From d3cba7119f4398b463f0596a4e9c8dd957ad68f5 Mon Sep 17 00:00:00 2001 From: github-actions Date: Thu, 9 Jan 2025 20:03:06 +0000 Subject: [PATCH] NVD Sync 2025-01-09 20:03 --- cpematch/0B/0B8A4CE0-486C-4CC3-91F6-B23D8541F6D0.json | 1 + cpematch/17/17129BBF-25EA-4A2B-9C5D-C6A139CD49BF.json | 2 +- cpematch/24/24FC80C6-13D4-41E1-8D95-275A045A775A.json | 2 +- cpematch/2B/2BBFF06A-6037-47B4-A3CF-B6B0F51D3491.json | 1 + cpematch/2D/2D2F5369-7873-4CD6-9F27-DE3EDC7C26AC.json | 2 +- cpematch/47/47CE311A-7EE4-405F-984B-AC3A71E177CA.json | 2 +- cpematch/49/49350E3D-5C97-4857-90E9-CC2C78E9FA76.json | 2 +- cpematch/66/66B11D95-C9D9-4D15-B338-C26B1B4C6941.json | 1 + cpematch/69/69A85312-CCB2-4931-B314-E2653E54C4C6.json | 2 +- cpematch/74/74BA9823-CCED-4B24-815D-B82543954BF8.json | 1 + cpematch/9B/9BA275D4-DEB9-4C8F-A871-6626A8FD5BF6.json | 1 + cpematch/C1/C18D359D-A98F-430F-85A0-CE282256CE09.json | 1 + cpematch/E2/E26D1325-2A1F-4B34-8487-2A355A5F3E87.json | 1 + cpematch/F6/F6A7800A-0BC1-4787-9CE1-7283B94BBEE4.json | 1 + cpematch/F6/F6D02936-81CB-45D8-A594-B5D9A2731936.json | 1 + cve/2018/CVE-2018-5852.json | 2 +- cve/2019/CVE-2019-10891.json | 2 +- cve/2021/CVE-2021-47016.json | 2 +- cve/2021/CVE-2021-47037.json | 2 +- cve/2021/CVE-2021-47056.json | 2 +- cve/2021/CVE-2021-47066.json | 2 +- cve/2021/CVE-2021-47069.json | 2 +- cve/2021/CVE-2021-47072.json | 2 +- cve/2022/CVE-2022-37056.json | 2 +- cve/2023/CVE-2023-2023.json | 2 +- cve/2023/CVE-2023-23913.json | 2 +- cve/2023/CVE-2023-25748.json | 2 +- cve/2023/CVE-2023-25749.json | 2 +- cve/2023/CVE-2023-25750.json | 2 +- cve/2023/CVE-2023-27744.json | 2 +- cve/2023/CVE-2023-27745.json | 2 +- cve/2023/CVE-2023-29722.json | 2 +- cve/2023/CVE-2023-29723.json | 2 +- cve/2023/CVE-2023-29736.json | 2 +- cve/2023/CVE-2023-29748.json | 2 +- cve/2023/CVE-2023-2977.json | 2 +- cve/2023/CVE-2023-30758.json | 2 +- cve/2023/CVE-2023-33486.json | 2 +- cve/2023/CVE-2023-33551.json | 2 +- cve/2023/CVE-2023-33716.json | 2 +- cve/2023/CVE-2023-33719.json | 2 +- cve/2023/CVE-2023-33764.json | 2 +- cve/2023/CVE-2023-33778.json | 2 +- cve/2023/CVE-2023-48082.json | 2 +- cve/2024/CVE-2024-10466.json | 2 +- cve/2024/CVE-2024-10525.json | 2 +- cve/2024/CVE-2024-10917.json | 2 +- cve/2024/CVE-2024-11614.json | 2 +- cve/2024/CVE-2024-13237.json | 1 + cve/2024/CVE-2024-13238.json | 1 + cve/2024/CVE-2024-13239.json | 1 + cve/2024/CVE-2024-13240.json | 1 + cve/2024/CVE-2024-13241.json | 1 + cve/2024/CVE-2024-13242.json | 1 + cve/2024/CVE-2024-13243.json | 1 + cve/2024/CVE-2024-13244.json | 1 + cve/2024/CVE-2024-13245.json | 1 + cve/2024/CVE-2024-13246.json | 1 + cve/2024/CVE-2024-13247.json | 1 + cve/2024/CVE-2024-13248.json | 1 + cve/2024/CVE-2024-13249.json | 1 + cve/2024/CVE-2024-13250.json | 1 + cve/2024/CVE-2024-13251.json | 1 + cve/2024/CVE-2024-13252.json | 1 + cve/2024/CVE-2024-13253.json | 1 + cve/2024/CVE-2024-13254.json | 1 + cve/2024/CVE-2024-13255.json | 1 + cve/2024/CVE-2024-13256.json | 1 + cve/2024/CVE-2024-13257.json | 1 + cve/2024/CVE-2024-13258.json | 1 + cve/2024/CVE-2024-13259.json | 1 + cve/2024/CVE-2024-31988.json | 2 +- cve/2024/CVE-2024-31996.json | 2 +- cve/2024/CVE-2024-31997.json | 2 +- cve/2024/CVE-2024-32035.json | 2 +- cve/2024/CVE-2024-32036.json | 2 +- cve/2024/CVE-2024-35314.json | 2 +- cve/2024/CVE-2024-37392.json | 2 +- cve/2024/CVE-2024-3935.json | 2 +- cve/2024/CVE-2024-39924.json | 2 +- cve/2024/CVE-2024-39925.json | 2 +- cve/2024/CVE-2024-39926.json | 2 +- cve/2024/CVE-2024-45346.json | 2 +- cve/2024/CVE-2024-47220.json | 2 +- cve/2024/CVE-2024-48063.json | 2 +- cve/2024/CVE-2024-48955.json | 2 +- cve/2024/CVE-2024-49035.json | 2 +- cve/2024/CVE-2024-49038.json | 2 +- cve/2024/CVE-2024-7474.json | 2 +- cve/2024/CVE-2024-7807.json | 2 +- cve/2024/CVE-2024-9202.json | 2 +- cve/2024/CVE-2024-9575.json | 2 +- cve/2025/CVE-2025-21598.json | 1 + cve/2025/CVE-2025-21628.json | 1 + cve/2025/CVE-2025-22149.json | 1 + cve/2025/CVE-2025-22151.json | 1 + syncdate.json | 8 ++++---- 97 files changed, 100 insertions(+), 64 deletions(-) create mode 100644 cpematch/0B/0B8A4CE0-486C-4CC3-91F6-B23D8541F6D0.json create mode 100644 cpematch/2B/2BBFF06A-6037-47B4-A3CF-B6B0F51D3491.json create mode 100644 cpematch/66/66B11D95-C9D9-4D15-B338-C26B1B4C6941.json create mode 100644 cpematch/74/74BA9823-CCED-4B24-815D-B82543954BF8.json create mode 100644 cpematch/9B/9BA275D4-DEB9-4C8F-A871-6626A8FD5BF6.json create mode 100644 cpematch/C1/C18D359D-A98F-430F-85A0-CE282256CE09.json create mode 100644 cpematch/E2/E26D1325-2A1F-4B34-8487-2A355A5F3E87.json create mode 100644 cpematch/F6/F6A7800A-0BC1-4787-9CE1-7283B94BBEE4.json create mode 100644 cpematch/F6/F6D02936-81CB-45D8-A594-B5D9A2731936.json create mode 100644 cve/2024/CVE-2024-13237.json create mode 100644 cve/2024/CVE-2024-13238.json create mode 100644 cve/2024/CVE-2024-13239.json create mode 100644 cve/2024/CVE-2024-13240.json create mode 100644 cve/2024/CVE-2024-13241.json create mode 100644 cve/2024/CVE-2024-13242.json create mode 100644 cve/2024/CVE-2024-13243.json create mode 100644 cve/2024/CVE-2024-13244.json create mode 100644 cve/2024/CVE-2024-13245.json create mode 100644 cve/2024/CVE-2024-13246.json create mode 100644 cve/2024/CVE-2024-13247.json create mode 100644 cve/2024/CVE-2024-13248.json create mode 100644 cve/2024/CVE-2024-13249.json create mode 100644 cve/2024/CVE-2024-13250.json create mode 100644 cve/2024/CVE-2024-13251.json create mode 100644 cve/2024/CVE-2024-13252.json create mode 100644 cve/2024/CVE-2024-13253.json create mode 100644 cve/2024/CVE-2024-13254.json create mode 100644 cve/2024/CVE-2024-13255.json create mode 100644 cve/2024/CVE-2024-13256.json create mode 100644 cve/2024/CVE-2024-13257.json create mode 100644 cve/2024/CVE-2024-13258.json create mode 100644 cve/2024/CVE-2024-13259.json create mode 100644 cve/2025/CVE-2025-21598.json create mode 100644 cve/2025/CVE-2025-21628.json create mode 100644 cve/2025/CVE-2025-22149.json create mode 100644 cve/2025/CVE-2025-22151.json diff --git a/cpematch/0B/0B8A4CE0-486C-4CC3-91F6-B23D8541F6D0.json b/cpematch/0B/0B8A4CE0-486C-4CC3-91F6-B23D8541F6D0.json new file mode 100644 index 00000000000..9ba6115cb89 --- /dev/null +++ b/cpematch/0B/0B8A4CE0-486C-4CC3-91F6-B23D8541F6D0.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "0B8A4CE0-486C-4CC3-91F6-B23D8541F6D0", "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.8", "versionEndExcluding": "6.1.122", "lastModified": "2025-01-09T18:08:42.600", "cpeLastModified": "2025-01-09T18:08:42.600", "created": "2025-01-09T18:08:42.600", "status": "Active", "matches": [{"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8:*:*:*:*:*:*:*", "cpeNameId": "07476EA3-FFDE-4B8C-912C-23138078B5EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8:-:*:*:*:*:*:*", "cpeNameId": "5178891D-6B7B-4263-879E-E69653C4D719"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8:rc1:*:*:*:*:*:*", "cpeNameId": "4BBEF5DE-A47A-4676-B324-008ABEC06865"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8:rc2:*:*:*:*:*:*", "cpeNameId": "3238D662-CCC8-4AB2-8157-A26CCE26D2D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8:rc3:*:*:*:*:*:*", "cpeNameId": "782D5463-6D0E-4C21-B4BA-5E91F105D4F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8:rc4:*:*:*:*:*:*", "cpeNameId": "C35E4C5D-1E1D-466F-A67C-2FC1F25CB430"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8:rc5:*:*:*:*:*:*", "cpeNameId": "83AAD5D5-4B05-4B36-9CE2-8200C3C961C5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8:rc6:*:*:*:*:*:*", "cpeNameId": "0E7ED941-6C90-4C40-8DB3-5E1B1B277E72"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.0:-:*:*:*:*:*:*", "cpeNameId": "5CF73E72-A891-4A42-9B0F-C7C9A5B8C8A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.0:rc1:*:*:*:*:*:*", "cpeNameId": "3A738E69-098D-4FCF-B7BD-4029B795DA7B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.0:rc2:*:*:*:*:*:*", "cpeNameId": "65ED0818-2628-4C3E-9153-7964EBEBE623"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.0:rc3:*:*:*:*:*:*", "cpeNameId": "B10D552F-439F-41F8-A37B-92C049C8DDFA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.0:rc4:*:*:*:*:*:*", "cpeNameId": "0C80D4FE-591B-4062-B4E0-034C8E6824DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.0:rc5:*:*:*:*:*:*", "cpeNameId": "A1FD0D8B-97CB-488B-B7CF-52C0CD54F200"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.0:rc6:*:*:*:*:*:*", "cpeNameId": "83533D12-466A-4B04-BC3A-1F3C5D8750B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.1:*:*:*:*:*:*:*", "cpeNameId": "C5B329AA-50C3-4D56-B10E-85876E2D6AFF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.2:*:*:*:*:*:*:*", "cpeNameId": "DA50D3B5-AE38-4686-B2AC-0C85E4CD89FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.3:*:*:*:*:*:*:*", "cpeNameId": "E54D1F8D-F883-4051-BF12-057D3F0FB128"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.4:*:*:*:*:*:*:*", "cpeNameId": "2A27C723-EFF7-416C-AFF2-D51C97DDE1DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.5:*:*:*:*:*:*:*", "cpeNameId": "4E4A5F0F-AE99-43F4-8003-657F1AC0AA93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.6:*:*:*:*:*:*:*", "cpeNameId": "57FFF781-B984-4F38-837E-255B22971C5F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.7:*:*:*:*:*:*:*", "cpeNameId": "ABBD5CFC-8A56-41FF-98BF-3F3DAF0F3841"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.8:*:*:*:*:*:*:*", "cpeNameId": "5DBF7892-0D9B-4153-9AAA-F72B0283A4A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.9:*:*:*:*:*:*:*", "cpeNameId": "6353E571-9A60-4036-B95E-2C814AAF7752"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.10:*:*:*:*:*:*:*", "cpeNameId": "EA57F68D-826E-43DB-A61A-DBE3B1C191C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.11:*:*:*:*:*:*:*", "cpeNameId": "80319CAF-347D-468D-B8FC-FD9C043FC4DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.12:*:*:*:*:*:*:*", "cpeNameId": "A5CE9EA4-85BD-43F3-8F6B-A09C25FD9167"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.13:*:*:*:*:*:*:*", "cpeNameId": "F91ADB87-9531-4398-BB0B-C063A074973B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.14:*:*:*:*:*:*:*", "cpeNameId": "7F82A887-A988-475B-9478-8CFCF7C3A704"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.15:*:*:*:*:*:*:*", "cpeNameId": "987E4679-4B40-4434-B0D7-3DEDAAB2F6BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.16:*:*:*:*:*:*:*", "cpeNameId": "9C363333-E73E-4B58-8D4C-37BD1D0B51C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.17:*:*:*:*:*:*:*", "cpeNameId": "27BE33C0-428F-4A80-A80B-BC74C075B66C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.18:*:*:*:*:*:*:*", "cpeNameId": "9EE86950-40B6-4663-8A3A-7E1D03696B0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9:*:*:*:*:*:*:*", "cpeNameId": "121E9A60-F4D2-433C-98BF-0AFA0E4A266F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.0:-:*:*:*:*:*:*", "cpeNameId": "469494B6-32FD-4685-BE2F-A210B6063294"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc1:*:*:*:*:*:*", "cpeNameId": "7F13BEF4-27D5-40F6-9765-358FD93E1792"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc2:*:*:*:*:*:*", "cpeNameId": "5ACD024B-F179-4BD5-BAAE-51108956284E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc3:*:*:*:*:*:*", "cpeNameId": "EB2E632F-62CB-44FF-8C0C-E0D47D05E493"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc4:*:*:*:*:*:*", "cpeNameId": "F87B3257-4230-45BA-9667-307E0A4904CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc5:*:*:*:*:*:*", "cpeNameId": "2CCEF2FF-6123-42D5-B8BB-D8E248F8843C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc6:*:*:*:*:*:*", "cpeNameId": "C025B18C-40C5-4D4E-83AC-6BFEA8EE6936"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.1:*:*:*:*:*:*:*", "cpeNameId": "44A6C28C-2EBF-4D99-AE8C-887010615909"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.2:*:*:*:*:*:*:*", "cpeNameId": "31CF2F4F-4453-4907-AA98-E8137382086D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.3:*:*:*:*:*:*:*", "cpeNameId": "F63DD037-0FDF-4CEC-8117-A3982CD33949"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.4:*:*:*:*:*:*:*", "cpeNameId": "5BEC457A-2479-43CE-98B2-71459DE758CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.5:*:*:*:*:*:*:*", "cpeNameId": "09C574BD-509E-420D-A4F1-3BD1C32E39C9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.6:*:*:*:*:*:*:*", "cpeNameId": "456FDC00-52BA-493A-B35B-CBB030B87FFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.7:*:*:*:*:*:*:*", "cpeNameId": "0C7FD0C5-7C16-45A5-AA4F-92609FC022D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.8:*:*:*:*:*:*:*", "cpeNameId": "C5131E57-D5F0-40F5-9D16-7C22AA4F9767"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.9:*:*:*:*:*:*:*", "cpeNameId": "D3CEA5D0-4D9E-4C39-87F9-BC90F5B770B8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.10:*:*:*:*:*:*:*", "cpeNameId": "76C03A6F-AF3B-4F19-95D9-F4150871865A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.11:*:*:*:*:*:*:*", "cpeNameId": "69578C8A-5886-441D-B835-5D0EDD95D146"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.12:*:*:*:*:*:*:*", "cpeNameId": "59581E9A-A564-46D2-B63E-4A838F09E213"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.13:*:*:*:*:*:*:*", "cpeNameId": "31137D81-EDA5-431E-BBA0-F1BA9752D0CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.14:*:*:*:*:*:*:*", "cpeNameId": "4D283523-B6B5-4CA3-A445-5FDA69F42FB9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.15:*:*:*:*:*:*:*", "cpeNameId": "0415500F-6FA8-4B11-BC14-0F8334371749"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.16:*:*:*:*:*:*:*", "cpeNameId": "086B2B23-E533-4D2E-9E90-0EC4BD2646EE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10:-:*:*:*:*:*:*", "cpeNameId": "2E1F1B79-2711-4459-B972-D3C83C48D2D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10:rc1:*:*:*:*:*:*", "cpeNameId": "4255DBFB-D157-45ED-BA6C-1BACB64A1623"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10:rc2:*:*:*:*:*:*", "cpeNameId": "C7BA0F25-7DD0-427A-A8FF-D5CCD17EA554"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10:rc4:*:*:*:*:*:*", "cpeNameId": "0962C2F4-E79A-4C61-8380-55EAAAD4AE1B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.0:-:*:*:*:*:*:*", "cpeNameId": "6B1D1EAB-0195-4F05-88FF-F862563F89FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.0:rc1:*:*:*:*:*:*", "cpeNameId": "EBBE0FA3-6C50-4C78-83C3-9BE6F9A064E3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.0:rc2:*:*:*:*:*:*", "cpeNameId": "E59C1055-110F-4E68-BB9C-8E3C564F72F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.0:rc3:*:*:*:*:*:*", "cpeNameId": "955307F1-B773-46C3-983A-DEA36FDEBCBD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.0:rc4:*:*:*:*:*:*", "cpeNameId": "4AC5F069-6642-4E36-ACF3-EE93FCEAC751"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.0:rc5:*:*:*:*:*:*", "cpeNameId": "EF537B63-6913-49CD-8CEB-A9B744FE8E4E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.1:*:*:*:*:*:*:*", "cpeNameId": "919C724B-829B-4250-B6F3-66C503930681"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.2:*:*:*:*:*:*:*", "cpeNameId": "7B9D0BBB-79E9-4CA5-81CF-2F8783866A20"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.3:*:*:*:*:*:*:*", "cpeNameId": "6F0C6AC0-1A96-4202-B3A4-42216BDC476C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.4:*:*:*:*:*:*:*", "cpeNameId": "59CCCD55-2025-4BD2-BB41-7FBF6B449783"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.5:*:*:*:*:*:*:*", "cpeNameId": "6BD60207-E9A0-4688-A2D3-3A68CAC97BFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.6:*:*:*:*:*:*:*", "cpeNameId": "54839987-2658-4873-BB81-585C8849EE8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.7:*:*:*:*:*:*:*", "cpeNameId": "FB32ECFD-B8DB-4422-83B4-7F26B1DCC763"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.8:*:*:*:*:*:*:*", "cpeNameId": "0FCF254D-C922-4F67-B85C-7247077BBF63"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.9:*:*:*:*:*:*:*", "cpeNameId": "2313CF18-EB32-4DB8-9B68-B24F46689725"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.10:*:*:*:*:*:*:*", "cpeNameId": "77C0418A-B48F-4E70-B71F-5030B901EC8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.11:*:*:*:*:*:*:*", "cpeNameId": "32769B56-4C74-41FE-A7D3-5D87006BE1B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.12:*:*:*:*:*:*:*", "cpeNameId": "C5244E7D-A816-42FD-80A2-22A1EBD41FA8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.13:*:*:*:*:*:*:*", "cpeNameId": "0E80BF7E-93CE-4658-854B-7EFB6AC17CEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.14:*:*:*:*:*:*:*", "cpeNameId": "BCB6377E-BAD8-4063-8DB2-A16392D24089"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.15:*:*:*:*:*:*:*", "cpeNameId": "09DAF5C5-3ADF-4BFB-B681-DEFAD2874241"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.16:*:*:*:*:*:*:*", "cpeNameId": "878924C9-1FEA-49D2-BB99-6AE2A8812570"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.17:*:*:*:*:*:*:*", "cpeNameId": "13722F1D-D730-4F7C-AB84-1267068EF08C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.18:*:*:*:*:*:*:*", "cpeNameId": "2A86DC03-D4AC-4EAE-88FE-54D103F5A3D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.19:*:*:*:*:*:*:*", "cpeNameId": "B833D784-AF50-4A28-88B3-B00A2ABA00D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.20:*:*:*:*:*:*:*", "cpeNameId": "EC92790E-8CEB-4EE7-9655-BE16A14BCAC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.21:*:*:*:*:*:*:*", "cpeNameId": "A0D9BB71-2049-4DEA-B438-0EE2AA9A09ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.22:*:*:*:*:*:*:*", "cpeNameId": "4F726530-1114-4DF2-956E-81715A37EE2A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.23:*:*:*:*:*:*:*", "cpeNameId": "6A9B3C74-81DE-4FDA-A058-89DD6494DD5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.24:*:*:*:*:*:*:*", "cpeNameId": "B98E61C1-1F45-4150-B477-FBFF4FAC3ED3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.25:*:*:*:*:*:*:*", "cpeNameId": "AEDF3A34-9D1B-4E78-9BC8-BFC839CBA294"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.26:*:*:*:*:*:*:*", "cpeNameId": "0B823FEF-0461-49A6-A380-1FCA2F2765FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.27:*:*:*:*:*:*:*", "cpeNameId": "494E65F5-4C04-45D6-830F-4EE9103EBB79"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.28:*:*:*:*:*:*:*", "cpeNameId": "83414679-66B4-40C0-B061-FF9FE1B23F95"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.29:*:*:*:*:*:*:*", "cpeNameId": "2EDD7AD5-8E29-4C05-B2B9-690CE6523AE8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.30:*:*:*:*:*:*:*", "cpeNameId": "F4A2F70D-4AEF-4F79-8BD3-2AAA3BED01E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.31:*:*:*:*:*:*:*", "cpeNameId": "6D4C13F5-4DC9-4498-B598-0C72F44C408F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.32:*:*:*:*:*:*:*", "cpeNameId": "0CC82644-C0F1-4FE3-BE00-1AA49A715186"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.33:*:*:*:*:*:*:*", "cpeNameId": "1CE00059-6557-4873-88DC-0D8989EA8352"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.34:*:*:*:*:*:*:*", "cpeNameId": "D681DBE9-23F8-4AB1-A4C6-73075E8753B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.35:*:*:*:*:*:*:*", "cpeNameId": "DA0FCEE1-0A6E-488B-A168-9885CE8A892B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.36:*:*:*:*:*:*:*", "cpeNameId": "8EC26158-07A8-4F5B-AED4-B1B247C7804F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.37:*:*:*:*:*:*:*", "cpeNameId": "AE2694A8-5857-4C19-81BE-E371A011643C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.38:*:*:*:*:*:*:*", "cpeNameId": "ABEB722B-6903-4915-B85C-1D2A05674826"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.39:*:*:*:*:*:*:*", "cpeNameId": "6AD9EBB8-8E60-4501-A44E-057A3BEEDA17"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.40:*:*:*:*:*:*:*", "cpeNameId": "F0D558A0-55C0-460B-BE39-F06AF16FAC31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.41:*:*:*:*:*:*:*", "cpeNameId": "275C969B-FC08-441F-BDBC-F24EC5810A99"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.42:*:*:*:*:*:*:*", "cpeNameId": "731A0F3B-A32B-4345-BE91-ABA294048D2A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.43:*:*:*:*:*:*:*", "cpeNameId": "3FE2BC04-D69F-4239-B3D8-17898AE1EC6E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.44:*:*:*:*:*:*:*", "cpeNameId": "575245F7-0BE3-4A47-A20F-0D1ECF247B3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.45:*:*:*:*:*:*:*", "cpeNameId": "4BC74ACC-355D-41FE-9D78-D50DD08425F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.46:*:*:*:*:*:*:*", "cpeNameId": "E63871AE-A0FC-41E1-B4AE-99FEA83DE6EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.47:*:*:*:*:*:*:*", "cpeNameId": "2D465F1B-9417-4099-9468-09D21B58EFE0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.48:*:*:*:*:*:*:*", "cpeNameId": "78FC9A7F-B877-4B4B-93C7-C5BAEB84BEF1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.49:*:*:*:*:*:*:*", "cpeNameId": "2343BB66-E088-4CAA-9458-F62F5624D1BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.50:*:*:*:*:*:*:*", "cpeNameId": "BED11231-C3C0-4B9A-A667-E96A5EB42728"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.51:*:*:*:*:*:*:*", "cpeNameId": "4BA151A6-3479-4D73-92A0-25D7D74DD76C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.52:*:*:*:*:*:*:*", "cpeNameId": "4CFCF22F-C2C8-46CA-A8C2-A6DB5AAD3670"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.53:*:*:*:*:*:*:*", "cpeNameId": "6326FFB7-116E-4FB8-B2C1-909CC3B6C3C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.54:*:*:*:*:*:*:*", "cpeNameId": "A7FDB1DD-DC8A-4424-A81A-37F8A0B2F1D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.55:*:*:*:*:*:*:*", "cpeNameId": "A9A96456-8676-4108-B958-7A0E3493F315"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.56:*:*:*:*:*:*:*", "cpeNameId": "7444E85B-6F15-4980-8721-5B0A708042E3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.57:*:*:*:*:*:*:*", "cpeNameId": "2D88C78E-CA4C-40A2-BF04-E487DE3D79C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.58:*:*:*:*:*:*:*", "cpeNameId": "D8167B04-7EDF-4F1B-B967-EFCDC6FB0D63"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.59:*:*:*:*:*:*:*", "cpeNameId": "66E8BCA7-8C84-42E6-A891-0840BE07CE79"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.60:*:*:*:*:*:*:*", "cpeNameId": "3FE27316-DB42-42B3-95E5-EBF8CB7498C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.61:*:*:*:*:*:*:*", "cpeNameId": "47AD2C14-A08F-4D75-960F-1D5C72EB1979"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.62:*:*:*:*:*:*:*", "cpeNameId": "E93FBE71-458B-4F4A-BA1E-153759B14744"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.63:*:*:*:*:*:*:*", "cpeNameId": "7FD84D94-2BA9-4552-9807-F06A66D760BA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.64:*:*:*:*:*:*:*", "cpeNameId": "9424301F-3046-46B4-863C-E887D542C94B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.65:*:*:*:*:*:*:*", "cpeNameId": "70F56D3D-6046-4B8E-961A-C9835F0B9090"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.66:*:*:*:*:*:*:*", "cpeNameId": "C4C18611-ABA7-482D-82FD-8CE9E3CBDB33"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.67:*:*:*:*:*:*:*", "cpeNameId": "0B905626-8718-42FB-9908-7573102CB541"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.68:*:*:*:*:*:*:*", "cpeNameId": "365DA1ED-E1C9-4A4C-9A38-54FDA5832296"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.69:*:*:*:*:*:*:*", "cpeNameId": "27BBA256-9FD8-4A99-A301-31761D2CB794"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.70:*:*:*:*:*:*:*", "cpeNameId": "3B7F8DF6-7523-4D9B-B7B7-10E77A9D132C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.71:*:*:*:*:*:*:*", "cpeNameId": "580454E1-93EE-4311-852E-4B749F7905DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.72:*:*:*:*:*:*:*", "cpeNameId": "1307A5B0-2E1A-48AD-A718-46BF09EA2F52"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.73:*:*:*:*:*:*:*", "cpeNameId": "33F6E183-DDDE-4425-86CB-91EFEA45EB7C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.74:*:*:*:*:*:*:*", "cpeNameId": "861EB0F3-ECA9-4F1B-8842-DB4EFB6A00A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.75:*:*:*:*:*:*:*", "cpeNameId": "2D8BE345-69E8-49AC-A829-8FE9A71E0570"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.76:*:*:*:*:*:*:*", "cpeNameId": "71972DCE-D514-471A-8C19-6F1266FBB229"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.77:*:*:*:*:*:*:*", "cpeNameId": "F8C0EEE1-9B24-411B-ADC9-740859F33B48"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.78:*:*:*:*:*:*:*", "cpeNameId": "A8B37EA6-CA2C-46D6-A181-278E5C31F0DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.79:*:*:*:*:*:*:*", "cpeNameId": "F27C5E99-159C-490C-AF32-50BE9563EB52"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.80:*:*:*:*:*:*:*", "cpeNameId": "17813E0B-D346-4177-8F05-9533B4C60865"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.81:*:*:*:*:*:*:*", "cpeNameId": "8D01EFE4-8A1B-4CCF-95E7-AC5A1539D62E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.82:*:*:*:*:*:*:*", "cpeNameId": "1F0FC27E-9086-4213-9CFE-FD6F1B9A4AF1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.83:*:*:*:*:*:*:*", "cpeNameId": "481F6A95-F56E-4D6D-854C-6F04ECBD66B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.84:*:*:*:*:*:*:*", "cpeNameId": "46CC33A3-5940-4D55-8E84-E73C3BD823F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.85:*:*:*:*:*:*:*", "cpeNameId": "2D2A56E7-26AC-4B25-B518-580C7B57B9AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.86:*:*:*:*:*:*:*", "cpeNameId": "74D61A28-F673-4952-8B5C-02F3C13CB122"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.87:*:*:*:*:*:*:*", "cpeNameId": "339A37D8-F764-445B-8DB3-84A8FAECE0E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.88:*:*:*:*:*:*:*", "cpeNameId": "D97DAA30-8EFA-4A17-BCF4-1DA94DEA4EDB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.89:*:*:*:*:*:*:*", "cpeNameId": "E27E4623-1A1D-4DFD-82DA-A2C5CC7F7697"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.90:*:*:*:*:*:*:*", "cpeNameId": "E504954E-D296-441C-873E-BB0A99B128A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.91:*:*:*:*:*:*:*", "cpeNameId": "972594C2-DBE3-4358-974A-4F4669143532"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.92:*:*:*:*:*:*:*", "cpeNameId": "844FF0AF-746F-460B-AF09-70F04AEFCF31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.93:*:*:*:*:*:*:*", "cpeNameId": "0759AD27-6E8F-4FB0-86A0-581270987FC8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.94:*:*:*:*:*:*:*", "cpeNameId": "4762F42E-1EB4-43B9-B4C6-FED6BD72F8F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.95:*:*:*:*:*:*:*", "cpeNameId": "3AB26935-F86A-4944-AB5E-2030498A5150"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.96:*:*:*:*:*:*:*", "cpeNameId": "1F32FA33-C031-4CB3-9FE9-5B8F2AB4F0DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.97:*:*:*:*:*:*:*", "cpeNameId": "EA2A46B2-E9A8-4939-B34C-305DADC1E706"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.98:*:*:*:*:*:*:*", "cpeNameId": "6F40D4DA-5127-4F65-B450-DACBFF729694"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.99:*:*:*:*:*:*:*", "cpeNameId": "4ACCE8A9-B038-41D4-853D-6FFCC67C6B64"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.100:*:*:*:*:*:*:*", "cpeNameId": "7BC07033-922F-4E00-9A7F-A9799C0665BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.101:*:*:*:*:*:*:*", "cpeNameId": "63A5156F-CEE7-4BF7-8421-892C0A117BFF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.102:*:*:*:*:*:*:*", "cpeNameId": "FE32C7D9-7BCC-4896-9D3A-954D3A175242"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.103:*:*:*:*:*:*:*", "cpeNameId": "0E21CE22-A7B8-4F83-BEE7-6672AE3A2C44"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.104:*:*:*:*:*:*:*", "cpeNameId": "A4E75A55-DB3C-43F3-AA43-A04380CB435A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.105:*:*:*:*:*:*:*", "cpeNameId": "217BD320-E966-48FB-A3DA-EAC81FBA3D02"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.106:*:*:*:*:*:*:*", "cpeNameId": "A13D5A45-1F78-4F9D-8932-09FB4963FE2B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.107:*:*:*:*:*:*:*", "cpeNameId": "94B537FB-3FC1-4A2A-90C5-A41C4E757EAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.108:*:*:*:*:*:*:*", "cpeNameId": "A36CC6BB-339C-4928-B79B-7047AD126CAE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.109:*:*:*:*:*:*:*", "cpeNameId": "787AABB6-F55D-41A7-99FA-AE59AD411920"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.110:*:*:*:*:*:*:*", "cpeNameId": "E8453C19-A25E-42BC-AC28-3967873C0502"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.111:*:*:*:*:*:*:*", "cpeNameId": "F25CCCEB-3631-4B9B-852D-A76ED56BA4DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.112:*:*:*:*:*:*:*", "cpeNameId": "5A726FC3-8B4B-4E63-9865-6A5C6BC9451D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.113:*:*:*:*:*:*:*", "cpeNameId": "CD45E388-608F-4BE6-8152-527548FE08DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.114:*:*:*:*:*:*:*", "cpeNameId": "A7BDF880-128D-4D74-8D98-E41C861040C5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.115:*:*:*:*:*:*:*", "cpeNameId": "6692FB97-9395-401A-B1CB-AD484F90B89A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.116:*:*:*:*:*:*:*", "cpeNameId": "9A64BA88-6D08-409E-BFE1-24CFA920C75A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.117:*:*:*:*:*:*:*", "cpeNameId": "2D582BFD-C229-4552-B828-115F83D73F89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.118:*:*:*:*:*:*:*", "cpeNameId": "CA086871-EB47-4699-8451-993791AA05DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.119:*:*:*:*:*:*:*", "cpeNameId": "483BEBC5-E6D4-4ED8-A5E5-DB2DD73986DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.120:*:*:*:*:*:*:*", "cpeNameId": "68EF2A7B-021A-4153-BDB1-A68499185EFB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.121:*:*:*:*:*:*:*", "cpeNameId": "C55B56E4-06A2-43C2-BE53-5681C0687D73"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.122:*:*:*:*:*:*:*", "cpeNameId": "CB7B49F3-DDD7-4A9E-BF7D-89BCA4437C52"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.123:*:*:*:*:*:*:*", "cpeNameId": "4A20AD3E-FA89-4524-8D02-B2728615111C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.124:*:*:*:*:*:*:*", "cpeNameId": "C30938C7-DF69-4F4C-ADF6-BF47C209872E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.125:*:*:*:*:*:*:*", "cpeNameId": "D091A040-31A4-4643-BD08-9D25F02BDDED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.126:*:*:*:*:*:*:*", "cpeNameId": "FF6CD639-C348-4BAA-8C59-8FE73D9966DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.127:*:*:*:*:*:*:*", "cpeNameId": "3F24CE79-3D3D-421A-AC44-E68C17FC5D92"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.128:*:*:*:*:*:*:*", "cpeNameId": "F9E550EF-FFA3-4194-9071-7922680C7E6E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.129:*:*:*:*:*:*:*", "cpeNameId": "987DB34E-E170-4E7E-B08A-CD32A73E9156"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.130:*:*:*:*:*:*:*", "cpeNameId": "A7E67D9A-9FA7-43ED-B536-312C5C01CD6E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.131:*:*:*:*:*:*:*", "cpeNameId": "D9C69A17-571F-45C1-9120-1BE31A33A948"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.132:*:*:*:*:*:*:*", "cpeNameId": "166EDBC5-3C18-4042-8C19-F339F25162FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.133:*:*:*:*:*:*:*", "cpeNameId": "CBA08C9F-0426-4B96-A6E8-7253C152FFBC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.134:*:*:*:*:*:*:*", "cpeNameId": "182AECF8-FAC1-4E1B-BE84-ABB34E11A3F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.135:*:*:*:*:*:*:*", "cpeNameId": "A7249039-E52A-4756-A93F-06A3284AEDEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.136:*:*:*:*:*:*:*", "cpeNameId": "84C67C6F-FA0B-41EE-9D20-11A0BC255F63"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.137:*:*:*:*:*:*:*", "cpeNameId": "00A8D67B-9DFD-4BBE-9A8D-976B22573BC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.138:*:*:*:*:*:*:*", "cpeNameId": "94A225AF-5670-4866-967D-29ECA4887457"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.139:*:*:*:*:*:*:*", "cpeNameId": "579F476A-FED8-4232-ADF1-3889FDC4C86C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.140:*:*:*:*:*:*:*", "cpeNameId": "84F54287-F019-47C9-9CB7-7B6B6CCBA9E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.141:*:*:*:*:*:*:*", "cpeNameId": "3E72C4BF-107C-4C73-AD2D-13564B590074"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.142:*:*:*:*:*:*:*", "cpeNameId": "FC309597-3B6C-4DB1-920B-97C1428824C2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.143:*:*:*:*:*:*:*", "cpeNameId": "0F20169C-AA6F-433A-AB4B-2FB83AFE4CBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.144:*:*:*:*:*:*:*", "cpeNameId": "02E301AD-B083-4D5E-81D5-7C1990FAA3B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.145:*:*:*:*:*:*:*", "cpeNameId": "BAA0E2C0-1BF2-4F95-BBDA-D294FFC56C90"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.146:*:*:*:*:*:*:*", "cpeNameId": "333D6187-DE99-4496-951B-79FC37281B50"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.147:*:*:*:*:*:*:*", "cpeNameId": "5B8EA31C-9846-414C-B164-133B7C72AFAC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.148:*:*:*:*:*:*:*", "cpeNameId": "48B13BAF-B20A-4DEA-9516-565B3030BD3F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