack_frame+0x5c/0x90 [mac80211] idr_for_each+0x74/0x110 ieee80211_free_hw+0x44/0xe8 [mac80211] rtw_sdio_remove+0x9c/0xc0 [rtw88_sdio] sdio_bus_remove+0x44/0x180 device_remove+0x54/0x90 device_release_driver_internal+0x1d4/0x238 driver_detach+0x54/0xc0 bus_remove_driver+0x78/0x108 driver_unregister+0x38/0x78 sdio_unregister_driver+0x2c/0x40 rtw_8723cs_driver_exit+0x18/0x1000 [rtw88_8723cs] __do_sys_delete_module.isra.0+0x190/0x338 __arm64_sys_delete_module+0x1c/0x30 invocar_llamada_al_sistema+0x74/0x100 el0_svc_common.constprop.0+0x48/0xf0 do_el0_svc+0x24/0x38 el0_svc+0x3c/0x158 el0t_64_sync_handler+0x120/0x138 el0t_64_sync+0x194/0x198 ---[ fin de seguimiento 0000000000000000 ]---"}], "metrics": {}, "references": [{"url": "https://git.kernel.org/stable/c/3d94c4b21966b49c3e26ceeefacaa11ff7ee6d68", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/3e5e4a801aaf4283390cc34959c6c48f910ca5ea", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/9bca6528f20325d30c22236b23116f161d418f6d", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-56616.json b/cve/2024/CVE-2024-56616.json index 2cacebc03dc..e361a7e4ee4 100644 --- a/cve/2024/CVE-2024-56616.json +++ b/cve/2024/CVE-2024-56616.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-56616", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:21.120", "lastModified": "2024-12-27T15:15:21.120", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/dp_mst: Fix MST sideband message body length check\n\nFix the MST sideband message body length check, which must be at least 1\nbyte accounting for the message body CRC (aka message data CRC) at the\nend of the message.\n\nThis fixes a case where an MST branch device returns a header with a\ncorrect header CRC (indicating a correctly received body length), with\nthe body length being incorrectly set to 0. This will later lead to a\nmemory corruption in drm_dp_sideband_append_payload() and the following\nerrors in dmesg:\n\n UBSAN: array-index-out-of-bounds in drivers/gpu/drm/display/drm_dp_mst_topology.c:786:25\n index -1 is out of range for type 'u8 [48]'\n Call Trace:\n drm_dp_sideband_append_payload+0x33d/0x350 [drm_display_helper]\n drm_dp_get_one_sb_msg+0x3ce/0x5f0 [drm_display_helper]\n drm_dp_mst_hpd_irq_handle_event+0xc8/0x1580 [drm_display_helper]\n\n memcpy: detected field-spanning write (size 18446744073709551615) of single field \"&msg->msg[msg->curlen]\" at drivers/gpu/drm/display/drm_dp_mst_topology.c:791 (size 256)\n Call Trace:\n drm_dp_sideband_append_payload+0x324/0x350 [drm_display_helper]\n drm_dp_get_one_sb_msg+0x3ce/0x5f0 [drm_display_helper]\n drm_dp_mst_hpd_irq_handle_event+0xc8/0x1580 [drm_display_helper]"}], "metrics": {}, "references": [{"url": "https://git.kernel.org/stable/c/1fc1f32c4a3421b9d803f18ec3ef49db2fb5d5ef", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/780fa184d4dc38ad6c4fded345ab8f9be7a63e96", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/bd2fccac61b40eaf08d9546acc9fef958bfe4763", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/c58947a8d4a500902597ee1dbadf0518d7ff8801", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-56616", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:21.120", "lastModified": "2025-01-09T16:16:22.620", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/dp_mst: Fix MST sideband message body length check\n\nFix the MST sideband message body length check, which must be at least 1\nbyte accounting for the message body CRC (aka message data CRC) at the\nend of the message.\n\nThis fixes a case where an MST branch device returns a header with a\ncorrect header CRC (indicating a correctly received body length), with\nthe body length being incorrectly set to 0. This will later lead to a\nmemory corruption in drm_dp_sideband_append_payload() and the following\nerrors in dmesg:\n\n UBSAN: array-index-out-of-bounds in drivers/gpu/drm/display/drm_dp_mst_topology.c:786:25\n index -1 is out of range for type 'u8 [48]'\n Call Trace:\n drm_dp_sideband_append_payload+0x33d/0x350 [drm_display_helper]\n drm_dp_get_one_sb_msg+0x3ce/0x5f0 [drm_display_helper]\n drm_dp_mst_hpd_irq_handle_event+0xc8/0x1580 [drm_display_helper]\n\n memcpy: detected field-spanning write (size 18446744073709551615) of single field \"&msg->msg[msg->curlen]\" at drivers/gpu/drm/display/drm_dp_mst_topology.c:791 (size 256)\n Call Trace:\n drm_dp_sideband_append_payload+0x324/0x350 [drm_display_helper]\n drm_dp_get_one_sb_msg+0x3ce/0x5f0 [drm_display_helper]\n drm_dp_mst_hpd_irq_handle_event+0xc8/0x1580 [drm_display_helper]"}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/dp_mst: Corregir la comprobaci\u00f3n de longitud del cuerpo del mensaje de banda lateral MST Corrige la comprobaci\u00f3n de longitud del cuerpo del mensaje de banda lateral MST, que debe ser de al menos 1 byte teniendo en cuenta el CRC del cuerpo del mensaje (tambi\u00e9n conocido como CRC de los datos del mensaje) al final del mensaje. Esto corrige un caso en el que un dispositivo de rama MST devuelve un encabezado con un CRC de encabezado correcto (que indica una longitud de cuerpo recibida correctamente), con la longitud del cuerpo configurada incorrectamente en 0. Esto luego provocar\u00e1 una corrupci\u00f3n de memoria en drm_dp_sideband_append_payload() y los siguientes errores en dmesg: UBSAN: array-index-out-of-bounds en drivers/gpu/drm/display/drm_dp_mst_topology.c:786:25 index -1 is out of range for type 'u8 [48]' Seguimiento de llamadas: drm_dp_sideband_append_payload+0x33d/0x350 [drm_display_helper] drm_dp_get_one_sb_msg+0x3ce/0x5f0 [drm_display_helper] drm_dp_mst_hpd_irq_handle_event+0xc8/0x1580 [drm_display_helper] memcpy: se detect\u00f3 una escritura que abarca el campo (tama\u00f1o 18446744073709551615) de un solo campo \"&msg->msg[msg->curlen]\" en drivers/gpu/drm/display/drm_dp_mst_topology.c:791 (tama\u00f1o 256) Seguimiento de llamadas: drm_dp_sideband_append_payload+0x324/0x350 [drm_display_helper] drm_dp_get_one_sb_msg+0x3ce/0x5f0 [drm_display_helper] drm_dp_mst_hpd_irq_handle_event+0xc8/0x1580 [drm_display_helper]"}], "metrics": {}, "references": [{"url": "https://git.kernel.org/stable/c/109f91d8b9335b0f3714ef9920eae5a8b21d56af", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/1fc1f32c4a3421b9d803f18ec3ef49db2fb5d5ef", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/70e7166612f4e6da8d7d0305c47c465d88d037e5", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/780fa184d4dc38ad6c4fded345ab8f9be7a63e96", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/bd2fccac61b40eaf08d9546acc9fef958bfe4763", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/c58947a8d4a500902597ee1dbadf0518d7ff8801", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-56626.json b/cve/2024/CVE-2024-56626.json index e253e45a048..e886a75b714 100644 --- a/cve/2024/CVE-2024-56626.json +++ b/cve/2024/CVE-2024-56626.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-56626", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:22.140", "lastModified": "2024-12-27T15:15:22.140", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: fix Out-of-Bounds Write in ksmbd_vfs_stream_write\n\nAn offset from client could be a negative value, It could allows\nto write data outside the bounds of the allocated buffer.\nNote that this issue is coming when setting\n'vfs objects = streams_xattr parameter' in ksmbd.conf."}], "metrics": {}, "references": [{"url": "https://git.kernel.org/stable/c/164d3597d26d9acff5d5b8bc3208bdcca942dd6a", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/313dab082289e460391c82d855430ec8a28ddf81", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/8cd7490fc0f268883e86e840cda5311257af69ca", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/c5797f195c67132d061d29c57a7c6d30530686f0", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-56626", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:22.140", "lastModified": "2025-01-09T16:16:22.770", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: fix Out-of-Bounds Write in ksmbd_vfs_stream_write\n\nAn offset from client could be a negative value, It could allows\nto write data outside the bounds of the allocated buffer.\nNote that this issue is coming when setting\n'vfs objects = streams_xattr parameter' in ksmbd.conf."}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ksmbd: se corrige la escritura fuera de los l\u00edmites en ksmbd_vfs_stream_write. Un desplazamiento del cliente podr\u00eda ser un valor negativo, lo que podr\u00eda permitir escribir datos fuera de los l\u00edmites del b\u00fafer asignado. Tenga en cuenta que este problema se produce al configurar 'vfs objects = streams_xattr parameter' en ksmbd.conf."}], "metrics": {}, "references": [{"url": "https://git.kernel.org/stable/c/164d3597d26d9acff5d5b8bc3208bdcca942dd6a", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/1aea5c9470be2c7129704fb1b9562b1e3e0576f8", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/313dab082289e460391c82d855430ec8a28ddf81", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/8cd7490fc0f268883e86e840cda5311257af69ca", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/c5797f195c67132d061d29c57a7c6d30530686f0", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-56627.json b/cve/2024/CVE-2024-56627.json index efe97bb240e..b1e73bbf24d 100644 --- a/cve/2024/CVE-2024-56627.json +++ b/cve/2024/CVE-2024-56627.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-56627", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:22.250", "lastModified": "2024-12-27T15:15:22.250", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: fix Out-of-Bounds Read in ksmbd_vfs_stream_read\n\nAn offset from client could be a negative value, It could lead\nto an out-of-bounds read from the stream_buf.\nNote that this issue is coming when setting\n'vfs objects = streams_xattr parameter' in ksmbd.conf."}], "metrics": {}, "references": [{"url": "https://git.kernel.org/stable/c/27de4295522e9a33e4a3fc72f7b8193df9eebe41", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/81eed631935f2c52cdaf6691c6d48e0b06e8ad73", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/de4d790dcf53be41736239d7ee63849a16ff5d10", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/fc342cf86e2dc4d2edb0fc2ff5e28b6c7845adb9", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-56627", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:22.250", "lastModified": "2025-01-09T16:16:22.907", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: fix Out-of-Bounds Read in ksmbd_vfs_stream_read\n\nAn offset from client could be a negative value, It could lead\nto an out-of-bounds read from the stream_buf.\nNote that this issue is coming when setting\n'vfs objects = streams_xattr parameter' in ksmbd.conf."}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ksmbd: se ha corregido la lectura fuera de los l\u00edmites en ksmbd_vfs_stream_read. Un desplazamiento del cliente podr\u00eda ser un valor negativo, lo que podr\u00eda provocar una lectura fuera de los l\u00edmites desde stream_buf. Tenga en cuenta que este problema se produce al configurar 'vfs objects = streams_xattr parameter' en ksmbd.conf."}], "metrics": {}, "references": [{"url": "https://git.kernel.org/stable/c/27de4295522e9a33e4a3fc72f7b8193df9eebe41", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/6bd1bf0e8c42f10a9a9679a4c103a9032d30594d", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/81eed631935f2c52cdaf6691c6d48e0b06e8ad73", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/de4d790dcf53be41736239d7ee63849a16ff5d10", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/fc342cf86e2dc4d2edb0fc2ff5e28b6c7845adb9", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-56694.json b/cve/2024/CVE-2024-56694.json index cdbcce9e47a..2e72a67de0b 100644 --- a/cve/2024/CVE-2024-56694.json +++ b/cve/2024/CVE-2024-56694.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-56694", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-28T10:15:15.203", "lastModified": "2025-01-08T17:11:31.067", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: fix recursive lock when verdict program return SK_PASS\n\nWhen the stream_verdict program returns SK_PASS, it places the received skb\ninto its own receive queue, but a recursive lock eventually occurs, leading\nto an operating system deadlock. This issue has been present since v6.9.\n\n'''\nsk_psock_strp_data_ready\n write_lock_bh(&sk->sk_callback_lock)\n strp_data_ready\n strp_read_sock\n read_sock -> tcp_read_sock\n strp_recv\n cb.rcv_msg -> sk_psock_strp_read\n # now stream_verdict return SK_PASS without peer sock assign\n __SK_PASS = sk_psock_map_verd(SK_PASS, NULL)\n sk_psock_verdict_apply\n sk_psock_skb_ingress_self\n sk_psock_skb_ingress_enqueue\n sk_psock_data_ready\n read_lock_bh(&sk->sk_callback_lock) <= dead lock\n\n'''\n\nThis topic has been discussed before, but it has not been fixed.\nPrevious discussion:\nhttps://lore.kernel.org/all/6684a5864ec86_403d20898@john.notmuch"}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf: se corrige el bloqueo recursivo cuando el programa de veredicto devuelve SK_PASS Cuando el programa stream_verdict devuelve SK_PASS, coloca el skb recibido en su propia cola de recepci\u00f3n, pero finalmente se produce un bloqueo recursivo que provoca un bloqueo del sistema operativo. Este problema ha estado presente desde la versi\u00f3n v6.9. ''' sk_psock_strp_data_ready write_lock_bh(&sk->sk_callback_lock) strp_data_ready strp_read_sock read_sock -> tcp_read_sock strp_recv cb.rcv_msg -> sk_psock_strp_read # ahora stream_verdict devuelve SK_PASS sin asignaci\u00f3n de sock de pares __SK_PASS = sk_psock_map_verd(SK_PASS, NULL) sk_psock_verdict_apply sk_psock_skb_ingress_self sk_psock_skb_ingress_enqueue sk_psock_data_ready read_lock_bh(&sk->sk_callback_lock) <= bloqueo muerto ''' Este tema se ha discutido antes, pero no se ha solucionado. Discusi\u00f3n anterior: https://lore.kernel.org/all/6684a5864ec86_403d20898@john.notmuch"}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "baseScore": 5.5, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-667"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.10.223", "versionEndExcluding": "5.11", "matchCriteriaId": "CA30912E-AC28-4CAA-B0BF-82A5ABF6555D"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.15.159", "versionEndExcluding": "5.15.174", "matchCriteriaId": "AE68EECA-B500-4C8F-BA03-6297422D3BE3"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.1.91", "versionEndExcluding": "6.1.120", "matchCriteriaId": "D7525FB8-F6DA-4FBF-A1B7-66F009E2F1FE"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.6.31", "versionEndExcluding": "6.6.64", "matchCriteriaId": "C14BE86F-46F8-45CE-942E-3CB49D3AAB95"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.8.10", "versionEndExcluding": "6.11.11", "matchCriteriaId": "DC02F628-9D7C-48E7-93BD-4A25BD2C74CF"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.12", "versionEndExcluding": "6.12.2", "matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776"}]}]}], "references": [{"url": "https://git.kernel.org/stable/c/01f1b88acfd79103da0610b45471f6c88ea98d72", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/386efa339e08563dd33e83bc951aea5d407fe578", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/6694f7acd625ed854bf6342926e771d65dad7f69", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/8ca2a1eeadf09862190b2810697702d803ceef2d", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/da2bc8a0c8f3ac66fdf980fc59936f851a083561", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/f84c5ef6ca23cc2f72f3b830d74f67944684bb05", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-56694", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-28T10:15:15.203", "lastModified": "2025-01-09T16:16:23.053", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: fix recursive lock when verdict program return SK_PASS\n\nWhen the stream_verdict program returns SK_PASS, it places the received skb\ninto its own receive queue, but a recursive lock eventually occurs, leading\nto an operating system deadlock. This issue has been present since v6.9.\n\n'''\nsk_psock_strp_data_ready\n write_lock_bh(&sk->sk_callback_lock)\n strp_data_ready\n strp_read_sock\n read_sock -> tcp_read_sock\n strp_recv\n cb.rcv_msg -> sk_psock_strp_read\n # now stream_verdict return SK_PASS without peer sock assign\n __SK_PASS = sk_psock_map_verd(SK_PASS, NULL)\n sk_psock_verdict_apply\n sk_psock_skb_ingress_self\n sk_psock_skb_ingress_enqueue\n sk_psock_data_ready\n read_lock_bh(&sk->sk_callback_lock) <= dead lock\n\n'''\n\nThis topic has been discussed before, but it has not been fixed.