.149:*:*:*:*:*:*:*", "cpeNameId": "2BDBBF02-8793-439B-B2B7-F1398DDC5165"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.150:*:*:*:*:*:*:*", "cpeNameId": "845A54DE-9847-4628-81AE-9202E104E5A7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.151:*:*:*:*:*:*:*", "cpeNameId": "429BF264-A007-4AFC-9AC8-17CA5BE8091F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.152:*:*:*:*:*:*:*", "cpeNameId": "A21895BD-17BD-4347-BB11-AC22832B5545"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.153:*:*:*:*:*:*:*", "cpeNameId": "C72F8FFE-0954-4360-ABC2-97FDC0DB5D45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.154:*:*:*:*:*:*:*", "cpeNameId": "76BE03E9-E28F-44A8-9B89-9700CF4E3689"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.155:*:*:*:*:*:*:*", "cpeNameId": "C28104D3-94AE-44FA-9395-B7B19859B677"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.156:*:*:*:*:*:*:*", "cpeNameId": "27FB0DEA-7659-4394-8E83-0EC289A5CAA4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.157:*:*:*:*:*:*:*", "cpeNameId": "D9820BF1-0B1A-432F-889F-F152AAA957DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.158:*:*:*:*:*:*:*", "cpeNameId": "C0BDDEFA-7B1D-4108-BCC9-FFA63A3DDC7E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.159:*:*:*:*:*:*:*", "cpeNameId": "8A23C014-F216-43C3-9D3C-5CEED86EE41D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.160:*:*:*:*:*:*:*", "cpeNameId": "1978465D-F79C-40EB-A6EF-50EFF77BB974"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.161:*:*:*:*:*:*:*", "cpeNameId": "29914586-1720-4AE1-A204-01432051782B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.162:*:*:*:*:*:*:*", "cpeNameId": "FBE6A9B7-94E5-456F-B336-59EE1C9C62E5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.163:*:*:*:*:*:*:*", "cpeNameId": "31DF5109-302D-4C99-BF27-7752453D8B5E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.164:*:*:*:*:*:*:*", "cpeNameId": "3262D873-56B3-449E-A70A-17DA2F4D9382"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.165:*:*:*:*:*:*:*", "cpeNameId": "21C9EF71-018C-41DE-ADCD-FF6A38C77E4C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.166:*:*:*:*:*:*:*", "cpeNameId": "46897616-FAB1-4E27-8F2B-7B59CF5B96D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.167:*:*:*:*:*:*:*", "cpeNameId": "2547AA22-645F-4613-A353-93431C5784F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.168:*:*:*:*:*:*:*", "cpeNameId": "FF6BB8B3-8746-4110-9FFC-C8FA51F8CD8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.169:*:*:*:*:*:*:*", "cpeNameId": "76B2AC55-7FE1-4EB6-B66F-AA2DA71D67CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.170:*:*:*:*:*:*:*", "cpeNameId": "E8A369DE-6CF8-43BF-ACC2-34CCEAAEADEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.171:*:*:*:*:*:*:*", "cpeNameId": "192DCF0D-9152-475F-828E-817AD9C86E8B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.172:*:*:*:*:*:*:*", "cpeNameId": "DF8383A9-7BF3-473B-9EE1-38C0FB296913"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.173:*:*:*:*:*:*:*", "cpeNameId": "7AB9EEF7-D575-4CB3-B57E-173AE0807897"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.174:*:*:*:*:*:*:*", "cpeNameId": "2658DE93-2BC0-4AC0-86D9-0487D4571A3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.175:*:*:*:*:*:*:*", "cpeNameId": "9C9415F0-7A65-436A-AAD8-31F99B9D7389"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.176:*:*:*:*:*:*:*", "cpeNameId": "1D0378DF-6D92-4307-904F-C66E45A7951E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.177:*:*:*:*:*:*:*", "cpeNameId": "EAE9A661-784D-4767-AF9B-7FBFA7D82738"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.178:*:*:*:*:*:*:*", "cpeNameId": "C17A6F7B-CD4A-49F4-A75B-B67338DDDDD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.179:*:*:*:*:*:*:*", "cpeNameId": "E79DFC9A-C359-4DD6-990B-2174E5B0024A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.180:*:*:*:*:*:*:*", "cpeNameId": "0A2AFA9A-832F-4C6C-BF9A-7C5A1C0E4FCA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.181:*:*:*:*:*:*:*", "cpeNameId": "4ED76815-B1FF-4FF7-B33D-4CC39C1A3948"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.182:*:*:*:*:*:*:*", "cpeNameId": "094B86B6-B8A4-408E-93F5-7514E0889F80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.183:*:*:*:*:*:*:*", "cpeNameId": "0ECF42BB-D201-4ED6-BA24-8B3A388564DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.184:*:*:*:*:*:*:*", "cpeNameId": "588AC0CC-AEA3-4230-8820-D46E13AFED1A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.185:*:*:*:*:*:*:*", "cpeNameId": "1B6E85FD-9863-43D4-830D-C46AC7CF8EA5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.186:*:*:*:*:*:*:*", "cpeNameId": "E1320383-8026-48C2-AA55-3D6DD4C91761"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.187:*:*:*:*:*:*:*", "cpeNameId": "78BC22D4-F955-4AC6-A00F-AD4832C1F2FA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.188:*:*:*:*:*:*:*", "cpeNameId": "E562975C-CD47-45F9-815A-F1549043871A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.189:*:*:*:*:*:*:*", "cpeNameId": "9F7D5828-8590-4C04-9BA2-03D8A9265783"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.190:*:*:*:*:*:*:*", "cpeNameId": "052F6967-B479-47A5-B705-66ADF5BAE5B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.191:*:*:*:*:*:*:*", "cpeNameId": "E6E1C494-101F-4F6C-B9F9-453EF9EC7D30"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.192:*:*:*:*:*:*:*", "cpeNameId": "A1A79F09-A517-41C9-81E2-0D1B960AC8E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.193:*:*:*:*:*:*:*", "cpeNameId": "329B75BA-C9CB-4193-A56B-4C175431194D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.194:*:*:*:*:*:*:*", "cpeNameId": "B3CC767E-10C4-4966-8921-50BB6E99E682"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.195:*:*:*:*:*:*:*", "cpeNameId": "BDAF83E0-E596-47CA-9FD5-E310643531AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.196:*:*:*:*:*:*:*", "cpeNameId": "B52AB3E0-7C8A-4E9B-9AB7-970D110AD689"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.197:*:*:*:*:*:*:*", "cpeNameId": "A98AABF5-2C66-4202-8CC8-7BD6A5BD206C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.198:*:*:*:*:*:*:*", "cpeNameId": "D2FB7CC8-3184-4B7B-8F15-206D478B957B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.199:*:*:*:*:*:*:*", "cpeNameId": "F17EC735-6954-48DE-9B79-129B113894DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.200:*:*:*:*:*:*:*", "cpeNameId": "215BF96E-9953-4137-9343-E664467C544B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.201:*:*:*:*:*:*:*", "cpeNameId": "4F5AA1AE-A206-4735-811F-D278CE94F425"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.202:*:*:*:*:*:*:*", "cpeNameId": "21709E5C-334E-4C9A-93FC-D33A6A234EBE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.203:*:*:*:*:*:*:*", "cpeNameId": "90B8792D-F589-4658-8105-D62452F51118"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.204:*:*:*:*:*:*:*", "cpeNameId": "783138D6-77F2-42BD-B712-64D5E3069478"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.205:*:*:*:*:*:*:*", "cpeNameId": "FDFF6DBF-A75C-45BA-A6EB-7EE625C06625"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.206:*:*:*:*:*:*:*", "cpeNameId": "3AFE0482-4EE2-4916-B1D9-6164C7CE9424"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.207:*:*:*:*:*:*:*", "cpeNameId": "B70FE32B-60B4-491B-BE0C-1709EFA5893C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.208:*:*:*:*:*:*:*", "cpeNameId": "0B61E6D6-2C0A-41BF-A847-2A0989F51690"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.209:*:*:*:*:*:*:*", "cpeNameId": "FAD83EB2-0BC4-4AD0-B7D0-84D486786E11"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.210:*:*:*:*:*:*:*", "cpeNameId": "4F085545-FA13-4D9D-ACC8-F268C0942C68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.211:*:*:*:*:*:*:*", "cpeNameId": "1110C146-0596-4E9A-9D9A-759EEE029BE7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.212:*:*:*:*:*:*:*", "cpeNameId": "C4725039-FE74-42A4-8F28-71890581F507"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.213:*:*:*:*:*:*:*", "cpeNameId": "01623D91-F403-4331-8911-FC3D9F207EEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.214:*:*:*:*:*:*:*", "cpeNameId": "6E428F60-24AE-403A-918B-A89C96B757C7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.215:*:*:*:*:*:*:*", "cpeNameId": "3800AEF1-ED61-41F4-9D70-EA3E0B77361D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.216:*:*:*:*:*:*:*", "cpeNameId": "0E9E733E-B81F-4112-AD2F-CE938439024B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.217:*:*:*:*:*:*:*", "cpeNameId": "48B7E2F6-5130-443C-8771-BE9DCDFBDD10"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.218:*:*:*:*:*:*:*", "cpeNameId": "3B485A54-4F57-4E7C-B620-A82938273FA7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.219:*:*:*:*:*:*:*", "cpeNameId": "C7F27EB7-A65A-45A2-A904-9F60507D342A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.220:*:*:*:*:*:*:*", "cpeNameId": "447A4E02-26AC-4CA2-B76D-B3508CF9B860"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.221:*:*:*:*:*:*:*", "cpeNameId": "436B2D40-F48C-4162-99D2-30D16807E3B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.222:*:*:*:*:*:*:*", "cpeNameId": "6BF3B63B-B671-44C8-8CBC-9FD21CA0E820"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.223:*:*:*:*:*:*:*", "cpeNameId": "121ACF12-28C3-4E2A-88C5-D5EF13920A90"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.224:*:*:*:*:*:*:*", "cpeNameId": "A67E472A-DC6E-4691-B5F1-225DE7946514"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.225:*:*:*:*:*:*:*", "cpeNameId": "CD10FD8D-0844-48A8-986D-33CA0DB5B3AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.226:*:*:*:*:*:*:*", "cpeNameId": "A11586F3-BA48-43B1-B808-2FD2280550F7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.227:*:*:*:*:*:*:*", "cpeNameId": "D3DD83A4-36EB-4F6B-86DB-524C91470807"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.229:*:*:*:*:*:*:*", "cpeNameId": "B816AFF0-A9B1-4F57-93E1-BB2D2A273A68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.230:*:*:*:*:*:*:*", "cpeNameId": "A940CCEF-1858-4FB9-BEC7-C2CD5A8DA5C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.244:*:*:*:*:*:*:*", "cpeNameId": "CA513596-6180-494F-A47C-4DC449B53BB7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:*:*:*:*:*:*:*", "cpeNameId": "63BC1E47-0228-41F4-989F-B4714260762B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:-:*:*:*:*:*:*", "cpeNameId": "BEEBF8B2-4493-470F-90B7-A9A57717C54C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:rc1:*:*:*:*:*:*", "cpeNameId": "AC145652-F483-4B19-B8C4-624F28E03010"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:rc2:*:*:*:*:*:*", "cpeNameId": "B9AE2C09-C300-4B2D-A5A7-E5D4CE11A0F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:rc3:*:*:*:*:*:*", "cpeNameId": "24855508-8DA6-4CA8-9B38-21B1C4505824"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:rc4:*:*:*:*:*:*", "cpeNameId": "B5E9A0D7-9681-4F6C-BBE8-30403B1C6F83"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:rc5:*:*:*:*:*:*", "cpeNameId": "95BCDE4B-2F7F-4F21-A2F1-A30E9C6370D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:rc6:*:*:*:*:*:*", "cpeNameId": "F455B799-C4F3-4B7A-8B65-0383984C3717"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:rc7:*:*:*:*:*:*", "cpeNameId": "1F290906-F5FA-45DF-922F-62ECC063EA76"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.1:*:*:*:*:*:*:*", "cpeNameId": "34D4AA87-9172-4704-BEA7-9DDEB516DB84"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.2:*:*:*:*:*:*:*", "cpeNameId": "8BF52BA5-E253-4CDD-A135-1531A86D543E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.3:*:*:*:*:*:*:*", "cpeNameId": "145EB557-D73C-47BB-87A6-B7029FA35A40"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.4:*:*:*:*:*:*:*", "cpeNameId": "7EEB122E-2E7E-4662-8AF2-B5F702EA3A6A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.5:*:*:*:*:*:*:*", "cpeNameId": "A3738040-9287-4A85-AE74-8E90D460C227"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.6:*:*:*:*:*:*:*", "cpeNameId": "C1C5E2C0-BA06-4A09-8063-F0CA9FC0ABFE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.7:*:*:*:*:*:*:*", "cpeNameId": "F2C4DB30-0C29-4A72-ACAD-AC339F102D29"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.8:*:*:*:*:*:*:*", "cpeNameId": "B8F6A213-C6B1-442B-BB9F-2B987BDEA023"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.9:*:*:*:*:*:*:*", "cpeNameId": "54EA37D0-6527-4F8B-A416-2ADF4F749CF8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.10:*:*:*:*:*:*:*", "cpeNameId": "620126E3-8499-4B1E-A182-2E3AF06B336B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.11:*:*:*:*:*:*:*", "cpeNameId": "193D233C-D3F2-4B20-AFFF-7B602948094F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.12:*:*:*:*:*:*:*", "cpeNameId": "90F5A23D-3E38-40C2-B5F8-8F4D6C1FA3E7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.13:*:*:*:*:*:*:*", "cpeNameId": "2B0BFF44-FCAF-4E26-BEB4-6F302ECCC398"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.14:*:*:*:*:*:*:*", "cpeNameId": "6F1AF9D1-837E-4681-A1B5-DBE553BB65DE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.15:*:*:*:*:*:*:*", "cpeNameId": "B9251847-EA27-4EBA-B9F3-1162156DBDFA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.16:*:*:*:*:*:*:*", "cpeNameId": "16A3579F-40D9-4FB0-B7D3-54FC47821FE8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.17:*:*:*:*:*:*:*", "cpeNameId": "BDFD9B25-4336-4D39-8C82-48867CB816ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.18:*:*:*:*:*:*:*", "cpeNameId": "82BF44C5-7264-4478-B8FC-06100D67440C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.19:*:*:*:*:*:*:*", "cpeNameId": "B4AE9BDA-08FC-43E5-B69A-12D179D1F0F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.20:*:*:*:*:*:*:*", "cpeNameId": "9FA3583C-D6CB-4E2D-8807-AD4BE72A8400"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.21:*:*:*:*:*:*:*", "cpeNameId": "4C39A0D8-85D6-4087-A5C7-E31B4763C30E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.22:*:*:*:*:*:*:*", "cpeNameId": "3734E58B-67DE-4CFE-8A0A-E198902F5EF3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12:-:*:*:*:*:*:*", "cpeNameId": "909AE298-650A-40FC-89B6-3C9B84F18D0D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12:rc1:*:*:*:*:*:*", "cpeNameId": "2DF254E6-DCA2-415F-A9CF-A8F8214C70C9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12:rc2:*:*:*:*:*:*", "cpeNameId": "28EA1789-0AA1-4DDF-8A3B-186FAE60250E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12:rc3:*:*:*:*:*:*", "cpeNameId": "18273D65-2C56-44F3-86BB-210E8183A30E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12:rc4:*:*:*:*:*:*", "cpeNameId": "1C698D86-842A-4A52-AC8A-0ACE001B6150"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12:rc5:*:*:*:*:*:*", "cpeNameId": "5DA86DC0-64A9-4E9C-A37C-A4EFB1764A84"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12:rc6:*:*:*:*:*:*", "cpeNameId": "DD2A90B7-FAAF-49E4-A5FE-F6E9ADF6A147"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12:rc7:*:*:*:*:*:*", "cpeNameId": "A990F6D8-E66C-4AD6-9606-71E2B8FB4CFE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.1:*:*:*:*:*:*:*", "cpeNameId": "7497D744-2E4C-45AD-9B58-D9ECD626175B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.2:*:*:*:*:*:*:*", "cpeNameId": "10641D0D-05A7-4B3D-82FB-FFE591B7DBD7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.3:*:*:*:*:*:*:*", "cpeNameId": "5AD0A9F1-5AD4-4ABB-A833-99BA7D351577"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.4:*:*:*:*:*:*:*", "cpeNameId": "4665239B-D45C-4558-9F54-695E98369E8C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.5:*:*:*:*:*:*:*", "cpeNameId": "8E690484-7C22-4011-9B03-9983E23095F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.6:*:*:*:*:*:*:*", "cpeNameId": "F9520114-68E1-4BB9-B088-7C1A27ACE515"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.7:*:*:*:*:*:*:*", "cpeNameId": "AD1AB54E-70EA-4B7E-B7D9-87F45E7F87A9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.8:*:*:*:*:*:*:*", "cpeNameId": "8C5ABC42-12D2-499A-B6CC-C9B1E15AEA71"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.9:*:*:*:*:*:*:*", "cpeNameId": "46196B73-964E-4ABC-B0E5-48B5F5CB7BFF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.10:*:*:*:*:*:*:*", "cpeNameId": "36A6AB9B-68B3-4234-A8E6-74EC108A160C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.11:*:*:*:*:*:*:*", "cpeNameId": "A12D7920-D1CA-44DC-A290-E26C4FE41EEF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.12:*:*:*:*:*:*:*", "cpeNameId": "9794C38E-32C0-4EB8-B4FE-D02D6E4ECFEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.13:*:*:*:*:*:*:*", "cpeNameId": "B5621156-BE25-4483-A3D0-4DD273245B57"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.14:*:*:*:*:*:*:*", "cpeNameId": "D1BB4FE7-AF71-4FEF-BD81-A88B9E860487"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.15:*:*:*:*:*:*:*", "cpeNameId": "9B349C0E-D91F-485E-A777-06055A4DF1D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.16:*:*:*:*:*:*:*", "cpeNameId": "0101B6BB-6E04-4238-A384-245C8C831FE0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.17:*:*:*:*:*:*:*", "cpeNameId": "B70E75C0-1784-4F2D-9890-72635AD1ABC8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.18:*:*:*:*:*:*:*", "cpeNameId": "FC1C2672-396B-452C-97B1-6C7F0583CB21"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.19:*:*:*:*:*:*:*", "cpeNameId": "6CE0FEDB-F644-4A9C-A88A-8F9D69B58BBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.25:*:*:*:*:*:*:*", "cpeNameId": "E9B47122-76AA-45F9-9BA9-9AA7D47E1819"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13:-:*:*:*:*:*:*", "cpeNameId": "760A4977-F4EC-4445-8EED-8F3540557E96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", "cpeNameId": "789E9076-49A9-4149-A146-FFAB80FD6312"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", "cpeNameId": "510FD2D9-571A-4924-B0B5-266204ABEF00"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", "cpeNameId": "B7FC9139-392C-42D9-B092-06ADE363B7C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", "cpeNameId": "78FDEB4A-AC37-4CEB-90F2-69700A1DFCB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*", "cpeNameId": "2B4C5B22-5D8E-46CA-A9A7-D488F2847060"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13:rc6:*:*:*:*:*:*", "cpeNameId": "55D4CFE3-C4CD-4A45-A04A-BFDA91D27503"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13:rc7:*:*:*:*:*:*", "cpeNameId": "DD429168-8AFF-457A-A8A7-8723FDC00949"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.0-52:*:*:*:*:*:*:*", "cpeNameId": "292646CC-C335-4347-87AE-6E1555659B40"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.1:*:*:*:*:*:*:*", "cpeNameId": "30F1E081-ED8A-457C-8465-D9C070DF0721"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.2:*:*:*:*:*:*:*", "cpeNameId": "17573538-60C1-4BBE-8321-EDE2F7F0E1A3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.3:*:*:*:*:*:*:*", "cpeNameId": "E0E67EF3-1AC9-4F29-B215-A82FF3493F6D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.4:*:*:*:*:*:*:*", "cpeNameId": "C6A71459-E60F-4B6A-B838-AE055D002725"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.5:*:*:*:*:*:*:*", "cpeNameId": "2F2A9933-4925-48E1-A572-276C4704E76F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.6:*:*:*:*:*:*:*", "cpeNameId": "9B5FC7E8-F482-43BD-B50D-7371AB3D4692"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.7:*:*:*:*:*:*:*", "cpeNameId": "94B23D33-6B16-475B-BF18-12A4FD5BE981"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.8:*:*:*:*:*:*:*", "cpeNameId": "71FC3F52-9D0F-4FA1-BEC8-7E662B3F0865"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.9:*:*:*:*:*:*:*", "cpeNameId": "5F17B3D4-BEAA-4606-B54B-419BE8532261"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.10:*:*:*:*:*:*:*", "cpeNameId": "73EC9A1A-02F6-4D0A-993F-5F2F9277F242"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.11:*:*:*:*:*:*:*", "cpeNameId": "45FFC97B-0FB5-4F9F-8660-FDCF0FBD5166"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.12:*:*:*:*:*:*:*", "cpeNameId": "2C6FC6E4-806F-4C8F-BC99-E279D18A47F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.13:*:*:*:*:*:*:*", "cpeNameId": "EBA292BE-DC50-49A1-8C5B-284C05E30E80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.14:*:*:*:*:*:*:*", "cpeNameId": "950E8486-A34F-4B8C-B6B9-213FB5D2B553"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.15:*:*:*:*:*:*:*", "cpeNameId": "DD0ACE31-23BC-46AE-8C24-DDE99C1677FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.16:*:*:*:*:*:*:*", "cpeNameId": "7D6ABA87-CFF7-4467-B1EB-26F1B2C8CD86"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.17:*:*:*:*:*:*:*", "cpeNameId": "B6F4951C-AB24-43F3-8361-34CD2C0DA81E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.18:*:*:*:*:*:*:*", "cpeNameId": "C7B2B5A1-F367-42EA-BB1B-F03C29AE7228"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.19:*:*:*:*:*:*:*", "cpeNameId": "39AC74B5-3F06-44E2-8F03-3C3F552C6111"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14:-:*:*:*:*:*:*", "cpeNameId": "290B9F79-3C87-4725-9517-AF89CC5F87D6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14:rc1:*:*:*:*:*:*", "cpeNameId": "A83E7C0B-A2D1-46BB-A787-DF9B68EA842A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14:rc2:*:*:*:*:*:*", "cpeNameId": "3FC14149-AA1E-48B5-8F75-5B5DD861A257"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14:rc3:*:*:*:*:*:*", "cpeNameId": "FA98B0B7-3C8F-4AC4-96E2-C1ED5869C608"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14:rc4:*:*:*:*:*:*", "cpeNameId": "21FB0B0F-DD53-4505-A841-D56D4C98ADDA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14:rc5:*:*:*:*:*:*", "cpeNameId": "4DDE3D5C-B126-49B9-8255-B97A9F55DC75"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14:rc6:*:*:*:*:*:*", "cpeNameId": "AC770C18-100E-4D5A-8E7C-548B363374D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.1:*:*:*:*:*:*:*", "cpeNameId": "6ED5E726-F7B4-446F-8B58-8756B5D09D3A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.2:*:*:*:*:*:*:*", "cpeNameId": "EEEEDE36-29F0-45B2-A5AD-AC615F9ECBFE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.3:*:*:*:*:*:*:*", "cpeNameId": "820DBC02-C9B5-4003-84F4-6C88EE2C3161"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.4:*:*:*:*:*:*:*", "cpeNameId": "75EEBB8F-B653-4BE3-8748-7973BB51D982"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.5:*:*:*:*:*:*:*", "cpeNameId": "EB2BAAA7-D118-4EE4-8974-B5E91B2DD088"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.6:*:*:*:*:*:*:*", "cpeNameId": "A90AEBB1-634D-4E4C-9EB4-5A378DA9921E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.7:*:*:*:*:*:*:*", "cpeNameId": "713408CD-13C2-4E22-A7CF-1CFA01082262"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.8:*:*:*:*:*:*:*", "cpeNameId": "AF7173EC-5AA6-4152-ADE2-77F860F5DCBD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.9:*:*:*:*:*:*:*", "cpeNameId": "5C3FF227-DDB0-4ACE-9170-4BE4CDA39239"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.10:*:*:*:*:*:*:*", "cpeNameId": "B9A635C8-CD0F-4897-A6E6-11F42F597CF7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.11:*:*:*:*:*:*:*", "cpeNameId": "D302868E-99BB-4C0C-9EC5-22E0F2F7B58A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.12:*:*:*:*:*:*:*", "cpeNameId": "227CCDD9-0DA9-4E19-A3A0-98182C78A04D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.13:*:*:*:*:*:*:*", "cpeNameId": "BA9F4788-9EAB-4974-B38D-F49FA29FCAB7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.14:*:*:*:*:*:*:*", "cpeNameId": "30A4EDD4-FFDC-46D1-9525-65CE02584D95"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.15:*:*:*:*:*:*:*", "cpeNameId": "253EE3A7-BB19-4AC4-B7F6-9B50D49FE43B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.16:*:*:*:*:*:*:*", "cpeNameId": "CFD0FB79-CC87-491D-8B44-C835289F1FF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.17:*:*:*:*:*:*:*", "cpeNameId": "6D7A8649-F82D-4F46-8B54-B4A42730DC62"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.18:*:*:*:*:*:*:*", "cpeNameId": "F5056E34-3AA2-4E1D-9445-D36A5E9AC2AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.19:*:*:*:*:*:*:*", "cpeNameId": "173C2A8A-1254-4EA0-8FE0-266FB47C42E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.20:*:*:*:*:*:*:*", "cpeNameId": "91634B25-518C-487C-90FC-C295D8AEF303"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.21:*:*:*:*:*:*:*", "cpeNameId": "1188704C-1DAC-4A1B-876D-B462547A9A1D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15:-:*:*:*:*:*:*", "cpeNameId": "599716EA-4916-4E30-8C24-4C6384D09138"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*", "cpeNameId": "CC920260-1BAF-4237-9263-2BCB29AE387F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*", "cpeNameId": "E052153B-5861-4C61-8207-1ED350609920"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:*", "cpeNameId": "6DBE44D0-670B-4B11-93BC-5CE160AE79A0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15:rc4:*:*:*:*:*:*", "cpeNameId": "D2702E38-FC04-4035-9742-46E5C2C32FF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15:rc5:*:*:*:*:*:*", "cpeNameId": "A638E326-4ACA-4CBB-8541-3860AEC16C9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15:rc6:*:*:*:*:*:*", "cpeNameId": "3E354D0D-99D1-4D2E-A42D-66946B7130B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15:rc7:*:*:*:*:*:*", "cpeNameId": "3FA3424A-B73B-4456-B871-280BBF7DE793"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.0:*:*:*:*:*:*:*", "cpeNameId": "3B152660-5C53-45F1-82AE-702237DAC922"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.0-58:*:*:*:*:*:*:*", "cpeNameId": "06ABD7CB-C7BF-4F85-ABD4-36F90A9114F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.1:*:*:*:*:*:*:*", "cpeNameId": "C92526FC-5702-4551-95C4-5D185E57703A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.2:*:*:*:*:*:*:*", "cpeNameId": "A70688C6-4AA2-4110-BC86-CA9E324DF3EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.3:*:*:*:*:*:*:*", "cpeNameId": "64CD2A28-6AE0-4894-8B00-F5232E3C34A9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.3:-:*:*:*:*:*:*", "cpeNameId": "FE18FBEA-C217-402C-8731-7C387B4B3D7F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.4:*:*:*:*:*:*:*", "cpeNameId": "969BD4C0-B372-451B-9376-0CA5FB3C286F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.5:*:*:*:*:*:*:*", "cpeNameId": "7309FA34-EDC1-41D1-BB4E-09F09900678F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.6:*:*:*:*:*:*:*", "cpeNameId": "DA042DB6-921A-4071-A171-7D0C2BBBC8F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.7:*:*:*:*:*:*:*", "cpeNameId": "0E69D848-C6AF-45F1-B581-3435108E1E1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.8:*:*:*:*:*:*:*", "cpeNameId": "73679DB9-DB66-4D04-9362-9F7FDE3ED7DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.9:*:*:*:*:*:*:*", "cpeNameId": "A914D016-CDDA-4F8C-8D11-AD68CA078395"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.10:*:*:*:*:*:*:*", "cpeNameId": "B8732B41-FD4D-4BB5-B500-664C2BA3129F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.11:*:*:*:*:*:*:*", "cpeNameId": "A58F2B5E-D805-40E6-B2EC-38AB78F48EBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.12:*:*:*:*:*:*:*", "cpeNameId": "C570EA74-0498-4116-8B63-2E08DB9EAF91"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.13:*:*:*:*:*:*:*", "cpeNameId": "D43ECFE8-45FA-41D1-94B9-F6A3601D99C4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.14:*:*:*:*:*:*:*", "cpeNameId": "9B285A1E-C507-4EDB-A79D-7F3A707A00D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.15:*:*:*:*:*:*:*", "cpeNameId": "479523C1-5DFC-4ADF-88A9-60D25E740ECD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.16:*:*:*:*:*:*:*", "cpeNameId": "283D07E0-7CF7-428B-B5E7-F9F389F42621"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.17:*:*:*:*:*:*:*", "cpeNameId": "28209832-3CD5-4EB8-BFF7-94C00921B21A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.18:*:*:*:*:*:*:*", "cpeNameId": "C402A420-3087-4169-B118-B9576726F29A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.19:*:*:*:*:*:*:*", "cpeNameId": "71FF4C04-4676-4339-904C-E431CA842C9A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.20:*:*:*:*:*:*:*", "cpeNameId": "D3AC6061-A8AD-4B32-9631-AAD5AE8AE846"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.21:*:*:*:*:*:*:*", "cpeNameId": "01512FC7-2E77-4185-84AD-233C3850F0C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.22:*:*:*:*:*:*:*", "cpeNameId": "13950585-5CDE-450C-8569-0F629C7EDB2E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.23:*:*:*:*:*:*:*", "cpeNameId": "84D3D456-7CBD-4BB2-940D-07D97BA08C58"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.24:*:*:*:*:*:*:*", "cpeNameId": "4B07A2D0-5A94-41AD-8478-EB93089837BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.25:*:*:*:*:*:*:*", "cpeNameId": "4B57878E-85D9-4630-81F9-971E521E1D04"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.26:*:*:*:*:*:*:*", "cpeNameId": "10C93845-0531-404A-B632-86FC15D22E78"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.27:*:*:*:*:*:*:*", "cpeNameId": "6B435B64-AB1B-4029-B6A5-01DD5C19206F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.28:*:*:*:*:*:*:*", "cpeNameId": "101F745E-07DD-436D-9573-77D88FEE7DA8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.29:*:*:*:*:*:*:*", "cpeNameId": "2126A535-152D-4C7D-BEEC-5E05EFF76DBF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.30:*:*:*:*:*:*:*", "cpeNameId": "3D5050EC-725E-41E0-A0BB-89C5CC71ACC5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.31:*:*:*:*:*:*:*", "cpeNameId": "CADD5BFF-62AF-44DA-8433-F0221493495C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.32:*:*:*:*:*:*:*", "cpeNameId": "D41546A8-EBED-4F57-BD4A-9E1B2A5C17CC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.33:*:*:*:*:*:*:*", "cpeNameId": "2AD16C2A-38AA-4931-922E-B883B7574C58"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.34:*:*:*:*:*:*:*", "cpeNameId": "99C916A9-866D-4905-9878-8DD27F5E980D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.35:*:*:*:*:*:*:*", "cpeNameId": "5F3D2240-53BA-4C7D-8199-FE7F31339D4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.36:*:*:*:*:*:*:*", "cpeNameId": "FF57011F-9545-414B-B253-52F38B78B77A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.37:*:*:*:*:*:*:*", "cpeNameId": "606225EC-ECF3-4F47-91A8-7F9D17842D62"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.38:*:*:*:*:*:*:*", "cpeNameId": "4DB0EF0E-5BF0-47C3-A2F9-B3522AFF7190"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.39:*:*:*:*:*:*:*", "cpeNameId": "A08CEA1B-91C1-4711-BD80-0F7ADDE94BA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.40:*:*:*:*:*:*:*", "cpeNameId": "89D88D81-DD0E-43FD-B671-78B808D88647"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.41:*:*:*:*:*:*:*", "cpeNameId": "DD7E6E45-BF7C-46DF-958C-735232ECCBED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.42:*:*:*:*:*:*:*", "cpeNameId": "B2520F43-B7D8-4373-8869-07DCFD59FF11"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.43:*:*:*:*:*:*:*", "cpeNameId": "F16FC01A-7763-44B0-B502-4FC46DA358AF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.44:*:*:*:*:*:*:*", "cpeNameId": "030D2A9C-692A-4DB1-9D63-44DBCC0C68F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.45:*:*:*:*:*:*:*", "cpeNameId": "94C51A53-591C-4ED3-BBD6-7549EE1F8068"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.46:*:*:*:*:*:*:*", "cpeNameId": "ACC8D217-A7B0-4C18-9B70-FA0E5262BFB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.47:*:*:*:*:*:*:*", "cpeNameId": "191C3ACC-27A6-438E-9334-742147EFFBFE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.48:*:*:*:*:*:*:*", "cpeNameId": "8B81D3ED-5819-4470-BE97-D8DEA91AFBB3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.49:*:*:*:*:*:*:*", "cpeNameId": "BAF8556B-BB65-4F53-8EB5-059A294DCD67"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.50:*:*:*:*:*:*:*", "cpeNameId": "D99EABCA-D9E3-44D7-AF96-2D5F1474CD15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.51:*:*:*:*:*:*:*", "cpeNameId": "89386483-66E5-4C04-B476-C08F5BD6D0D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.52:*:*:*:*:*:*:*", "cpeNameId": "076DEA19-48DB-476C-8CFA-06ACE89F67EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.53:*:*:*:*:*:*:*", "cpeNameId": "E3AAC0BA-7638-428F-9D89-08A94750E9EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.54:*:*:*:*:*:*:*", "cpeNameId": "56A56B25-D086-4413-8692-A5882F02760F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.55:*:*:*:*:*:*:*", "cpeNameId": "4BF52F71-274C-4E09-9D64-84AAC8D6F67E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.56:*:*:*:*:*:*:*", "cpeNameId": "2D041A4C-8395-4B72-B6B7-06ECBA8E8693"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.57:*:*:*:*:*:*:*", "cpeNameId": "6B5C0E6D-8C22-41CE-8CF7-5A85861A47D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.58:*:*:*:*:*:*:*", "cpeNameId": "FCE4E1B8-7046-4626-A6D1-53B7095B20A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.59:*:*:*:*:*:*:*", "cpeNameId": "729B700C-BDB9-4DFB-A795-98DFBE32EEC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.60:*:*:*:*:*:*:*", "cpeNameId": "1D98E598-4BF4-43D6-904C-9290DDF06272"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.61:*:*:*:*:*:*:*", "cpeNameId": "6CCCAF65-435F-482C-BA22-7DDC145109F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.62:*:*:*:*:*:*:*", "cpeNameId": "B90909CA