\nPrevious discussion:\nhttps://lore.kernel.org/all/6684a5864ec86_403d20898@john.notmuch"}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf: se corrige el bloqueo recursivo cuando el programa de veredicto devuelve SK_PASS Cuando el programa stream_verdict devuelve SK_PASS, coloca el skb recibido en su propia cola de recepci\u00f3n, pero finalmente se produce un bloqueo recursivo que provoca un bloqueo del sistema operativo. Este problema ha estado presente desde la versi\u00f3n v6.9. ''' sk_psock_strp_data_ready write_lock_bh(&sk->sk_callback_lock) strp_data_ready strp_read_sock read_sock -> tcp_read_sock strp_recv cb.rcv_msg -> sk_psock_strp_read # ahora stream_verdict devuelve SK_PASS sin asignaci\u00f3n de sock de pares __SK_PASS = sk_psock_map_verd(SK_PASS, NULL) sk_psock_verdict_apply sk_psock_skb_ingress_self sk_psock_skb_ingress_enqueue sk_psock_data_ready read_lock_bh(&sk->sk_callback_lock) <= bloqueo muerto ''' Este tema se ha discutido antes, pero no se ha solucionado. Discusi\u00f3n anterior: https://lore.kernel.org/all/6684a5864ec86_403d20898@john.notmuch"}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "baseScore": 5.5, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-667"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.10.223", "versionEndExcluding": "5.11", "matchCriteriaId": "CA30912E-AC28-4CAA-B0BF-82A5ABF6555D"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.15.159", "versionEndExcluding": "5.15.174", "matchCriteriaId": "AE68EECA-B500-4C8F-BA03-6297422D3BE3"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.1.91", "versionEndExcluding": "6.1.120", "matchCriteriaId": "D7525FB8-F6DA-4FBF-A1B7-66F009E2F1FE"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.6.31", "versionEndExcluding": "6.6.64", "matchCriteriaId": "C14BE86F-46F8-45CE-942E-3CB49D3AAB95"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.8.10", "versionEndExcluding": "6.11.11", "matchCriteriaId": "DC02F628-9D7C-48E7-93BD-4A25BD2C74CF"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.12", "versionEndExcluding": "6.12.2", "matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776"}]}]}], "references": [{"url": "https://git.kernel.org/stable/c/01f1b88acfd79103da0610b45471f6c88ea98d72", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/078f7e1521442a55db4bed812a2fbaf02ac33819", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/221109ba2127eabd0aa64718543638b58b15df56", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/386efa339e08563dd33e83bc951aea5d407fe578", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/6694f7acd625ed854bf6342926e771d65dad7f69", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/8ca2a1eeadf09862190b2810697702d803ceef2d", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/da2bc8a0c8f3ac66fdf980fc59936f851a083561", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/f84c5ef6ca23cc2f72f3b830d74f67944684bb05", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-56715.json b/cve/2024/CVE-2024-56715.json index 7b63082ab7d..f8390750bad 100644 --- a/cve/2024/CVE-2024-56715.json +++ b/cve/2024/CVE-2024-56715.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-56715", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-29T09:15:06.643", "lastModified": "2024-12-29T09:15:06.643", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nionic: Fix netdev notifier unregister on failure\n\nIf register_netdev() fails, then the driver leaks the netdev notifier.\nFix this by calling ionic_lif_unregister() on register_netdev()\nfailure. This will also call ionic_lif_unregister_phc() if it has\nalready been registered."}], "metrics": {}, "references": [{"url": "https://git.kernel.org/stable/c/9590d32e090ea2751e131ae5273859ca22f5ac14", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/da5736f516a664a9e1ff74902663c64c423045d2", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/da93a12876f8b969df7316dc93aac7e725f88252", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/ee2e931b2b46de9af7f681258e8ec8e2cd81cfc6", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-56715", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-29T09:15:06.643", "lastModified": "2025-01-09T16:16:23.240", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nionic: Fix netdev notifier unregister on failure\n\nIf register_netdev() fails, then the driver leaks the netdev notifier.\nFix this by calling ionic_lif_unregister() on register_netdev()\nfailure. This will also call ionic_lif_unregister_phc() if it has\nalready been registered."}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ionic: Arreglar la cancelaci\u00f3n del registro del notificador netdev en caso de error Si register_netdev() falla, el controlador filtra el notificador netdev. Solucione esto llamando a ionic_lif_unregister() en caso de error de register_netdev(). Esto tambi\u00e9n llamar\u00e1 a ionic_lif_unregister_phc() si ya se ha registrado."}], "metrics": {}, "references": [{"url": "https://git.kernel.org/stable/c/87847938f5708b2509b279369c96572254bcf2ba", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/9590d32e090ea2751e131ae5273859ca22f5ac14", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/da5736f516a664a9e1ff74902663c64c423045d2", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/da93a12876f8b969df7316dc93aac7e725f88252", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/ee2e931b2b46de9af7f681258e8ec8e2cd81cfc6", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-56716.json b/cve/2024/CVE-2024-56716.json index 96da4336596..ee6aa22d40c 100644 --- a/cve/2024/CVE-2024-56716.json +++ b/cve/2024/CVE-2024-56716.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-56716", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-29T09:15:06.777", "lastModified": "2024-12-29T09:15:06.777", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetdevsim: prevent bad user input in nsim_dev_health_break_write()\n\nIf either a zero count or a large one is provided, kernel can crash."}], "metrics": {}, "references": [{"url": "https://git.kernel.org/stable/c/470c5ecbac2f19b1cdee2a6ce8d5650c3295c94b", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/8e9ef6bdf71bf25f4735e0230ce1919de8985835", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/d10321be26ff9e9e912697e9e8448099654ff561", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/ee76746387f6233bdfa93d7406990f923641568f", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-56716", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-29T09:15:06.777", "lastModified": "2025-01-09T16:16:23.387", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetdevsim: prevent bad user input in nsim_dev_health_break_write()\n\nIf either a zero count or a large one is provided, kernel can crash."}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netdevsim: evitar entradas incorrectas del usuario en nsim_dev_health_break_write() Si se proporciona un recuento cero o uno grande, el kernel puede bloquearse."}], "metrics": {}, "references": [{"url": "https://git.kernel.org/stable/c/470c5ecbac2f19b1cdee2a6ce8d5650c3295c94b", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/81bdfcd6e6a998e219c9dd49ec7291c2e0594bbc", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/8e9ef6bdf71bf25f4735e0230ce1919de8985835", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/b3a6daaf7cfb2de37b89fd7a5a2ad4ea9aa3e181", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/d10321be26ff9e9e912697e9e8448099654ff561", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/ee76746387f6233bdfa93d7406990f923641568f", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-56759.json b/cve/2024/CVE-2024-56759.json index be06fcacfa5..097b96214d2 100644 --- a/cve/2024/CVE-2024-56759.json +++ b/cve/2024/CVE-2024-56759.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-56759", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-06T17:15:40.900", "lastModified": "2025-01-07T23:07:04.790", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix use-after-free when COWing tree bock and tracing is enabled\n\nWhen a COWing a tree block, at btrfs_cow_block(), and we have the\ntracepoint trace_btrfs_cow_block() enabled and preemption is also enabled\n(CONFIG_PREEMPT=y), we can trigger a use-after-free in the COWed extent\nbuffer while inside the tracepoint code. This is because in some paths\nthat call btrfs_cow_block(), such as btrfs_search_slot(), we are holding\nthe last reference on the extent buffer @buf so btrfs_force_cow_block()\ndrops the last reference on the @buf extent buffer when it calls\nfree_extent_buffer_stale(buf), which schedules the release of the extent\nbuffer with RCU. This means that if we are on a kernel with preemption,\nthe current task may be preempted before calling trace_btrfs_cow_block()\nand the extent buffer already released by the time trace_btrfs_cow_block()\nis called, resulting in a use-after-free.\n\nFix this by moving the trace_btrfs_cow_block() from btrfs_cow_block() to\nbtrfs_force_cow_block() before the COWed extent buffer is freed.\nThis also has a side effect of invoking the tracepoint in the tree defrag\ncode, at defrag.c:btrfs_realloc_node(), since btrfs_force_cow_block() is\ncalled there, but this is fine and it was actually missing there."}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: btrfs: se corrige el use-after-free cuando se aplica COW a un bloque de \u00e1rbol y se habilita el seguimiento Cuando se aplica COW a un bloque de \u00e1rbol, en btrfs_cow_block(), y tenemos habilitado el punto de seguimiento trace_btrfs_cow_block() y tambi\u00e9n est\u00e1 habilitada la preempci\u00f3n (CONFIG_PREEMPT=y), podemos activar un use-after-free en el b\u00fafer de extensi\u00f3n aplicado COW mientras estamos dentro del c\u00f3digo del punto de seguimiento. Esto se debe a que en algunas rutas que llaman a btrfs_cow_block(), como btrfs_search_slot(), estamos manteniendo la \u00faltima referencia en el b\u00fafer de extensi\u00f3n @buf, por lo que btrfs_force_cow_block() elimina la \u00faltima referencia en el b\u00fafer de extensi\u00f3n @buf cuando llama a free_extent_buffer_stale(buf), que programa la liberaci\u00f3n del b\u00fafer de extensi\u00f3n con RCU. Esto significa que si estamos en un n\u00facleo con preempci\u00f3n, la tarea actual puede ser preemptada antes de llamar a trace_btrfs_cow_block() y el buffer de extensi\u00f3n ya liberado para el momento en que se llama a trace_btrfs_cow_block(), lo que da como resultado un use-after-free. Arregle esto moviendo trace_btrfs_cow_block() de btrfs_cow_block() a btrfs_force_cow_block() antes de que se libere el buffer de extensi\u00f3n COWed. Esto tambi\u00e9n tiene un efecto secundario de invocar el punto de seguimiento en el c\u00f3digo de desfragmentaci\u00f3n del \u00e1rbol, en defrag.c:btrfs_realloc_node(), ya que btrfs_force_cow_block() se llama all\u00ed, pero esto est\u00e1 bien y en realidad faltaba all\u00ed."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.8, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-416"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.12.8", "matchCriteriaId": "37A8903F-DC48-45AD-98DC-188AFD7C5844"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*", "matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*", "matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*", "matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E"}]}]}], "references": [{"url": "https://git.kernel.org/stable/c/44f52bbe96dfdbe4aca3818a2534520082a07040", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/c3a403d8ce36f5a809a492581de5ad17843e4701", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-56759", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-06T17:15:40.900", "lastModified": "2025-01-09T16:16:23.547", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix use-after-free when COWing tree bock and tracing is enabled\n\nWhen a COWing a tree block, at btrfs_cow_block(), and we have the\ntracepoint trace_btrfs_cow_block() enabled and preemption is also enabled\n(CONFIG_PREEMPT=y), we can trigger a use-after-free in the COWed extent\nbuffer while inside the tracepoint code. This is because in some paths\nthat call btrfs_cow_block(), such as btrfs_search_slot(), we are holding\nthe last reference on the extent buffer @buf so btrfs_force_cow_block()\ndrops the last reference on the @buf extent buffer when it calls\nfree_extent_buffer_stale(buf), which schedules the release of the extent\nbuffer with RCU. This means that if we are on a kernel with preemption,\nthe current task may be preempted before calling trace_btrfs_cow_block()\nand the extent buffer already released by the time trace_btrfs_cow_block()\nis called, resulting in a use-after-free.\n\nFix this by moving the trace_btrfs_cow_block() from btrfs_cow_block() to\nbtrfs_force_cow_block() before the COWed extent buffer is freed.\nThis also has a side effect of invoking the tracepoint in the tree defrag\ncode, at defrag.c:btrfs_realloc_node(), since btrfs_force_cow_block() is\ncalled there, but this is fine and it was actually missing there."}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: btrfs: se corrige el use-after-free cuando se aplica COW a un bloque de \u00e1rbol y se habilita el seguimiento Cuando se aplica COW a un bloque de \u00e1rbol, en btrfs_cow_block(), y tenemos habilitado el punto de seguimiento trace_btrfs_cow_block() y tambi\u00e9n est\u00e1 habilitada la preempci\u00f3n (CONFIG_PREEMPT=y), podemos activar un use-after-free en el b\u00fafer de extensi\u00f3n aplicado COW mientras estamos dentro del c\u00f3digo del punto de seguimiento. Esto se debe a que en algunas rutas que llaman a btrfs_cow_block(), como btrfs_search_slot(), estamos manteniendo la \u00faltima referencia en el b\u00fafer de extensi\u00f3n @buf, por lo que btrfs_force_cow_block() elimina la \u00faltima referencia en el b\u00fafer de extensi\u00f3n @buf cuando llama a free_extent_buffer_stale(buf), que programa la liberaci\u00f3n del b\u00fafer de extensi\u00f3n con RCU. Esto significa que si estamos en un n\u00facleo con preempci\u00f3n, la tarea actual puede ser preemptada antes de llamar a trace_btrfs_cow_block() y el buffer de extensi\u00f3n ya liberado para el momento en que se llama a trace_btrfs_cow_block(), lo que da como resultado un use-after-free. Arregle esto moviendo trace_btrfs_cow_block() de btrfs_cow_block() a btrfs_force_cow_block() antes de que se libere el buffer de extensi\u00f3n COWed. Esto tambi\u00e9n tiene un efecto secundario de invocar el punto de seguimiento en el c\u00f3digo de desfragmentaci\u00f3n del \u00e1rbol, en defrag.c:btrfs_realloc_node(), ya que btrfs_force_cow_block() se llama all\u00ed, pero esto est\u00e1 bien y en realidad faltaba all\u00ed."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.8, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-416"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.12.8", "matchCriteriaId": "37A8903F-DC48-45AD-98DC-188AFD7C5844"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*", "matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*", "matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*", "matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E"}]}]}], "references": [{"url": "https://git.kernel.org/stable/c/44f52bbe96dfdbe4aca3818a2534520082a07040", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/526ff5b27f090fb15040471f892cd2c9899ce314", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/66376f1a73cba57fd0af2631d7888605b738e499", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/9a466b8693b9add05de99af00c7bdff8259ecf19", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/ba5120a2fb5f23b4d39d302e181aa5d4e28a90d1", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/c3a403d8ce36f5a809a492581de5ad17843e4701", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-56761.json b/cve/2024/CVE-2024-56761.json index b1e677b181d..d324321efc5 100644 --- a/cve/2024/CVE-2024-56761.json +++ b/cve/2024/CVE-2024-56761.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-56761", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-06T17:15:41.480", "lastModified": "2025-01-07T23:05:19.703", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/fred: Clear WFE in missing-ENDBRANCH #CPs\n\nAn indirect branch instruction sets the CPU indirect branch tracker\n(IBT) into WAIT_FOR_ENDBRANCH (WFE) state and WFE stays asserted\nacross the instruction boundary. When the decoder finds an\ninappropriate instruction while WFE is set ENDBR, the CPU raises a #CP\nfault.\n\nFor the \"kernel IBT no ENDBR\" selftest where #CPs are deliberately\ntriggered, the WFE state of the interrupted context needs to be\ncleared to let execution continue. Otherwise when the CPU resumes\nfrom the instruction that just caused the previous #CP, another\nmissing-ENDBRANCH #CP is raised and the CPU enters a dead loop.\n\nThis is not a problem with IDT because it doesn't preserve WFE and\nIRET doesn't set WFE. But FRED provides space on the entry stack\n(in an expanded CS area) to save and restore the WFE state, thus the\nWFE state is no longer clobbered, so software must clear it.\n\nClear WFE to avoid dead looping in ibt_clear_fred_wfe() and the\n!ibt_fatal code path when execution is allowed to continue.\n\nClobbering WFE in any other circumstance is a security-relevant bug.