-2810-4537-A85A-4CBA4A6AF37C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.63:*:*:*:*:*:*:*", "cpeNameId": "6F0C3B38-C13C-4A80-9EBD-65AC9FCC8F9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.64:*:*:*:*:*:*:*", "cpeNameId": "F91D8B0C-B2AC-43A8-8D6C-536E4C07BDA3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.65:*:*:*:*:*:*:*", "cpeNameId": "4C75DDA0-056C-4560-B8F6-FD3A28965C0F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.66:*:*:*:*:*:*:*", "cpeNameId": "479D10C6-D8AE-4C6C-95D8-D4935062ACDA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.67:*:*:*:*:*:*:*", "cpeNameId": "ADBEA5B5-A3FF-4667-A57F-EAA8FBC5F51A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.68:*:*:*:*:*:*:*", "cpeNameId": "E5298249-E4F2-40FD-9A02-0FFE62A97655"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.69:*:*:*:*:*:*:*", "cpeNameId": "AF74FFF5-EACB-41FA-9DDE-6E9F7C2D49E9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.70:*:*:*:*:*:*:*", "cpeNameId": "626D6B66-055F-40EF-87D0-BCA1ACB41632"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.71:*:*:*:*:*:*:*", "cpeNameId": "13BB2C1F-A7E8-4FEA-802A-FCB5DB17689E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.72:*:*:*:*:*:*:*", "cpeNameId": "687ACBBC-002B-4A57-B0C5-495C006BF83A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.73:*:*:*:*:*:*:*", "cpeNameId": "2FFC61CE-E920-4907-9237-ADCB03CF57F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.74:*:*:*:*:*:*:*", "cpeNameId": "21586670-7837-44DE-98F5-E8664ECB39F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.75:*:*:*:*:*:*:*", "cpeNameId": "257AECB1-0BFD-4F2F-9E1D-8B99451293E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.76:*:*:*:*:*:*:*", "cpeNameId": "4C6C2994-8803-478D-98AD-268D0B994FD2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.77:*:*:*:*:*:*:*", "cpeNameId": "67B26A96-5B92-41D5-A933-110235C90FC2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.78:*:*:*:*:*:*:*", "cpeNameId": "93765A6E-5FF1-428E-B6DD-08E9761E4BC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.79:*:*:*:*:*:*:*", "cpeNameId": "1E46E1F7-EC81-48DB-8D87-615670C42211"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.80:*:*:*:*:*:*:*", "cpeNameId": "403BE072-9172-420B-A0DF-A011387FC467"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.81:*:*:*:*:*:*:*", "cpeNameId": "76501F14-5447-4316-96C1-406CBB85ACEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.82:*:*:*:*:*:*:*", "cpeNameId": "EC139CB2-1B4C-41BA-B74E-6E21D4C75A65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.83:*:*:*:*:*:*:*", "cpeNameId": "B82C5952-6221-4637-A4F9-27F26C848140"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.84:*:*:*:*:*:*:*", "cpeNameId": "6D9BBF85-E068-4434-9F1D-FC5E2BCCCE15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.85:*:*:*:*:*:*:*", "cpeNameId": "4DFB6EEB-3B7C-4BBE-9C57-22212F5CF117"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.86:*:*:*:*:*:*:*", "cpeNameId": "54FA7373-2A0F-441F-B2DE-D0026C9E6E2A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.87:*:*:*:*:*:*:*", "cpeNameId": "D2002224-68A5-4CEB-84E8-C68A68A70477"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.88:*:*:*:*:*:*:*", "cpeNameId": "240ADDF1-F9B5-4E8A-BB28-8D25FD6EAFAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.89:*:*:*:*:*:*:*", "cpeNameId": "E8949735-535C-4365-9E77-3F5AFA127F45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.90:*:*:*:*:*:*:*", "cpeNameId": "27480E5A-75A6-4924-AE94-56C368919E20"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.91:*:*:*:*:*:*:*", "cpeNameId": "F1444DEC-505C-4B47-89E1-558CA1FE252D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.92:*:*:*:*:*:*:*", "cpeNameId": "366E992F-2DEB-4B73-8D13-0AAA6CDAB1AA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.93:*:*:*:*:*:*:*", "cpeNameId": "8B194E4D-C302-4781-A3EB-287B9338BB49"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.94:*:*:*:*:*:*:*", "cpeNameId": "8C4F3FDB-C7D3-4FAF-ADC9-F9C48692180C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.95:*:*:*:*:*:*:*", "cpeNameId": "78DB19FE-CDF2-4493-934F-F78BAC1E3525"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.96:*:*:*:*:*:*:*", "cpeNameId": "BD7068CF-1BF4-4836-A365-A1CAA95D8492"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.97:*:*:*:*:*:*:*", "cpeNameId": "8D4F726D-1B15-4756-B043-23B295E50326"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.98:*:*:*:*:*:*:*", "cpeNameId": "26CC4C2E-D776-4C60-9E36-FCAC66C0CA93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.99:*:*:*:*:*:*:*", "cpeNameId": "FB96FD42-EA7B-4EA4-BE27-FB6AE67A19D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.100:*:*:*:*:*:*:*", "cpeNameId": "8D34EF8C-BCA7-4EC8-9C69-559A59897E86"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.101:*:*:*:*:*:*:*", "cpeNameId": "6675EF7C-AACC-4247-A01C-896C9A44CFB9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.102:*:*:*:*:*:*:*", "cpeNameId": "2FEF936B-B116-4F46-8301-200550628240"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.103:*:*:*:*:*:*:*", "cpeNameId": "DE221176-159A-4357-8F12-AC71670703B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.104:*:*:*:*:*:*:*", "cpeNameId": "C1896DF2-E302-460B-9502-CF7063E5DF9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.105:*:*:*:*:*:*:*", "cpeNameId": "9E101463-342E-4486-823F-3BC4BD391306"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.106:*:*:*:*:*:*:*", "cpeNameId": "CA88855E-C837-4947-93E0-B9D7F9B827E7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.107:*:*:*:*:*:*:*", "cpeNameId": "B13F0C93-E3E4-4641-9EAB-3EA2990A1C89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.108:*:*:*:*:*:*:*", "cpeNameId": "130C0395-CE35-4126-A645-AADC5CD80532"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.109:*:*:*:*:*:*:*", "cpeNameId": "45D1D3CB-FD9D-42FB-A1D3-534BC36E80EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.110:*:*:*:*:*:*:*", "cpeNameId": "A931A0BD-98A1-47EB-9A75-0E8789CD2174"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.111:*:*:*:*:*:*:*", "cpeNameId": "CED0554E-DE06-438B-BD20-D55AB97E2137"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.112:*:*:*:*:*:*:*", "cpeNameId": "01469DE3-F508-4F50-B7EF-CFFAF6B0244A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.113:*:*:*:*:*:*:*", "cpeNameId": "EE8A8B31-F5BC-463C-8C3F-F99C8605D124"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.114:*:*:*:*:*:*:*", "cpeNameId": "7555AB4A-AA90-4F9E-AC9A-522F0EBB84B6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.115:*:*:*:*:*:*:*", "cpeNameId": "37780F52-A144-418A-8605-87E836109FA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.116:*:*:*:*:*:*:*", "cpeNameId": "67C9CBE9-0CF6-4DC1-96C9-8B8D0C572C76"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.117:*:*:*:*:*:*:*", "cpeNameId": "ADB012DE-27D7-4796-A07A-55897A9208B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.118:*:*:*:*:*:*:*", "cpeNameId": "6CAF3A99-3538-4B78-AB6F-1FD5BC1D3731"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.119:*:*:*:*:*:*:*", "cpeNameId": "F62E2EC5-1929-49E3-8920-4EFC89470EF3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.120:*:*:*:*:*:*:*", "cpeNameId": "1ACD20AE-5810-4832-9596-E0F2B77F6DED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.121:*:*:*:*:*:*:*", "cpeNameId": "0840D171-E172-4AEB-9A04-748165172F57"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.122:*:*:*:*:*:*:*", "cpeNameId": "108F7161-9C83-4AF5-81CE-7210DBE16A3B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.123:*:*:*:*:*:*:*", "cpeNameId": "AFC5B1D0-7550-4CA6-B9D8-7362589804BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.124:*:*:*:*:*:*:*", "cpeNameId": "607A4975-DD27-45FB-8492-B2D610C8CE49"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.125:*:*:*:*:*:*:*", "cpeNameId": "7CFAB9E2-3565-4DBE-A4A3-F420E0E6F1B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.126:*:*:*:*:*:*:*", "cpeNameId": "934C84D4-9205-4231-918D-52F8653AD03A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.127:*:*:*:*:*:*:*", "cpeNameId": "94F04153-424F-4287-9D87-86D843B8EC6B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.128:*:*:*:*:*:*:*", "cpeNameId": "3A0743EE-08EE-4033-974B-534685606B8D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.129:*:*:*:*:*:*:*", "cpeNameId": "1851B737-51D3-44EC-BAD0-C326CB4B258A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.130:*:*:*:*:*:*:*", "cpeNameId": "5E3B9172-8C12-4171-BE40-947651A6C1D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.131:*:*:*:*:*:*:*", "cpeNameId": "68CDD386-3C55-4849-BFDD-71A5DF5ECF00"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.132:*:*:*:*:*:*:*", "cpeNameId": "3F25FB70-CBCF-4363-947B-8D0749D054A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.133:*:*:*:*:*:*:*", "cpeNameId": "183855CE-2982-4596-954A-C8AD340BB217"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.134:*:*:*:*:*:*:*", "cpeNameId": "2C960D3A-EB30-4662-92DE-2F4DCA1B61DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.135:*:*:*:*:*:*:*", "cpeNameId": "795D4E07-5632-4B2F-889E-52121C56C87A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.136:*:*:*:*:*:*:*", "cpeNameId": "39F63867-B3B8-4B11-8568-793FE9BF0657"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.137:*:*:*:*:*:*:*", "cpeNameId": "86AFC96E-5CC1-4C7C-8D07-20BF5FD72F51"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.138:*:*:*:*:*:*:*", "cpeNameId": "6D98B672-ABF1-4E6A-85CA-C98156AD289F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.139:*:*:*:*:*:*:*", "cpeNameId": "60BDBDA5-D58A-4E1E-87FB-110840F829F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.140:*:*:*:*:*:*:*", "cpeNameId": "44DCAB0F-015F-4450-9454-1B281A41F7FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.141:*:*:*:*:*:*:*", "cpeNameId": "3C8C0EA5-6615-4404-9C0E-507EA505E607"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.142:*:*:*:*:*:*:*", "cpeNameId": "AACA090B-6D25-4504-8EEF-02C1DA914B55"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.143:*:*:*:*:*:*:*", "cpeNameId": "04411AB1-68B2-43CF-8AAF-023A00274276"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.144:*:*:*:*:*:*:*", "cpeNameId": "D1A15124-7544-4990-8884-8EC08CBDB231"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.145:*:*:*:*:*:*:*", "cpeNameId": "DBDB8123-C794-42AF-B554-13E794244440"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.146:*:*:*:*:*:*:*", "cpeNameId": "CD3243D1-4C4E-424A-BCFE-7FAF5782049D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.147:*:*:*:*:*:*:*", "cpeNameId": "D14C7C5E-C636-4B9B-941A-1B5D3FE4AF3B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.148:*:*:*:*:*:*:*", "cpeNameId": "43B668A9-8ADC-487B-8857-F8CC74D99990"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.149:*:*:*:*:*:*:*", "cpeNameId": "8C6DF61D-1354-424F-88D4-C76B0044C4BA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.150:*:*:*:*:*:*:*", "cpeNameId": "405263B7-A847-493D-BAC8-67CDC081E8A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.151:*:*:*:*:*:*:*", "cpeNameId": "AFB5460A-5F15-4E58-A1D9-438F22B08C61"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.152:*:*:*:*:*:*:*", "cpeNameId": "6FD5D09F-908B-4EA6-ADDA-D5D4867282C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.153:*:*:*:*:*:*:*", "cpeNameId": "35BC07C8-138B-48CB-94C8-F4F2DE1CEA73"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.154:*:*:*:*:*:*:*", "cpeNameId": "104BA652-53EA-4BE7-AEF6-1E69DF5BAB94"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.155:*:*:*:*:*:*:*", "cpeNameId": "82D13E0C-C092-4C55-8F8E-A8EC9F7C5B28"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.156:*:*:*:*:*:*:*", "cpeNameId": "0208D826-E36F-43ED-94E2-47B3786BDA8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.157:*:*:*:*:*:*:*", "cpeNameId": "29BE7FF8-0D66-4613-9FF9-1491805EF6E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.158:*:*:*:*:*:*:*", "cpeNameId": "F0BD86B6-9DA2-4CB5-925F-AED18EA69B7A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.159:*:*:*:*:*:*:*", "cpeNameId": "1967C928-055E-41A6-9452-11327EFD81F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.160:*:*:*:*:*:*:*", "cpeNameId": "39762989-4F30-40E8-9958-8100639F003F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.161:*:*:*:*:*:*:*", "cpeNameId": "93EFCF93-5625-453D-B8C8-D532F2F6B2EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.162:*:*:*:*:*:*:*", "cpeNameId": "AD93992B-560A-4880-AB8E-2B12E1ED9CE6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.163:*:*:*:*:*:*:*", "cpeNameId": "9F1AF162-C909-4161-9860-93F52BA93C11"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.164:*:*:*:*:*:*:*", "cpeNameId": "E82128C3-95AC-4517-8595-90030EB8B1B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.165:*:*:*:*:*:*:*", "cpeNameId": "DD75A3C4-3B2C-47C3-8249-25430F6326F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.166:*:*:*:*:*:*:*", "cpeNameId": "C4AE610D-F204-40F4-9F0E-A12F96513628"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.167:*:*:*:*:*:*:*", "cpeNameId": "AD2CD499-D496-457D-B206-76DD055935D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.168:*:*:*:*:*:*:*", "cpeNameId": "D17DDC10-C0C2-4595-99AA-7D081F156E28"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.170:*:*:*:*:*:*:*", "cpeNameId": "68B1E403-BB7E-46D6-93FB-39CCDEC9F903"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.171:*:*:*:*:*:*:*", "cpeNameId": "20D00418-523B-451C-A87C-A7494767A55C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.172:*:*:*:*:*:*:*", "cpeNameId": "BF5B290A-52DC-4153-9821-1E04DA80704B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16:-:*:*:*:*:*:*", "cpeNameId": "C83A7E51-CA73-46EC-8635-C725205B637D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*", "cpeNameId": "028A348E-72E2-4B13-9D61-56938AFFB6F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:*", "cpeNameId": "6495A470-21D2-43F0-B762-C6ECB6134C5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16:rc3:*:*:*:*:*:*", "cpeNameId": "6342FCDA-7AC5-4E1B-A8F7-C4A7CB62F606"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16:rc4:*:*:*:*:*:*", "cpeNameId": "3379676E-35B7-4474-8A99-EF053E0FD968"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16:rc5:*:*:*:*:*:*", "cpeNameId": "AE10DE94-CADF-4B77-B540-4197CCAB49EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16:rc6:*:*:*:*:*:*", "cpeNameId": "EFBAB573-844C-4A77-BC98-353AB1C86E1A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16:rc7:*:*:*:*:*:*", "cpeNameId": "71AEECF0-21D6-492A-999E-8D6687D719A7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.0:*:*:*:*:*:*:*", "cpeNameId": "081E7EC8-3E8E-48D4-8187-1B96F6BE062F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.0:rc1:*:*:*:*:*:*", "cpeNameId": "EB5911C8-9712-4439-99F2-5BCDED060240"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.1:*:*:*:*:*:*:*", "cpeNameId": "2730ED9E-094C-40E1-B3C5-75C02A9E1BBD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.2:*:*:*:*:*:*:*", "cpeNameId": "7A33187A-7AA3-4565-BD7A-EE2304904D3B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.3:*:*:*:*:*:*:*", "cpeNameId": "F0C5525B-4224-4481-9190-16DFA7982F9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.4:*:*:*:*:*:*:*", "cpeNameId": "891F8D0E-202D-4728-9D83-764496E40CB9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.5:*:*:*:*:*:*:*", "cpeNameId": "AFC47178-4013-4A67-BFBE-F2C1D8C43FAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.6:*:*:*:*:*:*:*", "cpeNameId": "A563BA20-7E45-4F95-97CC-B991BEE12EC2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.7:*:*:*:*:*:*:*", "cpeNameId": "62897C18-4BA0-46BF-A3C6-A2F57B2C400F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.8:*:*:*:*:*:*:*", "cpeNameId": "0D9ED6C5-B404-47B6-BDDA-21FB4E7392DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.9:*:*:*:*:*:*:*", "cpeNameId": "DBB9E77F-F972-4486-AE16-C40C76D64E87"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.10:*:*:*:*:*:*:*", "cpeNameId": "7D6A655C-B244-446F-8CDC-4D17D47253AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.11:*:*:*:*:*:*:*", "cpeNameId": "B5EB9714-867F-44F9-9AA3-BE8D500D4BC5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.12:*:*:*:*:*:*:*", "cpeNameId": "8BF0B6A9-F5F7-4EF6-A81F-9AA1DEBFBCE3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.13:*:*:*:*:*:*:*", "cpeNameId": "BE8039FF-A2FF-4592-BCF2-FDE1271C80D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.14:*:*:*:*:*:*:*", "cpeNameId": "70857AD4-FC92-4F1B-905E-19EC450C5B11"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.15:*:*:*:*:*:*:*", "cpeNameId": "AC26CE14-E5B3-4159-805B-6EC9D9B37D83"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.16:*:*:*:*:*:*:*", "cpeNameId": "544C971D-5F36-423D-AB36-E217BE202DB8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.17:*:*:*:*:*:*:*", "cpeNameId": "2A58FEF7-CB40-428A-806B-BE0B32BBB723"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.18:*:*:*:*:*:*:*", "cpeNameId": "7FBBF4E8-6F44-4592-8069-C21668D738E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.19:*:*:*:*:*:*:*", "cpeNameId": "CA37F5FB-5C02-45F3-B7B7-1F56F552B120"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.20:*:*:*:*:*:*:*", "cpeNameId": "83FC3AB5-576E-489E-A697-0865FE9D7439"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.62:*:*:*:*:*:*:*", "cpeNameId": "AC968C04-563B-44E7-A323-6CF404B73D4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:-:*:*:*:*:*:*", "cpeNameId": "805B659E-0A6A-4EDE-9E81-F83A30B3264A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*", "cpeNameId": "A87C09DD-69B1-4CA9-8AE6-3DBF4DF3F11D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*", "cpeNameId": "8F54EDC5-48AB-4577-8C36-660DC7D71454"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:rc3:*:*:*:*:*:*", "cpeNameId": "BA251D8D-4559-451C-9974-E9C6B8087A08"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:rc4:*:*:*:*:*:*", "cpeNameId": "75F94F87-13C3-44A6-80AF-C0C5C599E2A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:rc5:*:*:*:*:*:*", "cpeNameId": "CB671C15-924A-43CA-91DB-1D9FA9D0CC25"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:rc6:*:*:*:*:*:*", "cpeNameId": "A9B040E0-4FFC-4F00-ADB0-5AC01F8F04ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:rc7:*:*:*:*:*:*", "cpeNameId": "EC464421-E417-4360-86C8-511D0221DCF2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:rc8:*:*:*:*:*:*", "cpeNameId": "B3CC3FB2-843F-4B86-86B3-D72EEFBA33FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.1:*:*:*:*:*:*:*", "cpeNameId": "E3D26A37-A963-4501-AD97-1E252FA7A48E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.2:*:*:*:*:*:*:*", "cpeNameId": "7B9C1788-8178-4BDD-8547-0B3193B030A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.3:*:*:*:*:*:*:*", "cpeNameId": "C4DE0AAD-9698-4ADE-A59B-3A730D1B10C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.4:*:*:*:*:*:*:*", "cpeNameId": "EA1887EA-7FF5-4222-B72B-F17A05C0B035"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.5:*:*:*:*:*:*:*", "cpeNameId": "662B2A28-A112-4710-A201-3017CBD3FC8F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.6:*:*:*:*:*:*:*", "cpeNameId": "77EB0841-4431-4A1E-A99F-ACE36FC6FE50"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.7:*:*:*:*:*:*:*", "cpeNameId": "F2EA9343-31D9-42B5-B7DB-D7DDDE92F4F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.8:*:*:*:*:*:*:*", "cpeNameId": "31AD3C06-0526-4470-BC59-67D196013B43"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.9:*:*:*:*:*:*:*", "cpeNameId": "D3C822DE-EC22-4C9B-9AA7-C084613C6FF9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.10:*:*:*:*:*:*:*", "cpeNameId": "4CE524CA-B05D-4C9E-B81A-1937E7FFE6DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.11:*:*:*:*:*:*:*", "cpeNameId": "234E800C-A082-4960-BA0D-975F256DDD4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.12:*:*:*:*:*:*:*", "cpeNameId": "878DE0B7-411C-4C58-B753-C6D22E664553"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.13:*:*:*:*:*:*:*", "cpeNameId": "996D982B-11AA-4504-A9CD-8787C813BFBD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.14:*:*:*:*:*:*:*", "cpeNameId": "5E2AEB31-D1FD-4E9D-9CA9-0F9457674EA9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.15:*:*:*:*:*:*:*", "cpeNameId": "2C08D207-8B50-400F-9807-FB3072AD4E6A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:-:*:*:*:*:*:*", "cpeNameId": "0FD8602E-5D63-49B5-AB56-CB2948250E45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:rc1:*:*:*:*:*:*", "cpeNameId": "1DECE9B9-E9A2-4045-BD0B-C6510F69937D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:rc2:*:*:*:*:*:*", "cpeNameId": "EE2606B9-AA8F-4D28-8575-7AD825CAD250"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:rc3:*:*:*:*:*:*", "cpeNameId": "BC668967-571A-466D-8C69-9495260D3BBD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:rc4:*:*:*:*:*:*", "cpeNameId": "FD9CE501-B79F-4899-A816-149019C673E4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:rc5:*:*:*:*:*:*", "cpeNameId": "2E4EE9B2-FC64-4E7E-9757-5109B02E0AAF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:rc6:*:*:*:*:*:*", "cpeNameId": "D5A2141A-53D1-4E5B-B7C7-4FB179F6F219"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:rc7:*:*:*:*:*:*", "cpeNameId": "CF8E007E-9F74-4780-A09E-D101B3076FDF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:rc9:*:*:*:*:*:*", "cpeNameId": "E38067B2-E041-45F1-8A88-DE716AEDC5A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.1:*:*:*:*:*:*:*", "cpeNameId": "5EE504EE-64C4-4361-86B4-E5A7BD65776C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.2:*:*:*:*:*:*:*", "cpeNameId": "787215C4-0507-4760-BF1F-2A8491B66E4F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.3:*:*:*:*:*:*:*", "cpeNameId": "D2A628F1-1878-4C0B-87E6-B21A7CE382D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.4:*:*:*:*:*:*:*", "cpeNameId": "4890EDC3-B4E8-4CD2-AC95-A9DB9CB74FBF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.5:*:*:*:*:*:*:*", "cpeNameId": "BAA68B22-F0BC-45AD-A350-E8774FC53150"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.6:*:*:*:*:*:*:*", "cpeNameId": "C27B6005-D7EB-47DE-B01C-D5BD2B818D3A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.7:*:*:*:*:*:*:*", "cpeNameId": "89AE071D-DFF0-40A5-B7CE-BA33F9FCC5E7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.8:*:*:*:*:*:*:*", "cpeNameId": "F32F879F-B0ED-4F85-B1AD-A45D6DE80D86"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.9:*:*:*:*:*:*:*", "cpeNameId": "AE86A00C-455A-4075-9AC6-714B1F66D934"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.10:*:*:*:*:*:*:*", "cpeNameId": "704396EF-097A-4DFF-8DAE-4B19965C49AF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.11:*:*:*:*:*:*:*", "cpeNameId": "5CFE2D2B-62BD-448C-B0D4-5F7A9B8AB669"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.12:*:*:*:*:*:*:*", "cpeNameId": "F9A857D7-99FC-4761-B4DF-76E758BDE2BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.13:*:*:*:*:*:*:*", "cpeNameId": "A2A3B308-1BA2-4C79-88AF-861CE6482E28"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.14:*:*:*:*:*:*:*", "cpeNameId": "534CA992-2337-4EA8-B1F7-256574B35175"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.15:*:*:*:*:*:*:*", "cpeNameId": "2074E50B-BBEE-4902-B9F2-24E1B862076E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.16:*:*:*:*:*:*:*", "cpeNameId": "D2A2905E-45CE-4135-8D5D-0FF92766109E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.17:*:*:*:*:*:*:*", "cpeNameId": "4794F12E-3EDA-4619-BBB0-E275E1F06710"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.18:*:*:*:*:*:*:*", "cpeNameId": "17C90012-A0AA-459E-946A-B3C82983B22B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.19:*:*:*:*:*:*:*", "cpeNameId": "222B7748-23E3-4A4D-B9D5-4C5A6D5B2AEF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:-:*:*:*:*:*:*", "cpeNameId": "A7C04E0A-EF2B-426E-8AFE-CDFB04C2EE00"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*", "cpeNameId": "91317E86-8C24-4B48-BD6D-8EF732A881D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*", "cpeNameId": "4D6C0AAC-C284-42AB-8F4E-E54D5294D180"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*", "cpeNameId": "08BCB0AD-FBD2-4A2B-B8AE-9733E31BA02A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*", "cpeNameId": "5EC4698A-FD3A-4387-B636-810BCCBE2F15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*", "cpeNameId": "6FBD2340-901D-4CE1-BA59-55C77404D099"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*", "cpeNameId": "009D67E0-1C71-4212-BE27-834E15E8112B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*", "cpeNameId": "9294C90D-628E-44F8-B196-9ADEF3B72C89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:rc8:*:*:*:*:*:*", "cpeNameId": "1EF80A31-F9CD-4870-9F50-F71C1D3F4DC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.1:*:*:*:*:*:*:*", "cpeNameId": "3409D2C8-FB81-4CE9-9B26-677FAAD94F42"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.2:*:*:*:*:*:*:*", "cpeNameId": "0B80A369-7E22-4E25-8D33-298AD0B23074"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.3:*:*:*:*:*:*:*", "cpeNameId": "9E737761-792A-4225-9385-3EBF3CBBBA81"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.4:*:*:*:*:*:*:*", "cpeNameId": "5435810C-35B3-4401-9434-7EE8DE82604B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.5:*:*:*:*:*:*:*", "cpeNameId": "937FA107-2C1F-4AF8-955A-66F90A3DBB9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.6:*:*:*:*:*:*:*", "cpeNameId": "DD0D3175-C807-4197-BC7D-3737DEB5602D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.7:*:*:*:*:*:*:*", "cpeNameId": "A60E3F91-9293-4B3E-98E9-0D11D1942C1B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.8:*:*:*:*:*:*:*", "cpeNameId": "1A2B6F42-AF1B-473E-8033-83C73609D4E4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.9:*:*:*:*:*:*:*", "cpeNameId": "7664EA3B-7AD2-46EC-92EF-552091071A5F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.10:*:*:*:*:*:*:*", "cpeNameId": "93A56D61-5B65-4D74-ABEF-766372AF7AA0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.11:*:*:*:*:*:*:*", "cpeNameId": "C9534805-84C6-45B9-86BF-7D05E4136C96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.12:*:*:*:*:*:*:*", "cpeNameId": "DE9B1782-E79B-4EF2-8CDB-3D24CF153AC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.13:*:*:*:*:*:*:*", "cpeNameId": "BC90F145-D85D-4388-A4F8-2151884F1663"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.14:*:*:*:*:*:*:*", "cpeNameId": "C0BCABF8-19C2-4B49-9A49-EF7128C5B8B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.15:*:*:*:*:*:*:*", "cpeNameId": "88BDA49D-7A90-40EB-B71E-A570891B9EE6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.16:*:*:*:*:*:*:*", "cpeNameId": "9C3D06BA-AF02-4FFD-AE35-347B04643683"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.17:*:*:*:*:*:*:*", "cpeNameId": "124836C8-7921-4BFE-A64C-AE9F640C9130"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0:-:*:*:*:*:*:*", "cpeNameId": "3A2B23AB-CBA1-42BB-8FA6-C64C95B4FFC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:*", "cpeNameId": "28304135-D881-4B0E-B7C6-826D7CA6F1CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0:rc2:*:*:*:*:*:*", "cpeNameId": "80E35649-C2A2-423F-93D6-8DA4F6A8B4E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0:rc3:*:*:*:*:*:*", "cpeNameId": "D7F3713F-F696-4D43-80A5-98433FA9F02D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0:rc4:*:*:*:*:*:*", "cpeNameId": "C16C9B3F-BD8C-4404-B51D-91856734622D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0:rc5:*:*:*:*:*:*", "cpeNameId": "453F7A7A-15F4-4D21-B85B-6C1DE66FF9F4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0:rc6:*:*:*:*:*:*", "cpeNameId": "42BE5475-0D59-4599-AC53-94A247DA277C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0:rc7:*:*:*:*:*:*", "cpeNameId": "9F921345-A999-4E40-9F3F-4F009C78FBAE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.1:*:*:*:*:*:*:*", "cpeNameId": "DA897396-3BC0-4AC4-B42D-98475AAEFDB1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.2:*:*:*:*:*:*:*", "cpeNameId": "EAFB7D30-6006-44B3-9687-77CBE235323A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.3:*:*:*:*:*:*:*", "cpeNameId": "09573A93-AEDE-4BBA-88F3-6F5CC94F2EE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.4:*:*:*:*:*:*:*", "cpeNameId": "DA0AA4FE-4C59-448A-88DC-C8A8EAF513E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.5:*:*:*:*:*:*:*", "cpeNameId": "C8D96C96-4D7D-4FA4-9CEA-660BF39FC1D7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.6:*:*:*:*:*:*:*", "cpeNameId": "C978C4EF-7AF5-4AA8-BD1D-954E9D7476AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.7:*:*:*:*:*:*:*", "cpeNameId": "70248903-1B6E-43D3-963F-9CCA75253E2A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.8:*:*:*:*:*:*:*", "cpeNameId": "22375451-92E0-4690-B7C4-82B63F7F54AA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.9:*:*:*:*:*:*:*", "cpeNameId": "792202AB-6A0E-491B-87FC-3F98835781A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.10:*:*:*:*:*:*:*", "cpeNameId": "FF48867C-F23F-4340-96AC-8C40D01A93A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.11:*:*:*:*:*:*:*", "cpeNameId": "E8A33859-F785-4E67-83D6-3304A2AC8F1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.12:*:*:*:*:*:*:*", "cpeNameId": "BBCB0428-C568-4F4B-8069-BFC5DE18BA66"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.13:*:*:*:*:*:*:*", "cpeNameId": "785980A5-8FCC-4DEB-8C31-6B66B3F2ED06"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.14:*:*:*:*:*:*:*", "cpeNameId": "3D9CF1CA-591F-4D6B-835F-71E494855265"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.15:*:*:*:*:*:*:*", "cpeNameId": "3DB8BB3F-8384-49A3-9B5C-0C812B669916"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.16:*:*:*:*:*:*:*", "cpeNameId": "97B95EF5-6328-416C-A983-BAD4DB8178EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.17:*:*:*:*:*:*:*", "cpeNameId": "5D22785E-D725-46B7-83E8-9AA3F1B1EE61"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.18:*:*:*:*:*:*:*", "cpeNameId": "F5B47278-06DD-4334-BEAA-82D99836E0CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.19:*:*:*:*:*:*:*", "cpeNameId": "2D6FBBDE-1828-44E5-AE5B-0844E49DD7DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:-:*:*:*:*:*:*", "cpeNameId": "E1B09DBA-878F-4B52-AE09-74B0B8F5D68F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*", "cpeNameId": "30EC2354-B32A-44E9-9861-CEA7D545DFBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*", "cpeNameId": "BFAC13C0-7539-40DF-B674-4ECCA1868626"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*", "cpeNameId": "585AB024-3F59-4BDB-A302-D224DF5D8495"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*", "cpeNameId": "4A21513E-7139-44E5-88E8-9B991661CF3C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*", "cpeNameId": "8D834469-69DF-4937-AFF3-A0B90AB70455"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*", "cpeNameId": "25204659-6277-44F6-B75E-69B25412BE26"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*", "cpeNameId": "79676ADB-9CD8-4734-9FBF-13CA081A2193"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:rc8:*:*:*:*:*:*", "cpeNameId": "80492410-4FE5-4C8B-897C-243E42C03469"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.1:*:*:*:*:*:*:*", "cpeNameId": "3C595643-58A0-402D-8A1A-E2148719F38F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.2:*:*:*:*:*:*:*", "cpeNameId": "5F145B48-D5DB-4B52-ABDC-41BAACF04213"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.3:*:*:*:*:*:*:*", "cpeNameId": "59A7EC30-0E14-45EE-A5DA-9D98F4793E93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.4:*:*:*:*:*:*:*", "cpeNameId": "28AD2EF2-9A1F-4C90-A938-33E394A94615"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.5:*:*:*:*:*:*:*", "cpeNameId": "37B29EC5-AB56-4407-871C-6AF5177AE78F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.6:*:*:*:*:*:*:*", "cpeNameId": "76D2F6EA-F7DC-413B-85EC-C8B7916DCD0C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.7:*:*:*:*:*:*:*", "cpeNameId": "3E05D19C-FFAF-44BC-B9CB-D7054765D6D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.8:*:*:*:*:*:*:*", "cpeNameId": "9625E836-75C2-4337-BAA1-70F3958C06CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.9:*:*:*:*:*:*:*", "cpeNameId": "492A02F0-DBF7-40C0-9CD6-AFADC763E814"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.10:*:*:*:*:*:*:*", "cpeNameId": "9A0A4990-A036-4290-AD79-B7531545BA07"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.11:*:*:*:*:*:*:*", "cpeNameId": "5FDD9C37-5F34-43FE-98FA-3D3D7ED73B6F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.12:*:*:*:*:*:*:*", "cpeNameId": "54D136A5-6D3A-4CF8-8ECD-0A4B3345ED61"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.13:*:*:*:*:*:*:*", "cpeNameId": "A1D987CD-234D-48E5-BC87-D5BDAB19AD8D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.14:*:*:*:*:*:*:*", "cpeNameId": "51407BCD-81B8-4C16-9246-F7AC5E654783"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.15:*:*:*:*:*:*:*", "cpeNameId": "E0851513-6D8C-45D5-AA02-1A897F200C76"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.16:*:*:*:*:*:*:*", "cpeNameId": "FBCFC7A2-8E0C-400E-9903-F88E27BC6692"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.17:*:*:*:*:*:*:*", "cpeNameId": "D83234B0-70C7-49E3-B041-458A4388E5F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.18:*:*:*:*:*:*:*", "cpeNameId": "7BFD121A-9AAE-4FA4-B4BB-79BCFC945942"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.19:*:*:*:*:*:*:*", "cpeNameId": "5CEF4F40-C180-4D35-BFBE-CE813D0DB03A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.20:*:*:*:*:*:*:*", "cpeNameId": "8629FDD2-5ACC-47D6-A355-161F5C9E9DE2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.21:*:*:*:*:*:*:*", "cpeNameId": "5FAA107F-2A9C-4F4A-ADB6-BDE37B733B3A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.22:*:*:*:*:*:*:*", "cpeNameId": "8425DCE9-412B-439B-BCFA-0296FCF4AC3B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.23:*:*:*:*:*:*:*", "cpeNameId": "2CAA00B8-15FB-49C3-8D03-4EAC237C0C30"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.24:*:*:*:*:*:*:*", "cpeNameId": "55BE846B-6D72-4890-A345-41A221706A91"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.25:*:*:*:*:*:*:*", "cpeNameId": "6E8595D6-1B26-48C0-8BB5-7AA9956DA2EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.26:*:*:*:*:*:*:*", "cpeNameId": "579C1BAF-C0BD-4A23-8220-878509BD4041"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.27:*:*:*:*:*:*:*", "cpeNameId": "918EEE53-3E32-4088-A31F-7706A0658354"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.28:*:*:*:*:*:*:*", "cpeNameId": "E5894A09-16F4-4390-9756-7B55B730A5C7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.29:*:*:*:*:*:*:*", "cpeNameId": "4A87BD1D-E5CA-4D1E-BC1C-866333AC8B70"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.30:*:*:*:*:*:*:*", "cpeNameId": "EA84BB70-A3D7-488F-B591-6F660E5F72D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.31:*:*:*:*:*:*:*", "cpeNameId": "099FB693-8DF2-40B8-987C-638A2B85F830"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.32:*:*:*:*:*:*:*", "cpeNameId": "5A2E5E92-E0A5-4B86-979F-C06CBC9AF59E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.33:*:*:*:*:*:*:*", "cpeNameId": "4D00786A-3089-4F53-9833-D854D82A886A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.34:*:*:*:*:*:*:*", "cpeNameId": "394E558D-3CCA-4443-81A4-464D00F1796F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.35:*:*:*:*:*:*:*", "cpeNameId": "244B5E4B-3CCC-469E-BC89-424CC37562E5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.36:*:*:*:*:*:*:*", "cpeNameId": "A25A0D88-A1D0-44DD-9C59-0EC251F83B79"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.37:*:*:*:*:*:*:*", "cpeNameId": "FFD0F957-52D3-47DB-9B9B-9D40AB55A9E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.38:*:*:*:*:*:*:*", "cpeNameId": "A7384483-B54D-422E-BD1C-47B466DF7808"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.39:*:*:*:*:*:*:*", "cpeNameId": "BD0A672F-9FD5-470F-91C8-77E96F4B3741"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.40:*:*:*:*:*:*:*", "cpeNameId": "29E4B4C2-838C-48BD-B509-576D1E26C738"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.41:*:*:*:*:*:*:*", "cpeNameId": "C139FA8B-93DA-4053-B303-A3C1DC1382FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.42:*:*:*:*:*:*:*", "cpeNameId": "BF0F83BA-BD56-4364-B55F-EE486FFD9897"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.43:*:*:*:*:*:*:*", "cpeNameId": "37F54B64-6DB3-410B-9795-F9468CCD37D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.44:*:*:*:*:*:*:*", "cpeNameId": "A2813E22-3300-4145-9AF5-091D4FB91EDE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.45:*:*:*:*:*:*:*", "cpeNameId": "E862B1DC-542D-4E20-BEDE-89AC2B3B5D7F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.46:*:*:*:*:*:*:*", "cpeNameId": "940E4409-174B-45E7-B73A-69D72C14D42E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.47:*:*:*:*:*:*:*", "cpeNameId": "2E917523-B369-4B0C-B2FE-330ABAF30D9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.48:*:*:*:*:*:*:*", "cpeNameId": "7AE6B80A-97F9-46E1-91BF-10C5CFE9F291"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.49:*:*:*:*:*:*:*", "cpeNameId": "6C3E0D45-EDD1-48D6-B60C-99C23C609BB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.50:*:*:*:*:*:*:*", "cpeNameId": "3DB32BBC-2AFB-4C81-AB59-6F8C3BA243E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.51:*:*:*:*:*:*:*", "cpeNameId": "5AC8AA4E-C62F-4E70-9E99-6FDC429D2E4E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.52:*:*:*:*:*:*:*", "cpeNameId": "D833500B-5B7B-4D77-980F-A92A0E26CE6B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.53:*:*:*:*:*:*:*", "cpeNameId": "19E0C2D7-36FA-461C-B763-F0B8DBF346A7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.54:*:*:*:*:*:*:*", "cpeNameId": "CD384F60-5A3F-4B0C-A5A2-3ECEA68BB813"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.55:*:*:*:*:*:*:*", "cpeNameId": "768733C9-E2A4-4C01-8956-5FB868E592E3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.56:*:*:*:*:*:*:*", "cpeNameId": "0FC6F402-E917-4E7F-8D83-3D22EF171CAB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.57:*:*:*:*:*:*:*", "cpeNameId": "E8BCDBFF-F548-45B0-9AF9-3FB4B1E38539"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.58:*:*:*:*:*:*:*", "cpeNameId": "E8B92EC7-BB1E-4A65-A431-3125DA3DF1DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.59:*:*:*:*:*:*:*", "cpeNameId": "5C514FE3-ED8D-4DEA-874A-4B61A7578749"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.60:*:*:*:*:*:*:*", "cpeNameId": "215F5625-C874-4841-82C5-AE4A9E6ED912"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.61:*:*:*:*:*:*:*", "cpeNameId": "764780E0-FF24-42A3-A99B-CE11CB846C95"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.62:*:*:*:*:*:*:*", "cpeNameId": "5C2774B8-AF4C-4A7B-BBF4-9516ABF4B4E9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.63:*:*:*:*:*:*:*", "cpeNameId": "BC276565-052E-41EF-9F0F-7ECD9D9678BE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.64:*:*:*:*:*:*:*", "cpeNameId": "DB256AAF-90E8-463A-8C21-D57CC6368D0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.65:*:*:*:*:*:*:*", "cpeNameId": "C9A9E342-DEBC-44E6-82F3-3CCBCBD1F565"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.66:*:*:*:*:*:*:*", "cpeNameId": "68B83B2F-DA58-4442-A4E4-5EFBD7DA2E64"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.67:*:*:*:*:*:*:*", "cpeNameId": "FBD55969-6EB5-4ED7-AD05-1D03D728B999"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.68:*:*:*:*:*:*:*", "cpeNameId": "5A5B47CF-90B7-4BEF-B5AE-EE4FED51E095"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.69:*:*:*:*:*:*:*", "cpeNameId": "0ADD17CA-B3B5-4F53-B4F4-ED079642A461"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.70:*:*:*:*:*:*:*", "cpeNameId": "6F29E18D-63C6-4544-A0E7-92F17EB3ACFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.71:*:*:*:*:*:*:*", "cpeNameId": "A7455D5B-D8E2-4CBE-BF3D-D3CF1A6004FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.72:*:*:*:*:*:*:*", "cpeNameId": "91A1363B-FA51-4A72-AD5E-3784118C73E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.73:*:*:*:*:*:*:*", "cpeNameId": "7C1AD665-9759-452D-86AA-C903E4225BA7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.74:*:*:*:*:*:*:*", "cpeNameId": "7058C57F-5141-4FAC-932A-BDDF0F20C78A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.75:*:*:*:*:*:*:*", "cpeNameId": "2F7FAD3F-6381-42EE-B130-D942FAC1AED0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.76:*:*:*:*:*:*:*", "cpeNameId": "4F7988C5-FA25-4C7C-B0DC-5C084A8CA6DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.77:*:*:*:*:*:*:*", "cpeNameId": "9F7ABB2D-A627-40C5-BC86-9BC9BBBEDBB9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.78:*:*:*:*:*:*:*", "cpeNameId": "71DE43EB-3996-47C3-963A-B93C9E6C6142"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.79:*:*:*:*:*:*:*", "cpeNameId": "191F54D4-44BC-49D5-8FB9-5DFFD648B9F7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.80:*:*:*:*:*:*:*", "cpeNameId": "14B574EE-69F8-4E87-9017-91CBFDAEC743"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.81:*:*:*:*:*:*:*", "cpeNameId": "94E966D4-1DB0-4695-98DA-A28CB90D32EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.82:*:*:*:*:*:*:*", "cpeNameId": "8D92799A-0542-4509-923F-6006E116D1BE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.83:*:*:*:*:*:*:*", "cpeNameId": "C2EF5D53-F86A-4D8A-AB79-DD6491B257F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.84:*:*:*:*:*:*:*", "cpeNameId": "61BB8657-3718-4355-BAA8-92F84B14D1A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.85:*:*:*:*:*:*:*", "cpeNameId": "A599E08D-FD19-4E86-A335-C107B0C6CB0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.86:*:*:*:*:*:*:*", "cpeNameId": "324E1D15-3D11-4683-9B0A-D3BA95E6B7C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.87:*:*:*:*:*:*:*", "cpeNameId": "D320A094-647B-4DC5-83FB-BC79A60AAE61"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.88:*:*:*:*:*:*:*", "cpeNameId": "407DC4FD-0E42-48C0-8A16-07F5CB7F308F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.89:*:*:*:*:*:*:*", "cpeNameId": "2DCEF9A6-CB07-404E-ADCC-E2BD0F69354D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.90:*:*:*:*:*:*:*", "cpeNameId": "CD2E5E6E-F436-4447-BB45-4CA1EBCC1F0F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.91:*:*:*:*:*:*:*", "cpeNameId": "D5909F53-54F8-4E30-87B2-E5B74AEEF668"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.92:*:*:*:*:*:*:*", "cpeNameId": "825880D5-240B-4E5E-88D7-9FBE9377D725"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.93:*:*:*:*:*:*:*", "cpeNameId": "C34961F8-366C-44F9-884F-D95ED75D74E9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.94:*:*:*:*:*:*:*", "cpeNameId": "49338264-F467-4F72-851C-41E72F2E8849"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.95:*:*:*:*:*:*:*", "cpeNameId": "D583DD92-8DB8-4D08-8F84-FEACBF885E5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.96:*:*:*:*:*:*:*", "cpeNameId": "ABD92EA7-61F0-4324-AD60-18A4A9E0345B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.97:*:*:*:*:*:*:*", "cpeNameId": "9CA68F01-482D-4C81-9FAF-8FCB3F4EB631"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.98:*:*:*:*:*:*:*", "cpeNameId": "DB87B10B-0B00-43E6-9712-B7749C08C5B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.99:*:*:*:*:*:*:*", "cpeNameId": "FA3EF181-E416-4607-B59D-A6CEA2D95875"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.100:*:*:*:*:*:*:*", "cpeNameId": "92234FA1-8B41-45EB-BADB-32779B7E4E3C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.101:*:*:*:*:*:*:*", "cpeNameId": "2965F5F4-6322-4A74-BE47-C1E4FF4E4BB3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.102:*:*:*:*:*:*:*", "cpeNameId": "D936A06E-46B7-44F1-AEA1-6C899F68E2DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.103:*:*:*:*:*:*:*", "cpeNameId": "C3564FF2-0B2D-42BF-AA29-3AAF57DF9D0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.104:*:*:*:*:*:*:*", "cpeNameId": "CEF383F0-D9F1-4948-B102-C491944BECBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.105:*:*:*:*:*:*:*", "cpeNameId": "BC26835E-2E39-465E-B48C-E871C740CB06"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.106:*:*:*:*:*:*:*", "cpeNameId": "2142A9D9-E547-4FE9-BDA3-B7B27D3CEF4D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.107:*:*:*:*:*:*:*", "cpeNameId": "9F7EB5C3-3C76-4816-BB64-A0D47A8FF148"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.108:*:*:*:*:*:*:*", "cpeNameId": "A0B4BCED-0919-484E-B64A-2D6F944128BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.109:*:*:*:*:*:*:*", "cpeNameId": "14C4B1A8-4457-4620-A2F4-A7BAAB479E01"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.110:*:*:*:*:*:*:*", "cpeNameId": "08F57941-7A99-4F2F-982B-54B72CA90ECA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.111:*:*:*:*:*:*:*", "cpeNameId": "F75C660D-8C20-4B05-BAB3-2D3BEF6EBC9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.112:*:*:*:*:*:*:*", "cpeNameId": "82BF8B3E-D66C-40EF-B175-1E5A2466D997"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.113:*:*:*:*:*:*:*", "cpeNameId": "CF72EDAE-B29A-4A22-BF70-8FD89123C957"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.114:*:*:*:*:*:*:*", "cpeNameId": "86E6F51B-573A-4DB5-99FA-BB89A65DD613"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.115:*:*:*:*:*:*:*", "cpeNameId": "63567DC6-8639-44B7-BDBC-C600977ECD7C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.116:*:*:*:*:*:*:*", "cpeNameId": "7A6E8D0B-1EF6-4080-A3AD-45CD2B6C35AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.117:*:*:*:*:*:*:*", "cpeNameId": "AD8652AE-1F37-43B4-BC34-39F852FD3301"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.119:*:*:*:*:*:*:*", "cpeNameId": "3E564E16-38CA-428F-98CC-5F14B13A30CB"}]}} \ No newline at end of file diff --git a/cpematch/17/17129BBF-25EA-4A2B-9C5D-C6A139CD49BF.json b/cpematch/17/17129BBF-25EA-4A2B-9C5D-C6A139CD49BF.json index d4f9971524e..94322124892 100644 --- a/cpematch/17/17129BBF-25EA-4A2B-9C5D-C6A139CD49BF.json +++ b/cpematch/17/17129BBF-25EA-4A2B-9C5D-C6A139CD49BF.json @@ -1 +1 @@ -{"matchString": {"matchCriteriaId": "17129BBF-25EA-4A2B-9C5D-C6A139CD49BF", "criteria": "cpe:2.3:a:wpmet:elementskit:*:*:*:*:pro:wordpress:*:*", "versionEndIncluding": "3.6.0", "lastModified": "2025-01-07T22:16:39.977", "cpeLastModified": "2025-01-07T22:16:39.977", "created": "2025-01-07T22:16:39.977", "status": "Active", "matches": [{"cpeName": "cpe:2.3:a:wpmet:elementskit:-:*:*:*:pro:wordpress:*:*", "cpeNameId": "5AC5DDCD-C5E4-46B6-9D50-97C74EAB4437"}]}} \ No newline at end of file +{"matchString": {"matchCriteriaId": "17129BBF-25EA-4A2B-9C5D-C6A139CD49BF", "criteria": "cpe:2.3:a:wpmet:elementskit:*:*:*:*:pro:wordpress:*:*", "versionEndIncluding": "3.6.0", "lastModified": "2025-01-09T18:48:35.567", "cpeLastModified": "2025-01-09T18:48:35.567", "created": "2025-01-07T22:16:39.977", "status": "Active", "matches": [{"cpeName": "cpe:2.3:a:wpmet:elementskit:-:*:*:*:pro:wordpress:*:*", "cpeNameId": "5AC5DDCD-C5E4-46B6-9D50-97C74EAB4437"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit:2.3.6:*:*:*:pro:wordpress:*:*", "cpeNameId": "54B1AB4B-A68B-4330-93B7-9C7908D85D72"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit:2.6.4:*:*:*:pro:wordpress:*:*", "cpeNameId": "4C582DB4-CECC-46EF-9409-201DBA60724D"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit:3.6.0:*:*:*:pro:wordpress:*:*", "cpeNameId": "F4C1F0C2-BB36-44E2-828B-6CBD2BF6CCB3"}]}} \ No newline at end of file diff --git a/cpematch/24/24FC80C6-13D4-41E1-8D95-275A045A775A.json b/cpematch/24/24FC80C6-13D4-41E1-8D95-275A045A775A.json index b7ec6495517..93abf8403b8 100644 --- a/cpematch/24/24FC80C6-13D4-41E1-8D95-275A045A775A.json +++ b/cpematch/24/24FC80C6-13D4-41E1-8D95-275A045A775A.json @@ -1 +1 @@ -{"matchString": {"matchCriteriaId": "24FC80C6-13D4-41E1-8D95-275A045A775A", "criteria": "cpe:2.3:a:wpmet:elementskit:*:*:*:*:pro:wordpress:*:*", "versionEndExcluding": "3.6.3", "lastModified": "2024-10-17T14:01:42.273", "cpeLastModified": "2024-10-17T14:01:42.273", "created": "2024-08-07T15:59:27.583", "status": "Active", "matches": [{"cpeName": "cpe:2.3:a:wpmet:elementskit:-:*:*:*:pro:wordpress:*:*", "cpeNameId": "5AC5DDCD-C5E4-46B6-9D50-97C74EAB4437"}]}} \ No newline at end of file +{"matchString": {"matchCriteriaId": "24FC80C6-13D4-41E1-8D95-275A045A775A", "criteria": "cpe:2.3:a:wpmet:elementskit:*:*:*:*:pro:wordpress:*:*", "versionEndExcluding": "3.6.3", "lastModified": "2024-10-17T14:01:42.273", "cpeLastModified": "2025-01-09T18:48:35.567", "created": "2024-08-07T15:59:27.583", "status": "Active", "matches": [{"cpeName": "cpe:2.3:a:wpmet:elementskit:-:*:*:*:pro:wordpress:*:*", "cpeNameId": "5AC5DDCD-C5E4-46B6-9D50-97C74EAB4437"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit:2.3.6:*:*:*:pro:wordpress:*:*", "cpeNameId": "54B1AB4B-A68B-4330-93B7-9C7908D85D72"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit:2.6.4:*:*:*:pro:wordpress:*:*", "cpeNameId": "4C582DB4-CECC-46EF-9409-201DBA60724D"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit:3.6.0:*:*:*:pro:wordpress:*:*", "cpeNameId": "F4C1F0C2-BB36-44E2-828B-6CBD2BF6CCB3"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit:3.6.1:*:*:*:pro:wordpress:*:*", "cpeNameId": "0BF9B631-428E-4347-B9FB-31D64A00EFE8"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit:3.6.2:*:*:*:pro:wordpress:*:*", "cpeNameId": "6A077D6D-F089-4555-9EAB-93F2592339B6"}]}} \ No newline at end of file diff --git a/cpematch/2B/2BBFF06A-6037-47B4-A3CF-B6B0F51D3491.json b/cpematch/2B/2BBFF06A-6037-47B4-A3CF-B6B0F51D3491.json new file mode 100644 index 00000000000..928635be1c5 --- /dev/null +++ b/cpematch/2B/2BBFF06A-6037-47B4-A3CF-B6B0F51D3491.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "2BBFF06A-6037-47B4-A3CF-B6B0F51D3491", "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.3", "versionEndExcluding": "5.4.288", "lastModified": "2025-01-09T19:26:10.360", "cpeLastModified": "2025-01-09T19:26:10.360", "created": "2025-01-09T19:26:10.360", "status": "Active", "matches": [{"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3:*:*:*:*:*:*:*", "cpeNameId": "4C56AF79-C2B9-4C63-A51E-9D4CB7529269"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3:-:*:*:*:*:*:*", "cpeNameId": "216C7567-C83B-4498-B0CD-46431830482F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3:rc1:*:*:*:*:*:*", "cpeNameId": "3165F23C-852B-45C1-B6FA-188E656427A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3:rc2:*:*:*:*:*:*", "cpeNameId": "17CD7EFE-3E88-45D0-AC88-B03B00A4A0E9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3:rc3:*:*:*:*:*:*", "cpeNameId": "063AFF14-AB8B-4D13-8BFC-AF437607AE59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3:rc4:*:*:*:*:*:*", "cpeNameId": "DA6C4271-F035-42BD-A918-49966E65D9DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3:rc5:*:*:*:*:*:*", "cpeNameId": "260917D4-E4F2-4870-B50B-A942D3E00035"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3:rc6:*:*:*:*:*:*", "cpeNameId": "E2B66DF7-767D-4223-986E-018BE688F462"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3:rc7:*:*:*:*:*:*", "cpeNameId": "322E8592-6A21-4496-8DD7-F0E90FB0B08D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3.1:*:*:*:*:*:*:*", "cpeNameId": "D542D5ED-4CF2-4408-A91F-FA978B1C5334"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3.2:*:*:*:*:*:*:*", "cpeNameId": "271CBB6E-85D1-4ED7-958A-9ADF338CCB88"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3.3:*:*:*:*:*:*:*", "cpeNameId": "DFFF6BEB-FB02-424F-B4DA-DEE049E81395"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3.4:*:*:*:*:*:*:*", "cpeNameId": "A08B75A7-1E6E-4B08-B2F6-D25FC72C3E7A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3.5:*:*:*:*:*:*:*", "cpeNameId": "6A018015-0114-490B-80FC-B588B1F13E5F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3.6:*:*:*:*:*:*:*", "cpeNameId": "FC6A036B-228C-4A5D-A41E-A36CF4BEB971"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3.7:*:*:*:*:*:*:*", "cpeNameId": "BC9B3FC7-EC05-42E5-BBEC-CBA38E38BD5E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.3.8:*:*:*:*:*:*:*", "cpeNameId": "3D1A21A4-5D3D-4FCD-8021-51F2E62F8719"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4:*:*:*:*:*:*:*", "cpeNameId": "7F9645DF-BD4B-4479-BD61-A818171E36D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4:-:*:*:*:*:*:*", "cpeNameId": "5C315BD5-D56F-498D-B5FC-77B6A6AF2571"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4:rc1:*:*:*:*:*:*", "cpeNameId": "9C50F743-0E91-4E50-B542-1DB40389CCFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4:rc2:*:*:*:*:*:*", "cpeNameId": "C7693E1E-3F4A-4B31-84DA-C32CC0A6B4A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4:rc3:*:*:*:*:*:*", "cpeNameId": "B869F0C3-5462-4A49-9C04-91717DAEBE48"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4:rc4:*:*:*:*:*:*", "cpeNameId": "9169DD50-1F78-4AB2-AF6A-9A87A55CD5F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4:rc5:*:*:*:*:*:*", "cpeNameId": "6DFDA097-AE0D-4C22-A612-6B43191ED494"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4:rc6:*:*:*:*:*:*", "cpeNameId": "A2A13DB3-7362-432E-9956-47476E3C8594"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4:rc7:*:*:*:*:*:*", "cpeNameId": "F7DC5C7C-F1E4-4876-BB23-5AE2E0837698"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.1:*:*:*:*:*:*:*", "cpeNameId": "9C88F8A3-ECCB-428C-A8C5-B9952B20B8EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.2:*:*:*:*:*:*:*", "cpeNameId": "0BBD2F2B-55D2-4E99-A64D-85552721CF89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.3:*:*:*:*:*:*:*", "cpeNameId": "3BFBDB35-0D9A-4AED-BC40-130C68E136E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.4:*:*:*:*:*:*:*", "cpeNameId": "8B78F0EB-512E-4DF3-BBB0-B863DE170D9B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.5:*:*:*:*:*:*:*", "cpeNameId": "6EC99C95-4E8A-4204-89A6-D55C83C78499"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.6:*:*:*:*:*:*:*", "cpeNameId": "58DB20D4-AD22-4075-9CC5-C4B2B758491C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.7:*:*:*:*:*:*:*", "cpeNameId": "42125DFB-604A-4336-BB50-FB32DBF2CDB2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.8:*:*:*:*:*:*:*", "cpeNameId": "BEC6A864-F607-43DC-9A5C-6C9881A1638E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.9:*:*:*:*:*:*:*", "cpeNameId": "ADE87835-B344-47B2-8734-3BCA1035C217"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.10:*:*:*:*:*:*:*", "cpeNameId": "847E7314-8B34-4579-B3D5-D9D742132804"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.11:*:*:*:*:*:*:*", "cpeNameId": "C47995DE-5F8C-41A6-AD25-656557A3851C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.12:*:*:*:*:*:*:*", "cpeNameId": "2E13CD82-764F-45B1-BD27-BD9BA15D9AC6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.13:*:*:*:*:*:*:*", "cpeNameId": "E892C72B-87E4-48C9-9425-2A40B8235644"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.14:*:*:*:*:*:*:*", "cpeNameId": "912F5A2C-795B-4A15-B3CD-DF691594C2A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.15:*:*:*:*:*:*:*", "cpeNameId": "3B4AC1FF-B222-4844-8AE1-9FA1685FA572"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.16:*:*:*:*:*:*:*", "cpeNameId": "66D514ED-5C2D-416B-B169-67B838575459"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.17:*:*:*:*:*:*:*", "cpeNameId": "48DFA50A-628C-4C55-961D-ABF2052B406B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.18:*:*:*:*:*:*:*", "cpeNameId": "E58E0E22-013B-43A0-8B3E-5E8854DDD393"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.19:*:*:*:*:*:*:*", "cpeNameId": "77E923D8-A9BC-42BD-8C28-CBF54959A042"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.20:*:*:*:*:*:*:*", "cpeNameId": "19FAA1FA-B770-4D3D-8FFA-CF117BF8FEC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.21:*:*:*:*:*:*:*", "cpeNameId": "1FD4A547-6D4D-483F-892A-DB616570302F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.22:*:*:*:*:*:*:*", "cpeNameId": "4533F044-1645-47CD-BD31-A7700CB4EE52"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.23:*:*:*:*:*:*:*", "cpeNameId": "755BD5E1-FC72-42F6-8C5C-40E449F32E0D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.24:*:*:*:*:*:*:*", "cpeNameId": "85CE79D8-3F06-40DE-B5EA-A99E9257D388"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.25:*:*:*:*:*:*:*", "cpeNameId": "D7CD3755-1AEE-41DA-BB81-AEAB2A339000"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.26:*:*:*:*:*:*:*", "cpeNameId": "BA83EAD2-B9D6-4AA6-B332-4D70AB1CE85C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.27:*:*:*:*:*:*:*", "cpeNameId": "725D03ED-1B8B-4F7F-94DE-D163679B25A6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.28:*:*:*:*:*:*:*", "cpeNameId": "7B46EA94-4CEA-413A-B300-4BC8207D587E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.29:*:*:*:*:*:*:*", "cpeNameId": "613792CE-5F01-4ECD-9273-74E35A76DACA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.30:*:*:*:*:*:*:*", "cpeNameId": "16DDCFE6-2FB0-4ADE-B11D-297DD2135CF1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.31:*:*:*:*:*:*:*", "cpeNameId": "74B55E1A-5C97-49F4-84B4-281E7C53EA9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.32:*:*:*:*:*:*:*", "cpeNameId": "732DD130-EDEF-48B4-AD0F-12010B578C01"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.33:*:*:*:*:*:*:*", "cpeNameId": "18F2FE88-3208-4608-AE5C-3443C0D03E0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.34:*:*:*:*:*:*:*", "cpeNameId": "DC0A746D-3887-488F-A374-EF35CBC969D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.35:*:*:*:*:*:*:*", "cpeNameId": "B46CD7B2-4950-4D52-BDD2-817DCC9D13EC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.36:*:*:*:*:*:*:*", "cpeNameId": "EB53E610-E9E2-4B1F-9816-2CEE82CCC4DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.37:*:*:*:*:*:*:*", "cpeNameId": "7380EA90-66F0-4EA0-B861-12AE47C28F9C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.38:*:*:*:*:*:*:*", "cpeNameId": "606E3372-BAE9-48A8-BC16-866AAB02533A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.39:*:*:*:*:*:*:*", "cpeNameId": "A1B8D27F-3388-4370-B95B-7568B6BA975E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.40:*:*:*:*:*:*:*", "cpeNameId": "9D346BC6-FFA5-473E-ACFD-DAC361B91C5A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.41:*:*:*:*:*:*:*", "cpeNameId": "268803F9-54B1-4A2E-A2F2-4CC26E6A84C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.42:*:*:*:*:*:*:*", "cpeNameId": "0904F99F-9733-447C-BF7E-FEBD996E5877"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.43:*:*:*:*:*:*:*", "cpeNameId": "D21701F8-F7C2-4916-A60D-AD66082E64E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.44:*:*:*:*:*:*:*", "cpeNameId": "8C57B372-D510-41A1-B427-0A796F78B306"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.45:*:*:*:*:*:*:*", "cpeNameId": "1B6AA52B-3A5F-4FA5-873D-00D3E3656401"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.46:*:*:*:*:*:*:*", "cpeNameId": "7DEE950A-5E8D-469E-8441-0CD012D6CD4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.47:*:*:*:*:*:*:*", "cpeNameId": "DA2E3BEC-E551-4742-BD82-5BC5E47EBE75"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.48:*:*:*:*:*:*:*", "cpeNameId": "1EDB923A-9B3C-46CE-976C-150970DDCF32"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.49:*:*:*:*:*:*:*", "cpeNameId": "A47A980A-97AC-40B9-AD50-1DA77D0A020B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.50:*:*:*:*:*:*:*", "cpeNameId": "730CBC8B-0C78-4C84-AFBE-D105CBD5C0F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.51:*:*:*:*:*:*:*", "cpeNameId": "A306D9A3-48CC-4DDC-99CC-E2D8183335DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.52:*:*:*:*:*:*:*", "cpeNameId": "EAC93D54-6A08-4475-B196-85F6673B3B6E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.53:*:*:*:*:*:*:*", "cpeNameId": "F5B7DFA5-C039-40CC-82D0-2916C7F971B6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.54:*:*:*:*:*:*:*", "cpeNameId": "786F2688-E780-46C4-8177-D9CABFC4AA9A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.55:*:*:*:*:*:*:*", "cpeNameId": "3B8D1625-531A-4A51-8567-142C05E10F6B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.56:*:*:*:*:*:*:*", "cpeNameId": "8385A08A-3F7B-43F8-8757-1667E3A28F42"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.57:*:*:*:*:*:*:*", "cpeNameId": "B21C66D5-9C50-403B-BAE5-98D1F1D7001E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.58:*:*:*:*:*:*:*", "cpeNameId": "AAB1ABC2-DCE1-4550-B433-C2B1B419B330"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.59:*:*:*:*:*:*:*", "cpeNameId": "A2D32DA0-65C4-4274-A0FD-E8220E6B407D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.60:*:*:*:*:*:*:*", "cpeNameId": "6B960E11-5BB3-4E40-AE5F-90CFB7F2980B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.61:*:*:*:*:*:*:*", "cpeNameId": "257F2EE3-72EF-4629-94A4-F01A901E85D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.62:*:*:*:*:*:*:*", "cpeNameId": "F128274D-5BF9-45BE-9C1E-3B08DF64E504"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.63:*:*:*:*:*:*:*", "cpeNameId": "EB67B16A-E5A8-4DAE-A8F6-6CD9189F95A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.64:*:*:*:*:*:*:*", "cpeNameId": "21587FC1-355D-4B3F-A06D-DD171F1C62AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.65:*:*:*:*:*:*:*", "cpeNameId": "3B826B1E-86CA-420D-8929-50E4BCAB927C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.66:*:*:*:*:*:*:*", "cpeNameId": "004E1589-DAFD-4B02-A65B-41814392F976"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.67:*:*:*:*:*:*:*", "cpeNameId": "9C287C03-7C7B-4567-ABD1-2860784AC063"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.68:*:*:*:*:*:*:*", "cpeNameId": "6CEEBDCA-447C-4D40-B1CF-1433091347D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.69:*:*:*:*:*:*:*", "cpeNameId": "B60431E1-FFBB-4708-A8E2-47D1BE957937"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.70:*:*:*:*:*:*:*", "cpeNameId": "AF905E35-EF7E-4F3A-B286-8202F6D883E9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.71:*:*:*:*:*:*:*", "cpeNameId": "1D7F6676-187E-4E98-816B-2D3ADD98271D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.72:*:*:*:*:*:*:*", "cpeNameId": "8D85776B-17BC-471E-A6C3-3405CEDEACC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.73:*:*:*:*:*:*:*", "cpeNameId": "58070F9F-FAC4-4033-A486-4275D7C14EAC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.74:*:*:*:*:*:*:*", "cpeNameId": "3908F399-E82F-4734-BFCC-DF569910954D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.75:*:*:*:*:*:*:*", "cpeNameId": "37F2005A-3B64-459E-BECF-5DDF3DC26198"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.76:*:*:*:*:*:*:*", "cpeNameId": "54E1E032-2977-43E0-A0E2-33EE4B8D605D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.77:*:*:*:*:*:*:*", "cpeNameId": "3CE3F6B9-7686-49FF-9E5D-A7FC5B22C04B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.78:*:*:*:*:*:*:*", "cpeNameId": "9A4F3A55-778F-4D01-BD21-BB057B317C80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.79:*:*:*:*:*:*:*", "cpeNameId": "A3B58A38-1DB3-425B-83CB-4D6E9B0D50CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.80:*:*:*:*:*:*:*", "cpeNameId": "013D0308-EFC0-48E6-ABE9-97E8677D7956"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.81:*:*:*:*:*:*:*", "cpeNameId": "C76DEE0E-3C76-4C34-AE57-4F269C0C8345"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.82:*:*:*:*:*:*:*", "cpeNameId": "E0ECA58C-8488-4280-8227-9FD106C4965D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.83:*:*:*:*:*:*:*", "cpeNameId": "B4592A01-0026-4F16-8862-E50EBED75F70"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.84:*:*:*:*:*:*:*", "cpeNameId": "A57E9CF5-FB3E-40F3-9C3F-2C5D3CD218A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.85:*:*:*:*:*:*:*", "cpeNameId": "6DA39A76-5294-44B8-A319-EC0B34E50AC1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.86:*:*:*:*:*:*:*", "cpeNameId": "A5C5F48A-B66E-4C7F-9FF2-C5F0A406CACE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.87:*:*:*:*:*:*:*", "cpeNameId": "2B757A0C-5A39-432A-9B8C-037BA527E46A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.88:*:*:*:*:*:*:*", "cpeNameId": "463F88B6-C5A7-4EE5-8FC4-8D7DE9BB2ADF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.89:*:*:*:*:*:*:*", "cpeNameId": "05E83609-D10C-43C4-82CC-F48ACFBA0C0E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.90:*:*:*:*:*:*:*", "cpeNameId": "AF639F1D-3DB5-4B65-A297-86F88DCEB6BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.91:*:*:*:*:*:*:*", "cpeNameId": "9BD75AFF-1561-4D4E-AEF7-08C63165754D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.92:*:*:*:*:*:*:*", "cpeNameId": "E43540C5-4034-4B55-9F86-EAD8C1B35822"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.93:*:*:*:*:*:*:*", "cpeNameId": "6A67D1C1-1FD3-4FDA-A30F-B9CF2557E49B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.94:*:*:*:*:*:*:*", "cpeNameId": "EE56E2B3-234B-428F-94CC-8284B83F0F80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.95:*:*:*:*:*:*:*", "cpeNameId": "7586CF73-B96D-40A6-B25A-CB257A3C0B1B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.96:*:*:*:*:*:*:*", "cpeNameId": "B3B099C7-C246-4260-BE85-5F4A32C48C8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.97:*:*:*:*:*:*:*", "cpeNameId": "226A5757-D8F7-464F-8061-3DFD1D7016F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.98:*:*:*:*:*:*:*", "cpeNameId": "8FD90207-404B-4137-A313-C80EF0209E29"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.99:*:*:*:*:*:*:*", "cpeNameId": "A0C62D21-AD27-457A-B628-B0FA831541FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.100:*:*:*:*:*:*:*", "cpeNameId": "22E87AE1-0C4D-481A-9AB6-122958F7B806"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.101:*:*:*:*:*:*:*", "cpeNameId": "5F633063-4C78-4FFE-9C72-DFE721C5B99D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.102:*:*:*:*:*:*:*", "cpeNameId": "644B6E4C-743F-4DDB-A586-AF5E6C336D22"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.103:*:*:*:*:*:*:*", "cpeNameId": "501E0F8B-5756-4E68-BEDA-3ABEA9EBECAC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.104:*:*:*:*:*:*:*", "cpeNameId": "67111E0D-8FA5-41D2-A1FE-96F1B3972EF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.105:*:*:*:*:*:*:*", "cpeNameId": "05B2F693-9415-403E-B362-3E90E78F5205"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.106:*:*:*:*:*:*:*", "cpeNameId": "7076EF21-2974-477F-A77F-028724B1ECF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.107:*:*:*:*:*:*:*", "cpeNameId": "CA13D9EC-2887-46B7-895C-E9FC341E03C9