\n\n[ dhansen: changelog rewording ]"}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: x86/fred: Borrar WFE en #CPs de ENDBRANCH faltantes Una instrucci\u00f3n de bifurcaci\u00f3n indirecta establece el rastreador de bifurcaci\u00f3n indirecta (IBT) de la CPU en estado WAIT_FOR_ENDBRANCH (WFE) y WFE permanece afirmado a trav\u00e9s del l\u00edmite de instrucci\u00f3n. Cuando el decodificador encuentra una instrucci\u00f3n inapropiada mientras WFE est\u00e1 establecido en ENDBR, la CPU genera un error #CP. Para la autoprueba \"IBT del kernel sin ENDBR\" donde los #CP se activan deliberadamente, el estado WFE del contexto interrumpido debe borrarse para permitir que la ejecuci\u00f3n contin\u00fae. De lo contrario, cuando la CPU se reanuda desde la instrucci\u00f3n que acaba de causar el #CP anterior, se genera otro #CP de ENDBRANCH faltante y la CPU entra en un bucle muerto. Esto no es un problema con IDT porque no preserva WFE e IRET no establece WFE. Pero FRED proporciona espacio en la pila de entrada (en un \u00e1rea CS expandida) para guardar y restaurar el estado WFE, por lo que el estado WFE ya no se ve afectado, por lo que el software debe limpiarlo. Limpie WFE para evitar bucles muertos en ibt_clear_fred_wfe() y la ruta de c\u00f3digo !ibt_fatal cuando se permite que la ejecuci\u00f3n contin\u00fae. Afectar a WFE en cualquier otra circunstancia es un error relevante para la seguridad. [ dhansen: reformulaci\u00f3n del registro de cambios ]"}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "baseScore": 5.5, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.6", "versionEndExcluding": "6.12.8", "matchCriteriaId": "9603956D-3787-4C93-B9F3-D1868F726960"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*", "matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*", "matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*", "matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E"}]}]}], "references": [{"url": "https://git.kernel.org/stable/c/b939f108e86b76119428a6fa4e92491e09ac7867", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/dc81e556f2a017d681251ace21bf06c126d5a192", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-56761", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-06T17:15:41.480", "lastModified": "2025-01-09T16:16:23.667", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/fred: Clear WFE in missing-ENDBRANCH #CPs\n\nAn indirect branch instruction sets the CPU indirect branch tracker\n(IBT) into WAIT_FOR_ENDBRANCH (WFE) state and WFE stays asserted\nacross the instruction boundary. When the decoder finds an\ninappropriate instruction while WFE is set ENDBR, the CPU raises a #CP\nfault.\n\nFor the \"kernel IBT no ENDBR\" selftest where #CPs are deliberately\ntriggered, the WFE state of the interrupted context needs to be\ncleared to let execution continue. Otherwise when the CPU resumes\nfrom the instruction that just caused the previous #CP, another\nmissing-ENDBRANCH #CP is raised and the CPU enters a dead loop.\n\nThis is not a problem with IDT because it doesn't preserve WFE and\nIRET doesn't set WFE. But FRED provides space on the entry stack\n(in an expanded CS area) to save and restore the WFE state, thus the\nWFE state is no longer clobbered, so software must clear it.\n\nClear WFE to avoid dead looping in ibt_clear_fred_wfe() and the\n!ibt_fatal code path when execution is allowed to continue.\n\nClobbering WFE in any other circumstance is a security-relevant bug.\n\n[ dhansen: changelog rewording ]"}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: x86/fred: Borrar WFE en #CPs de ENDBRANCH faltantes Una instrucci\u00f3n de bifurcaci\u00f3n indirecta establece el rastreador de bifurcaci\u00f3n indirecta (IBT) de la CPU en estado WAIT_FOR_ENDBRANCH (WFE) y WFE permanece afirmado a trav\u00e9s del l\u00edmite de instrucci\u00f3n. Cuando el decodificador encuentra una instrucci\u00f3n inapropiada mientras WFE est\u00e1 establecido en ENDBR, la CPU genera un error #CP. Para la autoprueba \"IBT del kernel sin ENDBR\" donde los #CP se activan deliberadamente, el estado WFE del contexto interrumpido debe borrarse para permitir que la ejecuci\u00f3n contin\u00fae. De lo contrario, cuando la CPU se reanuda desde la instrucci\u00f3n que acaba de causar el #CP anterior, se genera otro #CP de ENDBRANCH faltante y la CPU entra en un bucle muerto. Esto no es un problema con IDT porque no preserva WFE e IRET no establece WFE. Pero FRED proporciona espacio en la pila de entrada (en un \u00e1rea CS expandida) para guardar y restaurar el estado WFE, por lo que el estado WFE ya no se ve afectado, por lo que el software debe limpiarlo. Limpie WFE para evitar bucles muertos en ibt_clear_fred_wfe() y la ruta de c\u00f3digo !ibt_fatal cuando se permite que la ejecuci\u00f3n contin\u00fae. Afectar a WFE en cualquier otra circunstancia es un error relevante para la seguridad. [ dhansen: reformulaci\u00f3n del registro de cambios ]"}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "baseScore": 5.5, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.6", "versionEndExcluding": "6.12.8", "matchCriteriaId": "9603956D-3787-4C93-B9F3-D1868F726960"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*", "matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*", "matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*", "matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E"}]}]}], "references": [{"url": "https://git.kernel.org/stable/c/151447859d6fb0dcce8259f0971c6e94fb801661", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/b939f108e86b76119428a6fa4e92491e09ac7867", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/dc81e556f2a017d681251ace21bf06c126d5a192", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-56763.json b/cve/2024/CVE-2024-56763.json index eabd8a064af..8f540f917fe 100644 --- a/cve/2024/CVE-2024-56763.json +++ b/cve/2024/CVE-2024-56763.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-56763", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-06T17:15:42.150", "lastModified": "2025-01-07T23:03:48.537", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Prevent bad count for tracing_cpumask_write\n\nIf a large count is provided, it will trigger a warning in bitmap_parse_user.\nAlso check zero for it."}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tracing: Evitar recuento incorrecto para tracing_cpumask_write Si se proporciona un recuento alto, se activar\u00e1 una advertencia en bitmap_parse_user. Tambi\u00e9n verifique que est\u00e9 a cero."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "baseScore": 5.5, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.6.29", "versionEndExcluding": "6.1.123", "matchCriteriaId": "9729DA56-1826-482F-912F-994173A8BC29"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.2", "versionEndExcluding": "6.6.69", "matchCriteriaId": "EF18E3CB-058C-4836-B36D-8073F1C09977"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.7", "versionEndExcluding": "6.12.8", "matchCriteriaId": "E79883DD-75BE-4DA9-B4EC-AC6DE63BD438"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*", "matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*", "matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*", "matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E"}]}]}], "references": [{"url": "https://git.kernel.org/stable/c/03041e474a6a8f1bfd4b96b164bb3165c48fa1a3", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/1cca920af19df5dd91254e5ff35e68e911683706", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/3d15f4c2449558ffe83b4dba30614ef1cd6937c3", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/98feccbf32cfdde8c722bc4587aaa60ee5ac33f0", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-56763", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-06T17:15:42.150", "lastModified": "2025-01-09T16:16:23.780", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Prevent bad count for tracing_cpumask_write\n\nIf a large count is provided, it will trigger a warning in bitmap_parse_user.\nAlso check zero for it."}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tracing: Evitar recuento incorrecto para tracing_cpumask_write Si se proporciona un recuento alto, se activar\u00e1 una advertencia en bitmap_parse_user. Tambi\u00e9n verifique que est\u00e9 a cero."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "baseScore": 5.5, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.6.29", "versionEndExcluding": "6.1.123", "matchCriteriaId": "9729DA56-1826-482F-912F-994173A8BC29"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.2", "versionEndExcluding": "6.6.69", "matchCriteriaId": "EF18E3CB-058C-4836-B36D-8073F1C09977"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.7", "versionEndExcluding": "6.12.8", "matchCriteriaId": "E79883DD-75BE-4DA9-B4EC-AC6DE63BD438"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*", "matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*", "matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*", "matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E"}]}]}], "references": [{"url": "https://git.kernel.org/stable/c/03041e474a6a8f1bfd4b96b164bb3165c48fa1a3", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/1cca920af19df5dd91254e5ff35e68e911683706", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/2558d753df0628d4187d8e1fd989339460f4f364", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/3d15f4c2449558ffe83b4dba30614ef1cd6937c3", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/98feccbf32cfdde8c722bc4587aaa60ee5ac33f0", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/f60172b447317cb6c5e74b5601a151866269baf6", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-56766.json b/cve/2024/CVE-2024-56766.json index 4dc86dcb28c..284e0e30b45 100644 --- a/cve/2024/CVE-2024-56766.json +++ b/cve/2024/CVE-2024-56766.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-56766", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-06T17:15:43.127", "lastModified": "2025-01-07T22:59:50.807", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmtd: rawnand: fix double free in atmel_pmecc_create_user()\n\nThe \"user\" pointer was converted from being allocated with kzalloc() to\nbeing allocated by devm_kzalloc(). Calling kfree(user) will lead to a\ndouble free."}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mtd: rawnand: se corrige una liberaci\u00f3n doble en atmel_pmecc_create_user(). El puntero \"usuario\" pas\u00f3 de estar asignado con kzalloc() a estar asignado por devm_kzalloc(). Llamar a kfree(user) provocar\u00e1 una liberaci\u00f3n doble."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.8, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-415"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.19.325", "versionEndExcluding": "4.20", "matchCriteriaId": "3C960EB7-4E90-49E0-BB92-BE6F1B8CF26F"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.4.287", "versionEndExcluding": "5.5", "matchCriteriaId": "2E049AFB-F729-4E03-87D4-2BB4FFA5E622"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.10.231", "versionEndExcluding": "5.11", "matchCriteriaId": "055DF185-747E-444A-AEC9-E23AA67777A2"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.15.174", "versionEndExcluding": "5.16", "matchCriteriaId": "5EDFC1D5-0414-42C6-B6E2-1101700AA7DE"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.1.120", "versionEndExcluding": "6.1.123", "matchCriteriaId": "010819A3-7BB5-4ACE-9F5E-C53664C957C2"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.6.64", "versionEndExcluding": "6.6.69", "matchCriteriaId": "1DA730E9-7DB9-4919-A111-9038A4685B92"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.11.11", "versionEndExcluding": "6.12", "matchCriteriaId": "4CBF5F6E-D446-4CAE-AAA4-413442319824"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.12.2", "versionEndExcluding": "6.12.8", "matchCriteriaId": "42EECCF9-F7F0-46E2-A493-B31E541E6147"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*", "matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*", "matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*", "matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E"}]}]}], "references": [{"url": "https://git.kernel.org/stable/c/6ea15205d7e2b811fbbdf79783f686f58abfb4b7", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/d2f090ea57f8d6587e09d4066f740a8617767b3d", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/d8e4771f99c0400a1873235704b28bb803c83d17", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/dd45c87782738715d5e7c167f8dabf0814a7394a", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-56766", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-06T17:15:43.127", "lastModified": "2025-01-09T16:16:23.913", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmtd: rawnand: fix double free in atmel_pmecc_create_user()\n\nThe \"user\" pointer was converted from being allocated with kzalloc() to\nbeing allocated by devm_kzalloc(). Calling kfree(user) will lead to a\ndouble free."}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mtd: rawnand: se corrige una liberaci\u00f3n doble en atmel_pmecc_create_user(). El puntero \"usuario\" pas\u00f3 de estar asignado con kzalloc() a estar asignado por devm_kzalloc(). Llamar a kfree(user) provocar\u00e1 una liberaci\u00f3n doble."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.8, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-415"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.19.325", "versionEndExcluding": "4.20", "matchCriteriaId": "3C960EB7-4E90-49E0-BB92-BE6F1B8CF26F"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.4.287", "versionEndExcluding": "5.5", "matchCriteriaId": "2E049AFB-F729-4E03-87D4-2BB4FFA5E622"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.10.231", "versionEndExcluding": "5.11", "matchCriteriaId": "055DF185-747E-444A-AEC9-E23AA67777A2"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.15.174", "versionEndExcluding": "5.16", "matchCriteriaId": "5EDFC1D5-0414-42C6-B6E2-1101700AA7DE"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.1.120", "versionEndExcluding": "6.1.123", "matchCriteriaId": "010819A3-7BB5-4ACE-9F5E-C53664C957C2"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.6.64", "versionEndExcluding": "6.6.69", "matchCriteriaId": "1DA730E9-7DB9-4919-A111-9038A4685B92"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.11.11", "versionEndExcluding": "6.12", "matchCriteriaId": "4CBF5F6E-D446-4CAE-AAA4-413442319824"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.12.2", "versionEndExcluding": "6.12.8", "matchCriteriaId": "42EECCF9-F7F0-46E2-A493-B31E541E6147"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*", "matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*", "matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*", "matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E"}]}]}], "references": [{"url": "https://git.kernel.org/stable/c/1562871ef613fa9492aa0310933eff785166a90e", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/3d825a241e65f7e3072978729e79d735ec40b80e", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/6ea15205d7e2b811fbbdf79783f686f58abfb4b7", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/ca9818554b0f33e87f38e4bfa2dac056692d46cc", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/d2f090ea57f8d6587e09d4066f740a8617767b3d", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/d8e4771f99c0400a1873235704b28bb803c83d17", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/dd45c87782738715d5e7c167f8dabf0814a7394a", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-56767.json b/cve/2024/CVE-2024-56767.json index 9d5ecc728e3..e1d1fbce7c6 100644 --- a/cve/2024/CVE-2024-56767.json +++ b/cve/2024/CVE-2024-56767.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-56767", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-06T17:15:43.477", "lastModified": "2025-01-07T22:51:02.250", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: at_xdmac: avoid null_prt_deref in at_xdmac_prep_dma_memset\n\nThe at_xdmac_memset_create_desc may return NULL, which will lead to a\nnull pointer dereference. For example, the len input is error, or the\natchan->free_descs_list is empty and memory is exhausted. Therefore, add\ncheck to avoid this."}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: dmaengine: at_xdmac: evitar null_prt_deref en at_xdmac_prep_dma_memset El par\u00e1metro at_xdmac_memset_create_desc puede devolver NULL, lo que provocar\u00e1 una desreferencia de puntero nulo. Por ejemplo, la entrada len es un error o la lista atchan->free_descs_list est\u00e1 vac\u00eda y la memoria est\u00e1 agotada. Por lo tanto, agregue una comprobaci\u00f3n para evitar esto."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "baseScore": 5.5, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-476"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.2", "versionEndExcluding": "6.1.123", "matchCriteriaId": "F5F0EA73-3F4D-47C1-9667-244C435D9457"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.2", "versionEndExcluding": "6.6.69", "matchCriteriaId": "EF18E3CB-058C-4836-B36D-8073F1C09977"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.7", "versionEndExcluding": "6.12.8", "matchCriteriaId": "E79883DD-75BE-4DA9-B4EC-AC6DE63BD438"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*", "matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*", "matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*", "matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E"}]}]}], "references": [{"url": "https://git.kernel.org/stable/c/54376d8d26596f98ed7432a788314bb9154bf3e3", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/c43ec96e8d34399bd9dab2f2dc316b904892133f", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/e658f1c133b854b2ae799147301d82dddb8f3162", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/fdba6d5e455388377ec7e82a5913ddfcc7edd93b", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-56767", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-06T17:15:43.477", "lastModified": "2025-01-09T16:16:24.063", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: at_xdmac: avoid null_prt_deref in at_xdmac_prep_dma_memset\n\nThe at_xdmac_memset_create_desc may return NULL, which will lead to a\nnull pointer dereference. For example, the len input is error, or the\natchan->free_descs_list is empty and memory is exhausted. Therefore, add\ncheck to avoid this."}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: dmaengine: at_xdmac: evitar null_prt_deref en at_xdmac_prep_dma_memset El par\u00e1metro at_xdmac_memset_create_desc puede devolver NULL, lo que provocar\u00e1 una desreferencia de puntero nulo. Por ejemplo, la entrada len es un error o la lista atchan->free_descs_list est\u00e1 vac\u00eda y la memoria est\u00e1 agotada. Por lo tanto, agregue una comprobaci\u00f3n para evitar esto."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "baseScore": 5.5, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-476"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.2", "versionEndExcluding": "6.1.123", "matchCriteriaId": "F5F0EA73-3F4D-47C1-9667-244C435D9457"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.2", "versionEndExcluding": "6.6.69", "matchCriteriaId": "EF18E3CB-058C-4836-B36D-8073F1C09977"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.7", "versionEndExcluding": "6.12.8", "matchCriteriaId": "E79883DD-75BE-4DA9-B4EC-AC6DE63BD438"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*", "matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*", "matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*", "matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E"}]}]}], "references": [{"url": "https://git.kernel.org/stable/c/3d229600c54e9e0909080ecaf1aab0642aefa5f0", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/54376d8d26596f98ed7432a788314bb9154bf3e3", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/8d364597de9ce2a5f52714224bfe6c2e7a29b303", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/c43ec96e8d34399bd9dab2f2dc316b904892133f", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/e658f1c133b854b2ae799147301d82dddb8f3162", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/ed1a8aaa344522c0c349ac9042db27ad130ef913", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/fdba6d5e455388377ec7e82a5913ddfcc7edd93b", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-56769.json b/cve/2024/CVE-2024-56769.json index 21a1d3c1475..cc2e4cacdc1 100644 --- a/cve/2024/CVE-2024-56769.json +++ b/cve/2024/CVE-2024-56769.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-56769", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-06T17:15:44.063", "lastModified": "2025-01-07T22:49:54.483", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: dvb-frontends: dib3000mb: fix uninit-value in dib3000_write_reg\n\nSyzbot reports [1] an uninitialized value issue found by KMSAN in\ndib3000_read_reg().\n\nLocal u8 rb[2] is used in i2c_transfer() as a read buffer; in case\nthat call fails, the buffer may end up with some undefined values.\n\nSince no elaborate error handling is expected in dib3000_write_reg(),\nsimply zero out rb buffer to mitigate the problem.\n\n[1] Syzkaller report\ndvb-usb: bulk message failed: -22 (6/0)\n=====================================================\nBUG: KMSAN: uninit-value in dib3000mb_attach+0x2d8/0x3c0 drivers/media/dvb-frontends/dib3000mb.c:758\n dib3000mb_attach+0x2d8/0x3c0 drivers/media/dvb-frontends/dib3000mb.c:758\n dibusb_dib3000mb_frontend_attach+0x155/0x2f0 drivers/media/usb/dvb-usb/dibusb-mb.c:31\n dvb_usb_adapter_frontend_init+0xed/0x9a0 drivers/media/usb/dvb-usb/dvb-usb-dvb.c:290\n dvb_usb_adapter_init drivers/media/usb/dvb-usb/dvb-usb-init.c:90 [inline]\n dvb_usb_init drivers/media/usb/dvb-usb/dvb-usb-init.c:186 [inline]\n dvb_usb_device_init+0x25a8/0x3760 drivers/media/usb/dvb-usb/dvb-usb-init.c:310\n dibusb_probe+0x46/0x250 drivers/media/usb/dvb-usb/dibusb-mb.c:110\n...\nLocal variable rb created at:\n dib3000_read_reg+0x86/0x4e0 drivers/media/dvb-frontends/dib3000mb.c:54\n dib3000mb_attach+0x123/0x3c0 drivers/media/dvb-frontends/dib3000mb.c:758\n..."}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: media: dvb-frontends: dib3000mb: correcci\u00f3n de un valor no inicializado en dib3000_write_reg Syzbot informa [1] de un problema de valor no inicializado encontrado por KMSAN en dib3000_read_reg(). El rb u8 local [2] se utiliza en i2c_transfer() como un b\u00fafer de lectura; en caso de que esa llamada falle, el b\u00fafer puede terminar con algunos valores indefinidos. Dado que no se espera una gesti\u00f3n elaborada de errores en dib3000_write_reg(), simplemente ponga a cero el b\u00fafer rb para mitigar el problema. [1] Syzkaller informa dvb-usb: error en el mensaje masivo: -22 (6/0) ======================================================= ERROR: KMSAN: valor no inicializado en dib3000mb_attach+0x2d8/0x3c0 drivers/media/dvb-frontends/dib3000mb.c:758 dib3000mb_attach+0x2d8/0x3c0 drivers/media/dvb-frontends/dib3000mb.c:758 dibusb_dib3000mb_frontend_attach+0x155/0x2f0 drivers/media/usb/dvb-usb/dibusb-mb.c:31 dvb_usb_adapter_frontend_init+0xed/0x9a0 drivers/media/usb/dvb-usb/dvb-usb-dvb.c:290 dvb_usb_adapter_init drivers/media/usb/dvb-usb/dvb-usb-init.c:90 [en l\u00ednea] dvb_usb_init drivers/media/usb/dvb-usb/dvb-usb-init.c:186 [en l\u00ednea] dvb_usb_device_init+0x25a8/0x3760 drivers/media/usb/dvb-usb/dvb-usb-init.c:310 dibusb_probe+0x46/0x250 drivers/media/usb/dvb-usb/dibusb-mb.c:110 ... Variable local rb manipulado en: dib3000_read_reg+0x86/0x4e0 drivers/media/dvb-frontends/dib3000mb.c:54 dib3000mb_attach+0x123/0x3c0 drivers/media/dvb-frontends/dib3000mb.c:758 ..."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "baseScore": 5.5, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-908"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.6.19", "versionEndExcluding": "6.1.123", "matchCriteriaId": "C5D912DD-BB55-4C0A-AEDF-47A0C02B408C"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.2", "versionEndExcluding": "6.6.69", "matchCriteriaId": "EF18E3CB-058C-4836-B36D-8073F1C09977"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.7", "versionEndExcluding": "6.12.8", "matchCriteriaId": "E79883DD-75BE-4DA9-B4EC-AC6DE63BD438"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*", "matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*", "matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F"}]}]}], "references": [{"url": "https://git.kernel.org/stable/c/1d6de21f00293d819b5ca6dbe75ff1f3b6392140", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/2dd59fe0e19e1ab955259978082b62e5751924c7", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/3876e3a1c31a58a352c6bf5d2a90e3304445a637", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/c1197c1457bb7098cf46366e898eb52b41b6876a", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-56769", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-06T17:15:44.063", "lastModified": "2025-01-09T16:16:24.203", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: dvb-frontends: dib3000mb: fix uninit-value in dib3000_write_reg\n\nSyzbot reports [1] an uninitialized value issue found by KMSAN in\ndib3000_read_reg().\n\nLocal u8 rb[2] is used in i2c_transfer() as a read buffer; in case\nthat call fails, the buffer may end up with some undefined values.\n\nSince no elaborate error handling is expected in dib3000_write_reg(),\nsimply zero out rb buffer to mitigate the problem.\n\n[1] Syzkaller report\ndvb-usb: bulk message failed: -22 (6/0)\n=====================================================\nBUG: KMSAN: uninit-value in dib3000mb_attach+0x2d8/0x3c0 drivers/media/dvb-frontends/dib3000mb.c:758\n dib3000mb_attach+0x2d8/0x3c0 drivers/media/dvb-frontends/dib3000mb.c:758\n dibusb_dib3000mb_frontend_attach+0x155/0x2f0 drivers/media/usb/dvb-usb/dibusb-mb.c:31\n dvb_usb_adapter_frontend_init+0xed/0x9a0 drivers/media/usb/dvb-usb/dvb-usb-dvb.c:290\n dvb_usb_adapter_init drivers/media/usb/dvb-usb/dvb-usb-init.c:90 [inline]\n dvb_usb_init drivers/media/usb/dvb-usb/dvb-usb-init.c:186 [inline]\n dvb_usb_device_init+0x25a8/0x3760 drivers/media/usb/dvb-usb/dvb-usb-init.c:310\n dibusb_probe+0x46/0x250 drivers/media/usb/dvb-usb/dibusb-mb.c:110\n...\nLocal variable rb created at:\n dib3000_read_reg+0x86/0x4e0 drivers/media/dvb-frontends/dib3000mb.c:54\n dib3000mb_attach+0x123/0x3c0 drivers/media/dvb-frontends/dib3000mb.c:758\n..."}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: media: dvb-frontends: dib3000mb: correcci\u00f3n de un valor no inicializado en dib3000_write_reg Syzbot informa [1] de un problema de valor no inicializado encontrado por KMSAN en dib3000_read_reg(). El rb u8 local [2] se utiliza en i2c_transfer() como un b\u00fafer de lectura; en caso de que esa llamada falle, el b\u00fafer puede terminar con algunos valores indefinidos. Dado que no se espera una gesti\u00f3n elaborada de errores en dib3000_write_reg(), simplemente ponga a cero el b\u00fafer rb para mitigar el problema. [1] Syzkaller informa dvb-usb: error en el mensaje masivo: -22 (6/0) ======================================================= ERROR: KMSAN: valor no inicializado en dib3000mb_attach+0x2d8/0x3c0 drivers/media/dvb-frontends/dib3000mb.c:758 dib3000mb_attach+0x2d8/0x3c0 drivers/media/dvb-frontends/dib3000mb.c:758 dibusb_dib3000mb_frontend_attach+0x155/0x2f0 drivers/media/usb/dvb-usb/dibusb-mb.c:31 dvb_usb_adapter_frontend_init+0xed/0x9a0 drivers/media/usb/dvb-usb/dvb-usb-dvb.c:290 dvb_usb_adapter_init drivers/media/usb/dvb-usb/dvb-usb-init.c:90 [en l\u00ednea] dvb_usb_init drivers/media/usb/dvb-usb/dvb-usb-init.c:186 [en l\u00ednea] dvb_usb_device_init+0x25a8/0x3760 drivers/media/usb/dvb-usb/dvb-usb-init.c:310 dibusb_probe+0x46/0x250 drivers/media/usb/dvb-usb/dibusb-mb.c:110 ... Variable local rb manipulado en: dib3000_read_reg+0x86/0x4e0 drivers/media/dvb-frontends/dib3000mb.c:54 dib3000mb_attach+0x123/0x3c0 drivers/media/dvb-frontends/dib3000mb.c:758 ..."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "baseScore": 5.5, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-908"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.6.19", "versionEndExcluding": "6.1.123", "matchCriteriaId": "C5D912DD-BB55-4C0A-AEDF-47A0C02B408C"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.2", "versionEndExcluding": "6.6.69", "matchCriteriaId": "EF18E3CB-058C-4836-B36D-8073F1C09977"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.7", "versionEndExcluding": "6.12.8", "matchCriteriaId": "E79883DD-75BE-4DA9-B4EC-AC6DE63BD438"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*", "matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*", "matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F"}]}]}], "references": [{"url": "https://git.kernel.org/stable/c/035772fcd631eee2756b31cb6df249c0a8d453d7", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/1d6de21f00293d819b5ca6dbe75ff1f3b6392140", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/2dd59fe0e19e1ab955259978082b62e5751924c7", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/3876e3a1c31a58a352c6bf5d2a90e3304445a637", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/53106510736e734ce8b731ba871363389bfbf4c9", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/c1197c1457bb7098cf46366e898eb52b41b6876a", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/e11778189513cd7fb2edced5bd053bc18ede8418", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-8809.json b/cve/2024/CVE-2024-8809.json index 0a9a7ad949a..10f48b8ce04 100644 --- a/cve/2024/CVE-2024-8809.json +++ b/cve/2024/CVE-2024-8809.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-8809", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-11-22T21:15:19.110", "lastModified": "2024-11-22T21:15:19.110", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Cohesive Networks VNS3 Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Cohesive Networks VNS3. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the web service, which listens on TCP port 8000 by default. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-24178."}, {"lang": "es", "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo por inyecci\u00f3n de comandos VNS3 en Cohesive Networks. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en instalaciones afectadas de Cohesive Networks VNS3. Se requiere autenticaci\u00f3n para explotar esta vulnerabilidad. La falla espec\u00edfica existe dentro del servicio web, que escucha en el puerto TCP 8000 de manera predeterminada. El problema es el resultado de la falta de validaci\u00f3n adecuada de una cadena proporcionada por el usuario antes de usarla para ejecutar una llamada al sistema. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto de la ra\u00edz. Era ZDI-CAN-24178."}], "metrics": {"cvssMetricV30": [{"source": "zdi-disclosures@trendmicro.com", "type": "Secondary", "cvssData": {"version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 8.8, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "zdi-disclosures@trendmicro.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-78"}]}], "references": [{"url": "https://cohesive.net/support/security-responses/", "source": "zdi-disclosures@trendmicro.com"}, {"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1233/", "source": "zdi-disclosures@trendmicro.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-8809", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-11-22T21:15:19.110", "lastModified": "2025-01-09T16:11:32.663", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Cohesive Networks VNS3 Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Cohesive Networks VNS3. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the web service, which listens on TCP port 8000 by default. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-24178."}, {"lang": "es", "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo por inyecci\u00f3n de comandos VNS3 en Cohesive Networks. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en instalaciones afectadas de Cohesive Networks VNS3. Se requiere autenticaci\u00f3n para explotar esta vulnerabilidad. La falla espec\u00edfica existe dentro del servicio web, que escucha en el puerto TCP 8000 de manera predeterminada. El problema es el resultado de la falta de validaci\u00f3n adecuada de una cadena proporcionada por el usuario antes de usarla para ejecutar una llamada al sistema. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto de la ra\u00edz. Era ZDI-CAN-24178."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 8.8, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 5.9}], "cvssMetricV30": [{"source": "zdi-disclosures@trendmicro.com", "type": "Secondary", "cvssData": {"version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 8.8, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "zdi-disclosures@trendmicro.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-78"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:cohesive:vns3:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.6.1", "versionEndExcluding": "6.2.8", "matchCriteriaId": "E7E1C0E1-31B7-44B1-8D7C-EEBDD5CD88DD"}, {"vulnerable": true, "criteria": "cpe:2.3:a:cohesive:vns3:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.6.0", "versionEndExcluding": "6.6.7", "matchCriteriaId": "EF2C8255-9D77-40F2-94FE-7C380C84FA4B"}]}]}], "references": [{"url": "https://cohesive.net/support/security-responses/", "source": "zdi-disclosures@trendmicro.com", "tags": ["Vendor Advisory"]}, {"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1233/", "source": "zdi-disclosures@trendmicro.com", "tags": ["Third Party Advisory"]}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-0328.json b/cve/2025/CVE-2025-0328.json index e419fdeb87c..ebc5edbb32e 100644 --- a/cve/2025/CVE-2025-0328.json +++ b/cve/2025/CVE-2025-0328.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2025-0328", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T05:15:07.997", "lastModified": "2025-01-09T05:15:07.997", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "A vulnerability, which was classified as critical, has been found in KaiYuanTong ECT Platform up to 2.0.0. Affected by this issue is some unknown functionality of the file /public/server/runCode.php of the component HTTP POST Request Handler. The manipulation of the argument code leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."}], "metrics": {"cvssMetricV40": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "baseScore": 6.9, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "NONE", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "LOW", "vulnerableSystemIntegrity": "LOW", "vulnerableSystemAvailability": "LOW", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED"}}], "cvssMetricV31": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "baseScore": 7.3, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 3.9, "impactScore": 3.4}], "cvssMetricV2": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL"}, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "cna@vuldb.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-74"}, {"lang": "en", "value": "CWE-77"}]}], "references": [{"url": "https://note.zhaoj.in/share/ASPsoVCrLqKK", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?ctiid.290792", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?id.290792", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?submit.470601", "source": "cna@vuldb.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2025-0328", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T05:15:07.997", "lastModified": "2025-01-09T17:15:17.330", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "A vulnerability, which was classified as critical, has been found in KaiYuanTong ECT Platform up to 2.0.0. Affected by this issue is some unknown functionality of the file /public/server/runCode.php of the component HTTP POST Request Handler. The manipulation of the argument code leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."}, {"lang": "es", "value": "Se ha encontrado una vulnerabilidad, que se ha clasificado como cr\u00edtica, en KaiYuanTong ECT Platform hasta la versi\u00f3n 2.0.0. Este problema afecta a algunas funciones desconocidas del archivo /public/server/runCode.php del componente HTTP POST Request Handler. La manipulaci\u00f3n del c\u00f3digo de argumentos conduce a la inyecci\u00f3n de comandos. El ataque puede ejecutarse de forma remota. El exploit se ha divulgado al p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."