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.108:*:*:*:*:*:*:*", "cpeNameId": "434B3877-E6A2-433B-BAE5-71843920F36B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.109:*:*:*:*:*:*:*", "cpeNameId": "5E51C67B-8C45-4064-8260-480C281CBA63"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.110:*:*:*:*:*:*:*", "cpeNameId": "C34040E5-A03A-42A5-AF5B-F3DF66D0329F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.111:*:*:*:*:*:*:*", "cpeNameId": "8B9A38AA-B537-468D-8A06-3C4BB659EDEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.112:*:*:*:*:*:*:*", "cpeNameId": "C8F2983E-8CEE-474F-9B08-E9C13AD643D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.4.113:*:*:*:*:*:*:*", "cpeNameId": "A7A120EC-E789-4387-B8A3-FCB1DEAC68EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.5:*:*:*:*:*:*:*", "cpeNameId": "A5FD173E-DCE9-4A69-AFAB-4CD661963D1C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.5.1:*:*:*:*:*:*:*", "cpeNameId": "9B2B4A5A-182C-4EF3-9D8E-214596C544A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.5.2:*:*:*:*:*:*:*", "cpeNameId": "C76B49BF-115F-4134-BF91-EBB32275B777"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.5.3:*:*:*:*:*:*:*", "cpeNameId": "0A4A6E87-E6AA-4D67-B8AA-94C4024B4474"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.5.4:*:*:*:*:*:*:*", "cpeNameId": "D20FBE76-D905-4FDD-AC99-2F52A2BF36E4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.5.5:*:*:*:*:*:*:*", "cpeNameId": "5ED861D7-7EB8-497E-8D9C-7AC8A6BD5245"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.5.6:*:*:*:*:*:*:*", "cpeNameId": "F9C71974-A2F0-4B3D-8796-B8BD961BC536"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.5.7:*:*:*:*:*:*:*", "cpeNameId": "FE42B3DE-771E-4966-8642-AFC84050F1A9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6:*:*:*:*:*:*:*", "cpeNameId": "1A03B0CC-33D1-4F25-A957-2010FA603996"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6:-:*:*:*:*:*:*", "cpeNameId": "94EF24E5-AA7C-4277-B924-7F01A6E54EA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6:rc2:*:*:*:*:*:*", "cpeNameId": "BA0D05E0-1454-4C4F-9409-3DBAFC0ADF06"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6:rc3:*:*:*:*:*:*", "cpeNameId": "9191F237-1AB0-40B5-9AAF-04F6014FCDC4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6:rc4:*:*:*:*:*:*", "cpeNameId": "3CDE86D5-C3D3-4542-8F21-59142E917226"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6:rc5:*:*:*:*:*:*", "cpeNameId": "73692F50-41B2-415B-8861-6BC9B52A0AEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6:rc6:*:*:*:*:*:*", "cpeNameId": "105B97CB-41FC-45C9-A16C-EB81B3B5A329"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6:rc7:*:*:*:*:*:*", "cpeNameId": "F7C56EFA-52F1-42F7-9324-C4678DEF9F96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6.1:*:*:*:*:*:*:*", "cpeNameId": "A8A058FA-E4EE-416E-B539-00D8F5473CC6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6.2:*:*:*:*:*:*:*", "cpeNameId": "D5F87239-7A88-434F-9A9E-959FF775108E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6.3:*:*:*:*:*:*:*", "cpeNameId": "0BB0846D-DD56-4DE7-ABBC-B43558653DA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6.4:*:*:*:*:*:*:*", "cpeNameId": "B723EFC1-63BE-4D9A-A008-E02845D21C9A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6.5:*:*:*:*:*:*:*", "cpeNameId": "FB9206A1-D3F5-4400-82E6-34A78EAF67A0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6.6:*:*:*:*:*:*:*", "cpeNameId": "020B7DA4-CE48-49F2-991B-0DCB0AF4935A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6.7:*:*:*:*:*:*:*", "cpeNameId": "3606EADE-8161-4284-A09A-0FFA420DAE96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6.8:*:*:*:*:*:*:*", "cpeNameId": "6763F9A3-4305-41BF-946E-72CC19EE01F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6.9:*:*:*:*:*:*:*", "cpeNameId": "D2E19931-EB6A-4A08-9589-BBC4B2BA05E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6.10:*:*:*:*:*:*:*", "cpeNameId": "CD2E3A03-F96F-493D-9B0E-B96309D9AA93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.6.11:*:*:*:*:*:*:*", "cpeNameId": "A0E05409-4816-417B-A5B2-55F4BBBF45C2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.7:*:*:*:*:*:*:*", "cpeNameId": "12E1A3C4-D097-4545-B736-EB5C3A3A3887"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.7.1:*:*:*:*:*:*:*", "cpeNameId": "268526F8-8DBF-4883-8CE7-55CD76A58517"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.7.2:*:*:*:*:*:*:*", "cpeNameId": "B2A9865E-EDBE-452A-9E87-394FF9A4DD2E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.7.3:*:*:*:*:*:*:*", "cpeNameId": "91F07A30-7EF7-4870-86F8-D4E479920742"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.7.4:*:*:*:*:*:*:*", "cpeNameId": "16D48241-0C39-40FF-9BDD-FAC0AE667976"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.7.5:*:*:*:*:*:*:*", "cpeNameId": "4ACA5D3D-9862-46D6-8025-C8B2FBFD0C63"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.7.6:*:*:*:*:*:*:*", "cpeNameId": "A9A20F11-EA62-4A06-B773-E0E0CA1DB1D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.7.7:*:*:*:*:*:*:*", "cpeNameId": "DAC40CB3-B9AC-4DDC-AD0E-EFBAF468A80D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.7.8:*:*:*:*:*:*:*", "cpeNameId": "6DA3C651-639E-49B7-91A6-9352A51BB428"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.7.9:*:*:*:*:*:*:*", "cpeNameId": "43546599-BC37-4DDF-8692-717B4E3F9D04"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.7.10:*:*:*:*:*:*:*", "cpeNameId": "168DEBA5-591C-4BE5-B321-3432CF2FBE1A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8:*:*:*:*:*:*:*", "cpeNameId": "793FEE4E-6EB3-4AD3-8C35-45212DB9045D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.0:*:*:*:*:*:*:*", "cpeNameId": "0874112F-8BB6-4619-A940-6E6B71E792F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.1:*:*:*:*:*:*:*", "cpeNameId": "01FC3991-C111-44A7-808F-0278121EA54A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.2:*:*:*:*:*:*:*", "cpeNameId": "8811DE61-6DB4-4ADE-8F83-41A29664D527"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.3:*:*:*:*:*:*:*", "cpeNameId": "EC3384F9-D061-46C5-9774-76248C5ACE93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.4:*:*:*:*:*:*:*", "cpeNameId": "516830CB-D744-432F-92FE-763EDE2CA5F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.5:*:*:*:*:*:*:*", "cpeNameId": "43AAC1FC-42D7-4D1A-A963-CAB639DD8B00"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.6:*:*:*:*:*:*:*", "cpeNameId": "50313D29-F34E-4C0D-9144-484B999408DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.7:*:*:*:*:*:*:*", "cpeNameId": "5072B87F-09B0-417E-AD87-62C547BACCCC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.8:*:*:*:*:*:*:*", "cpeNameId": "0B3A862B-7B4A-4047-8B20-95188E30CC05"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.9:*:*:*:*:*:*:*", "cpeNameId": "C2049E4B-7E7F-4EE7-9BB1-521933C89D8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.10:*:*:*:*:*:*:*", "cpeNameId": "B409C2ED-789D-4ED8-A8CB-01600CAAA35E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.11:*:*:*:*:*:*:*", "cpeNameId": "D0A3901E-C3E7-42ED-802E-A62C1062B5B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.12:*:*:*:*:*:*:*", "cpeNameId": "85546B06-87AF-486E-8CC0-938579A020EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.8.13:*:*:*:*:*:*:*", "cpeNameId": "342CDE85-BF76-4CEB-8BA4-67ADC711496D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9:*:*:*:*:*:*:*", "cpeNameId": "C9009932-A990-4A1B-BE48-BED9A9A7FC65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9:-:*:*:*:*:*:*", "cpeNameId": "1CCCD217-0A7E-40A1-9520-617E661F1645"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9:rc1:*:*:*:*:*:*", "cpeNameId": "A7AE781E-2F1A-4C28-9CC5-476CE68CF1D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9:rc2:*:*:*:*:*:*", "cpeNameId": "5A29C44C-C923-4D5B-931C-0CE194896E8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9:rc3:*:*:*:*:*:*", "cpeNameId": "8793DB1D-710C-41A5-8BE4-895C45978720"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9:rc4:*:*:*:*:*:*", "cpeNameId": "A2345A72-55AE-4255-A7C4-73FDC8CDEF5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9:rc5:*:*:*:*:*:*", "cpeNameId": "EB60446B-804B-4948-B1B3-754169BD691E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9:rc6:*:*:*:*:*:*", "cpeNameId": "24401905-3848-4876-894C-45120BA6A0CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9:rc7:*:*:*:*:*:*", "cpeNameId": "2076878B-89D6-47D8-9572-9B9689FC2BEF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9.0:*:*:*:*:*:*:*", "cpeNameId": "169A5C5F-B455-4F6F-BF24-A312ECAFCE52"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9.1:*:*:*:*:*:*:*", "cpeNameId": "FCFDFA6F-C701-4BB1-8735-6C1F0E706C8B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9.2:*:*:*:*:*:*:*", "cpeNameId": "34F883C1-8869-4871-A2C2-7A4EBE52A72A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9.3:*:*:*:*:*:*:*", "cpeNameId": "F698940C-F9F2-4ED7-9AB5-4D5A2A3D7CE8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9.4:*:*:*:*:*:*:*", "cpeNameId": "3126DB9D-16C5-48EB-8548-304D58230779"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9.5:*:*:*:*:*:*:*", "cpeNameId": "01A51FAA-3D22-4445-9C47-192575EEA608"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9.6:*:*:*:*:*:*:*", "cpeNameId": "750F5059-2C73-4554-9789-1D880CA5DEE7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9.7:*:*:*:*:*:*:*", "cpeNameId": "D928DDB6-091C-4CA2-804C-390334A896B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9.8:*:*:*:*:*:*:*", "cpeNameId": "4EEC2898-AB1B-482B-AFC9-4849B0140622"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9.9:*:*:*:*:*:*:*", "cpeNameId": "D1ADF9CE-CF40-44B5-A7D1-82EEAA8FCBB9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9.10:*:*:*:*:*:*:*", "cpeNameId": "73EAE99F-3F30-429A-8C6D-22AB052D61AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.9.11:*:*:*:*:*:*:*", "cpeNameId": "58920DA7-409B-42BB-932E-76F0BE199BD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10:*:*:*:*:*:*:*", "cpeNameId": "627457F8-5AC8-4B56-90A8-F5817CEA1A02"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10:-:*:*:*:*:*:*", "cpeNameId": "B5D985BC-815C-4878-890F-A3CACB0B2C04"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10:rc1:*:*:*:*:*:*", "cpeNameId": "2B6DFE57-F18D-4466-8009-E56C1322A73B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10:rc2:*:*:*:*:*:*", "cpeNameId": "76E6C370-1859-4C7D-B9C3-C461D4932777"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10:rc3:*:*:*:*:*:*", "cpeNameId": "15784D14-3246-468A-8294-6B24FF62FDA8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10:rc4:*:*:*:*:*:*", "cpeNameId": "EB4B221D-C82B-4A7B-9143-25F7EA059041"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10:rc5:*:*:*:*:*:*", "cpeNameId": "A0635D56-7D89-4FE8-94DC-5E62E64EF17D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10:rc6:*:*:*:*:*:*", "cpeNameId": "CC3F67C3-CA69-4A13-8ACF-FC21990D5FAA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10:rc7:*:*:*:*:*:*", "cpeNameId": "5D39315F-8D24-4FCF-90B9-6E9369644DBE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.1:*:*:*:*:*:*:*", "cpeNameId": "36E0C37B-1059-4ECE-A8A8-4E7085ECB47E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.2:*:*:*:*:*:*:*", "cpeNameId": "36540352-DC52-4A5E-8E8C-9D05136A05BA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.3:*:*:*:*:*:*:*", "cpeNameId": "42630BB7-77F6-4E7E-8C9F-10D082BE9C86"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.4:*:*:*:*:*:*:*", "cpeNameId": "E35AB549-17AC-49BF-8ED9-15669310F079"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.5:*:*:*:*:*:*:*", "cpeNameId": "BDBF9D93-EFD8-4A4E-81C9-0F0C75FC16A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.6:*:*:*:*:*:*:*", "cpeNameId": "610F682A-AF20-4B5D-AA11-4F42C35B76D6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.7:*:*:*:*:*:*:*", "cpeNameId": "ADD79206-8D78-4BE9-B026-B1F822CDE556"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.8:*:*:*:*:*:*:*", "cpeNameId": "6F974AC6-0755-4F37-8412-02C361FEFB12"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.9:*:*:*:*:*:*:*", "cpeNameId": "890670E2-6785-47F4-86DE-93B58D48B91E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.10:*:*:*:*:*:*:*", "cpeNameId": "CE332AF0-A825-4216-B40B-930150C5CDF6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.11:*:*:*:*:*:*:*", "cpeNameId": "3E14F0B1-F85F-470B-B3DC-348B4784E611"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.12:*:*:*:*:*:*:*", "cpeNameId": "8D5DC9C4-BC9C-408F-AB6E-B71546668696"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.13:*:*:*:*:*:*:*", "cpeNameId": "25D38678-6147-4568-8FCC-CC82359417D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.14:*:*:*:*:*:*:*", "cpeNameId": "4EB118D0-AE6E-44C9-9969-CF2294698B06"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.15:*:*:*:*:*:*:*", "cpeNameId": "0A0706BE-9D8C-4781-B317-F73AFB379711"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.16:*:*:*:*:*:*:*", "cpeNameId": "64EE6331-F08C-4AD1-96F8-AB203BD22BFA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.17:*:*:*:*:*:*:*", "cpeNameId": "815A07AB-2704-473B-8438-AE69C1068040"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.18:*:*:*:*:*:*:*", "cpeNameId": "DBD88C4C-3287-43EE-ACB7-E5048E733D9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.19:*:*:*:*:*:*:*", "cpeNameId": "85991037-0786-4EED-81E7-6891E7A8DC2D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.20:*:*:*:*:*:*:*", "cpeNameId": "1403FE7F-53BC-4C3A-A0A6-0F284E097303"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.21:*:*:*:*:*:*:*", "cpeNameId": "7625E253-3F26-4923-9690-002AC4F18351"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.22:*:*:*:*:*:*:*", "cpeNameId": "55C8CD03-5BC7-48AE-AEF8-491EC0CCFBE8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.23:*:*:*:*:*:*:*", "cpeNameId": "DDBF32C8-F3C1-4FDD-94EC-2CB12DDD301A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.24:*:*:*:*:*:*:*", "cpeNameId": "F71917E6-D98D-4017-9410-E250F98E5150"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.25:*:*:*:*:*:*:*", "cpeNameId": "D1DB0CB7-8777-4FFA-BDA7-0E905821248D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.26:*:*:*:*:*:*:*", "cpeNameId": "5C216138-ADC4-4B4B-832A-0D5F45CB8601"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.27:*:*:*:*:*:*:*", "cpeNameId": "C0842F91-5527-418E-893E-2815B0B25B12"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.28:*:*:*:*:*:*:*", "cpeNameId": "455FB880-6681-4F6E-B7EE-DAB35E68ED00"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.29:*:*:*:*:*:*:*", "cpeNameId": "7ECF8E96-BB6C-48A1-A939-CAF7EEF01DAA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.30:*:*:*:*:*:*:*", "cpeNameId": "431061A4-8B29-44AC-8B5A-B00B492AF919"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.31:*:*:*:*:*:*:*", "cpeNameId": "C7A2D5DC-2AB9-4CB0-85B6-E9E3D52ECAE7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.32:*:*:*:*:*:*:*", "cpeNameId": "C9B41E65-9F6F-409B-AE9A-82BB1AE405AF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.33:*:*:*:*:*:*:*", "cpeNameId": "84FA7866-7446-4F3E-AFE7-B678A77F7678"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.34:*:*:*:*:*:*:*", "cpeNameId": "B37F635D-70D3-4A0F-BC7A-F724A00597EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.35:*:*:*:*:*:*:*", "cpeNameId": "6C02AEA8-E18E-4CE2-983F-FD54F170D970"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.36:*:*:*:*:*:*:*", "cpeNameId": "58D3B0A5-3DD9-46A6-AF11-FDC7670F9A5E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.37:*:*:*:*:*:*:*", "cpeNameId": "705AAD20-057F-4E96-8054-5ABFA09DEC45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.38:*:*:*:*:*:*:*", "cpeNameId": "59548517-C5F0-4917-ADF8-4C33A8590526"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.39:*:*:*:*:*:*:*", "cpeNameId": "27F7B769-9A4C-4AB9-9D07-18AAD41D0EEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.40:*:*:*:*:*:*:*", "cpeNameId": "9AAB506F-9A8F-40DD-ADD8-800C9EF8158F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.41:*:*:*:*:*:*:*", "cpeNameId": "92E1E10B-853E-4B5D-965A-EC219484816B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.42:*:*:*:*:*:*:*", "cpeNameId": "3E99C617-2C7C-49FB-A83C-8D425936A8EC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.43:*:*:*:*:*:*:*", "cpeNameId": "D6410957-5E95-48A0-BCA9-2235FAED1FE8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.44:*:*:*:*:*:*:*", "cpeNameId": "93A1603D-5749-4D3E-AEC4-2EA665A4682B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.45:*:*:*:*:*:*:*", "cpeNameId": "B739CA1D-E0B1-4D30-B7CE-E66FA1FFDBBC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.46:*:*:*:*:*:*:*", "cpeNameId": "E3725D22-0894-4887-A626-825BEB339578"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.47:*:*:*:*:*:*:*", "cpeNameId": "39640B61-C244-43C9-AB0C-6A220A1A5A56"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.48:*:*:*:*:*:*:*", "cpeNameId": "E6788528-AE41-473C-949B-710669D2D819"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.49:*:*:*:*:*:*:*", "cpeNameId": "D26658AF-CBE6-4E04-BF1A-F72C6E324B13"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.50:*:*:*:*:*:*:*", "cpeNameId": "524F7BF2-2CE3-4AF7-B2CE-27BDE272F5CE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.51:*:*:*:*:*:*:*", "cpeNameId": "5A46A50B-BE7A-422E-B5A5-85C4E7A9086B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.52:*:*:*:*:*:*:*", "cpeNameId": "BC501D66-6C4E-4287-B6B1-AF31DB34E6DE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.53:*:*:*:*:*:*:*", "cpeNameId": "A7F6AE2D-5239-42A4-BE47-B8405AFE4F15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.54:*:*:*:*:*:*:*", "cpeNameId": "FCAF15A4-5502-4988-972D-03C4FC1C8006"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.55:*:*:*:*:*:*:*", "cpeNameId": "6068E853-E361-413E-A374-6140BA7E3AEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.56:*:*:*:*:*:*:*", "cpeNameId": "4FC2A2C4-F834-43B1-8C2F-55BB48AD6576"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.57:*:*:*:*:*:*:*", "cpeNameId": "9EA2D1E4-4425-45AF-9C93-193BB49EA83A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.58:*:*:*:*:*:*:*", "cpeNameId": "74FD8119-9DCC-4CF1-BF22-CC9B0975F993"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.59:*:*:*:*:*:*:*", "cpeNameId": "97034175-79EB-4975-AEED-2C504169DAD3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.60:*:*:*:*:*:*:*", "cpeNameId": "F2AD8245-8B96-45BF-9E5D-0B24A3CE878D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.61:*:*:*:*:*:*:*", "cpeNameId": "2338CE12-153B-40A1-9200-757DE8EE2B31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.62:*:*:*:*:*:*:*", "cpeNameId": "BFA482D2-DAFA-43D9-BAD5-454D33FC986E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.63:*:*:*:*:*:*:*", "cpeNameId": "DE75E0A4-72AF-42DD-9A60-28DD82E24567"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.64:*:*:*:*:*:*:*", "cpeNameId": "57E7B27B-9D49-425A-AD27-D1FC5F1F5007"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.65:*:*:*:*:*:*:*", "cpeNameId": "FC5F79AC-A9F4-46F9-8390-21319C190DE2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.66:*:*:*:*:*:*:*", "cpeNameId": "267199FD-8267-4026-B0D5-8120C74CA81C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.67:*:*:*:*:*:*:*", "cpeNameId": "2FB70320-422D-41C6-9BE6-A90DA6C50C45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.68:*:*:*:*:*:*:*", "cpeNameId": "990F0E4A-3D05-4A24-93B9-821C5FA89E61"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.69:*:*:*:*:*:*:*", "cpeNameId": "86B87B65-18E8-46B1-BA2D-818DA2A97589"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.70:*:*:*:*:*:*:*", "cpeNameId": "14F9E78A-8939-4871-8C3A-176553FCE3F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.71:*:*:*:*:*:*:*", "cpeNameId": "AD18BF6A-8E8A-4F49-A685-7C52C567A804"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.72:*:*:*:*:*:*:*", "cpeNameId": "FBA9034E-BB55-4749-90A9-98D200B4655A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.73:*:*:*:*:*:*:*", "cpeNameId": "B7587B68-C990-47CF-BD9F-FC8A8AAAB01D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.74:*:*:*:*:*:*:*", "cpeNameId": "1EABE4F9-0363-4FE7-B6CE-415714E38C9E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.75:*:*:*:*:*:*:*", "cpeNameId": "2244EA46-B3EA-4AA6-A739-DC99BA897D8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.76:*:*:*:*:*:*:*", "cpeNameId": "54446C18-F95D-4767-9E2A-BBB520D1578B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.77:*:*:*:*:*:*:*", "cpeNameId": "8B94B3BD-37A2-46C8-B443-C69BAE2A93D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.78:*:*:*:*:*:*:*", "cpeNameId": "4B0A2778-F0C7-4932-9B59-5DBAC0E56BC1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.79:*:*:*:*:*:*:*", "cpeNameId": "E60581E5-899D-4C89-AB6F-CB591072FC40"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.80:*:*:*:*:*:*:*", "cpeNameId": "B264E855-88CD-4497-AD61-BAD605BDADB3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.81:*:*:*:*:*:*:*", "cpeNameId": "DF2C4C4B-9057-4E0E-9AB3-CFAEBB2B3FC4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.82:*:*:*:*:*:*:*", "cpeNameId": "FCD95819-4985-4986-836B-C60A6A7603A0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.83:*:*:*:*:*:*:*", "cpeNameId": "7857A3A2-6650-4E55-B69A-36A1C220AE69"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.84:*:*:*:*:*:*:*", "cpeNameId": "58854616-0E47-43CA-8F84-2820A63B578A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.85:*:*:*:*:*:*:*", "cpeNameId": "DED66AEB-55F2-4E73-9E63-A2A351B7C4A5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.86:*:*:*:*:*:*:*", "cpeNameId": "9AD4F8F7-DD35-4753-B28D-89AF3A118AE4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.87:*:*:*:*:*:*:*", "cpeNameId": "5DB0B4F9-191A-4190-B894-133F8D8D69D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.88:*:*:*:*:*:*:*", "cpeNameId": "4C7015DD-D345-46D2-BEDB-6C2371BA4CCB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.89:*:*:*:*:*:*:*", "cpeNameId": "4AB80BF4-4DA6-4A21-9170-271328D4BE10"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.90:*:*:*:*:*:*:*", "cpeNameId": "4DDE1841-2392-477A-AC6A-05EE08C442AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.91:*:*:*:*:*:*:*", "cpeNameId": "866D88DB-8640-4219-A519-C9D1DFE75A0A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.92:*:*:*:*:*:*:*", "cpeNameId": "CCF4FE02-E968-4718-B0C1-E34611B4A678"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.93:*:*:*:*:*:*:*", "cpeNameId": "3466DEC0-18B6-4CCC-9035-699DB58A08DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.94:*:*:*:*:*:*:*", "cpeNameId": "E2E267A5-F455-4F4B-B0DC-32695915F1F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.95:*:*:*:*:*:*:*", "cpeNameId": "1A09E587-339A-4653-897D-90351A1B1025"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.96:*:*:*:*:*:*:*", "cpeNameId": "C1173A8A-4845-4811-B351-EC99088D9CC2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.97:*:*:*:*:*:*:*", "cpeNameId": "164972DF-5261-4E50-AA72-0D593A06093E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.98:*:*:*:*:*:*:*", "cpeNameId": "959D88A5-1F60-4CC0-AA2A-FE4CA946B52C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.99:*:*:*:*:*:*:*", "cpeNameId": "83FA5052-1126-43B6-B154-9693B0DC5D68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.100:*:*:*:*:*:*:*", "cpeNameId": "FE74990F-736C-40A6-B9A6-5DB0862A3598"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.101:*:*:*:*:*:*:*", "cpeNameId": "65A3F087-7FDD-464B-B5E8-11A123B6FED0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.102:*:*:*:*:*:*:*", "cpeNameId": "4361D9D4-566F-48FA-A9B5-9DF5F480F87D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.103:*:*:*:*:*:*:*", "cpeNameId": "96462486-A899-4D91-AE51-05076698C747"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.104:*:*:*:*:*:*:*", "cpeNameId": "68B1A24A-226E-4C33-B506-68A97B8EB668"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.105:*:*:*:*:*:*:*", "cpeNameId": "DEDE9948-C1FC-49B3-8506-3D2951BFBB59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.106:*:*:*:*:*:*:*", "cpeNameId": "A4F41E53-E5A7-48F9-98A4-AD0AC46B29E5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.107:*:*:*:*:*:*:*", "cpeNameId": "D381BFF6-927D-4DCA-BB4F-4F42E77DEF75"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.10.108:*:*:*:*:*:*:*", "cpeNameId": "3398626D-D51A-4F5B-A24A-F23C0D2CB910"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11:*:*:*:*:*:*:*", "cpeNameId": "F75AFEC9-47FA-4037-90F6-A48AA82289C9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11:rc1:*:*:*:*:*:*", "cpeNameId": "5BEAC0E5-F63C-4AC6-95FC-CF80E30AA77E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11:rc2:*:*:*:*:*:*", "cpeNameId": "E5BBF478-F0EE-487A-B822-0C3E66912C59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11:rc3:*:*:*:*:*:*", "cpeNameId": "88CE34B4-9D9A-4AC8-B6F3-79A4DFA9D46A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11:rc4:*:*:*:*:*:*", "cpeNameId": "9C7C660C-5CB3-49CB-A94E-E772F275C30F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11:rc5:*:*:*:*:*:*", "cpeNameId": "91C8A273-5AF6-4E43-B09C-880A80B8CE77"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11:rc6:*:*:*:*:*:*", "cpeNameId": "B6A758CD-437D-4073-87A1-259DCE2BB31B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11:rc7:*:*:*:*:*:*", "cpeNameId": "B599BCFA-E2F9-4870-B34B-223562EA4FFC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11.1:*:*:*:*:*:*:*", "cpeNameId": "8D482F9D-E3F6-4C32-A00C-415D1326F573"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11.2:*:*:*:*:*:*:*", "cpeNameId": "952A504C-0AED-46A3-A44F-2804AC428A64"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11.3:*:*:*:*:*:*:*", "cpeNameId": "07351A9F-CF21-4D89-ABC4-595BA4B6117E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11.4:*:*:*:*:*:*:*", "cpeNameId": "D864C50A-53DD-4BFA-B846-4CB6EB1F718C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11.5:*:*:*:*:*:*:*", "cpeNameId": "2FB9015E-80F3-48F4-AF87-1A0308E755BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11.6:*:*:*:*:*:*:*", "cpeNameId": "2E8F4459-22C0-4006-8760-2A3DF30E1EBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11.7:*:*:*:*:*:*:*", "cpeNameId": "04ED3CC1-93AA-46B8-81B8-2A1EBF958C5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11.8:*:*:*:*:*:*:*", "cpeNameId": "E46B14D2-5050-4359-992A-E025238FB60E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11.9:*:*:*:*:*:*:*", "cpeNameId": "8F22E34B-3CBD-4F71-9C93-10511FEC2ECE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.11.10:*:*:*:*:*:*:*", "cpeNameId": "53E5A537-6C5E-463B-8BBA-F29456EC0728"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12:*:*:*:*:*:*:*", "cpeNameId": "64B896A7-E835-4D8C-BA75-179A4A1C5A21"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.1:*:*:*:*:*:*:*", "cpeNameId": "A5798E8B-25FE-4B2F-8425-ADA099CB6469"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.2:*:*:*:*:*:*:*", "cpeNameId": "00133E45-0260-47F0-93EB-50C9DA890A91"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.3:*:*:*:*:*:*:*", "cpeNameId": "905F7914-1CF3-47AE-8017-2577783E2B1D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.4:*:*:*:*:*:*:*", "cpeNameId": "3C6255BD-73CA-4B3B-BA1A-2B0C6B21C127"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.5:*:*:*:*:*:*:*", "cpeNameId": "5AB5DA1C-54FE-4065-9A6C-CF4292F5C766"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.6:*:*:*:*:*:*:*", "cpeNameId": "F94EAD8F-C9AF-4A71-8833-BEBB089C650B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.7:*:*:*:*:*:*:*", "cpeNameId": "65DC5222-0DF1-4F28-B48D-1B6987E4A250"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.8:*:*:*:*:*:*:*", "cpeNameId": "501F73DF-5349-4A18-AEC2-2DDA0FE61C2C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.9:*:*:*:*:*:*:*", "cpeNameId": "614BF4FA-00CF-48BB-AB0B-24268FD8116B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.10:*:*:*:*:*:*:*", "cpeNameId": "EE2F0BFF-481B-4403-85E8-CD3BEF29C49F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.11:*:*:*:*:*:*:*", "cpeNameId": "9EED81CF-D6C3-4521-8AA7-1057F00F4A84"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.12:*:*:*:*:*:*:*", "cpeNameId": "07A81603-5E43-4FAF-950A-8E9C84F2A7EE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.13:*:*:*:*:*:*:*", "cpeNameId": "BE3BAA85-6B7B-4893-9B06-0743B846FAF4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.14:*:*:*:*:*:*:*", "cpeNameId": "5CA9D680-CF72-4880-A263-7B5053CCC57D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.15:*:*:*:*:*:*:*", "cpeNameId": "52A55F4F-315E-4768-B2E3-13E044CC2598"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.16:*:*:*:*:*:*:*", "cpeNameId": "6DD80A01-AF1D-451B-B71E-6C35D01D3582"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.17:*:*:*:*:*:*:*", "cpeNameId": "677145FC-D4B5-46BC-B20B-2E89A95A75C7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.18:*:*:*:*:*:*:*", "cpeNameId": "0AEA1E6B-EDCC-4C8B-B8BD-49EF072F9662"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.19:*:*:*:*:*:*:*", "cpeNameId": "67D3A852-7617-495D-90B6-F9162A2DA19B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.20:*:*:*:*:*:*:*", "cpeNameId": "A50A0202-7561-46CE-BB13-70B1C30B44F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.21:*:*:*:*:*:*:*", "cpeNameId": "D0C55472-843A-4E56-883B-FC8286BDA3D7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.22:*:*:*:*:*:*:*", "cpeNameId": "43C97962-E307-4C33-9E7B-67C5B93CC4B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.23:*:*:*:*:*:*:*", "cpeNameId": "987EFE31-3789-47AF-99E0-48473B4B4A50"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.24:*:*:*:*:*:*:*", "cpeNameId": "C4697F43-ADAD-45A8-BC55-DEF93AF196A7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.25:*:*:*:*:*:*:*", "cpeNameId": "8879CA5B-DB0D-4589-9CDE-DBD94EF6FBE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.26:*:*:*:*:*:*:*", "cpeNameId": "329DD992-7C17-47BA-B421-8CD73D49D6EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.27:*:*:*:*:*:*:*", "cpeNameId": "41303B07-D3D7-40F8-93F1-85CD3343490C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.28:*:*:*:*:*:*:*", "cpeNameId": "035C87B6-8568-4673-B414-7E2BC872AE43"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.29:*:*:*:*:*:*:*", "cpeNameId": "14E4850D-2E72-49C1-9977-072FFAFF85EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.30:*:*:*:*:*:*:*", "cpeNameId": "FDFE0F89-D3F8-4D4D-9CE1-0E88C232EFE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.31:*:*:*:*:*:*:*", "cpeNameId": "778A3B9C-55D6-43B6-A5F8-6EB19EB7516D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.32:*:*:*:*:*:*:*", "cpeNameId": "F0E31FB4-CC29-4E44-9497-00FA47A8E9BE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.33:*:*:*:*:*:*:*", "cpeNameId": "EBD62036-9111-43E7-A5F8-EACF7BCB75FA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.34:*:*:*:*:*:*:*", "cpeNameId": "BE875471-EB8B-4187-A218-79BF0160106F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.35:*:*:*:*:*:*:*", "cpeNameId": "A1D08608-8242-4271-ABA8-24F53563796A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.36:*:*:*:*:*:*:*", "cpeNameId": "87BAFA75-3062-4330-B30E-BB3379D61996"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.37:*:*:*:*:*:*:*", "cpeNameId": "DFD328E2-C1A1-443F-B9B2-61E154FEC308"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.38:*:*:*:*:*:*:*", "cpeNameId": "A0C6DBCC-E339-44A2-BF07-C4BFA0A75218"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.39:*:*:*:*:*:*:*", "cpeNameId": "B8A25CCA-C76A-4C4A-A287-4263E9F193F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.40:*:*:*:*:*:*:*", "cpeNameId": "F7FC78A4-49B1-4BD5-A239-2913792F0D38"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.41:*:*:*:*:*:*:*", "cpeNameId": "E61ADF4E-64CA-44F9-BB10-8E05E4F9A49E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.42:*:*:*:*:*:*:*", "cpeNameId": "DF51174B-8193-49A6-AA5F-A88E55B5689C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.43:*:*:*:*:*:*:*", "cpeNameId": "660F6036-C153-4C4D-9C1C-8251780FD091"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.44:*:*:*:*:*:*:*", "cpeNameId": "AC5B232F-9000-4773-ACC7-A089BD2D1F95"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.45:*:*:*:*:*:*:*", "cpeNameId": "61441944-DB00-4959-9CF1-2FB0ABA9BD3C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.46:*:*:*:*:*:*:*", "cpeNameId": "49C78690-FF34-46C0-90E0-C8364AB6302C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.47:*:*:*:*:*:*:*", "cpeNameId": "25525F05-9701-4C5F-A520-5CE5D3F098F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.48:*:*:*:*:*:*:*", "cpeNameId": "9E751725-7306-4149-8716-76DF78D28E0D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.49:*:*:*:*:*:*:*", "cpeNameId": "26C4C2E6-B873-4617-839A-CEB90C44DEB8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.50:*:*:*:*:*:*:*", "cpeNameId": "25B9F5A0-597A-4CDB-BAD2-7EFDED049ADB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.51:*:*:*:*:*:*:*", "cpeNameId": "23960434-54B9-4CD3-8259-27E868FAD8F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.52:*:*:*:*:*:*:*", "cpeNameId": "CDD83033-874F-48F5-87AA-954427858E93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.53:*:*:*:*:*:*:*", "