}], "metrics": {"cvssMetricV40": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "baseScore": 6.9, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "NONE", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "LOW", "vulnerableSystemIntegrity": "LOW", "vulnerableSystemAvailability": "LOW", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED"}}], "cvssMetricV31": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "baseScore": 7.3, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 3.9, "impactScore": 3.4}], "cvssMetricV2": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL"}, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "cna@vuldb.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-74"}, {"lang": "en", "value": "CWE-77"}]}], "references": [{"url": "https://note.zhaoj.in/share/ASPsoVCrLqKK", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?ctiid.290792", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?id.290792", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?submit.470601", "source": "cna@vuldb.com"}, {"url": "https://note.zhaoj.in/share/ASPsoVCrLqKK", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-0331.json b/cve/2025/CVE-2025-0331.json index 2107ec2bff0..cafacb46341 100644 --- a/cve/2025/CVE-2025-0331.json +++ b/cve/2025/CVE-2025-0331.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2025-0331", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T05:15:08.237", "lastModified": "2025-01-09T05:15:08.237", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "A vulnerability, which was classified as critical, has been found in YunzMall up to 2.4.2. This issue affects the function changePwd of the file /app/platform/controllers/ResetpwdController.php of the component HTTP POST Request Handler. The manipulation of the argument pwd leads to weak password recovery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."}], "metrics": {"cvssMetricV40": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "baseScore": 6.9, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "NONE", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "LOW", "vulnerableSystemAvailability": "NONE", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED"}}], "cvssMetricV31": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "baseScore": 5.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 3.9, "impactScore": 1.4}], "cvssMetricV2": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE"}, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "cna@vuldb.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-640"}]}], "references": [{"url": "https://note.zhaoj.in/share/DsijzdQDJSAp", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?ctiid.290819", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?id.290819", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?submit.471663", "source": "cna@vuldb.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2025-0331", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T05:15:08.237", "lastModified": "2025-01-09T17:15:17.933", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "A vulnerability, which was classified as critical, has been found in YunzMall up to 2.4.2. This issue affects the function changePwd of the file /app/platform/controllers/ResetpwdController.php of the component HTTP POST Request Handler. The manipulation of the argument pwd leads to weak password recovery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."}, {"lang": "es", "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en YunzMall hasta la versi\u00f3n 2.4.2. Este problema afecta a la funci\u00f3n changePwd del archivo /app/platform/controllers/ResetpwdController.php del componente HTTP POST Request Handler. La manipulaci\u00f3n del argumento pwd provoca una recuperaci\u00f3n de contrase\u00f1as d\u00e9bil. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera."}], "metrics": {"cvssMetricV40": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "baseScore": 6.9, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "NONE", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "LOW", "vulnerableSystemAvailability": "NONE", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED"}}], "cvssMetricV31": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "baseScore": 5.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 3.9, "impactScore": 1.4}], "cvssMetricV2": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE"}, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "cna@vuldb.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-640"}]}], "references": [{"url": "https://note.zhaoj.in/share/DsijzdQDJSAp", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?ctiid.290819", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?id.290819", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?submit.471663", "source": "cna@vuldb.com"}, {"url": "https://note.zhaoj.in/share/DsijzdQDJSAp", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-0333.json b/cve/2025/CVE-2025-0333.json index abbbef2e4f6..1b9eef346c8 100644 --- a/cve/2025/CVE-2025-0333.json +++ b/cve/2025/CVE-2025-0333.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2025-0333", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T05:15:08.453", "lastModified": "2025-01-09T05:15:08.453", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "A vulnerability, which was classified as critical, was found in leiyuxi cy-fast 1.0. Affected is the function listData of the file /sys/role/listData. The manipulation of the argument order leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."}], "metrics": {"cvssMetricV40": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "baseScore": 5.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "LOW", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "LOW", "vulnerableSystemIntegrity": "LOW", "vulnerableSystemAvailability": "LOW", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED"}}], "cvssMetricV31": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "baseScore": 6.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.8, "impactScore": 3.4}], "cvssMetricV2": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL"}, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "cna@vuldb.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-74"}, {"lang": "en", "value": "CWE-89"}]}], "references": [{"url": "https://github.com/d3do-23/cvelist/blob/main/cy-fast/sqli1.md", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?ctiid.290820", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?id.290820", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?submit.475297", "source": "cna@vuldb.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2025-0333", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T05:15:08.453", "lastModified": "2025-01-09T17:15:18.077", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "A vulnerability, which was classified as critical, was found in leiyuxi cy-fast 1.0. Affected is the function listData of the file /sys/role/listData. The manipulation of the argument order leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."}, {"lang": "es", "value": "En leiyuxi cy-fast 1.0 se ha detectado una vulnerabilidad clasificada como cr\u00edtica. La funci\u00f3n listData del archivo /sys/role/listData est\u00e1 afectada. La manipulaci\u00f3n del orden de los argumentos provoca una inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."}], "metrics": {"cvssMetricV40": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "baseScore": 5.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "LOW", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "LOW", "vulnerableSystemIntegrity": "LOW", "vulnerableSystemAvailability": "LOW", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED"}}], "cvssMetricV31": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "baseScore": 6.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.8, "impactScore": 3.4}], "cvssMetricV2": [{"source": "cna@vuldb.com", "type": "Secondary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL"}, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "cna@vuldb.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-74"}, {"lang": "en", "value": "CWE-89"}]}], "references": [{"url": "https://github.com/d3do-23/cvelist/blob/main/cy-fast/sqli1.md", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?ctiid.290820", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?id.290820", "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?submit.475297", "source": "cna@vuldb.com"}, {"url": "https://github.com/d3do-23/cvelist/blob/main/cy-fast/sqli1.md", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-21592.json b/cve/2025/CVE-2025-21592.json new file mode 100644 index 00000000000..ce4aa7f232a --- /dev/null +++ b/cve/2025/CVE-2025-21592.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-21592", "sourceIdentifier": "sirt@juniper.net", "published": "2025-01-09T17:15:18.203", "lastModified": "2025-01-09T17:15:18.203", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "An Exposure of Sensitive Information to an Unauthorized Actor\u00a0vulnerability in the command-line interface (CLI) of Juniper Networks Junos OS on SRX Series devices allows a local, low-privileged user with access to the Junos CLI to view the contents of sensitive files on the file system.\n\nThrough the execution of either 'show services advanced-anti-malware' or 'show services security-intelligence' command, a user with limited permissions (e.g., a low privilege login class user) can access protected files that should not be accessible to the user. These files may contain sensitive information that can be used to cause further impact to the system.\n\n\nThis issue affects Junos OS SRX Series:\n\n\n\n * All versions before 21.4R3-S8,\n\n * from 22.2 before 22.2R3-S5,\n\n * from 22.3 before 22.3R3-S3,\n * from 22.4 before 22.4R3-S2,\n\n * from 23.2 before 23.2R2-S1,\n\n * from 23.4 before 23.4R2."}], "metrics": {"cvssMetricV40": [{"source": "sirt@juniper.net", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "baseScore": 6.8, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "LOW", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "HIGH", "vulnerableSystemIntegrity": "NONE", "vulnerableSystemAvailability": "NONE", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED"}}], "cvssMetricV31": [{"source": "sirt@juniper.net", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "baseScore": 5.5, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "sirt@juniper.net", "type": "Primary", "description": [{"lang": "en", "value": "CWE-200"}]}], "references": [{"url": "https://supportportal.juniper.net/JSA92860", "source": "sirt@juniper.net"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-21593.json b/cve/2025/CVE-2025-21593.json new file mode 100644 index 00000000000..55ea191c29a --- /dev/null +++ b/cve/2025/CVE-2025-21593.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-21593", "sourceIdentifier": "sirt@juniper.net", "published": "2025-01-09T17:15:18.380", "lastModified": "2025-01-09T17:15:18.380", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "An Improper Control of a Resource Through its Lifetime vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker to cause a Denial-of-Service (DoS).\n\nOn devices with SRv6 (Segment Routing over IPv6) enabled, an attacker can send a malformed BGP UPDATE packet which will cause the rpd to crash and restart. Continued receipt of these UPDATE packets will cause a sustained DoS condition.\u00a0\n\nThis issue affects iBGP and eBGP, and both IPv4 and IPv6 are affected by this vulnerability.This issue affects Junos OS:\u00a0\n\n\n\n * All versions before 21.2R3-S9,\u00a0\n * from 21.4 before 21.4R3-S10,\u00a0\n * from 22.2 before 22.2R3-S5,\u00a0\n * from 22.3 before 22.3R3-S4,\u00a0\n * from 22.4 before 22.4R3-S3,\u00a0\n * from 23.2 before 23.2R2-S2,\u00a0\n * from 23.4 before 23.4R2;\n\n\n\nand Junos OS Evolved:\u00a0\n\n\n\n * All versions before 21.2R3-S9-EVO,\u00a0\n * from 21.4-EVO before 21.4R3-S10-EVO,\u00a0\n * from 22.2-EVO before 22.2R3-S5-EVO,\u00a0\n * from 22.3-EVO before 22.3R3-S4-EVO,\u00a0\n * from 22.4-EVO before 22.4R3-S3-EVO,\n * from 23.2-EVO before 23.2R2-S2-EVO,\u00a0\n * from 23.4-EVO before 23.4R2-EVO."}], "metrics": {"cvssMetricV40": [{"source": "sirt@juniper.net", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:A/V:X/RE:X/U:X", "baseScore": 7.1, "baseSeverity": "HIGH", "attackVector": "ADJACENT", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "NONE", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "NONE", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "AUTOMATIC", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED"}}], "cvssMetricV31": [{"source": "sirt@juniper.net", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "ADJACENT_NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "sirt@juniper.net", "type": "Primary", "description": [{"lang": "en", "value": "CWE-664"}]}], "references": [{"url": "https://supportportal.juniper.net/JSA92861", "source": "sirt@juniper.net"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-21596.json b/cve/2025/CVE-2025-21596.json new file mode 100644 index 00000000000..8712a14a151 --- /dev/null +++ b/cve/2025/CVE-2025-21596.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-21596", "sourceIdentifier": "sirt@juniper.net", "published": "2025-01-09T17:15:18.593", "lastModified": "2025-01-09T17:15:18.593", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "An Improper Handling of Exceptional Conditions vulnerability in the command-line processing of Juniper Networks Junos OS on SRX1500, SRX4100, and SRX4200 devices allows a local, low-privileged authenticated attacker executing the 'show chassis environment pem' command to cause the chassis daemon (chassisd) to crash and restart, resulting in a temporary Denial of Service (DoS). However, repeated execution of this command will eventually cause the chassisd process to fail to restart, impacting packet processing on the system.\n\nThis issue affects Junos OS on SRX1500, SRX4100, SRX4200:\u00a0\n\n\n\n * All versions before 21.4R3-S9,\u00a0\n * from 22.2 before 22.2R3-S5,\u00a0\n * from 22.3 before 22.3R3-S4,\u00a0\n * from 22.4 before 22.4R3-S4,\u00a0\n * from 23.2 before 23.2R2-S3,\u00a0\n * from 23.4 before 23.4R2-S1."}], "metrics": {"cvssMetricV40": [{"source": "sirt@juniper.net", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:X/RE:M/U:X", "baseScore": 6.8, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "LOW", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "NONE", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NO", "recovery": "USER", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "MODERATE", "providerUrgency": "NOT_DEFINED"}}], "cvssMetricV31": [{"source": "sirt@juniper.net", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "baseScore": 5.5, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "sirt@juniper.net", "type": "Primary", "description": [{"lang": "en", "value": "CWE-755"}]}], "references": [{"url": "https://supportportal.juniper.net/JSA92864", "source": "sirt@juniper.net"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-21599.json b/cve/2025/CVE-2025-21599.json new file mode 100644 index 00000000000..16a91bc75ba --- /dev/null +++ b/cve/2025/CVE-2025-21599.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-21599", "sourceIdentifier": "sirt@juniper.net", "published": "2025-01-09T17:15:18.770", "lastModified": "2025-01-09T17:15:18.770", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "A\u00a0Missing Release of Memory after Effective Lifetime vulnerability in the Juniper Tunnel Driver (jtd) of Juniper Networks Junos OS Evolved allows an unauthenticated network-based attacker to cause Denial of Service.\u00a0\n\nReceipt of specifically malformed IPv6 packets, destined to the device, causes kernel memory to not be freed, resulting in memory exhaustion leading to a system crash and Denial of Service (DoS).\u00a0Continuous receipt and processing of these packets will continue to exhaust kernel memory, creating a sustained Denial of Service (DoS) condition.\nThis issue only affects systems configured with IPv6.\n\nThis issue affects Junos OS Evolved:\u00a0\n\n\n\n * from 22.4-EVO before 22.4R3-S5-EVO,\u00a0\n * from 23.2-EVO before 23.2R2-S2-EVO,\u00a0\n * from 23.4-EVO before 23.4R2-S2-EVO,\u00a0\n * from 24.2-EVO before 24.2R1-S2-EVO, 24.2R2-EVO.\n\n\n\n\nThis issue does not affect Juniper Networks Junos OS Evolved versions prior to 22.4R1-EVO."}], "metrics": {"cvssMetricV40": [{"source": "sirt@juniper.net", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "baseScore": 8.7, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "NONE", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "NONE", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "LOW", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED"}}], "cvssMetricV31": [{"source": "sirt@juniper.net", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.6}]}, "weaknesses": [{"source": "sirt@juniper.net", "type": "Primary", "description": [{"lang": "en", "value": "CWE-401"}]}], "references": [{"url": "https://supportportal.juniper.net/JSA92869", "source": "sirt@juniper.net"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-21600.json b/cve/2025/CVE-2025-21600.json new file mode 100644 index 00000000000..091afe4de85 --- /dev/null +++ b/cve/2025/CVE-2025-21600.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-21600", "sourceIdentifier": "sirt@juniper.net", "published": "2025-01-09T17:15:18.960", "lastModified": "2025-01-09T17:15:18.960", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "An Out-of-Bounds Read vulnerability in\n\nthe routing protocol daemon (rpd) of \n\n Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, logically adjacent BGP peer sending a specifically malformed BGP packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.\n\n\n\nThis issue only affects systems configured in\n either of two ways:\n\n \n \n * systems with BGP traceoptions enabled\n\n * systems with BGP family traffic-engineering (BGP-LS)\n configured\n\n\n and can be exploited from a directly connected and configured BGP peer.\u00a0\n\nThis issue affects iBGP and eBGP \n\nwith \n\nany address family\n\n configured, and both IPv4 and IPv6 are affected by this vulnerability.\n\nThis issue affects:\n\nJunos OS:\u00a0\n\n\n\n * All versions before 21.4R3-S9,\u00a0\n * from 22.2 before 22.2R3-S5,\u00a0\n * from 22.3 before 22.3R3-S4,\u00a0\n * from 22.4 before 22.4R3-S5,\u00a0\n * from 23.2 before 23.2R2-S3,\u00a0\n * from 23.4 before 23.4R2-S3,\u00a0\n * from 24.2 before 24.2R1-S2, 24.2R2;\u00a0\n\n\n\n\nJunos OS Evolved:\u00a0\n\n\n\n * All versions before 21.4R3-S9-EVO,\u00a0\n * from 22.2 before 22.2R3-S5-EVO,\u00a0\n * from 22.3 before 22.3R3-S4-EVO,\u00a0\n * from 22.4 before 22.4R3-S5-EVO,\u00a0\n * from 23.2 before 23.2R2-S3-EVO,\u00a0\n * from 23.4 before 23.4R2-S2-EVO,\u00a0\n * from 24.2 before 24.2R1-S2-EVO, 24.2R2-EVO.\n\n\n\nThis is a similar, but different vulnerability than the issue reported as CVE-2024-39516."}], "metrics": {"cvssMetricV40": [{"source": "sirt@juniper.net", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:A/V:C/RE:M/U:Green", "baseScore": 7.1, "baseSeverity": "HIGH", "attackVector": "ADJACENT", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "NONE", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "NONE", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "LOW", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NO", "recovery": "AUTOMATIC", "valueDensity": "CONCENTRATED", "vulnerabilityResponseEffort": "MODERATE", "providerUrgency": "GREEN"}}], "cvssMetricV31": [{"source": "sirt@juniper.net", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "ADJACENT_NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "sirt@juniper.net", "type": "Primary", "description": [{"lang": "en", "value": "CWE-125"}]}], "references": [{"url": "https://supportportal.juniper.net/JSA92870", "source": "sirt@juniper.net"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-21602.json b/cve/2025/CVE-2025-21602.json new file mode 100644 index 00000000000..9ce79645e8e --- /dev/null +++ b/cve/2025/CVE-2025-21602.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-21602", "sourceIdentifier": "sirt@juniper.net", "published": "2025-01-09T17:15:19.150", "lastModified": "2025-01-09T17:15:19.150", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker sending a specific BGP update packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS). \n\nContinuous receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.\n\nThis issue affects iBGP and eBGP, and both IPv4 and IPv6 are affected by this vulnerability.\n\nThis issue affects Junos OS:\u00a0\n\n\n\n * from 21.4 before 21.4R3-S9,\u00a0\n * from 22.2 before 22.2R3-S5,\u00a0\n * from 22.3 before 22.3R3-S4,\n * from 22.4 before 22.4R3-S5,\u00a0\n * from 23.2 before 23.2R2-S3,\u00a0\n * from 23.4 before 23.4R2-S3,\u00a0\n * from 24.2 before 24.2R1-S2, 24.2R2;\u00a0\n\n\nThis issue does not affect versions prior to\u00a021.1R1.\n\n\n\n\n\nJunos OS Evolved:\u00a0\n\n\n\n * from 21.4 before 21.4R3-S9-EVO,\u00a0\n * from 22.2 before 22.2R3-S5-EVO,\u00a0\n * from 22.3 before 22.3R3-S4-EVO,\n * from 22.4 before 22.4R3-S5-EVO,\u00a0\n * from 23.2 before 23.2R2-S3-EVO,\u00a0\n * from 23.4 before 23.4R2-S3-EVO,\u00a0\n * from 24.2 before 24.2R1-S2-EVO, 24.2R2-EVO.\n\n\nThis issue does not affect versions prior to 21.1R1-EVO"}], "metrics": {"cvssMetricV40": [{"source": "sirt@juniper.net", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:A/V:C/RE:M/U:Green", "baseScore": 7.1, "baseSeverity": "HIGH", "attackVector": "ADJACENT", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "NONE", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "NONE", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "LOW", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NO", "recovery": "AUTOMATIC", "valueDensity": "CONCENTRATED", "vulnerabilityResponseEffort": "MODERATE", "providerUrgency": "GREEN"}}], "cvssMetricV31": [{"source": "sirt@juniper.net", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "ADJACENT_NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "sirt@juniper.net", "type": "Primary", "description": [{"lang": "en", "value": "CWE-755"}]}], "references": [{"url": "https://supportportal.juniper.net/JSA92872", "source": "sirt@juniper.net"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-22295.json b/cve/2025/CVE-2025-22295.json new file mode 100644 index 00000000000..eeca201347f --- /dev/null +++ b/cve/2025/CVE-2025-22295.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-22295", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:25.140", "lastModified": "2025-01-09T16:16:25.140", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tripetto WordPress form builder plugin for contact forms, surveys and quizzes \u2013 Tripetto allows Stored XSS.This issue affects WordPress form builder plugin for contact forms, surveys and quizzes \u2013 Tripetto: from n/a through 8.0.5."}], "metrics": {"cvssMetricV31": [{"source": "audit@patchstack.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "baseScore": 7.1, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.8, "impactScore": 3.7}]}, "weaknesses": [{"source": "audit@patchstack.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://patchstack.com/database/wordpress/plugin/tripetto/vulnerability/wordpress-tripetto-plugin-8-0-5-cross-site-scripting-xss-vulnerability?_s_id=cve", "source": "audit@patchstack.com"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-22307.json b/cve/2025/CVE-2025-22307.json new file mode 100644 index 00000000000..f833a602f53 --- /dev/null +++ b/cve/2025/CVE-2025-22307.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-22307", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:25.347", "lastModified": "2025-01-09T16:16:25.347", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CodeAstrology Team Product Table for WooCommerce allows Reflected XSS.This issue affects Product Table for WooCommerce: from n/a through 3.5.6."}], "metrics": {"cvssMetricV31": [{"source": "audit@patchstack.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "baseScore": 7.1, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.8, "impactScore": 3.7}]}, "weaknesses": [{"source": "audit@patchstack.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://patchstack.com/database/wordpress/plugin/woo-product-table/vulnerability/wordpress-product-table-for-woocommerce-plugin-3-5-6-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", "source": "audit@patchstack.com"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-22313.json b/cve/2025/CVE-2025-22313.json new file mode 100644 index 00000000000..882076b4853 --- /dev/null +++ b/cve/2025/CVE-2025-22313.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-22313", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:25.653", "lastModified": "2025-01-09T16:16:25.653", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in OTWthemes Widgetize Pages Light allows Reflected XSS.This issue affects Widgetize Pages Light: from n/a through 3.0."}], "metrics": {"cvssMetricV31": [{"source": "audit@patchstack.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "baseScore": 7.1, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.8, "impactScore": 3.7}]}, "weaknesses": [{"source": "audit@patchstack.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://patchstack.com/database/wordpress/plugin/widgetize-pages-light/vulnerability/wordpress-widgetize-pages-light-plugin-3-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", "source": "audit@patchstack.com"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-22330.json b/cve/2025/CVE-2025-22330.json new file mode 100644 index 00000000000..32db13a2d0a --- /dev/null +++ b/cve/2025/CVE-2025-22330.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-22330", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:25.840", "lastModified": "2025-01-09T16:16:25.840", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mahesh Waghmare MG Parallax Slider allows Reflected XSS.This issue affects MG Parallax Slider: from n/a through 1.0.."}], "metrics": {"cvssMetricV31": [{"source": "audit@patchstack.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "baseScore": 7.1, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.8, "impactScore": 3.7}]}, "weaknesses": [{"source": "audit@patchstack.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://patchstack.com/database/wordpress/plugin/mg-parallax-slider/vulnerability/wordpress-mg-parallax-slider-plugin-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", "source": "audit@patchstack.com"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-22331.json b/cve/2025/CVE-2025-22331.json new file mode 100644 index 00000000000..6aaa225a1b9 --- /dev/null +++ b/cve/2025/CVE-2025-22331.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-22331", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:26.180", "lastModified": "2025-01-09T16:16:26.180", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in P3JX Cf7Save Extension allows Reflected XSS.This issue affects Cf7Save Extension: from n/a through 1."}], "metrics": {"cvssMetricV31": [{"source": "audit@patchstack.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "baseScore": 7.1, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.8, "impactScore": 3.7}]}, "weaknesses": [{"source": "audit@patchstack.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://patchstack.com/database/wordpress/plugin/cf7save-extension/vulnerability/wordpress-cf7save-extension-plugin-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", "source": "audit@patchstack.com"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-22345.json b/cve/2025/CVE-2025-22345.json new file mode 100644 index 00000000000..70f88626954 --- /dev/null +++ b/cve/2025/CVE-2025-22345.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-22345", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:26.620", "lastModified": "2025-01-09T16:16:26.620", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tobias Spiess TS Comfort DB allows Reflected XSS.This issue affects TS Comfort DB: from n/a through 2.0.7."}], "metrics": {"cvssMetricV31": [{"source": "audit@patchstack.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "baseScore": 7.1, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.8, "impactScore": 3.7}]}, "weaknesses": [{"source": "audit@patchstack.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://patchstack.com/database/wordpress/plugin/ts-comfort-database/vulnerability/wordpress-ts-comfort-db-plugin-2-0-7-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", "source": "audit@patchstack.com"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-22361.json b/cve/2025/CVE-2025-22361.json new file mode 100644 index 00000000000..e67889fcb6f --- /dev/null +++ b/cve/2025/CVE-2025-22361.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-22361", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:26.830", "lastModified": "2025-01-09T16:16:26.830", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Opentracker Opentracker Analytics allows Reflected XSS.This issue affects Opentracker Analytics: from n/a through 1.3."}], "metrics": {"cvssMetricV31": [{"source": "audit@patchstack.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "baseScore": 7.1, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.8, "impactScore": 3.7}]}, "weaknesses": [{"source": "audit@patchstack.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://patchstack.com/database/wordpress/plugin/opentracker-analytics/vulnerability/wordpress-opentracker-analytics-plugin-1-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", "source": "audit@patchstack.com"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-22504.json b/cve/2025/CVE-2025-22504.json new file mode 100644 index 00000000000..3456219b8d0 --- /dev/null +++ b/cve/2025/CVE-2025-22504.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-22504", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:27.110", "lastModified": "2025-01-09T16:16:27.110", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in jumpdemand 4ECPS Web Forms allows Upload a Web Shell to a Web Server.This issue affects 4ECPS Web Forms: from n/a through 0.2.18."}], "metrics": {"cvssMetricV31": [{"source": "audit@patchstack.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "baseScore": 10.0, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 6.0}]}, "weaknesses": [{"source": "audit@patchstack.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-434"}]}], "references": [{"url": "https://patchstack.com/database/wordpress/plugin/4ecps-webforms/vulnerability/wordpress-4ecps-web-forms-plugin-0-2-18-arbitrary-file-upload-vulnerability?_s_id=cve", "source": "audit@patchstack.com"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-22505.json b/cve/2025/CVE-2025-22505.json new file mode 100644 index 00000000000..04a7acea21e --- /dev/null +++ b/cve/2025/CVE-2025-22505.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-22505", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:27.280", "lastModified": "2025-01-09T16:16:27.280", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Nabaraj Chapagain NC Wishlist for Woocommerce allows SQL Injection.This issue affects NC Wishlist for Woocommerce: from n/a through 1.0.1."}], "metrics": {"cvssMetricV31": [{"source": "audit@patchstack.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L", "baseScore": 8.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "LOW"}, "exploitabilityScore": 3.1, "impactScore": 4.7}]}, "weaknesses": [{"source": "audit@patchstack.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-89"}]}], "references": [{"url": "https://patchstack.com/database/wordpress/plugin/nc-wishlist-for-woocommerce/vulnerability/wordpress-nc-wishlist-for-woocommerce-plugin-1-0-1-sql-injection-vulnerability?_s_id=cve", "source": "audit@patchstack.com"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-22508.json b/cve/2025/CVE-2025-22508.json new file mode 100644 index 00000000000..d9c002691b0 --- /dev/null +++ b/cve/2025/CVE-2025-22508.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-22508", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:27.433", "lastModified": "2025-01-09T16:16:27.433", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Roninwp FAT Event Lite allows PHP Local File Inclusion.This issue affects FAT Event Lite: from n/a through 1.1."}], "metrics": {"cvssMetricV31": [{"source": "audit@patchstack.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 8.1, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.2, "impactScore": 5.9}]}, "weaknesses": [{"source": "audit@patchstack.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-98"}]}], "references": [{"url": "https://patchstack.com/database/wordpress/plugin/fat-event-lite/vulnerability/wordpress-fat-event-lite-plugin-1-1-unauthenticated-non-arbitrary-local-file-inclusion-vulnerability?_s_id=cve", "source": "audit@patchstack.com"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-22510.json b/cve/2025/CVE-2025-22510.json new file mode 100644 index 00000000000..5d8f230e647 --- /dev/null +++ b/cve/2025/CVE-2025-22510.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-22510", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:27.590", "lastModified": "2025-01-09T16:16:27.590", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Deserialization of Untrusted Data vulnerability in Konrad Karpieszuk WC Price History for Omnibus allows Object Injection.This issue affects WC Price History for Omnibus: from n/a through 2.1.4."}], "metrics": {"cvssMetricV31": [{"source": "audit@patchstack.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.2, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.2, "impactScore": 5.9}]}, "weaknesses": [{"source": "audit@patchstack.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-502"}]}], "references": [{"url": "https://patchstack.com/database/wordpress/plugin/wc-price-history/vulnerability/wordpress-wc-price-history-for-omnibus-plugin-2-1-4-php-object-injection-vulnerability?_s_id=cve", "source": "audit@patchstack.com"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-22521.json b/cve/2025/CVE-2025-22521.json new file mode 100644 index 00000000000..abb7447d3d7 --- /dev/null +++ b/cve/2025/CVE-2025-22521.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-22521", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:27.743", "lastModified": "2025-01-09T16:16:27.743", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Scott Farrell wp Hosting Performance Check allows Reflected XSS.This issue affects wp Hosting Performance Check: from n/a through 2.18.8."}], "metrics": {"cvssMetricV31": [{"source": "audit@patchstack.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "baseScore": 7.1, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.8, "impactScore": 3.7}]}, "weaknesses": [{"source": "audit@patchstack.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://patchstack.com/database/wordpress/plugin/wp-hosting-performance-check/vulnerability/wordpress-wp-hosting-performance-check-plugin-2-18-8-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", "source": "audit@patchstack.com"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-22527.json b/cve/2025/CVE-2025-22527.json new file mode 100644 index 00000000000..b42dcec81fb --- /dev/null +++ b/cve/2025/CVE-2025-22527.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-22527", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:27.890", "lastModified": "2025-01-09T16:16:27.890", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Yamna Khawaja Mailing Group Listserv allows SQL Injection.This issue affects Mailing Group Listserv: from n/a through 2.0.9."}], "metrics": {"cvssMetricV31": [{"source": "audit@patchstack.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L", "baseScore": 7.6, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.3, "impactScore": 4.7}]}, "weaknesses": [{"source": "audit@patchstack.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-89"}]}], "references": [{"url": "https://patchstack.com/database/wordpress/plugin/wp-mailing-group/vulnerability/wordpress-mailing-group-listserv-plugin-2-0-9-sql-injection-vulnerability?_s_id=cve", "source": "audit@patchstack.com"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-22535.json b/cve/2025/CVE-2025-22535.json new file mode 100644 index 00000000000..56e46472102 --- /dev/null +++ b/cve/2025/CVE-2025-22535.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-22535", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:28.047", "lastModified": "2025-01-09T16:16:28.047", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Jonathan Kern WPListCal allows SQL Injection.This issue affects WPListCal: from n/a through 1.3.5."}], "metrics": {"cvssMetricV31": [{"source": "audit@patchstack.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L", "baseScore": 8.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "LOW"}, "exploitabilityScore": 3.1, "impactScore": 4.7}]}, "weaknesses": [{"source": "audit@patchstack.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-89"}]}], "references": [{"url": "https://patchstack.com/database/wordpress/plugin/wplistcal/vulnerability/wordpress-wplistcal-plugin-1-3-5-sql-injection-vulnerability?_s_id=cve", "source": "audit@patchstack.com"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-22537.json b/cve/2025/CVE-2025-22537.json new file mode 100644 index 00000000000..13dbd8ffb8b --- /dev/null +++ b/cve/2025/CVE-2025-22537.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-22537", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:28.210", "lastModified": "2025-01-09T16:16:28.210", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in traveller11 Google Maps Travel Route allows SQL Injection.This issue affects Google Maps Travel Route: from n/a through 1.3.1."}], "metrics": {"cvssMetricV31": [{"source": "audit@patchstack.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L", "baseScore": 8.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "LOW"}, "exploitabilityScore": 3.1, "impactScore": 4.7}]}, "weaknesses": [{"source": "audit@patchstack.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-89"}]}], "references": [{"url": "https://patchstack.com/database/wordpress/plugin/google-maps-travel-route/vulnerability/wordpress-google-maps-travel-route-plugin-1-3-1-sql-injection-vulnerability?_s_id=cve", "source": "audit@patchstack.com"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-22539.json b/cve/2025/CVE-2025-22539.json new file mode 100644 index 00000000000..0d53a515b28 --- /dev/null +++ b/cve/2025/CVE-2025-22539.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-22539", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:28.350", "lastModified": "2025-01-09T16:16:28.350", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ka2 Custom DataBase Tables allows Reflected XSS.This issue affects Custom DataBase Tables: from n/a through 2.1.34."}], "metrics": {"cvssMetricV31": [{"source": "audit@patchstack.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "baseScore": 7.1, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.8, "impactScore": 3.7}]}, "weaknesses": [{"source": "audit@patchstack.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://patchstack.com/database/wordpress/plugin/custom-database-tables/vulnerability/wordpress-custom-database-tables-plugin-2-1-34-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", "source": "audit@patchstack.com"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-22540.json b/cve/2025/CVE-2025-22540.json new file mode 100644 index 00000000000..301b5b815ab --- /dev/null +++ b/cve/2025/CVE-2025-22540.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-22540", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:28.503", "lastModified": "2025-01-09T16:16:28.503", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Sebastian Orellana Emailing Subscription allows Blind SQL Injection.This issue affects Emailing Subscription: from n/a through 1.4.1."}], "metrics": {"cvssMetricV31": [{"source": "audit@patchstack.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L", "baseScore": 9.3, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "LOW"}, "exploitabilityScore": 3.9, "impactScore": 4.7}]}, "weaknesses": [{"source": "audit@patchstack.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-89"}]}], "references": [{"url": "https://patchstack.com/database/wordpress/plugin/email-suscripcion/vulnerability/wordpress-emailing-subscription-plugin-1-4-1-sql-injection-vulnerability?_s_id=cve", "source": "audit@patchstack.com"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-22542.json b/cve/2025/CVE-2025-22542.json new file mode 100644 index 00000000000..5ca060785ea --- /dev/null +++ b/cve/2025/CVE-2025-22542.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-22542", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:28.670", "lastModified": "2025-01-09T16:16:28.670", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Ofek Nakar Virtual Bot allows Blind SQL Injection.This issue affects Virtual Bot: from n/a through 1.0.0."}], "metrics": {"cvssMetricV31": [{"source": "audit@patchstack.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L", "baseScore": 9.3, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "LOW"}, "exploitabilityScore": 3.9, "impactScore": 4.7}]}, "weaknesses": [{"source": "audit@patchstack.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-89"}]}], "references": [{"url": "https://patchstack.com/database/wordpress/plugin/virtual-bot/vulnerability/wordpress-virtual-bot-plugin-1-0-0-sql-injection-vulnerability?_s_id=cve", "source": "audit@patchstack.com"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-22561.json b/cve/2025/CVE-2025-22561.json new file mode 100644 index 00000000000..f2fadc47105 --- /dev/null +++ b/cve/2025/CVE-2025-22561.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-22561", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:28.827", "lastModified": "2025-01-09T16:16:28.827", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Missing Authorization vulnerability in Jason Funk Title Experiments Free allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Title Experiments Free: from n/a through 9.0.4."}], "metrics": {"cvssMetricV31": [{"source": "audit@patchstack.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "baseScore": 4.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 1.4}]}, "weaknesses": [{"source": "audit@patchstack.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-862"}]}], "references": [{"url": "https://patchstack.com/database/wordpress/plugin/wp-experiments-free/vulnerability/wordpress-title-experiments-free-plugin-9-0-4-broken-access-control-vulnerability?_s_id=cve", "source": "audit@patchstack.com"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-22594.json b/cve/2025/CVE-2025-22594.json new file mode 100644 index 00000000000..d10869826a0 --- /dev/null +++ b/cve/2025/CVE-2025-22594.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-22594", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:28.983", "lastModified": "2025-01-09T16:16:28.983", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in hccoder \u2013 S\u00e1ndor Fodor Better User Shortcodes allows Reflected XSS.This issue affects Better User Shortcodes: from n/a through 1.0."}], "metrics": {"cvssMetricV31": [{"source": "audit@patchstack.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "baseScore": 7.1, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.8, "impactScore": 3.7}]}, "weaknesses": [{"source": "audit@patchstack.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://patchstack.com/database/wordpress/plugin/better-user-shortcodes/vulnerability/wordpress-better-user-shortcodes-plugin-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", "source": "audit@patchstack.com"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-22595.json b/cve/2025/CVE-2025-22595.json new file mode 100644 index 00000000000..3887882b1c1 --- /dev/null +++ b/cve/2025/CVE-2025-22595.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-22595", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:29.160", "lastModified": "2025-01-09T16:16:29.160", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Yamna Khawaja Mailing Group Listserv allows Reflected XSS.This issue affects Mailing Group Listserv: from n/a through 2.0.9."}], "metrics": {"cvssMetricV31": [{"source": "audit@patchstack.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "baseScore": 7.1, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.8, "impactScore": 3.7}]}, "weaknesses": [{"source": "audit@patchstack.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://patchstack.com/database/wordpress/plugin/wp-mailing-group/vulnerability/wordpress-mailing-group-listserv-plugin-2-0-9-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", "source": "audit@patchstack.com"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-22801.json b/cve/2025/CVE-2025-22801.json new file mode 100644 index 00000000000..c5af3bfdc32 --- /dev/null +++ b/cve/2025/CVE-2025-22801.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-22801", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:29.323", "lastModified": "2025-01-09T16:16:29.323", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HasThemes Free WooCommerce Theme 99fy Extension allows Stored XSS.This issue affects Free WooCommerce Theme 99fy Extension: from n/a through 1.2.8."}], "metrics": {"cvssMetricV31": [{"source": "audit@patchstack.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.3, "impactScore": 3.7}]}, "weaknesses": [{"source": "audit@patchstack.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://patchstack.com/database/wordpress/plugin/99fy-core/vulnerability/wordpress-free-woocommerce-theme-99fy-extension-plugin-1-2-8-cross-site-scripting-xss-vulnerability?_s_id=cve", "source": "audit@patchstack.com"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-22802.json b/cve/2025/CVE-2025-22802.json new file mode 100644 index 00000000000..967da1b0089 --- /dev/null +++ b/cve/2025/CVE-2025-22802.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-22802", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:29.470", "lastModified": "2025-01-09T16:16:29.470", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in add-ons.org Email Templates Customizer for WordPress \u2013 Drag And Drop Email Templates Builder \u2013 YeeMail allows Stored XSS.This issue affects Email Templates Customizer for WordPress \u2013 Drag And Drop Email Templates Builder \u2013 YeeMail: from n/a through 2.1.4."}], "metrics": {"cvssMetricV31": [{"source": "audit@patchstack.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.3, "impactScore": 3.7}]}, "weaknesses": [{"source": "audit@patchstack.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://patchstack.com/database/wordpress/plugin/yeemail/vulnerability/wordpress-email-templates-customizer-yeemail-plugin-2-1-4-cross-site-scripting-xss-vulnerability?_s_id=cve", "source": "audit@patchstack.com"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-22803.json b/cve/2025/CVE-2025-22803.json new file mode 100644 index 00000000000..69ae294d974 --- /dev/null +++ b/cve/2025/CVE-2025-22803.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-22803", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:29.627", "lastModified": "2025-01-09T16:16:29.627", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in VillaTheme Advanced Product Information for WooCommerce allows Stored XSS.This issue affects Advanced Product Information for WooCommerce: from n/a through 1.1.4."}], "metrics": {"cvssMetricV31": [{"source": "audit@patchstack.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.3, "impactScore": 3.7}]}, "weaknesses": [{"source": "audit@patchstack.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://patchstack.com/database/wordpress/plugin/woo-advanced-product-information/vulnerability/wordpress-advanced-product-information-for-woocommerce-plugin-1-1-4-cross-site-scripting-xss-vulnerability?_s_id=cve", "source": "audit@patchstack.com"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-22804.json b/cve/2025/CVE-2025-22804.json new file mode 100644 index 00000000000..de6bbd67e85 --- /dev/null +++ b/cve/2025/CVE-2025-22804.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-22804", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:29.787", "lastModified": "2025-01-09T16:16:29.787", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Paul Bearne Author Avatars List/Block allows Stored XSS.This issue affects Author Avatars List/Block: from n/a through 2.1.23."}], "metrics": {"cvssMetricV31": [{"source": "audit@patchstack.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.3, "impactScore": 3.7}]}, "weaknesses": [{"source": "audit@patchstack.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://patchstack.com/database/wordpress/plugin/author-avatars/vulnerability/wordpress-author-avatars-list-block-plugin-2-1-23-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", "source": "audit@patchstack.com"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-22805.json b/cve/2025/CVE-2025-22805.json new file mode 100644 index 00000000000..eff6d5d9946 --- /dev/null +++ b/cve/2025/CVE-2025-22805.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-22805", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:29.937", "lastModified": "2025-01-09T16:16:29.937", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ThemePoints Skill Bar allows Stored XSS.This issue affects Skill Bar: from n/a through 1.2."}], "metrics": {"cvssMetricV31": [{"source": "audit@patchstack.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.3, "impactScore": 3.7}]}, "weaknesses": [{"source": "audit@patchstack.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://patchstack.com/database/wordpress/plugin/skillbars/vulnerability/wordpress-skill-bar-plugin-1-2-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", "source": "audit@patchstack.com"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-22806.json b/cve/2025/CVE-2025-22806.json new file mode 100644 index 00000000000..938370ead03 --- /dev/null +++ b/cve/2025/CVE-2025-22806.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-22806", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:30.090", "lastModified": "2025-01-09T16:16:30.090", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Modernaweb Studio Black Widgets For Elementor allows DOM-Based XSS.This issue affects Black Widgets For Elementor: from n/a through 1.3.8."}], "metrics": {"cvssMetricV31": [{"source": "audit@patchstack.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.3, "impactScore": 3.7}]}, "weaknesses": [{"source": "audit@patchstack.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://patchstack.com/database/wordpress/plugin/black-widgets/vulnerability/wordpress-black-widgets-for-elementor-plugin-1-3-8-cross-site-scripting-xss-vulnerability?_s_id=cve", "source": "audit@patchstack.com"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-22807.json b/cve/2025/CVE-2025-22807.json new file mode 100644 index 00000000000..4dc864379eb --- /dev/null +++ b/cve/2025/CVE-2025-22807.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-22807", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:30.253", "lastModified": "2025-01-09T16:16:30.253", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Robert Peake Responsive Flickr Slideshow allows Stored XSS.This issue affects Responsive Flickr Slideshow: from n/a through 2.6.0."}], "metrics": {"cvssMetricV31": [{"source": "audit@patchstack.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.3, "impactScore": 3.7}]}, "weaknesses": [{"source": "audit@patchstack.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://patchstack.com/database/wordpress/plugin/mobile-friendly-flickr-slideshow/vulnerability/wordpress-responsive-flickr-slideshow-plugin-2-6-0-cross-site-scripting-xss-vulnerability?_s_id=cve", "source": "audit@patchstack.com"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-22808.json b/cve/2025/CVE-2025-22808.json new file mode 100644 index 00000000000..9a63b9c1f94 --- /dev/null +++ b/cve/2025/CVE-2025-22808.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-22808", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:30.403", "lastModified": "2025-01-09T16:16:30.403", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Surbma Surbma | Premium WP allows DOM-Based XSS.This issue affects Surbma | Premium WP: from n/a through 9.0."}], "metrics": {"cvssMetricV31": [{"source": "audit@patchstack.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.3, "impactScore": 3.7}]}, "weaknesses": [{"source": "audit@patchstack.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://patchstack.com/database/wordpress/plugin/surbma-premium-wp/vulnerability/wordpress-surbma-premium-wp-plugin-9-0-cross-site-scripting-xss-vulnerability?_s_id=cve", "source": "audit@patchstack.com"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-22809.json b/cve/2025/CVE-2025-22809.json new file mode 100644 index 00000000000..c6f19afc2ac --- /dev/null +++ b/cve/2025/CVE-2025-22809.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-22809", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:30.557", "lastModified": "2025-01-09T16:16:30.557", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Gravity Master PDF Catalog Woocommerce allows DOM-Based XSS.This issue affects PDF Catalog Woocommerce: from n/a through 2.0."}], "metrics": {"cvssMetricV31": [{"source": "audit@patchstack.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.3, "impactScore": 3.7}]}, "weaknesses": [{"source": "audit@patchstack.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://patchstack.com/database/wordpress/plugin/pdf-catalog-woocommerce/vulnerability/wordpress-pdf-catalog-woocommerce-plugin-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve", "source": "audit@patchstack.com"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-22810.json b/cve/2025/CVE-2025-22810.json new file mode 100644 index 00000000000..9164610a6b8 --- /dev/null +++ b/cve/2025/CVE-2025-22810.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-22810", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:30.713", "lastModified": "2025-01-09T16:16:30.713", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CBB Team Content Blocks Builder allows Stored XSS.This issue affects Content Blocks Builder: from n/a through 2.7.6."}], "metrics": {"cvssMetricV31": [{"source": "audit@patchstack.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.3, "impactScore": 3.7}]}, "weaknesses": [{"source": "audit@patchstack.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://patchstack.com/database/wordpress/plugin/content-blocks-builder/vulnerability/wordpress-content-blocks-builder-plugin-2-7-6-cross-site-scripting-xss-vulnerability?_s_id=cve", "source": "audit@patchstack.com"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-22811.json b/cve/2025/CVE-2025-22811.json new file mode 100644 index 00000000000..201f7e66506 --- /dev/null +++ b/cve/2025/CVE-2025-22811.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-22811", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:30.880", "lastModified": "2025-01-09T16:16:30.880", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Modeltheme MT Addons for Elementor allows Stored XSS.This issue affects MT Addons for Elementor: from n/a through 1.0.6."}], "metrics": {"cvssMetricV31": [{"source": "audit@patchstack.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.3, "impactScore": 3.7}]}, "weaknesses": [{"source": "audit@patchstack.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://patchstack.com/database/wordpress/plugin/mt-addons-for-elementor/vulnerability/wordpress-mt-addons-for-elementor-plugin-1-0-6-cross-site-scripting-xss-vulnerability?_s_id=cve", "source": "audit@patchstack.com"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-22812.json b/cve/2025/CVE-2025-22812.json new file mode 100644 index 00000000000..ad1a82fbd3d --- /dev/null +++ b/cve/2025/CVE-2025-22812.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-22812", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:31.047", "lastModified": "2025-01-09T16:16:31.047", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in FlickDevs News Ticker Widget for Elementor allows Stored XSS.This issue affects News Ticker Widget for Elementor: from n/a through 1.3.2."}], "metrics": {"cvssMetricV31": [{"source": "audit@patchstack.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.3, "impactScore": 3.7}]}, "weaknesses": [{"source": "audit@patchstack.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://patchstack.com/database/wordpress/plugin/news-ticker-widget-for-elementor/vulnerability/wordpress-news-ticker-widget-for-elementor-plugin-1-3-2-cross-site-scripting-xss-vulnerability?_s_id=cve", "source": "audit@patchstack.com"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-22813.json b/cve/2025/CVE-2025-22813.json new file mode 100644 index 00000000000..fc0b23301ed --- /dev/null +++ b/cve/2025/CVE-2025-22813.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-22813", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:31.200", "lastModified": "2025-01-09T16:16:31.200", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ChatBot for WordPress - WPBot Conversational Forms for ChatBot allows Stored XSS.This issue affects Conversational Forms for ChatBot: from n/a through 1.4.2."}], "metrics": {"cvssMetricV31": [{"source": "audit@patchstack.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.3, "impactScore": 3.7}]}, "weaknesses": [{"source": "audit@patchstack.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://patchstack.com/database/wordpress/plugin/conversational-forms/vulnerability/wordpress-chatbot-conversational-forms-plugin-1-4-2-cross-site-scripting-xss-vulnerability?_s_id=cve", "source": "audit@patchstack.com"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-22814.json b/cve/2025/CVE-2025-22814.json new file mode 100644 index 00000000000..470d2df9c86 --- /dev/null +++ b/cve/2025/CVE-2025-22814.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-22814", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:31.370", "lastModified": "2025-01-09T16:16:31.370", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Dylan James Zephyr Admin Theme allows Cross Site Request Forgery.This issue affects Zephyr Admin Theme: from n/a through 1.4.1."}], "metrics": {"cvssMetricV31": [{"source": "audit@patchstack.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "baseScore": 7.1, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.8, "impactScore": 3.7}]}, "weaknesses": [{"source": "audit@patchstack.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-352"}]}], "references": [{"url": "https://patchstack.com/database/wordpress/plugin/zephyr-modern-admin-theme/vulnerability/wordpress-zephyr-admin-theme-plugin-1-4-1-csrf-to-stored-xss-vulnerability?_s_id=cve", "source": "audit@patchstack.com"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-22815.json b/cve/2025/CVE-2025-22815.json new file mode 100644 index 00000000000..6bb1ad2b95b --- /dev/null +++ b/cve/2025/CVE-2025-22815.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-22815", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:31.543", "lastModified": "2025-01-09T16:16:31.543", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in bPlugins LLC Button Block allows Stored XSS.This issue affects Button Block: from n/a through 1.1.6."}], "metrics": {"cvssMetricV31": [{"source": "audit@patchstack.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.3, "impactScore": 3.7}]}, "weaknesses": [{"source": "audit@patchstack.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://patchstack.com/database/wordpress/plugin/button-block/vulnerability/wordpress-button-block-plugin-1-1-6-cross-site-scripting-xss-vulnerability?_s_id=cve", "source": "audit@patchstack.com"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-22817.json b/cve/2025/CVE-2025-22817.json new file mode 100644 index 00000000000..9b527a2f1f6 --- /dev/null +++ b/cve/2025/CVE-2025-22817.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-22817", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:31.693", "lastModified": "2025-01-09T16:16:31.693", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Venutius BP Profile Shortcodes Extra allows Stored XSS.This issue affects BP Profile Shortcodes Extra: from n/a through 2.6.0."}], "metrics": {"cvssMetricV31": [{"source": "audit@patchstack.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.3, "impactScore": 3.7}]}, "weaknesses": [{"source": "audit@patchstack.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://patchstack.com/database/wordpress/plugin/bp-profile-shortcodes-extra/vulnerability/wordpress-bp-profile-shortcodes-extra-plugin-2-6-0-cross-site-scripting-xss-vulnerability?_s_id=cve", "source": "audit@patchstack.com"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-22818.json b/cve/2025/CVE-2025-22818.json new file mode 100644 index 00000000000..c308fdf9d5f --- /dev/null +++ b/cve/2025/CVE-2025-22818.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-22818", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:31.850", "lastModified": "2025-01-09T16:16:31.850", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in S3Bubble S3Player \u2013 WooCommerce & Elementor Integration allows Stored XSS.This issue affects S3Player \u2013 WooCommerce & Elementor Integration: from n/a through 4.2.1."}], "metrics": {"cvssMetricV31": [{"source": "audit@patchstack.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.3, "impactScore": 3.7}]}, "weaknesses": [{"source": "audit@patchstack.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://patchstack.com/database/wordpress/plugin/drm-protected-video-streaming/vulnerability/wordpress-s3player-plugin-4-2-1-cross-site-scripting-xss-vulnerability?_s_id=cve", "source": "audit@patchstack.com"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-22819.json b/cve/2025/CVE-2025-22819.json new file mode 100644 index 00000000000..fbb4212ba82 --- /dev/null +++ b/cve/2025/CVE-2025-22819.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-22819", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:32.000", "lastModified": "2025-01-09T16:16:32.000", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in 4wpbari Qr Code and Barcode Scanner Reader allows Stored XSS.This issue affects Qr Code and Barcode Scanner Reader: from n/a through 1.0.0."}], "metrics": {"cvssMetricV31": [{"source": "audit@patchstack.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.3, "impactScore": 3.7}]}, "weaknesses": [{"source": "audit@patchstack.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://patchstack.com/database/wordpress/plugin/qr-code-and-barcode-scanner-reader/vulnerability/wordpress-qr-code-and-barcode-scanner-reader-plugin-1-0-0-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", "source": "audit@patchstack.com"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-22820.json b/cve/2025/CVE-2025-22820.json new file mode 100644 index 00000000000..3bbbd400e64 --- /dev/null +++ b/cve/2025/CVE-2025-22820.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-22820", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:32.173", "lastModified": "2025-01-09T16:16:32.173", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Daniel Walmsley VR Views allows Stored XSS.This issue affects VR Views: from n/a through 1.5.1."}], "metrics": {"cvssMetricV31": [{"source": "audit@patchstack.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.3, "impactScore": 3.7}]}, "weaknesses": [{"source": "audit@patchstack.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://patchstack.com/database/wordpress/plugin/vr-views/vulnerability/wordpress-vr-views-plugin-1-5-1-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", "source": "audit@patchstack.com"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-22821.json b/cve/2025/CVE-2025-22821.json new file mode 100644 index 00000000000..955cae9fe53 --- /dev/null +++ b/cve/2025/CVE-2025-22821.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-22821", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:32.363", "lastModified": "2025-01-09T16:16:32.363", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in vfthemes StorePress allows DOM-Based XSS.This issue affects StorePress: from n/a through 1.0.12."}], "metrics": {"cvssMetricV31": [{"source": "audit@patchstack.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.3, "impactScore": 3.7}]}, "weaknesses": [{"source": "audit@patchstack.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://patchstack.com/database/wordpress/theme/storepress/vulnerability/wordpress-storepress-theme-1-0-12-cross-site-scripting-xss-vulnerability?_s_id=cve", "source": "audit@patchstack.com"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-22822.json b/cve/2025/CVE-2025-22822.json new file mode 100644 index 00000000000..21c2e43ecc9 --- /dev/null +++ b/cve/2025/CVE-2025-22822.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-22822", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:32.557", "lastModified": "2025-01-09T16:16:32.557", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Bishawjit Das wp custom countdown allows Stored XSS.This issue affects wp custom countdown: from n/a through 2.8."}], "metrics": {"cvssMetricV31": [{"source": "audit@patchstack.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.3, "impactScore": 3.7}]}, "weaknesses": [{"source": "audit@patchstack.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://patchstack.com/database/wordpress/plugin/wp-custom-countdown/vulnerability/wordpress-wp-custom-countdown-plugin-2-8-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", "source": "audit@patchstack.com"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-22823.json b/cve/2025/CVE-2025-22823.json new file mode 100644 index 00000000000..97efa32523b --- /dev/null +++ b/cve/2025/CVE-2025-22823.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-22823", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:32.717", "lastModified": "2025-01-09T16:16:32.717", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Justin Twerdy Genesis Style Shortcodes allows DOM-Based XSS.This issue affects Genesis Style Shortcodes: from n/a through 1.0."}], "metrics": {"cvssMetricV31": [{"source": "audit@patchstack.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.3, "impactScore": 3.7}]}, "weaknesses": [{"source": "audit@patchstack.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://patchstack.com/database/wordpress/plugin/genesis-style-shortcodes/vulnerability/wordpress-genesis-style-shortcodes-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve", "source": "audit@patchstack.com"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-22824.json b/cve/2025/CVE-2025-22824.json new file mode 100644 index 00000000000..5f873c07801 --- /dev/null +++ b/cve/2025/CVE-2025-22824.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-22824", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:32.893", "lastModified": "2025-01-09T16:16:32.893", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Lucia Intelisano Live Flight Radar allows Stored XSS.This issue affects Live Flight Radar: from n/a through 1.0."}], "metrics": {"cvssMetricV31": [{"source": "audit@patchstack.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.3, "impactScore": 3.7}]}, "weaknesses": [{"source": "audit@patchstack.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://patchstack.com/database/wordpress/plugin/live-flight-radar/vulnerability/wordpress-live-flight-radar-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve", "source": "audit@patchstack.com"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-22826.json b/cve/2025/CVE-2025-22826.json new file mode 100644 index 00000000000..efb4ce52f92 --- /dev/null +++ b/cve/2025/CVE-2025-22826.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-22826", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:33.047", "lastModified": "2025-01-09T16:16:33.047", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wpecommerce, wp.insider Sell Digital Downloads allows Stored XSS.This issue affects Sell Digital Downloads: from n/a through 2.2.7."}], "metrics": {"cvssMetricV31": [{"source": "audit@patchstack.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.3, "impactScore": 3.7}]}, "weaknesses": [{"source": "audit@patchstack.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://patchstack.com/database/wordpress/plugin/sell-digital-downloads/vulnerability/wordpress-sell-digital-downloads-plugin-2-2-7-cross-site-scripting-xss-vulnerability?_s_id=cve", "source": "audit@patchstack.com"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-22827.json b/cve/2025/CVE-2025-22827.json new file mode 100644 index 00000000000..37f31a07458 --- /dev/null +++ b/cve/2025/CVE-2025-22827.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-22827", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-09T16:16:33.200", "lastModified": "2025-01-09T16:16:33.200", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Joomag. WP Joomag allows DOM-Based XSS.This issue affects WP Joomag: from n/a through 2.5.2."}], "metrics": {"cvssMetricV31": [{"source": "audit@patchstack.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.3, "impactScore": 3.7}]}, "weaknesses": [{"source": "audit@patchstack.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://patchstack.com/database/wordpress/plugin/wp-joomag/vulnerability/wordpress-wp-joomag-plugin-2-5-2-cross-site-scripting-xss-vulnerability?_s_id=cve", "source": "audit@patchstack.com"}]}} \ No newline at end of file diff --git a/syncdate.json b/syncdate.json index 88591cd6965..da46d5e99b4 100644 --- a/syncdate.json +++ b/syncdate.json @@ -1,10 +1,10 @@ { "vulnerabilities": { - "lastModStartDate": "2025-01-09T14:03:15.293", - "lastModEndDate": "2025-01-09T16:03:51.723" + "lastModStartDate": "2025-01-09T16:03:51.723", + "lastModEndDate": "2025-01-09T18:03:23.457" }, "matchStrings": { - "lastModStartDate": "2025-01-09T14:03:15.173", - "lastModEndDate": "2025-01-09T16:03:26.630" + "lastModStartDate": "2025-01-09T16:03:26.630", + "lastModEndDate": "2025-01-09T18:03:08.097" } } \ No newline at end of file