cpeNameId": "DE70E58D-E54C-4EBF-AF80-073F06F48E96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.54:*:*:*:*:*:*:*", "cpeNameId": "A55F66D7-EFCC-4B69-A1DF-E079988DE459"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.55:*:*:*:*:*:*:*", "cpeNameId": "992B91FA-ED2E-472B-A540-8EDDDAB546DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.56:*:*:*:*:*:*:*", "cpeNameId": "C3E5ED56-2BFD-4B5B-A868-64FE8F556673"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.57:*:*:*:*:*:*:*", "cpeNameId": "5EB333E2-620D-4F48-9162-3A2A7269A5FA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.58:*:*:*:*:*:*:*", "cpeNameId": "91C923D0-3C2B-491F-BE0E-5283907AE153"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.59:*:*:*:*:*:*:*", "cpeNameId": "809D9A62-1091-437F-828C-E08C6DDA03D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.60:*:*:*:*:*:*:*", "cpeNameId": "402B78BE-A405-4665-9836-AD6043AD7D70"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.61:*:*:*:*:*:*:*", "cpeNameId": "A331CC45-D7C5-4930-8DA9-0FD2976C829B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.62:*:*:*:*:*:*:*", "cpeNameId": "B4FF0AA0-3B07-45DC-949B-053D7F53CC6B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.63:*:*:*:*:*:*:*", "cpeNameId": "B0B58B50-8AEA-449F-9AEF-89713152EAE3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.64:*:*:*:*:*:*:*", "cpeNameId": "0C9BB368-F2ED-4C3B-8E8A-295D5EA7B6D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.65:*:*:*:*:*:*:*", "cpeNameId": "2614B472-06A6-4DB5-99FE-6D6DB58EE9F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.66:*:*:*:*:*:*:*", "cpeNameId": "46C58247-7B77-4957-8C6C-256801A1BD7C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.67:*:*:*:*:*:*:*", "cpeNameId": "E79A8ECB-6A3E-458B-874A-246BF02438F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.68:*:*:*:*:*:*:*", "cpeNameId": "A66131F6-5BD1-4DE0-BD71-24B8F8E8A0E7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.69:*:*:*:*:*:*:*", "cpeNameId": "747F4A0A-795F-4764-84EA-F1E4B3C0AFA3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.70:*:*:*:*:*:*:*", "cpeNameId": "2BD55A5D-F95E-4980-838F-3D2C95475702"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.71:*:*:*:*:*:*:*", "cpeNameId": "D1DCC046-F7A5-4700-9F36-C18E6B97E247"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.72:*:*:*:*:*:*:*", "cpeNameId": "6418388D-4EA9-4676-B750-23B1E05EDB03"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.73:*:*:*:*:*:*:*", "cpeNameId": "2E62C9EE-C007-44BA-B1EE-B6F56AABFD62"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.12.74:*:*:*:*:*:*:*", "cpeNameId": "61D92C4C-6A59-45EA-B16A-A877DBF5267F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.13:*:*:*:*:*:*:*", "cpeNameId": "7675C9E5-D99B-4559-813B-08F5409902B8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.13:rc1:*:*:*:*:*:*", "cpeNameId": "704510E8-D773-421C-B4B8-F1B71978C66A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.13.1:*:*:*:*:*:*:*", "cpeNameId": "7179867B-6349-4785-A0E8-F5F482F45ED0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.13.2:*:*:*:*:*:*:*", "cpeNameId": "7C5BFB48-EF90-4264-BC04-7F16B6FED2A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.13.3:*:*:*:*:*:*:*", "cpeNameId": "FE5C9534-292E-4E03-8F5E-58B54CE6E1BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.13.4:*:*:*:*:*:*:*", "cpeNameId": "9B186AFD-8409-43C0-A7BE-FD3922148612"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.13.5:*:*:*:*:*:*:*", "cpeNameId": "0BB9D21D-FEA0-4AD0-B648-28D885F21C32"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.13.6:*:*:*:*:*:*:*", "cpeNameId": "1D6D97DE-0481-4C82-BB8A-832867572022"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.13.7:*:*:*:*:*:*:*", "cpeNameId": "7CA0A0D0-0BFB-4F04-B3C6-7E4392BBFF31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.13.8:*:*:*:*:*:*:*", "cpeNameId": "098C278A-3A8A-4510-9EAC-C3341B334B88"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.13.9:*:*:*:*:*:*:*", "cpeNameId": "BD4E7777-D71C-4C8F-891F-A0571D2B9107"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.13.10:*:*:*:*:*:*:*", "cpeNameId": "C6AEDFDC-DBD6-4D00-AE8C-45230E3B90C7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.13.11:*:*:*:*:*:*:*", "cpeNameId": "1D513E96-5147-4AC0-B88E-39D255397849"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14:-:*:*:*:*:*:*", "cpeNameId": "1D9BAB2A-ACD5-4894-ACF3-BB019C0D9DAE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14:rc1:*:*:*:*:*:*", "cpeNameId": "275C31DB-1803-404A-B330-5C8BDA278F3E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14:rc2:*:*:*:*:*:*", "cpeNameId": "F3F198B6-5F96-4DAA-AD09-6239B6A86D74"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14:rc3:*:*:*:*:*:*", "cpeNameId": "69BAE2C9-57F4-4215-8AFC-A08082F91F89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14:rc4:*:*:*:*:*:*", "cpeNameId": "EDD65366-2557-44F5-B9BA-DD37AE036110"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14:rc5:*:*:*:*:*:*", "cpeNameId": "E044E8FA-940A-4293-83C0-4F42F00E30B8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14:rc6:*:*:*:*:*:*", "cpeNameId": "D98D7A2C-5208-41E2-8E41-2EF23273F91C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14:rc7:*:*:*:*:*:*", "cpeNameId": "1CFADBD3-9088-42D7-AD96-2B90F566D83E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14:rc8:*:*:*:*:*:*", "cpeNameId": "C353F80F-94CD-4CE0-8B55-EFADABD82F01"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.1:*:*:*:*:*:*:*", "cpeNameId": "EFAAC9F0-0CBF-41F8-BFAA-792B68ACC080"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.2:*:*:*:*:*:*:*", "cpeNameId": "7C11DBE5-5367-4A8C-8892-1845187B0DAF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.3:*:*:*:*:*:*:*", "cpeNameId": "31D44284-BB44-4E6E-837C-3ACB4B6D3B98"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.4:*:*:*:*:*:*:*", "cpeNameId": "E0BEF371-B9BB-47D0-A565-4A5235548473"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.5:*:*:*:*:*:*:*", "cpeNameId": "3D16437E-1E60-4921-8A0D-D7A9D92B8765"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.6:*:*:*:*:*:*:*", "cpeNameId": "2F640FC6-6044-448F-8821-0CEED7B2FA99"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.7:*:*:*:*:*:*:*", "cpeNameId": "32195292-ACC9-4769-B0F5-B4A1556413D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.8:*:*:*:*:*:*:*", "cpeNameId": "F58DCB69-AF8A-46D0-908D-C46050B56588"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.9:*:*:*:*:*:*:*", "cpeNameId": "8A9A99A1-8548-4708-B249-945CAB4E0BDE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.10:*:*:*:*:*:*:*", "cpeNameId": "310204CE-EB36-4207-BE51-01B4EFA21612"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.11:*:*:*:*:*:*:*", "cpeNameId": "5EFDD809-F451-448D-BCA3-D8F1423877E3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.12:*:*:*:*:*:*:*", "cpeNameId": "5B4BD86F-D2A6-4800-8D5E-1F27F58F683F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.13:*:*:*:*:*:*:*", "cpeNameId": "1C190740-B2F4-4F2E-B6A0-98D96316968B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.14:*:*:*:*:*:*:*", "cpeNameId": "F655EE2A-0907-4AC1-969D-75421AA873BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.15:*:*:*:*:*:*:*", "cpeNameId": "CF8F0970-8DD7-4AFC-8BB3-CDDD4C0CCFCE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.16:*:*:*:*:*:*:*", "cpeNameId": "6E51D89B-7B3C-4B01-98F6-9EE63EECF0C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.17:*:*:*:*:*:*:*", "cpeNameId": "8C60A84F-4C1E-4745-8479-2DAB0F2AFA85"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.18:*:*:*:*:*:*:*", "cpeNameId": "7E2BED9C-EA21-4C51-924B-226BBFCED950"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.19:*:*:*:*:*:*:*", "cpeNameId": "EE4C5E0E-CE83-4E30-A6ED-F00D310F1007"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.20:*:*:*:*:*:*:*", "cpeNameId": "613E1F2F-51D2-47FB-9BEC-1500252E750F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.21:*:*:*:*:*:*:*", "cpeNameId": "46C29139-C9A6-4F18-922A-7B6B84739E19"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.22:*:*:*:*:*:*:*", "cpeNameId": "E3884214-BF14-43D5-AD47-28C63E8F2549"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.23:*:*:*:*:*:*:*", "cpeNameId": "1E15C7AB-DB2A-4383-9307-9ECDB67459D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.24:*:*:*:*:*:*:*", "cpeNameId": "3D260DE8-01A1-46E9-BA73-FC19FB9909E4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.25:*:*:*:*:*:*:*", "cpeNameId": "BE686202-3204-4E6D-94A1-DFBF267BE150"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.26:*:*:*:*:*:*:*", "cpeNameId": "0D6CB817-59F8-4416-95A7-0187B315FC43"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.27:*:*:*:*:*:*:*", "cpeNameId": "CDA9DAD3-11EE-4616-B437-8E5A016D2663"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.28:*:*:*:*:*:*:*", "cpeNameId": "87E8D5EC-7107-4A8B-90C6-EED05AC9F068"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.29:*:*:*:*:*:*:*", "cpeNameId": "477180AC-6496-43B7-BD33-B88FA9DF1BD8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.30:*:*:*:*:*:*:*", "cpeNameId": "69E9067D-3CDF-4A22-AF5F-64F8262A08A3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.31:*:*:*:*:*:*:*", "cpeNameId": "3197F63D-4282-4176-B9F0-3C9ED1852338"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.32:*:*:*:*:*:*:*", "cpeNameId": "BD3E1C90-E84E-4240-B5DB-EE0A640428D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.33:*:*:*:*:*:*:*", "cpeNameId": "D7DDB6E3-CAA5-4CDA-BC12-1051EB8A4915"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.34:*:*:*:*:*:*:*", "cpeNameId": "B4D681EA-C675-4F30-BA58-C00E1A1BF0C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.35:*:*:*:*:*:*:*", "cpeNameId": "10D5F3CC-5CE4-433A-8EE2-6C26D0B0F104"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.36:*:*:*:*:*:*:*", "cpeNameId": "2C87858B-A357-4109-8F4A-43F30D955337"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.37:*:*:*:*:*:*:*", "cpeNameId": "438D314D-81C9-46E2-A074-D3CDC8150A31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.38:*:*:*:*:*:*:*", "cpeNameId": "56FF2B04-ACFB-4CB5-B622-2500B7EBCF9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.39:*:*:*:*:*:*:*", "cpeNameId": "F188A8FC-42B2-484D-92F3-9820A0AFB215"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.40:*:*:*:*:*:*:*", "cpeNameId": "1C91D5D4-7E7C-4DE2-8485-580F7BC1DA94"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.41:*:*:*:*:*:*:*", "cpeNameId": "4FA8915E-F7A0-4EB2-B56B-A91F138153FF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.42:*:*:*:*:*:*:*", "cpeNameId": "CDE8EDFB-FA30-425F-AD32-F8BB598FE9DE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.43:*:*:*:*:*:*:*", "cpeNameId": "329775D3-608C-469E-9BF0-27B5743333B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.44:*:*:*:*:*:*:*", "cpeNameId": "5FCF03F5-EC66-466B-95F0-DCD0F290D8B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.45:*:*:*:*:*:*:*", "cpeNameId": "E46E69E4-EFEE-439E-9C2F-456ABD7FFFFC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.46:*:*:*:*:*:*:*", "cpeNameId": "AAE75E9F-C997-4361-85ED-01A12A505971"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.47:*:*:*:*:*:*:*", "cpeNameId": "4DCD068C-F3EC-4D35-909D-E00796FDF9D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.48:*:*:*:*:*:*:*", "cpeNameId": "072DDFA0-91FD-48BE-AC5C-B580C6CB6640"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.49:*:*:*:*:*:*:*", "cpeNameId": "5ABF4B87-D1FF-468F-BE3E-F00B44DD2DA8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.50:*:*:*:*:*:*:*", "cpeNameId": "6F239227-0791-4643-B831-84C1A08668CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.51:*:*:*:*:*:*:*", "cpeNameId": "D9D7B3F3-0FAD-4727-82ED-D1B01BEA5CAE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.52:*:*:*:*:*:*:*", "cpeNameId": "FA995237-C4AE-4356-AFCB-3ACFC2F06435"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.53:*:*:*:*:*:*:*", "cpeNameId": "97407565-A5B7-46B0-878B-76A598FD0DC4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.54:*:*:*:*:*:*:*", "cpeNameId": "73ED7AF3-B159-47BD-A2D7-3D2099B9549F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.55:*:*:*:*:*:*:*", "cpeNameId": "1C7DC9FB-31E4-4495-914C-BDF430224F2A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.56:*:*:*:*:*:*:*", "cpeNameId": "2B87E36E-C9C7-4287-B88E-B58CCDBEE8CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.57:*:*:*:*:*:*:*", "cpeNameId": "89CDF3D4-923A-42EB-B4F1-396752130549"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.58:*:*:*:*:*:*:*", "cpeNameId": "50F34BAE-FD72-4BA7-BDF3-2F063E263FE3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.59:*:*:*:*:*:*:*", "cpeNameId": "C17D896B-B112-4147-8B4E-D6809500DD0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.60:*:*:*:*:*:*:*", "cpeNameId": "CB0E701E-6E22-4C6B-ADC4-F7C9FED3490A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.61:*:*:*:*:*:*:*", "cpeNameId": "D5EC3A9F-488B-459B-B671-3CFF36C5264E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.62:*:*:*:*:*:*:*", "cpeNameId": "AAB9B2FA-7944-4BC7-9A19-C851CA4CA046"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.63:*:*:*:*:*:*:*", "cpeNameId": "7C8CFA70-2A89-4466-BF4E-58399541737F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.64:*:*:*:*:*:*:*", "cpeNameId": "2A0CBD6F-B950-4E1E-A538-EAC32B0F8D04"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.65:*:*:*:*:*:*:*", "cpeNameId": "302F00DB-6B4E-4974-9504-734827154FB8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.66:*:*:*:*:*:*:*", "cpeNameId": "D99E638B-B0EC-4DF7-8DFB-AA72926214AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.67:*:*:*:*:*:*:*", "cpeNameId": "2D123B44-2856-465B-BD85-533B959BB396"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.68:*:*:*:*:*:*:*", "cpeNameId": "6F411166-BE23-4D70-BAA4-2C37BCCCA795"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.69:*:*:*:*:*:*:*", "cpeNameId": "0DCE2177-093F-482E-8271-5BE75B5C4316"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.70:*:*:*:*:*:*:*", "cpeNameId": "829DAB82-FBA0-4C3D-852F-AF4920CE367B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.71:*:*:*:*:*:*:*", "cpeNameId": "8B763B63-7E89-4D31-B562-617198EB7A38"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.72:*:*:*:*:*:*:*", "cpeNameId": "DDEAEE70-1BEB-4C35-938A-7A2F0D5FF364"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.73:*:*:*:*:*:*:*", "cpeNameId": "5FBBDAD5-3210-49BC-B74C-1A3A59E38BD0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.74:*:*:*:*:*:*:*", "cpeNameId": "19C0B93D-C2D2-455F-BB51-70561B410251"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.75:*:*:*:*:*:*:*", "cpeNameId": "07647DB4-686E-4102-8A4B-FB7F7F4815D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.76:*:*:*:*:*:*:*", "cpeNameId": "225864D5-2AA2-4307-9AE4-36E4AE04110A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.77:*:*:*:*:*:*:*", "cpeNameId": "22C497DB-E1E3-4DFD-8E34-49796EAC1A3E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.78:*:*:*:*:*:*:*", "cpeNameId": "426F0C47-6D01-4224-92EF-986D75736A21"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.14.79:*:*:*:*:*:*:*", "cpeNameId": "D1756F76-C011-4755-82E3-997A11C5E1BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15:*:*:*:*:*:*:*", "cpeNameId": "F0E9A4B8-14FC-4869-AD9F-6246C6547675"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15:-:*:*:*:*:*:*", "cpeNameId": "E641A360-B4B9-4DF0-8F2E-7D5595E4CB00"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15:rc1:*:*:*:*:*:*", "cpeNameId": "118BFA5A-5522-46F1-8AE9-B68045907253"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15:rc2:*:*:*:*:*:*", "cpeNameId": "EC2F3273-918F-4CA8-8E3E-B0CBAE13039F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15:rc3:*:*:*:*:*:*", "cpeNameId": "85138DF9-2827-446B-B366-B0A20F1CAC4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15:rc4:*:*:*:*:*:*", "cpeNameId": "9EDCB3A7-36AC-4876-899D-C730BFBD51C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15:rc6:*:*:*:*:*:*", "cpeNameId": "513428B6-9ED7-429F-8EFA-414B66BB9A0A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15:rc7:*:*:*:*:*:*", "cpeNameId": "8C4E9BE9-AD91-4485-BE20-EBB81C5855B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15:rc8:*:*:*:*:*:*", "cpeNameId": "8706AA2E-64B2-412F-8C3C-C71110DE9BC9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15.1:*:*:*:*:*:*:*", "cpeNameId": "A0C9E4D7-B2A7-483B-98B7-A2CA6D9E0C7B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15.2:*:*:*:*:*:*:*", "cpeNameId": "D3F1222D-3C96-4F9A-B451-BA8C6AB11559"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15.3:*:*:*:*:*:*:*", "cpeNameId": "6D3E9B6B-73D6-47CD-83DF-D15B7FAE0B54"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15.4:*:*:*:*:*:*:*", "cpeNameId": "D09D6559-426F-401C-AAEA-50AA0131727F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15.5:*:*:*:*:*:*:*", "cpeNameId": "4576C52F-F54C-4DAF-99E7-64A078AFC64F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15.6:*:*:*:*:*:*:*", "cpeNameId": "F8ACD41C-8286-4481-AB2B-251455CA1DFF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15.7:*:*:*:*:*:*:*", "cpeNameId": "514EE5B7-BC9B-4A33-BFE3-F58F36176143"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15.8:*:*:*:*:*:*:*", "cpeNameId": "D7988546-C2DA-43EF-A366-BA433414B2BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15.9:*:*:*:*:*:*:*", "cpeNameId": "4A4616C1-AC52-4DAB-8A9E-EFF2995ACC3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.15.10:*:*:*:*:*:*:*", "cpeNameId": "404717ED-8092-4310-B1D7-09DBE376FE7F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16:*:*:*:*:*:*:*", "cpeNameId": "0D147325-751C-4432-8659-4B28F342226C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.0:*:*:*:*:*:*:*", "cpeNameId": "978149A6-9A39-4896-AE9F-AE62071FF0B6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.1:*:*:*:*:*:*:*", "cpeNameId": "62B44D66-3148-4898-8789-85C8A7B27A40"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.2:*:*:*:*:*:*:*", "cpeNameId": "C76FB5C0-1C39-4E68-8F46-31FE00C018CC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.3:*:*:*:*:*:*:*", "cpeNameId": "88CCC2DD-0D9D-410C-8C24-92C5FC988B82"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.4:*:*:*:*:*:*:*", "cpeNameId": "033756ED-A578-42B2-93F2-36560EDDA0B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.5:*:*:*:*:*:*:*", "cpeNameId": "CAA952A3-3352-40F3-AD85-1764E26C6931"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.6:*:*:*:*:*:*:*", "cpeNameId": "EAF67B7C-FC7F-43DF-8238-C00AB67C30F7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.7:*:*:*:*:*:*:*", "cpeNameId": "2CC42649-1736-4748-8194-179E2F0576BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.35:*:*:*:*:*:*:*", "cpeNameId": "04FCF80C-585D-4A46-B874-49F9672541BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.36:*:*:*:*:*:*:*", "cpeNameId": "087658D7-B58E-49B5-AAF6-8268B05E6801"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.37:*:*:*:*:*:*:*", "cpeNameId": "01DE314D-2401-4FC2-8A9A-2D73356FDC23"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.38:*:*:*:*:*:*:*", "cpeNameId": "FCB85B1F-907F-4B32-B4D7-37B6BD2355F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.39:*:*:*:*:*:*:*", "cpeNameId": "1D6982FB-0E82-41B7-A209-5B5CF756BD9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.40:*:*:*:*:*:*:*", "cpeNameId": "B0B9A3E3-4FEC-413C-A97B-99E3FDDA1602"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.41:*:*:*:*:*:*:*", "cpeNameId": "65CBCBE3-A3F8-4CF6-BC30-24E77EBDE2A0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.42:*:*:*:*:*:*:*", "cpeNameId": "08CBF40F-1294-44E1-95AA-51B23466AD26"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.43:*:*:*:*:*:*:*", "cpeNameId": "68A8F4F3-A708-4BC7-B7FD-DCB35047847F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.44:*:*:*:*:*:*:*", "cpeNameId": "61DC1733-CCD9-47CD-8CA1-44C38CBFCC4F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.45:*:*:*:*:*:*:*", "cpeNameId": "ABB4790F-1BAE-4D38-BFAA-06F009031F1B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.46:*:*:*:*:*:*:*", "cpeNameId": "E9B9FB14-2860-4B64-AF08-18BA9BE7489B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.47:*:*:*:*:*:*:*", "cpeNameId": "26E01A49-3E16-4ED9-9681-62B3030AB68A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.48:*:*:*:*:*:*:*", "cpeNameId": "69C3C6D6-E1FA-4EC4-80C1-C02F61938549"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.49:*:*:*:*:*:*:*", "cpeNameId": "416FEB34-45F8-4398-8D94-3805E8C7F3DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.50:*:*:*:*:*:*:*", "cpeNameId": "BF545EBF-5A06-4463-A52C-939143C580E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.51:*:*:*:*:*:*:*", "cpeNameId": "5BD775DA-9D01-4314-96F7-743320925FA0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.52:*:*:*:*:*:*:*", "cpeNameId": "D0476FA4-F223-4687-AB62-A1AE985BF592"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.53:*:*:*:*:*:*:*", "cpeNameId": "B2F445F5-D0DA-4817-B4D5-137180AD5EE2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.54:*:*:*:*:*:*:*", "cpeNameId": "0C7A45E6-72C3-4478-BEFF-7BF02CB07848"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.55:*:*:*:*:*:*:*", "cpeNameId": "52C0AE2C-F11A-4174-ACBB-506C1945AB0C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.56:*:*:*:*:*:*:*", "cpeNameId": "C24A3322-D73A-4F67-9340-8EA61B5A9913"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.57:*:*:*:*:*:*:*", "cpeNameId": "5F55BFFB-BC77-4271-9D63-FBFC6DE367B2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.58:*:*:*:*:*:*:*", "cpeNameId": "09BE3ADC-1C8E-4BCC-A2D7-CCB66F4CE9B6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.59:*:*:*:*:*:*:*", "cpeNameId": "25C6AB87-321E-4ADB-9F0F-3F606FBDC85A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.60:*:*:*:*:*:*:*", "cpeNameId": "ADD78C70-C158-4BCE-950E-EDF40A095E89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.61:*:*:*:*:*:*:*", "cpeNameId": "F123EECC-8D3D-4E62-9071-7C1A6BCF61C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.62:*:*:*:*:*:*:*", "cpeNameId": "1DC81E13-D26C-4C7B-8932-91A5073057F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.63:*:*:*:*:*:*:*", "cpeNameId": "B3E66409-84A3-4541-9768-86B8A51FB328"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.64:*:*:*:*:*:*:*", "cpeNameId": "B0AEA29E-085F-407C-B0F3-20D641DBD474"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.65:*:*:*:*:*:*:*", "cpeNameId": "A025E699-97C5-4D0B-8082-84811E504EEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.66:*:*:*:*:*:*:*", "cpeNameId": "FF4394B2-3DAD-482E-9DB2-444FA72C90F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.67:*:*:*:*:*:*:*", "cpeNameId": "6ED98836-A7F3-43B9-838B-FF7C8C794A1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.68:*:*:*:*:*:*:*", "cpeNameId": "71C1BFAF-7826-4AB7-BE91-1AF3A92AC920"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.69:*:*:*:*:*:*:*", "cpeNameId": "9024E2C0-9705-46EE-BD72-1DC5C1D5D785"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.70:*:*:*:*:*:*:*", "cpeNameId": "97A1310D-F625-405E-8439-0B6C54C8F011"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.71:*:*:*:*:*:*:*", "cpeNameId": "BF4D80F6-8CAA-4B90-B41A-0BD714A4ED93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.72:*:*:*:*:*:*:*", "cpeNameId": "E54CF846-FAD0-4CF6-8A14-764972F7D25C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.73:*:*:*:*:*:*:*", "cpeNameId": "E31B871E-95F6-4B60-A6DA-3B354BC4EF44"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.74:*:*:*:*:*:*:*", "cpeNameId": "7920F5D1-2B11-49FF-B408-C65F37D88BA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.75:*:*:*:*:*:*:*", "cpeNameId": "A47B8AA9-37AC-49E5-B070-EE3DCE8C8677"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.76:*:*:*:*:*:*:*", "cpeNameId": "959BDC84-98A1-40BC-9D43-4D2EEF86C8EE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.77:*:*:*:*:*:*:*", "cpeNameId": "DEFA7CAA-BE16-492B-9870-4923CE650385"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.78:*:*:*:*:*:*:*", "cpeNameId": "55234DEE-0470-4F77-8FD7-B2DB8B6368B6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.79:*:*:*:*:*:*:*", "cpeNameId": "9824EA76-6C32-4A7B-B006-82D91D850B89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.80:*:*:*:*:*:*:*", "cpeNameId": "312A9A1F-D081-4587-A76D-C887235B4C72"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.81:*:*:*:*:*:*:*", "cpeNameId": "6B15290F-5938-4189-91FF-0B4C031D83C2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.82:*:*:*:*:*:*:*", "cpeNameId": "1EECAED3-55C7-4248-B820-CCCD7AC5E773"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.83:*:*:*:*:*:*:*", "cpeNameId": "CC455596-4F37-4CDE-9744-CC84AB6C0E0E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.84:*:*:*:*:*:*:*", "cpeNameId": "1BF22FC0-A0DE-4998-9596-36F1A60919B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.16.85:*:*:*:*:*:*:*", "cpeNameId": "8AA6F9DE-FBD3-4565-9C90-428D82F9E14C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.17:*:*:*:*:*:*:*", "cpeNameId": "1C3AFAF2-7B60-4F0C-B03C-5FB23A17280C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.17.1:*:*:*:*:*:*:*", "cpeNameId": "4CFBD0A5-3336-4C03-B114-6F24B3EDE0C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.17.2:*:*:*:*:*:*:*", "cpeNameId": "1A9A9411-A41C-4B05-AF63-0D77398E4BE4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.17.3:*:*:*:*:*:*:*", "cpeNameId": "3B1A96B9-0491-421C-A330-FC4942D56074"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.17.4:*:*:*:*:*:*:*", "cpeNameId": "8DA7D44B-1C84-4608-ADB0-36FEB71F4E44"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.17.5:*:*:*:*:*:*:*", "cpeNameId": "D706D66E-EEB4-431D-A085-7EB09F42E0F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.17.6:*:*:*:*:*:*:*", "cpeNameId": "74FB6A46-0FBA-4D8B-B54C-906EACFF73E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.17.7:*:*:*:*:*:*:*", "cpeNameId": "C5487351-49B5-43D6-8449-75C42F235EAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.17.8:*:*:*:*:*:*:*", "cpeNameId": "32C73375-6506-47D5-8DE9-749A737042B1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18:*:*:*:*:*:*:*", "cpeNameId": "F9D4BE1A-3B0A-4CDE-9B48-B4C0DD148C1C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18:rc1:*:*:*:*:*:*", "cpeNameId": "2C08DAAC-1B87-402B-B67D-A2E19BF96F72"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18:rc2:*:*:*:*:*:*", "cpeNameId": "B98E56E8-4D53-441B-A181-19DCB300435A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18:rc3:*:*:*:*:*:*", "cpeNameId": "EC696823-660D-4297-BA88-C66382298ABF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18:rc4:*:*:*:*:*:*", "cpeNameId": "8750CEAE-92CD-4BC5-991C-DF76F763EAB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18:rc5:*:*:*:*:*:*", "cpeNameId": "5D8CBF93-33A1-44E6-B546-246AAE0C400B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.0:*:*:*:*:*:*:*", "cpeNameId": "DDFDD9DC-91E2-469C-A81D-EF131DD78832"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.1:*:*:*:*:*:*:*", "cpeNameId": "915A4DF7-BFBB-4377-8FF5-F12B469805B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.2:*:*:*:*:*:*:*", "cpeNameId": "61EA132A-8D2F-4400-87BD-98DEB73C2F58"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.3:*:*:*:*:*:*:*", "cpeNameId": "B313C760-856E-4DBF-890C-240E2AA6BC95"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.4:*:*:*:*:*:*:*", "cpeNameId": "3591FD85-8FD0-46CE-9251-9C43339298A7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.5:*:*:*:*:*:*:*", "cpeNameId": "F31FEA15-EAFE-4BF4-8E2B-A8FC4A3367FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.6:*:*:*:*:*:*:*", "cpeNameId": "CB32ACB7-6117-4707-86A5-F913CA60E374"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.7:*:*:*:*:*:*:*", "cpeNameId": "D343B89B-7DEF-4D67-B107-05E6A2BD28C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.8:*:*:*:*:*:*:*", "cpeNameId": "7378B9B1-73C9-407B-AA9D-73E1F260005E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.9:*:*:*:*:*:*:*", "cpeNameId": "00178340-62AA-43C8-B841-7FAFFC043F5A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.10:*:*:*:*:*:*:*", "cpeNameId": "1863E12C-9335-4CA7-8903-1C678070902D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.11:*:*:*:*:*:*:*", "cpeNameId": "6EA68AAA-65DA-4CFE-9632-3B2A44EB40A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.12:*:*:*:*:*:*:*", "cpeNameId": "40E473C0-2FAB-413A-9682-D9D72FA7CCAF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.13:*:*:*:*:*:*:*", "cpeNameId": "CDC0061A-C366-48D4-950F-C46826707BE4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.14:*:*:*:*:*:*:*", "cpeNameId": "B233D49C-12C6-4F7E-B156-C7DCE793C029"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.15:*:*:*:*:*:*:*", "cpeNameId": "592E4CB0-FA15-40A8-9A88-1D2C798ED507"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.16:*:*:*:*:*:*:*", "cpeNameId": "E6EC955E-AD15-47A5-A573-7E9079D8B459"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.17:*:*:*:*:*:*:*", "cpeNameId": "99986C05-5DA3-45DF-8230-37B83B60F6DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.18:*:*:*:*:*:*:*", "cpeNameId": "FB1B3A35-091B-4474-A8F4-25C08D786F5E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.19:*:*:*:*:*:*:*", "cpeNameId": "1CAA99E1-8AC0-4AFA-8747-B4489B51AC66"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.20:*:*:*:*:*:*:*", "cpeNameId": "7DACC3BC-2976-4332-A117-7DF50B773BC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.21:*:*:*:*:*:*:*", "cpeNameId": "3F39EDFF-F17E-4502-90A7-4DA1F138372A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.22:*:*:*:*:*:*:*", "cpeNameId": "2FDAE819-7A17-4557-AD19-642879E1182F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.23:*:*:*:*:*:*:*", "cpeNameId": "FE2290B4-A963-40C6-AD68-34370800D2B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.24:*:*:*:*:*:*:*", "cpeNameId": "235EBC6D-7552-4A73-8E08-3AE548DBD5AF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.25:*:*:*:*:*:*:*", "cpeNameId": "336B63E1-2FB7-448D-A788-054BFEE89DD6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.26:*:*:*:*:*:*:*", "cpeNameId": "61F6061B-A43C-4C37-B595-B91E1F8B7105"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.27:*:*:*:*:*:*:*", "cpeNameId": "3C2E31EE-06B3-4846-9B90-489E8FB853F7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.28:*:*:*:*:*:*:*", "cpeNameId": "55CB6B1F-6698-47C6-8F29-E879975094F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.29:*:*:*:*:*:*:*", "cpeNameId": "89400C79-96C2-464F-B2A3-ADE57C4216BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.30:*:*:*:*:*:*:*", "cpeNameId": "9864D7F0-5414-4C5E-A30C-46A67178CB89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.31:*:*:*:*:*:*:*", "cpeNameId": "E54C1BE3-616D-40E5-B3E4-7FEF1926F641"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.32:*:*:*:*:*:*:*", "cpeNameId": "540C8FCB-ED21-42C2-AF0C-4FFDDC9EA949"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.33:*:*:*:*:*:*:*", "cpeNameId": "BF29E394-3C1F-48CA-89D7-F19C7D606EEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.34:*:*:*:*:*:*:*", "cpeNameId": "A898F0CF-0EF4-4314-A0E4-ACCA5888C8D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.35:*:*:*:*:*:*:*", "cpeNameId": "C823F021-BE62-47FD-B2A6-2B717AF21A49"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.36:*:*:*:*:*:*:*", "cpeNameId": "6F9F7FDA-3741-4D39-A0AB-A5378A54CAED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.37:*:*:*:*:*:*:*", "cpeNameId": "B12E94B9-0ACD-42A6-806F-C0F956BE7D0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.38:*:*:*:*:*:*:*", "cpeNameId": "046E1F1D-D2D5-4D3B-B02D-E509E52DC8F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.39:*:*:*:*:*:*:*", "cpeNameId": "F79826FA-BE26-40EF-8B58-992A444A016F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.40:*:*:*:*:*:*:*", "cpeNameId": "9E7E1DFB-6312-4620-8FD6-1678E7C0A930"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.41:*:*:*:*:*:*:*", "cpeNameId": "28D7776C-D60C-4278-88CF-3CD71BC7139B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.42:*:*:*:*:*:*:*", "cpeNameId": "2A963EE0-93C9-43DC-9ACC-E5609EC4CC59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.43:*:*:*:*:*:*:*", "cpeNameId": "73701687-A705-4A48-9984-996B82994F8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.44:*:*:*:*:*:*:*", "cpeNameId": "CDC11CC8-AA61-47D7-8AD0-B375F643AF6C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.45:*:*:*:*:*:*:*", "cpeNameId": "27D85C73-E2E1-4221-BA98-F5EF49839996"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.46:*:*:*:*:*:*:*", "cpeNameId": "08B323A1-7FC2-4B2E-8C08-71303053B4C4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.47:*:*:*:*:*:*:*", "cpeNameId": "46D96B0A-80FE-4FFD-A6E9-142BF845C350"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.48:*:*:*:*:*:*:*", "cpeNameId": "18D2D332-851F-4D9A-B3DD-E82627FC1A9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.49:*:*:*:*:*:*:*", "cpeNameId": "DE88F0D2-93F3-4A2B-BA54-E3A4BD34DECA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.50:*:*:*:*:*:*:*", "cpeNameId": "EEFB2967-F096-4CAE-9B1F-DD5AE90B7610"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.51:*:*:*:*:*:*:*", "cpeNameId": "B816BFFA-7439-479C-84DF-669697E09FEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.52:*:*:*:*:*:*:*", "cpeNameId": "E53F2A26-9D36-4950-85C8-39E4658EB9F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.53:*:*:*:*:*:*:*", "cpeNameId": "6729A6C7-F654-42CE-BF65-FF6D721D43E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.54:*:*:*:*:*:*:*", "cpeNameId": "26482DBA-47E0-4708-8F5E-C5FF92E44C33"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.55:*:*:*:*:*:*:*", "cpeNameId": "B39A27A3-C88B-4BF0-AADA-961257B1373E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.56:*:*:*:*:*:*:*", "cpeNameId": "FC7D4FF8-F7FE-4330-BADD-64738DA5954D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.57:*:*:*:*:*:*:*", "cpeNameId": "862F472A-9630-49AE-99CA-F03460E0FD2B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.58:*:*:*:*:*:*:*", "cpeNameId": "82FC879F-8E36-4045-89D9-2C2FE5EB03C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.59:*:*:*:*:*:*:*", "cpeNameId": "5E17937E-582B-4B6B-A9B1-004578BBD4E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.60:*:*:*:*:*:*:*", "cpeNameId": "40A3973B-6C46-4BEE-A0F2-B94ABD55B3A9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.61:*:*:*:*:*:*:*", "cpeNameId": "8F7DA9D6-8FD1-417B-92B2-342F88AAF757"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.62:*:*:*:*:*:*:*", "cpeNameId": "9FC70B62-2EF8-480C-B87F-B2538C2C92C5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.63:*:*:*:*:*:*:*", "cpeNameId": "65C52AE5-5F34-4C11-BAC5-BD8A2ECD5DA3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.64:*:*:*:*:*:*:*", "cpeNameId": "34401E8C-8EFA-44EF-8380-957152BE7BD8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.65:*:*:*:*:*:*:*", "cpeNameId": "BF906FA5-AAF6-4789-A72B-53210F4BA0E7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.66:*:*:*:*:*:*:*", "cpeNameId": "C303E030-6DC3-49CC-887D-A2E85FC91824"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.67:*:*:*:*:*:*:*", "cpeNameId": "2D980A8B-240A-44A1-A024-4A195F62DA46"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.68:*:*:*:*:*:*:*", "cpeNameId": "9B10FF41-0412-47D6-94A3-9FB0414972E5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.69:*:*:*:*:*:*:*", "cpeNameId": "BAD998E6-FBAB-4547-9812-C97362922FE3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.70:*:*:*:*:*:*:*", "cpeNameId": "FE042B21-3E19-4A1F-BC7B-5F412999C8D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.71:*:*:*:*:*:*:*", "cpeNameId": "8E589A57-9EEA-43A8-B751-65AEDCBA5EBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.72:*:*:*:*:*:*:*", "cpeNameId": "C0708F75-A272-461D-AC54-610C880B05FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.73:*:*:*:*:*:*:*", "cpeNameId": "9309A9A1-CCD2-4E14-ACCF-37CA3881E474"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.74:*:*:*:*:*:*:*", "cpeNameId": "C2B9924E-E542-4ED9-BF3B-6AA15288A545"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.75:*:*:*:*:*:*:*", "cpeNameId": "B4C12350-C8FC-45C9-A4E1-49EBAB0EABDF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.76:*:*:*:*:*:*:*", "cpeNameId": "9111BF49-BD08-43DC-A12A-DEBDA76D9639"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.77:*:*:*:*:*:*:*", "cpeNameId": "DB4ABECE-0600-4A46-A19C-CA856235940D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.78:*:*:*:*:*:*:*", "cpeNameId": "53BA34DD-CA76-4E31-9623-EEF2D80003E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.79:*:*:*:*:*:*:*", "cpeNameId": "0D20FC52-2D8E-4C84-9ED9-B9B67C41980F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.80:*:*:*:*:*:*:*", "cpeNameId": "B8CFFD61-70A0-40B9-8F6B-79DE799AFB34"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.81:*:*:*:*:*:*:*", "cpeNameId": "E87C6B62-BFE1-4E7F-8A08-BE3096DA3704"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.82:*:*:*:*:*:*:*", "cpeNameId": "A073A26A-0CD7-4859-BDCF-07C873E50EE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.83:*:*:*:*:*:*:*", "cpeNameId": "5D88F978-B18D-46CC-9CCA-63A39EEE0EE9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.84:*:*:*:*:*:*:*", "cpeNameId": "02B47410-42B7-4C91-B780-D4324FFE1BB5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.85:*:*:*:*:*:*:*", "cpeNameId": "9AE73ACC-86F0-4918-956F-81D6F33038B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.86:*:*:*:*:*:*:*", "cpeNameId": "5283AAAD-5F4D-46AA-9048-18103B049B8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.87:*:*:*:*:*:*:*", "cpeNameId": "A019755C-3B46-4FD3-BFAB-82CF5EAC84F7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.88:*:*:*:*:*:*:*", "cpeNameId": "54DCA64B-7B9C-4A8E-BC6C-B9D3D27FC058"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.89:*:*:*:*:*:*:*", "cpeNameId": "69894EDF-EFC1-41A2-BA9F-4E970B91B5C5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.90:*:*:*:*:*:*:*", "cpeNameId": "04FA57A5-0325-43E2-8FB8-96EBFDD3491D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.91:*:*:*:*:*:*:*", "cpeNameId": "1F4835B9-5B62-44D9-AACE-40C44269670C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.92:*:*:*:*:*:*:*", "cpeNameId": "955DE0A3-75D7-462A-9377-74292FBC6341"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.93:*:*:*:*:*:*:*", "cpeNameId": "D6E12C7F-315A-4EE0-B4FA-AD2AFB607360"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.94:*:*:*:*:*:*:*", "cpeNameId": "0934723A-985A-493A-A2D9-6D8C2229566F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.95:*:*:*:*:*:*:*", "cpeNameId": "20D1EC52-AAF2-4905-A653-EC8B98927F1B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.96:*:*:*:*:*:*:*", "cpeNameId": "666B8EDB-B957-4DE2-89E1-432393D0F4FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.97:*:*:*:*:*:*:*", "cpeNameId": "E60FE8A1-6A5D-4B84-9ADE-6ED50E56B3D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.98:*:*:*:*:*:*:*", "cpeNameId": "69DCB9B5-ECD8-4821-8301-657BC0EB5936"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.99:*:*:*:*:*:*:*", "cpeNameId": "A4BFD292-1CCF-49CE-BEF6-CCD2AD23BCBE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.100:*:*:*:*:*:*:*", "cpeNameId": "E2CC6E4F-2430-4053-B02A-E8D7BFB6D3AF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.101:*:*:*:*:*:*:*", "cpeNameId": "875D85CF-01D3-42D0-9F68-54F211512EA5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.102:*:*:*:*:*:*:*", "cpeNameId": "4015E4BA-544E-4034-A09D-0F26A37DC7DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.103:*:*:*:*:*:*:*", "cpeNameId": "9FF57CE8-73E2-4F25-8D82-B1D17024F4CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.104:*:*:*:*:*:*:*", "cpeNameId": "D3CB4966-9F15-459A-A1CA-DEFCDEF9CC2A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.105:*:*:*:*:*:*:*", "cpeNameId": "68DF0A6E-3B27-43B4-9FAE-EA4275B9F373"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.106:*:*:*:*:*:*:*", "cpeNameId": "B42541D4-595C-4FFE-839D-100EACCA6240"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.107:*:*:*:*:*:*:*", "cpeNameId": "A40753B8-610A-4157-AFA6-E5D4478B0336"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.108:*:*:*:*:*:*:*", "cpeNameId": "02084D31-1A6E-400E-AE2A-93E8D94F0E37"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.109:*:*:*:*:*:*:*", "cpeNameId": "E40A4E2C-FC77-4E2B-B9A2-948463D3BDAB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.110:*:*:*:*:*:*:*", "cpeNameId": "14CFFFE9-7DE0-4990-947F-07BFDD13FD96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.111:*:*:*:*:*:*:*", "cpeNameId": "2BF0E1DA-1756-4B18-BE30-EDEE9C61E1C2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.112:*:*:*:*:*:*:*", "cpeNameId": "C74C49FA-F24A-476C-BD5F-07458987BA4D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.113:*:*:*:*:*:*:*", "cpeNameId": "E298C83E-B3CB-407E-8552-50EBADDE68E4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.114:*:*:*:*:*:*:*", "cpeNameId": "D2EB3FF5-D7BF-4BD0-A7F6-3634CA03461A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.115:*:*:*:*:*:*:*", "cpeNameId": "752A887F-74E6-43F3-9A9F-70DC0CEF2054"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.116:*:*:*:*:*:*:*", "cpeNameId": "9E1D6133-AE78-4FA5-AE62-AB3A673D609E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.117:*:*:*:*:*:*:*", "cpeNameId": "8C4F542A-02E8-4044-B2E9-58394393AB14"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.118:*:*:*:*:*:*:*", "cpeNameId": "0065E5C1-1EE8-4646-8FD5-24F9BF694D6B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.119:*:*:*:*:*:*:*", "cpeNameId": "AFFDE9D3-AD3A-4F1A-B71F-F74505EBB108"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.120:*:*:*:*:*:*:*", "cpeNameId": "6A5FE4B4-896F-4A7E-9FAF-FDAD3DA8EED6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.121:*:*:*:*:*:*:*", "cpeNameId": "8534B956-8D0F-413D-8FAE-DCFD2044F8BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.122:*:*:*:*:*:*:*", "cpeNameId": "0EBA8A3C-CA75-41CA-AFAF-F51498E015BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.123:*:*:*:*:*:*:*", "cpeNameId": "AC45DD79-E0AA-4B4E-84F5-C98169C29661"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.124:*:*:*:*:*:*:*", "cpeNameId": "D2521793-534C-46AF-A53F-46FACB8CD23A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.125:*:*:*:*:*:*:*", "cpeNameId": "12CD0E92-5675-4FF0-9F98-427365913FC0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.126:*:*:*:*:*:*:*", "cpeNameId": "5AD835DC-8470-4BDC-8A50-0BF470B522A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.127:*:*:*:*:*:*:*", "cpeNameId": "FCC0AB74-D519-4931-8C2A-2E19ABD8CFE4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.128:*:*:*:*:*:*:*", "cpeNameId": "51C5B7F1-FBC7-472A-B1D2-FE0107EFED40"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.129:*:*:*:*:*:*:*", "cpeNameId": "EBC1F65E-5B87-48AA-84ED-EB4FF45F6CC5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.130:*:*:*:*:*:*:*", "cpeNameId": "0EE70948-23B6-42AD-8240-9E3C647B4AEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.131:*:*:*:*:*:*:*", "cpeNameId": "313E460E-3FF5-4346-BAF7-D4E40F2725BF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.132:*:*:*:*:*:*:*", "cpeNameId": "91FAE139-A381-4CB6-AD5C-BA097F8CA0F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.133:*:*:*:*:*:*:*", "cpeNameId": "11D0AF26-BA8B-48F4-83CB-564FBF3505F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.134:*:*:*:*:*:*:*", "cpeNameId": "EE94A171-F631-4BEC-B4D6-5DA5FE518A90"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.135:*:*:*:*:*:*:*", "cpeNameId": "99A0517F-6E2A-4257-8E0B-ABE31ED203D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.136:*:*:*:*:*:*:*", "cpeNameId": "353234F0-3D4F-4097-A9CE-19AFD3AC1141"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.137:*:*:*:*:*:*:*", "cpeNameId": "6CBCB4EB-B43A-456F-8347-78B6A0C77D9A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.138:*:*:*:*:*:*:*", "cpeNameId": "DAEAE81D-810E-470B-8771-C6D10318283C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.139:*:*:*:*:*:*:*", "cpeNameId": "09E363F2-7B35-494F-AB64-BC12A8F927F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.18.140:*:*:*:*:*:*:*", "cpeNameId": "B4CEB136-3486-42D6-BE13-A28F0130DFDC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.19:*:*:*:*:*:*:*", "cpeNameId": "C973645C-6420-4074-B349-D0258E3D194B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.19.1:*:*:*:*:*:*:*", "cpeNameId": "0615B00B-01C8-4962-B618-0F0077C902EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.19.2:*:*:*:*:*:*:*", "cpeNameId": "A989C578-40B5-4142-83F4-09DBB6C1D6C7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.19.3:*:*:*:*:*:*:*", "cpeNameId": "A00F6B4F-6EE2-4BE2-BDCF-D2B45F757BC9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.19.4:*:*:*:*:*:*:*", "cpeNameId": "B662D9C1-3A06-4D21-BE69-6C4CDD94904A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.19.5:*:*:*:*:*:*:*", "cpeNameId": "D52D426F-6E8E-4596-8A1C-3314BC96D9D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.19.6:*:*:*:*:*:*:*", "cpeNameId": "3AD744FD-0BEB-483F-815F-C6E51AFCF27E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.19.7:*:*:*:*:*:*:*", "cpeNameId": "7F6B22A7-0360-4212-B359-F3BB4407AE1A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:3.19.8:*:*:*:*:*:*:*", "cpeNameId": "743B104B-252C-4AFB-B236-9A67EB0AC44B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4:*:*:*:*:*:*:*", "cpeNameId": "D2B71FFC-740C-4263-B936-A3C1B18E5F9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0:*:*:*:*:*:*:*", "cpeNameId": "2467EFC2-0000-4EE5-AD91-D4EDD1009228"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0:-:*:*:*:*:*:*", "cpeNameId": "5738F26A-6508-4BF6-9CE4-A275613579B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0:rc1:*:*:*:*:*:*", "cpeNameId": "32082640-7AF2-43DC-861C-F7FDA79B77DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0:rc2:*:*:*:*:*:*", "cpeNameId": "F242212B-DE46-4CFF-B235-0B7C7ABAD0DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0:rc3:*:*:*:*:*:*", "cpeNameId": "A2FD0ED3-319A-4B99-A2B0-525C9A5EEAE0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0:rc4:*:*:*:*:*:*", "cpeNameId": "2837FE21-53FD-48DF-884C-B1D3118F280A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0:rc5:*:*:*:*:*:*", "cpeNameId": "05739160-269D-481A-BFB6-81FE05B65C37"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0:rc6:*:*:*:*:*:*", "cpeNameId": "8719C069-AD38-4A89-91A1-8029796ECD84"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0:rc7:*:*:*:*:*:*", "cpeNameId": "5CE65CCE-AFF6-4487-8CE9-8B45B2060D90"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0.0:*:*:*:*:*:*:*", "cpeNameId": "C74E8950-0E12-4101-95D1-E4ABEC24652B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0.1:*:*:*:*:*:*:*", "cpeNameId": "1405D246-2EB0-436A-88E3-C03CA8E8E3D7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0.2:*:*:*:*:*:*:*", "cpeNameId": "A0754CD9-F6FC-4BD9-A2AC-B00BD276E947"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0.3:*:*:*:*:*:*:*", "cpeNameId": "6A16B7AF-DE24-4294-9E0C-9B402E8A089D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0.4:*:*:*:*:*:*:*", "cpeNameId": "DC4F99B3-78CC-451C-A8B5-105EB9667877"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0.5:*:*:*:*:*:*:*", "cpeNameId": "0B384EE6-AE66-46B5-BBC4-30BF3DB7A9DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0.6:*:*:*:*:*:*:*", "cpeNameId": "EE0CD574-1AB5-4573-A704-B9CAF5530988"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0.7:*:*:*:*:*:*:*", "cpeNameId": "638DED59-9BB4-4E64-93F3-C949D3CF5A2D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0.8:*:*:*:*:*:*:*", "cpeNameId": "AF6AE96F-7CCD-461C-9355-98057BEC1163"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.0.9:*:*:*:*:*:*:*", "cpeNameId": "4686AB63-EA79-4CFD-AFFF-25B474BD744B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1:*:*:*:*:*:*:*", "cpeNameId": "1FD3A881-A85E-46E6-9F04-0C314F91A869"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1:-:*:*:*:*:*:*", "cpeNameId": "C6DDBD3E-D424-41BB-B833-75F7C2F0C29D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1:rc1:*:*:*:*:*:*", "cpeNameId": "6B1B5862-39FF-4533-A6F8-59DB9CB0D48D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1:rc2:*:*:*:*:*:*", "cpeNameId": "3F509385-C4B5-4E24-90C5-EE164AFF3168"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1:rc3:*:*:*:*:*:*", "cpeNameId": "1CA1E37C-026B-4EF1-9E1A-4EDE68FD1DD2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1:rc4:*:*:*:*:*:*", "cpeNameId": "11740404-17D1-4BAA-8744-153C7F8FA01D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1:rc5:*:*:*:*:*:*", "cpeNameId": "806EB383-7517-4BB0-8942-BBBB362C0745"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1:rc6:*:*:*:*:*:*", "cpeNameId": "6353B931-84FF-4DD3-AB70-3019EDE9CBBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1:rc7:*:*:*:*:*:*", "cpeNameId": "225B922C-F2C3-4DCF-A5C6-D66E365CEA33"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1:rc8:*:*:*:*:*:*", "cpeNameId": "9695C06A-6BF6-4E18-9A6C-1469B44753DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.0:*:*:*:*:*:*:*", "cpeNameId": "EA6178D9-E4A5-4DFF-8D43-5AB0131EB529"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.1:*:*:*:*:*:*:*", "cpeNameId": "A38CD077-9F8E-4572-B614-18D8DA41CE25"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.2:*:*:*:*:*:*:*", "cpeNameId": "F0D170E2-6B84-4760-B53F-830D6160C302"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.3:*:*:*:*:*:*:*", "cpeNameId": "C13A70C1-8523-44FE-B12D-B9035AAA5E6F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.4:*:*:*:*:*:*:*", "cpeNameId": "1FFB4199-8707-4CAD-8070-7E3066F8C868"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.5:*:*:*:*:*:*:*", "cpeNameId": "4418AD31-4638-4D43-BB32-AFF4C9B8C430"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.6:*:*:*:*:*:*:*", "cpeNameId": "C4F667A2-5EEB-4749-8EE1-C095E9EF5EB8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.7:*:*:*:*:*:*:*", "cpeNameId": "23ED7B6D-AC5F-4D76-8232-EB87EB162D91"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.8:*:*:*:*:*:*:*", "cpeNameId": "17C5A2CC-1906-46F6-982C-BDC57416938F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.9:*:*:*:*:*:*:*", "cpeNameId": "5EA18DB4-A8D4-4A3B-9BA9-35A529203034"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.10:*:*:*:*:*:*:*", "cpeNameId": "14FD8473-B0D4-4769-B4F1-B8C02974B0C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.11:*:*:*:*:*:*:*", "cpeNameId": "B08A1A95-E122-4BFC-9D4E-968E285140AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.12:*:*:*:*:*:*:*", "cpeNameId": "6F2E15B4-A02A-4DCC-AD8F-C32754D76BE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.13:*:*:*:*:*:*:*", "cpeNameId": "B44A7452-7F4C-4256-A6BA-92386941F1F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.14:*:*:*:*:*:*:*", "cpeNameId": "89A0B4D3-D197-4ACF-AABB-235B577E8835"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.15:*:*:*:*:*:*:*", "cpeNameId": "3F9E4481-B888-43A6-900E-6D059E24F4DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.16:*:*:*:*:*:*:*", "cpeNameId": "F376E601-5D90-4101-9249-D18FB4F379AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.17:*:*:*:*:*:*:*", "cpeNameId": "951AD518-B4DB-407A-A06A-6DF0E89752BA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.18:*:*:*:*:*:*:*", "cpeNameId": "AE6C698F-784D-4841-9352-B1A0F17613FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.19:*:*:*:*:*:*:*", "cpeNameId": "2BB57DCF-EAFB-4662-BE1F-0878957F6D71"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.20:*:*:*:*:*:*:*", "cpeNameId": "FDDD9390-36CC-48A2-BB78-32670780CC92"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.21:*:*:*:*:*:*:*", "cpeNameId": "48BC0496-DEEC-4779-BE64-E5E48C91AA6E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.22:*:*:*:*:*:*:*", "cpeNameId": "D2B401B4-792A-4339-9798-C1FC1EB14397"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.23:*:*:*:*:*:*:*", "cpeNameId": "1604FFD1-E146-4F99-BDA2-5B214E88FFF7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.24:*:*:*:*:*:*:*", "cpeNameId": "4F575F6F-792C-4930-B91B-ED38EA9DA5EE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.25:*:*:*:*:*:*:*", "cpeNameId": "1118DD03-426F-4352-875B-57BDA42AF9C5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.26:*:*:*:*:*:*:*", "cpeNameId": "F8E3B08B-72FE-4D6C-8D4E-04887E5E219E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.27:*:*:*:*:*:*:*", "cpeNameId": "1CB06853-22B6-40EA-ADBA-E429E2F967E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.28:*:*:*:*:*:*:*", "cpeNameId": "7D4A498E-31B1-4840-BE23-5AA268DA7CAE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.29:*:*:*:*:*:*:*", "cpeNameId": "CC42303B-B170-4BD6-A178-EC4B45171DA6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.30:*:*:*:*:*:*:*", "cpeNameId": "A9DF6117-615B-44EC-A8CF-63531F4F8B96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.31:*:*:*:*:*:*:*", "cpeNameId": "B25FC13E-EF58-4754-8035-6DF270313557"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.32:*:*:*:*:*:*:*", "cpeNameId": "1AD020F9-7A83-4BD3-A2E0-2AA1621A5FDE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.33:*:*:*:*:*:*:*", "cpeNameId": "E8C8975E-91CB-4038-8B7E-D36B9F3B6FAC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.34:*:*:*:*:*:*:*", "cpeNameId": "ABF7E934-AAF2-4335-A0B1-99BB16D3F751"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.35:*:*:*:*:*:*:*", "cpeNameId": "799F3962-5C6C-499B-B281-D38FDDDDFA05"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.36:*:*:*:*:*:*:*", "cpeNameId": "2D3FECAF-623C-4B31-B72B-04AB4D4007D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.37:*:*:*:*:*:*:*", "cpeNameId": "C89EE90D-595D-4E01-9574-4168BE770CBD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.38:*:*:*:*:*:*:*", "cpeNameId": "F65CB61E-C061-4406-BB74-A274E0F13AC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.39:*:*:*:*:*:*:*", "cpeNameId": "193A927C-9887-4A27-9759-44EB6E639C37"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.40:*:*:*:*:*:*:*", "cpeNameId": "1BC48C28-CC5A-47C7-9BA5-80E19916D9FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.41:*:*:*:*:*:*:*", "cpeNameId": "D465391D-62E6-4FF3-893B-1CBCCB1B5AEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.42:*:*:*:*:*:*:*", "cpeNameId": "9554D22C-0782-46F4-86CD-E321E7BCDA3C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.43:*:*:*:*:*:*:*", "cpeNameId": "ED423577-D69F-4F39-9D75-87F23173AD7A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.44:*:*:*:*:*:*:*", "cpeNameId": "044011D5-1E1C-4714-9B25-DAE9851DDFD8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.45:*:*:*:*:*:*:*", "cpeNameId": "22EF791D-7C93-4259-963D-9B874F241973"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.46:*:*:*:*:*:*:*", "cpeNameId": "DEFA34B6-5C67-453A-9BCF-92468BC0AF3C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.47:*:*:*:*:*:*:*", "cpeNameId": "7429D270-4092-44FF-B09B-01982EEDBA7A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.48:*:*:*:*:*:*:*", "cpeNameId": "B52A9A77-1E36-4973-BF17-27C7809BC6A6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.49:*:*:*:*:*:*:*", "cpeNameId": "FA0B3866-E1F1-49FE-AFE1-50C763DE1577"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.50:*:*:*:*:*:*:*", "cpeNameId": "99E2646C-4911-4586-B948-35F31C67FF12"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.51:*:*:*:*:*:*:*", "cpeNameId": "83DD1B25-C576-4C00-8B5E-DE5C5E0F9BFB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.1.52:*:*:*:*:*:*:*", "cpeNameId": "432CA14E-8ED4-4D41-9A1A-FA2EDE5DB5BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2:*:*:*:*:*:*:*", "cpeNameId": "8CEC5C41-7D54-46C5-B51A-C5B7000A261F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2:-:*:*:*:*:*:*", "cpeNameId": "404233EA-3A42-4415-807C-2795535D8FBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2:rc1:*:*:*:*:*:*", "cpeNameId": "01F7FC99-0732-43C2-8441-6075EF18BB1F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2:rc2:*:*:*:*:*:*", "cpeNameId": "C762486A-6A4C-423C-A02C-6ADFD08E43BA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2:rc3:*:*:*:*:*:*", "cpeNameId": "90E588AC-AB0B-48E5-A4EC-9961E9446253"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2:rc4:*:*:*:*:*:*", "cpeNameId": "C00F12B9-3630-403F-BD9F-ECEE434557B6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2:rc5:*:*:*:*:*:*", "cpeNameId": "D9578F1C-2720-4A5A-ADA6-BECCFC1A06B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2:rc6:*:*:*:*:*:*", "cpeNameId": "E6A0149C-F476-4468-8E02-E086BA1ED75C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2:rc7:*:*:*:*:*:*", "cpeNameId": "6EC892D2-6A54-4C68-A736-41A37FAB43DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2:rc8:*:*:*:*:*:*", "cpeNameId": "B3C3E05F-1E32-4C9F-9985-7861C068651A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2.0:*:*:*:*:*:*:*", "cpeNameId": "E7F7C907-29DD-4C0A-B62F-238D64F9CA52"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2.1:*:*:*:*:*:*:*", "cpeNameId": "BD114713-34F2-4BB0-B53A-EDFE8CC646C7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2.2:*:*:*:*:*:*:*", "cpeNameId": "BD0AD63F-B1DF-45C3-98B9-29E84D6847F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2.3:*:*:*:*:*:*:*", "cpeNameId": "AF52399D-722B-4373-AEB0-048D636AC2D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2.4:*:*:*:*:*:*:*", "cpeNameId": "F7C3C103-F75A-4C0C-8360-F8E059CFFE6E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2.5:*:*:*:*:*:*:*", "cpeNameId": "B1A5B3B7-86C0-4DF5-AF49-AEE88B639819"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2.6:*:*:*:*:*:*:*", "cpeNameId": "8CEA01FC-7DCC-4A1B-A083-9628EF0C034C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2.7:*:*:*:*:*:*:*", "cpeNameId": "8C8CB29B-5E42-4AB5-ABDF-380C0B00A9C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.2.8:*:*:*:*:*:*:*", "cpeNameId": "2019892E-BCC2-4F18-A09D-0C09DBB0B787"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3:*:*:*:*:*:*:*", "cpeNameId": "9C6EAC12-A07A-4F5F-B78B-EB96D2D331B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3:-:*:*:*:*:*:*", "cpeNameId": "73A7EEE5-C389-4C3B-BC22-FD0CDEC18F45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3:rc1:*:*:*:*:*:*", "cpeNameId": "69D84DB0-013C-4357-85CB-AB0756FAF083"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3:rc2:*:*:*:*:*:*", "cpeNameId": "20D634C6-571A-4D59-B99F-806C7C7548B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3:rc3:*:*:*:*:*:*", "cpeNameId": "ED000931-A13B-4853-B3D4-48D4DB46514D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3:rc4:*:*:*:*:*:*", "cpeNameId": "86DE3CD3-8810-4414-9AE9-230B9E548F43"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3:rc5:*:*:*:*:*:*", "cpeNameId": "9B329FAB-EC7B-4C85-A23B-F56E55260B89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3:rc6:*:*:*:*:*:*", "cpeNameId": "19AB03B2-6B8E-48A6-8D90-AD40402612EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3:rc7:*:*:*:*:*:*", "cpeNameId": "3A65D171-7A9B-43D9-BD44-4BD4AFCD61BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3.0:*:*:*:*:*:*:*", "cpeNameId": "554AE6B2-BA69-4DD7-A0E2-05897523452F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3.1:*:*:*:*:*:*:*", "cpeNameId": "AC05011D-579A-4D7B-9A9B-39BFE3CE1E00"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3.2:*:*:*:*:*:*:*", "cpeNameId": "0DCE2CF9-7D6A-4032-B153-628BB91676FA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3.3:*:*:*:*:*:*:*", "cpeNameId": "40C7AB11-ABD7-49EE-98A7-8E3E957B197B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3.4:*:*:*:*:*:*:*", "cpeNameId": "7A430ED7-4026-4E2C-967E-BCA3B17D9E39"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3.5:*:*:*:*:*:*:*", "cpeNameId": "B741D92F-7E21-4E6D-A751-19851AD4D07E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.3.6:*:*:*:*:*:*:*", "cpeNameId": "75E10032-3935-488F-B062-EA74AD1C6F42"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4:*:*:*:*:*:*:*", "cpeNameId": "0CC82592-969E-42E2-995A-77254AC2858C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4:-:*:*:*:*:*:*", "cpeNameId": "DCDA1601-B9CC-4CAB-9045-7E418185A857"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4:rc1:*:*:*:*:*:*", "cpeNameId": "D57BA72B-FFA4-4EDD-8609-41604BD7A8FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4:rc2:*:*:*:*:*:*", "cpeNameId": "428C4926-D233-44E4-9B15-420D7DF499BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4:rc3:*:*:*:*:*:*", "cpeNameId": "B3340F47-0DC7-497C-A2C4-0A2ACCC36821"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4:rc4:*:*:*:*:*:*", "cpeNameId": "C349F878-71AE-4CB6-95C2-A0E2D2869BDB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4:rc5:*:*:*:*:*:*", "cpeNameId": "E13E25C1-84C9-4A2B-AB57-E2860569C7B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4:rc6:*:*:*:*:*:*", "cpeNameId": "8EC67A5C-56D4-48A6-9A12-290C0BAF8BB7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4:rc7:*:*:*:*:*:*", "cpeNameId": "72A4C1AB-870E-43CE-B616-36F9036E8040"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4:rc8:*:*:*:*:*:*", "cpeNameId": "0D491AC8-EF6D-49D2-ABE3-14C900AEDC84"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.0:*:*:*:*:*:*:*", "cpeNameId": "F76C4499-1C1F-40BB-B72D-3CCBE24F9983"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.0-96.119:*:*:*:*:*:*:*", "cpeNameId": "FA8FC4BC-B432-45F3-BA3A-36629C2FB2BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.1:*:*:*:*:*:*:*", "cpeNameId": "7FE8FBE3-1F3E-4E59-971E-80D2291E9F04"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.2:*:*:*:*:*:*:*", "cpeNameId": "933EC82A-7117-4C3B-BAC3-B730E8177D68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.3:*:*:*:*:*:*:*", "cpeNameId": "4E8A4278-3F30-4F35-9A7D-E4ACB320AB90"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.4:*:*:*:*:*:*:*", "cpeNameId": "EFCC9662-D66A-4E22-BCF6-D92D4FC3C9BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.5:*:*:*:*:*:*:*", "cpeNameId": "5E5D47B0-7380-4061-ACA1-07FA5F5EE3F7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.6:*:*:*:*:*:*:*", "cpeNameId": "5AAADD86-5C57-4D1C-BAF8-A41D33BA47B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.7:*:*:*:*:*:*:*", "cpeNameId": "C3A6FFE6-7A8C-4F45-9950-821FEDE12755"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.8:*:*:*:*:*:*:*", "cpeNameId": "CD6D9EA8-5907-480D-826A-CFD853176989"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.9:*:*:*:*:*:*:*", "cpeNameId": "697729A2-369A-4485-A6D2-9128FBDEF13D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.10:*:*:*:*:*:*:*", "cpeNameId": "9C401888-D849-494A-8807-0F4A1B7F3B90"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.11:*:*:*:*:*:*:*", "cpeNameId": "41ADE2D0-F20F-4609-BE2E-2A52D8B77B4C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.12:*:*:*:*:*:*:*", "cpeNameId": "4624CFD6-9443-42DD-BF38-1E4C0F85942A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.13:*:*:*:*:*:*:*", "cpeNameId": "BFC70B7E-E345-473D-B885-17CB43DEFDE5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.14:*:*:*:*:*:*:*", "cpeNameId": "BC242831-9967-4C30-81DC-DF10A52E8A9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.15:*:*:*:*:*:*:*", "cpeNameId": "68D73D19-ABB3-4703-8D3D-006872776B09"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.16:*:*:*:*:*:*:*", "cpeNameId": "3BBB71CE-8252-4DAF-B2E0-9D4895CFAFF4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.17:*:*:*:*:*:*:*", "cpeNameId": "61C83B74-8A5A-482F-B7CB-DFF85EE2A312"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.18:*:*:*:*:*:*:*", "cpeNameId": "87EF4F10-A5FA-4EA9-BB2C-B7AE2D0E2731"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.19:*:*:*:*:*:*:*", "cpeNameId": "6A3F3026-8C21-4CCB-A985-C93A889BEFF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.20:*:*:*:*:*:*:*", "cpeNameId": "156A1C57-B0CC-403A-9A99-F087A22AB63E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.21:*:*:*:*:*:*:*", "cpeNameId": "5B9FCBCD-BDA2-45BF-BF11-2DB2990B0E8F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.22:*:*:*:*:*:*:*", "cpeNameId": "FEB1E36A-8777-49D3-B7AD-75F2D75C9AFF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.23:*:*:*:*:*:*:*", "cpeNameId": "A5F83DF2-1CE5-4789-806F-A232112BDE55"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.24:*:*:*:*:*:*:*", "cpeNameId": "9812732F-FD5D-4295-ADE7-D9F6E4126590"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.25:*:*:*:*:*:*:*", "cpeNameId": "1EDD6CD5-A9B7-4969-BCA1-18A7E453F27F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.26:*:*:*:*:*:*:*", "cpeNameId": "5A3C3EA9-B55D-4700-82DA-253D22CD1099"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.27:*:*:*:*:*:*:*", "cpeNameId": "D6AC0EFD-9C1B-45F5-BAEB-B18D8B02AAF3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.28:*:*:*:*:*:*:*", "cpeNameId": "B31EBB97-91D1-4EAB-BB83-DBB22040DDB6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.29:*:*:*:*:*:*:*", "cpeNameId": "D3C8008A-8BFC-4A96-887F-416BE9E64691"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.30:*:*:*:*:*:*:*", "cpeNameId": "889B12BB-2EDF-4EA0-8A84-62F616E4053D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.31:*:*:*:*:*:*:*", "cpeNameId": "1FECAF9A-B388-429C-8ACA-9CD4E510E0B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.32:*:*:*:*:*:*:*", "cpeNameId": "FC81D3C5-1E0B-47F7-BB37-585C75FE67AD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.33:*:*:*:*:*:*:*", "cpeNameId": "F823ED2B-606F-4195-997D-331C64592007"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.34:*:*:*:*:*:*:*", "cpeNameId": "B45CC685-7AF6-45F4-8D75-1FCE15D97A6B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.35:*:*:*:*:*:*:*", "cpeNameId": "C850B81D-E6A8-4FCB-B155-B63AFC9A4832"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.36:*:*:*:*:*:*:*", "cpeNameId": "C61E381E-000B-4731-AF8D-90BF59F11A85"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.37:*:*:*:*:*:*:*", "cpeNameId": "24FED760-B194-43AE-9B94-115470E988D6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.38:*:*:*:*:*:*:*", "cpeNameId": "878B3AEA-B1D0-4A02-BC68-376A6286D5DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.39:*:*:*:*:*:*:*", "cpeNameId": "9774A99C-3F08-496D-AAF3-A830DB1E5717"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.40:*:*:*:*:*:*:*", "cpeNameId": "C179136B-E80A-4B7C-A763-39BA95DD48D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.41:*:*:*:*:*:*:*", "cpeNameId": "44E2FCC4-8347-446A-9CBD-BE5CCABCB0E4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.42:*:*:*:*:*:*:*", "cpeNameId": "451A60BC-B7FE-43C5-9F7D-99F56719B263"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.43:*:*:*:*:*:*:*", "cpeNameId": "05E45126-5143-4405-B7D6-679436FF23E9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.44:*:*:*:*:*:*:*", "cpeNameId": "F6BDB13D-4380-4230-A021-51155E9CD1B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.45:*:*:*:*:*:*:*", "cpeNameId": "356F009A-A387-4214-A12D-68F7FE52D6C9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.46:*:*:*:*:*:*:*", "cpeNameId": "CCAF1CFF-7B49-4A7C-ADFB-8EB68042F3D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.47:*:*:*:*:*:*:*", "cpeNameId": "8FDA50AF-A48C-496F-8BAA-1D39488F88B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.48:*:*:*:*:*:*:*", "cpeNameId": "9CCE40F5-05B5-44AA-BDA0-6268E8E16F89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.49:*:*:*:*:*:*:*", "cpeNameId": "47151518-D679-4658-8B7D-77F977FC6B20"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.50:*:*:*:*:*:*:*", "cpeNameId": "F2BEC0AE-3B47-4DC7-BBF2-FF7AFD9744AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.51:*:*:*:*:*:*:*", "cpeNameId": "03CF782E-4825-46C5-92C6-1F9958428D4E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.52:*:*:*:*:*:*:*", "cpeNameId": "CE25CEF9-6DE1-4CB6-8685-9ECE06228051"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.53:*:*:*:*:*:*:*", "cpeNameId": "44AD121F-711F-44FC-A42D-EEE3B49EF09B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.54:*:*:*:*:*:*:*", "cpeNameId": "D8545A61-0DE7-4887-A656-6AC1F6D99FA4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.55:*:*:*:*:*:*:*", "cpeNameId": "812EE9D9-8B2A-4184-B2A3-1AE01523E622"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.56:*:*:*:*:*:*:*", "cpeNameId": "8D293DF8-3B9F-4930-8F77-29BE00E2A3FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.57:*:*:*:*:*:*:*", "cpeNameId": "38589104-9F4F-4999-8D51-B1E5D6CE806B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.58:*:*:*:*:*:*:*", "cpeNameId": "E394318F-A063-476A-89D0-696A69816F05"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.59:*:*:*:*:*:*:*", "cpeNameId": "9942A355-2E0F-445D-914A-ABF78CCBC64F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.60:*:*:*:*:*:*:*", "cpeNameId": "4616A735-3236-4490-9E4A-CF13C9198115"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.61:*:*:*:*:*:*:*", "cpeNameId": "300906FB-8359-4D31-9C79-B8B654D390F4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.62:*:*:*:*:*:*:*", "cpeNameId": "2323C950-541C-42D2-AD38-2ED9A3870714"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.63:*:*:*:*:*:*:*", "cpeNameId": "9138BACD-3DB4-4D5B-A566-F9BCF825B1FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.64:*:*:*:*:*:*:*", "cpeNameId": "D4B84632-21BF-41F4-BE43-63DF430DD2DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.65:*:*:*:*:*:*:*", "cpeNameId": "7A6C5D5A-5258-4AF9-8102-E570944A3E58"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.66:*:*:*:*:*:*:*", "cpeNameId": "C9AF7B6B-F888-4211-AD00-F9B56C34D41C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.67:*:*:*:*:*:*:*", "cpeNameId": "EC917E6E-35A5-45BB-AE1E-1079402EA052"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.68:*:*:*:*:*:*:*", "cpeNameId": "ECE8EEAA-08BD-43F9-A8ED-CB46263E4373"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.69:*:*:*:*:*:*:*", "cpeNameId": "8C9C110C-0041-4B82-BDD7-F54A5030D278"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.70:*:*:*:*:*:*:*", "cpeNameId": "F751372D-061C-47E2-B8C5-CB32070152B1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.71:*:*:*:*:*:*:*", "cpeNameId": "B3729C0E-0348-4130-B789-2CE7EA174E4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.72:*:*:*:*:*:*:*", "cpeNameId": "CB32A8F5-4963-457B-AFA2-426B4EDB82AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.73:*:*:*:*:*:*:*", "cpeNameId": "D84BE462-BD26-4182-8BA9-0B9EAB4650D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.74:*:*:*:*:*:*:*", "cpeNameId": "D5ED1938-4B1C-4997-8083-C7E1CD229E72"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.75:*:*:*:*:*:*:*", "cpeNameId": "38E49F41-BA58-4A52-8420-6A2FF96516D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.76:*:*:*:*:*:*:*", "cpeNameId": "20077160-E24C-47C3-B452-81625E2B87BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.77:*:*:*:*:*:*:*", "cpeNameId": "1C995C66-DCAD-450A-8DEC-5480C57765E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.78:*:*:*:*:*:*:*", "cpeNameId": "06EA7B0F-FE44-439E-8B6E-DA05D4ACD725"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.79:*:*:*:*:*:*:*", "cpeNameId": "5185E87B-AE55-427C-A0E4-8E016F945043"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.80:*:*:*:*:*:*:*", "cpeNameId": "B145CA1C-23F8-46A4-97FC-57471354BC07"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.81:*:*:*:*:*:*:*", "cpeNameId": "B46BADB5-A906-4989-A597-BB056C289302"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.82:*:*:*:*:*:*:*", "cpeNameId": "395C2214-5D0D-4E6E-821C-93B4BA0B3D7E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.83:*:*:*:*:*:*:*", "cpeNameId": "C7F9481A-F00C-4A7D-A28C-52A2F0FA0DAF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.84:*:*:*:*:*:*:*", "cpeNameId": "E350E11E-1917-4413-BB8F-5D9EAEB49411"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.85:*:*:*:*:*:*:*", "cpeNameId": "0D076280-76F9-4824-A0C8-B5F6C086DCE6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.86:*:*:*:*:*:*:*", "cpeNameId": "2ABB7C71-884C-4E5D-85F3-4AC8FA166985"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.87:*:*:*:*:*:*:*", "cpeNameId": "DD6C21E4-7565-4317-B325-96EA55C92F33"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.88:*:*:*:*:*:*:*", "cpeNameId": "608B4295-455B-4572-A5A8-03BEB29D75CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.89:*:*:*:*:*:*:*", "cpeNameId": "88644B26-E539-4D71-91F5-9B2749B8706D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.90:*:*:*:*:*:*:*", "cpeNameId": "2997B73D-574C-45C1-88FA-7AD9B7C963F4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.91:*:*:*:*:*:*:*", "cpeNameId": "D55C911B-0765-456B-9985-8CBFFB0954AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.92:*:*:*:*:*:*:*", "cpeNameId": "4C8AF219-5201-49E9-94A4-1BE15403A27D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.93:*:*:*:*:*:*:*", "cpeNameId": "164A1A90-B36C-4454-B89D-6719CA368178"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.94:*:*:*:*:*:*:*", "cpeNameId": "31D8CD9C-DADC-46D8-B8CA-77FCD24C8691"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.95:*:*:*:*:*:*:*", "cpeNameId": "8CD707EB-3889-4DC9-839B-EB9F5CDD4587"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.96:*:*:*:*:*:*:*", "cpeNameId": "0CB79FE3-A3D1-4F1D-9A44-88FD75CE1C13"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.97:*:*:*:*:*:*:*", "cpeNameId": "F3990863-8D9C-4374-B274-E62B91534FC2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.98:*:*:*:*:*:*:*", "cpeNameId": "0726D23D-8D13-4988-8654-D33A1386B6FA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.99:*:*:*:*:*:*:*", "cpeNameId": "C3D8AB2A-6DEC-40D8-AD3E-7447A9736092"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.100:*:*:*:*:*:*:*", "cpeNameId": "F903471F-7DC5-4168-BAF1-AE02C3E43321"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.101:*:*:*:*:*:*:*", "cpeNameId": "C94D5AD3-E24B-4D44-AF5F-09128A434F3F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.102:*:*:*:*:*:*:*", "cpeNameId": "DBBDB1E6-0160-417F-8EBA-E4A143CA41D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.103:*:*:*:*:*:*:*", "cpeNameId": "18570476-ABFC-4A8C-BBEF-AED9E53F6C34"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.104:*:*:*:*:*:*:*", "cpeNameId": "1B28A2BA-810E-4B40-83E9-4BED770D72EC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.105:*:*:*:*:*:*:*", "cpeNameId": "C25BB8A0-D93C-4071-BBED-99386B18DAE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.106:*:*:*:*:*:*:*", "cpeNameId": "2B75F5E1-5335-4AD7-9441-F3CBA98EF747"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.107:*:*:*:*:*:*:*", "cpeNameId": "449985A4-B44D-4C2A-9413-1BDA709D9E01"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.108:*:*:*:*:*:*:*", "cpeNameId": "E04D3E71-E5C0-40B4-AC12-FFE336978A74"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.109:*:*:*:*:*:*:*", "cpeNameId": "F3940127-6BEE-4F2E-B44A-FAACA6BFF9F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.110:*:*:*:*:*:*:*", "cpeNameId": "7F88E543-8723-481B-BBE2-757F82EA8100"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.111:*:*:*:*:*:*:*", "cpeNameId": "ED95CF08-486A-43C7-9DFE-966644DCC377"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.112:*:*:*:*:*:*:*", "cpeNameId": "11F03D25-057A-4661-9D80-0287A9FC3E46"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.113:*:*:*:*:*:*:*", "cpeNameId": "B6607762-D34E-4781-B5FB-A0663816E6BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.114:*:*:*:*:*:*:*", "cpeNameId": "0543C55A-12A4-4B28-BA66-452EFFAC7098"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.115:*:*:*:*:*:*:*", "cpeNameId": "C8AFB8B7-895F-4DFE-A789-B5B8891EF694"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.116:*:*:*:*:*:*:*", "cpeNameId": "4C78171E-3ADE-4991-8A87-86C1CAB609EC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.117:*:*:*:*:*:*:*", "cpeNameId": "A52DAAA6-AEDB-4A29-AB9A-B6F61101C486"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.118:*:*:*:*:*:*:*", "cpeNameId": "5C8DB1F1-2B65-41C5-AAC5-4B49BB90F6F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.119:*:*:*:*:*:*:*", "cpeNameId": "7636EB46-4587-49F1-A3DE-E99CD375F5D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.120:*:*:*:*:*:*:*", "cpeNameId": "FFBA4ECA-45CC-480D-A349-474A02528A5F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.121:*:*:*:*:*:*:*", "cpeNameId": "53674370-5B99-49DE-B239-324189EB5699"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.122:*:*:*:*:*:*:*", "cpeNameId": "E2DD9DE8-2CB7-487E-846A-56FAD08E199A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.123:*:*:*:*:*:*:*", "cpeNameId": "C15400AA-A918-43A6-90B9-9C7975A9D308"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.124:*:*:*:*:*:*:*", "cpeNameId": "BBB6E83C-5BA4-4226-9E3B-C23F3FCE248D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.125:*:*:*:*:*:*:*", "cpeNameId": "58B7AA16-617E-40FE-B192-6ABD6C1E05C4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.126:*:*:*:*:*:*:*", "cpeNameId": "C4C1F614-3186-456E-BD0F-3715273D010F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.127:*:*:*:*:*:*:*", "cpeNameId": "5E2E2078-968E-4730-8CAA-59B48CC007CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.128:*:*:*:*:*:*:*", "cpeNameId": "19D36CCE-3249-41DA-926C-42ED9DAF91C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.129:*:*:*:*:*:*:*", "cpeNameId": "DEE1AE91-0A90-461F-962A-F92EDA0DEA6F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.130:*:*:*:*:*:*:*", "cpeNameId": "60B9BFCA-ADCF-466E-B401-8BE4E2D4F6A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.131:*:*:*:*:*:*:*", "cpeNameId": "246A3AC9-CCED-4A3B-B82F-F26E6A79E3F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.132:*:*:*:*:*:*:*", "cpeNameId": "EBDB64FC-B4F1-4680-B1B0-1C848129B1B1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.133:*:*:*:*:*:*:*", "cpeNameId": "246F341D-A30B-4398-9F47-E6007ADD9411"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.134:*:*:*:*:*:*:*", "cpeNameId": "7AA07554-42F7-481E-849B-AEA632431934"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.135:*:*:*:*:*:*:*", "cpeNameId": "90C944B1-DB85-4B52-BD32-DDEB7A2A549E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.136:*:*:*:*:*:*:*", "cpeNameId": "7B06530D-A42B-4037-9FDB-7193ADC8697B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.137:*:*:*:*:*:*:*", "cpeNameId": "2329C964-A06C-46AB-A09B-16FCD04225BF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.138:*:*:*:*:*:*:*", "cpeNameId": "C459456B-DAC6-4628-AD4D-07FEC30EDC0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.139:*:*:*:*:*:*:*", "cpeNameId": "E896A785-A21A-4E37-8FD7-6F648D85C73D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.140:*:*:*:*:*:*:*", "cpeNameId": "5B870D55-093B-4A4E-A4BA-92ADF186D4AA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.141:*:*:*:*:*:*:*", "cpeNameId": "EAF9150A-686D-46A2-9388-47A1A60D263D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.142:*:*:*:*:*:*:*", "cpeNameId": "2AAE9D72-ECB4-4C43-BE20-5AC5FAAAD7EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.143:*:*:*:*:*:*:*", "cpeNameId": "A929B4C2-CED9-48D3-BE7A-A06751C50A82"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.144:*:*:*:*:*:*:*", "cpeNameId": "D52CB870-E71C-4ED1-9575-89C55E22371F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.145:*:*:*:*:*:*:*", "cpeNameId": "07CAE2BD-3C40-4DB7-B7F4-7F3F188C288B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.146:*:*:*:*:*:*:*", "cpeNameId": "F66FDF27-78C6-4AE8-BFFF-74FD08E25D2B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.147:*:*:*:*:*:*:*", "cpeNameId": "6EF3FCC0-FBD5-4575-ACDC-14A6CBD4C33C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.148:*:*:*:*:*:*:*", "cpeNameId": "5E07F013-A8BD-4FAC-93E4-99A687FAC737"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.149:*:*:*:*:*:*:*", "cpeNameId": "A304D006-C083-43DB-814C-92AD93A16406"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.150:*:*:*:*:*:*:*", "cpeNameId": "FE1937F5-7F68-4712-A42B-352F98DBCB73"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.151:*:*:*:*:*:*:*", "cpeNameId": "302DB07A-BCEB-473E-B83D-7144D60975C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.152:*:*:*:*:*:*:*", "cpeNameId": "AF045BDA-D8EE-480F-B055-2C8F1F6BB441"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.153:*:*:*:*:*:*:*", "cpeNameId": "7E53F5F7-2160-4D23-A389-6C177EB97920"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.154:*:*:*:*:*:*:*", "cpeNameId": "A352CE2F-3599-42AA-A999-8D2A8AE77385"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.155:*:*:*:*:*:*:*", "cpeNameId": "68E34650-597F-4BB5-B655-AAF63A824DFC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.156:*:*:*:*:*:*:*", "cpeNameId": "A9B206FB-6ED1-43D6-93B6-E5D295B69BFA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.157:*:*:*:*:*:*:*", "cpeNameId": "83CB40AA-9524-4C0B-BB83-7DDCCE05A165"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.158:*:*:*:*:*:*:*", "cpeNameId": "98E50A5B-D1F8-4A2E-BFFA-DFD9318A4C0C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.159:*:*:*:*:*:*:*", "cpeNameId": "A68C2E01-EAD7-4504-AC51-B6895536A2A7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.160:*:*:*:*:*:*:*", "cpeNameId": "265719AB-6D6A-4AE3-A264-8998A6B51417"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.161:*:*:*:*:*:*:*", "cpeNameId": "29283AA7-C999-41CF-B9EA-AF62EBAE25AA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.162:*:*:*:*:*:*:*", "cpeNameId": "026D8844-B72E-449A-AD9D-6DA20D6B2461"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.163:*:*:*:*:*:*:*", "cpeNameId": "CF2684AA-9D52-4D0C-B9C0-EA458DBA0275"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.164:*:*:*:*:*:*:*", "cpeNameId": "CF99A96E-B230-41AD-8BC4-5870661F4FE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.165:*:*:*:*:*:*:*", "cpeNameId": "382060D4-41AC-4E8F-B469-5012B74CA970"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.166:*:*:*:*:*:*:*", "cpeNameId": "7C529480-7A93-4F29-B9B6-DC8415C2C224"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.167:*:*:*:*:*:*:*", "cpeNameId": "DF37EDB8-03D5-48A1-825C-6AF1031DAADF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.168:*:*:*:*:*:*:*", "cpeNameId": "6D13EE22-1FB2-4497-BD34-EE71D20FB8BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.169:*:*:*:*:*:*:*", "cpeNameId": "BC302B8B-8B9A-4824-97CE-7E6433BF32B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.170:*:*:*:*:*:*:*", "cpeNameId": "7CFD9E7B-FE01-4B66-A9A6-1368D013765A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.171:*:*:*:*:*:*:*", "cpeNameId": "DED1A683-EBE7-497B-929A-313AB2AC0925"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.172:*:*:*:*:*:*:*", "cpeNameId": "A0C2E3CD-4225-4F59-9399-141ECB64DCCA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.173:*:*:*:*:*:*:*", "cpeNameId": "64951069-6F32-4B2C-876D-F2768FAB072F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.174:*:*:*:*:*:*:*", "cpeNameId": "EBB28714-885F-44E1-A0F8-51679623F675"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.175:*:*:*:*:*:*:*", "cpeNameId": "1BA05B10-74CC-41CC-AC4B-5F983EB9EF6A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.176:*:*:*:*:*:*:*", "cpeNameId": "207CE836-9B16-4D97-A92E-937EA92B2454"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.177:*:*:*:*:*:*:*", "cpeNameId": "900CD12E-534F-4104-9453-98073C4B9FE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.178:*:*:*:*:*:*:*", "cpeNameId": "662D17D5-0313-498C-BE52-48C9C2164929"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.179:*:*:*:*:*:*:*", "cpeNameId": "FDA8B29F-BFF6-4550-832D-9E76E48FA652"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.180:*:*:*:*:*:*:*", "cpeNameId": "0E55779B-C14D-49B2-AAD3-9E02A0612FA0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.181:*:*:*:*:*:*:*", "cpeNameId": "08726DAC-BA17-4EC2-BADB-177D34704C1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.182:*:*:*:*:*:*:*", "cpeNameId": "00DADA74-AD7D-4030-81F7-B8024E9EDD39"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.183:*:*:*:*:*:*:*", "cpeNameId": "41DA6AEA-5407-416C-8E04-738A6BFD2AFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.184:*:*:*:*:*:*:*", "cpeNameId": "CB0669FC-A028-4A45-873B-C1E5B60A153F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.185:*:*:*:*:*:*:*", "cpeNameId": "EA578486-31F1-4809-81A3-09B130EFF1EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.186:*:*:*:*:*:*:*", "cpeNameId": "5A48466E-5175-48F2-AB12-20FF8FD39A91"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.187:*:*:*:*:*:*:*", "cpeNameId": "A0AF33BB-CCA4-4EF3-AD37-A6BDA592201E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.188:*:*:*:*:*:*:*", "cpeNameId": "C55F2CFE-9058-4F93-9D1A-9959655533E3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.189:*:*:*:*:*:*:*", "cpeNameId": "1923663A-BA21-4246-9A05-53EEB987A59F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.190:*:*:*:*:*:*:*", "cpeNameId": "3D3E3AC9-B829-41A9-A4BF-E0D25EE83CB3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.191:*:*:*:*:*:*:*", "cpeNameId": "0209D8A9-58CB-464D-98E9-C55849C5EFBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.192:*:*:*:*:*:*:*", "cpeNameId": "E5ADF739-9681-4488-91EF-1DEB057300AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.193:*:*:*:*:*:*:*", "cpeNameId": "7611677A-A4AF-496B-89BD-AD6FEE729557"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.194:*:*:*:*:*:*:*", "cpeNameId": "C4697BBB-B20E-4481-9CB1-47705D6B0A64"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.195:*:*:*:*:*:*:*", "cpeNameId": "58471B55-C8F3-462E-A365-CDE52A6BCBA9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.196:*:*:*:*:*:*:*", "cpeNameId": "7DE3F30B-22F8-4308-A4DD-69346EFAEC9C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.197:*:*:*:*:*:*:*", "cpeNameId": "0D16F9C5-E2D5-4A37-904F-9B882AD86309"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.198:*:*:*:*:*:*:*", "cpeNameId": "91BB87DE-E086-4D53-AB3A-69224410D542"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.199:*:*:*:*:*:*:*", "cpeNameId": "281A834B-F437-4D42-A128-2F404AD98C03"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.200:*:*:*:*:*:*:*", "cpeNameId": "CFDE6A44-7410-45AA-B03F-518BB2E3D029"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.201:*:*:*:*:*:*:*", "cpeNameId": "2F3696BC-9946-43EC-A5BE-FBF103B914C2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.202:*:*:*:*:*:*:*", "cpeNameId": "49E286A6-8D86-4F0C-AE46-70CE364D4D34"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.203:*:*:*:*:*:*:*", "cpeNameId": "F05F8B59-C598-4A9D-8598-95E486F03912"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.204:*:*:*:*:*:*:*", "cpeNameId": "9574762D-2B80-4DA6-B5C0-13BA8574BDF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.205:*:*:*:*:*:*:*", "cpeNameId": "E1592B19-0EBB-40A5-8E26-09D333620E42"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.206:*:*:*:*:*:*:*", "cpeNameId": "7A00E289-C1AF-4892-888E-FE2B71F9192B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.207:*:*:*:*:*:*:*", "cpeNameId": "66F586E3-6EA7-427E-B2A1-04C72BB3C0F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.208:*:*:*:*:*:*:*", "cpeNameId": "35D69FF2-A15F-4DEF-9042-8068FB161134"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.209:*:*:*:*:*:*:*", "cpeNameId": "494CAA62-F904-40B5-B57F-DD740D2CA896"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.210:*:*:*:*:*:*:*", "cpeNameId": "196CBDC8-9C64-42C8-ADA4-7D4BEA554878"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.211:*:*:*:*:*:*:*", "cpeNameId": "013EBDF8-3C0F-4215-931D-C3C29B435E0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.212:*:*:*:*:*:*:*", "cpeNameId": "7D6E2DB9-8680-4AEF-AD1A-3D69754035F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.213:*:*:*:*:*:*:*", "cpeNameId": "D49FC2AF-E5DA-418C-BE69-F7C7B25ECD30"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.214:*:*:*:*:*:*:*", "cpeNameId": "630B3919-9504-4EA4-82BF-3352DAE4FFAB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.215:*:*:*:*:*:*:*", "cpeNameId": "BFF8FD48-648F-4E98-BDDA-AF7832422E08"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.216:*:*:*:*:*:*:*", "cpeNameId": "44AD0235-927F-4286-AE7C-34E60481DCD2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.217:*:*:*:*:*:*:*", "cpeNameId": "D726E465-CB14-4F50-A3A5-05F5BEB544FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.218:*:*:*:*:*:*:*", "cpeNameId": "3BEA4D9C-4899-4E3F-AA4F-86AC93C26841"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.219:*:*:*:*:*:*:*", "cpeNameId": "155548FF-67CC-4BA7-BE08-2810EA12A181"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.220:*:*:*:*:*:*:*", "cpeNameId": "20FB805F-D821-49EF-969C-21CD8232CC97"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.221:*:*:*:*:*:*:*", "cpeNameId": "48B45DEA-86BB-4242-8F6E-CFF9BB37B19C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.222:*:*:*:*:*:*:*", "cpeNameId": "6C5D7A67-FB42-44EA-A569-7274E9F06E40"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.223:*:*:*:*:*:*:*", "cpeNameId": "B91D2396-F745-44E4-9794-8A7B191D0EBE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.224:*:*:*:*:*:*:*", "cpeNameId": "BFBEE827-A91F-455B-8C59-14CAF80BAC0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.225:*:*:*:*:*:*:*", "cpeNameId": "C905A295-285D-4D2C-A0F3-454FD5ED6071"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.226:*:*:*:*:*:*:*", "cpeNameId": "A9B06703-D925-4E2A-9FA0-2A6863A17CF0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.227:*:*:*:*:*:*:*", "cpeNameId": "6FAB2103-943D-4DA6-B967-00AEA85D70F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.228:*:*:*:*:*:*:*", "cpeNameId": "64D4B432-E3DD-4D99-85EE-7287EA5003D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.229:*:*:*:*:*:*:*", "cpeNameId": "94C0C578-4D2D-4BA0-9614-C5EFE5FAC97E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.230:*:*:*:*:*:*:*", "cpeNameId": "3C588990-79E8-4296-82F6-EECDADEC4FBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.231:*:*:*:*:*:*:*", "cpeNameId": "6CCFCFAC-B519-4B1C-BA37-C254526BFC5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.232:*:*:*:*:*:*:*", "cpeNameId": "852B8329-D924-4265-86D5-F92FDD268B05"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.233:*:*:*:*:*:*:*", "cpeNameId": "0C14D107-1D46-490A-9C9C-973325B77873"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.234:*:*:*:*:*:*:*", "cpeNameId": "355C0CE7-0FD8-47FE-A7A3-D0B4487DF610"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.235:*:*:*:*:*:*:*", "cpeNameId": "B0CEDF08-FDE9-4A9F-84D5-C73C341FB515"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.236:*:*:*:*:*:*:*", "cpeNameId": "0DCBF98D-881B-43B9-90C7-FCB4B493F70C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.237:*:*:*:*:*:*:*", "cpeNameId": "F97BF049-4C8A-4CBF-8848-6D8DDD81D75B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.238:*:*:*:*:*:*:*", "cpeNameId": "988EC493-0C82-46C8-8A4D-AF1501B35670"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.239:*:*:*:*:*:*:*", "cpeNameId": "4158AFE2-D4E1-4334-B313-F9CA5C7B0CB7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.240:*:*:*:*:*:*:*", "cpeNameId": "8B1E737A-F8D6-4FCF-A8B2-D8B9F4EC07F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.241:*:*:*:*:*:*:*", "cpeNameId": "81BB3A2B-0C6A-47B9-AB54-3763CE6314B8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.242:*:*:*:*:*:*:*", "cpeNameId": "21206177-2704-4E74-BDA1-1510124628DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.243:*:*:*:*:*:*:*", "cpeNameId": "10CD8A76-15D2-4B01-896E-086AB6DBB68F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.244:*:*:*:*:*:*:*", "cpeNameId": "1F928940-DFB6-4916-8382-A1C774194832"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.245:*:*:*:*:*:*:*", "cpeNameId": "0CC09134-0AD5-4091-BE00-0FDCE6C1B5AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.246:*:*:*:*:*:*:*", "cpeNameId": "7F445E26-C26F-4398-BA55-3903FC3AB3ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.247:*:*:*:*:*:*:*", "cpeNameId": "68E8E3E3-D2CB-4354-A0E4-AEE63E9AF94E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.248:*:*:*:*:*:*:*", "cpeNameId": "3949F9FD-1182-47FB-A635-AD39280555BE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.249:*:*:*:*:*:*:*", "cpeNameId": "4C7951C3-5951-4525-99F1-483B3B397CE3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.250:*:*:*:*:*:*:*", "cpeNameId": "7C354C5F-E5EF-4D0B-8854-3D5C163E59D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.251:*:*:*:*:*:*:*", "cpeNameId": "440E5A5E-E0D6-424A-A978-F34DEADDFA17"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.252:*:*:*:*:*:*:*", "cpeNameId": "551FE389-86EA-492D-A22F-C6D2C6BCDB2E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.253:*:*:*:*:*:*:*", "cpeNameId": "BB12F4A9-AE2A-4CDB-958F-5AF3C262067E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.254:*:*:*:*:*:*:*", "cpeNameId": "007D7060-D12B-46BD-B005-897B3E5290CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.255:*:*:*:*:*:*:*", "cpeNameId": "2FB1583A-1D2E-4B82-AFA4-81D623D681D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.256:*:*:*:*:*:*:*", "cpeNameId": "450021EA-3409-4C4F-9B49-97579C89E534"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.257:*:*:*:*:*:*:*", "cpeNameId": "28876801-3DD9-4992-B0CF-3160C9822D9C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.258:*:*:*:*:*:*:*", "cpeNameId": "133ED5C3-38BC-47CA-97C9-ACC9D33D93C9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.259:*:*:*:*:*:*:*", "cpeNameId": "2FC947E5-32F4-413E-864D-1F7BEE684504"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.260:*:*:*:*:*:*:*", "cpeNameId": "3727E506-D975-46B1-BA82-9E9DBF60864D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.261:*:*:*:*:*:*:*", "cpeNameId": "B7D5C3F2-7F88-4FF7-9D56-EBB35C7FA687"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.262:*:*:*:*:*:*:*", "cpeNameId": "FA3F037B-3AA8-4DC7-ABF8-37D4E7F72987"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.263:*:*:*:*:*:*:*", "cpeNameId": "B629674A-274B-4A00-B972-8E6AC7A125C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.264:*:*:*:*:*:*:*", "cpeNameId": "CCE21890-0782-4EA7-8C50-C16BA210EBEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.265:*:*:*:*:*:*:*", "cpeNameId": "61DC4A5D-8023-4703-9B5F-CF38623D5F4B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.266:*:*:*:*:*:*:*", "cpeNameId": "E7953AF3-4293-4FDC-9E2A-791F15CDBC96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.267:*:*:*:*:*:*:*", "cpeNameId": "A0A7C20B-1669-492F-8E45-B94457D9BA5B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.268:*:*:*:*:*:*:*", "cpeNameId": "74A43E1F-F22F-421F-BB43-6D313E186447"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.269:*:*:*:*:*:*:*", "cpeNameId": "F87C845A-E4F5-48C5-8BE7-A32DC9765770"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.270:*:*:*:*:*:*:*", "cpeNameId": "C9E3E563-0877-41A4-B911-9C1D96FC083D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.271:*:*:*:*:*:*:*", "cpeNameId": "AF7989DF-3745-43BE-BE62-C89975857EC0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.272:*:*:*:*:*:*:*", "cpeNameId": "9BEE5DF7-1F70-4B14-91E8-A6C4C75A6A15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.273:*:*:*:*:*:*:*", "cpeNameId": "D33F4F6B-4412-41B0-A647-71C2F3DEA100"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.274:*:*:*:*:*:*:*", "cpeNameId": "E414EB92-7254-44A9-A831-3739EC2C0339"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.275:*:*:*:*:*:*:*", "cpeNameId": "2E6BFFD9-5144-428A-B3B4-9D39DC57928F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.276:*:*:*:*:*:*:*", "cpeNameId": "8BB682EF-48EA-4014-8C3A-372DBBEDBDDB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.277:*:*:*:*:*:*:*", "cpeNameId": "57B18195-1374-4A01-A7BC-62CAB96836BF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.278:*:*:*:*:*:*:*", "cpeNameId": "B3439ABE-6A03-4C6E-8C65-5F340D3408CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.279:*:*:*:*:*:*:*", "cpeNameId": "3E65E40A-EBF1-4E15-BB6E-3F33C0607213"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.280:*:*:*:*:*:*:*", "cpeNameId": "158B02C6-BE88-4AAA-8D98-A2928FF494E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.281:*:*:*:*:*:*:*", "cpeNameId": "46960B28-AA2F-49A0-BD2A-B70031BAFE17"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.282:*:*:*:*:*:*:*", "cpeNameId": "6C488375-5CBF-4B6A-B5DE-4EE9D0D78D6A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.283:*:*:*:*:*:*:*", "cpeNameId": "89C004F6-5808-4140-8CA9-94B1BDFFFC08"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.284:*:*:*:*:*:*:*", "cpeNameId": "87E0D14B-2305-46E4-A1FF-56DF608C1795"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.285:*:*:*:*:*:*:*", "cpeNameId": "44F8F5F9-4842-4765-A551-2D2078DFC684"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.286:*:*:*:*:*:*:*", "cpeNameId": "1E4F8F79-CF58-424B-8884-424A00B283C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.287:*:*:*:*:*:*:*", "cpeNameId": "AFEC2AD9-E3ED-4ECE-BA80-1FD76248D514"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.288:*:*:*:*:*:*:*", "cpeNameId": "EEDEF216-9D62-4DF6-BD89-3EED6906292F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.289:*:*:*:*:*:*:*", "cpeNameId": "A02EA509-DF45-4CE8-90B1-C8BD7B8BAFD6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.290:*:*:*:*:*:*:*", "cpeNameId": "A2C66CF4-D5D7-4897-8E3F-5E47FED898A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.291:*:*:*:*:*:*:*", "cpeNameId": "9C4FE524-6E1E-4FB5-BC3C-9731F9F78E6A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.292:*:*:*:*:*:*:*", "cpeNameId": "35C28419-F80A-4875-88CE-4D4B6F00C8DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.293:*:*:*:*:*:*:*", "cpeNameId": "58BE8244-391B-4CF2-A805-E299B82C61D7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.294:*:*:*:*:*:*:*", "cpeNameId": "3B2A2979-293A-4DE2-8EEC-030AB3096C30"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.295:*:*:*:*:*:*:*", "cpeNameId": "15FA5BB0-94CE-4689-B8A6-EB344F983EC9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.296:*:*:*:*:*:*:*", "cpeNameId": "5DA05C25-355D-4C96-8D88-1E207C726AAF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.297:*:*:*:*:*:*:*", "cpeNameId": "36F176DB-DCF3-4FC2-88DD-A94222633A21"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.298:*:*:*:*:*:*:*", "cpeNameId": "459887C6-2292-4B2A-87AD-DD7714A00949"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.299:*:*:*:*:*:*:*", "cpeNameId": "181DBB6F-D9C2-4189-9F54-7B9CDDB80BD7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.300:*:*:*:*:*:*:*", "cpeNameId": "8BB51592-1D30-4CD6-863D-818A48FF2AE4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.301:*:*:*:*:*:*:*", "cpeNameId": "48216E63-EB92-4B3B-9CBD-E2A1D46EC013"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.4.302:*:*:*:*:*:*:*", "cpeNameId": "C5FA6C11-FE27-44EC-A4A6-25120C4848CE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5:*:*:*:*:*:*:*", "cpeNameId": "6752716B-480D-47F4-B011-9496A572E34A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5:-:*:*:*:*:*:*", "cpeNameId": "64E8469C-7D92-46CE-953D-C228C6751E3E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5:rc1:*:*:*:*:*:*", "cpeNameId": "2CCF74F9-BC2F-461A-98E6-DC98E271FCEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5:rc2:*:*:*:*:*:*", "cpeNameId": "55517ACC-4334-44E0-AD3D-0E1FF4E013DE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5:rc3:*:*:*:*:*:*", "cpeNameId": "BC105030-814B-4359-85B8-AB322E105737"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5:rc4:*:*:*:*:*:*", "cpeNameId": "DD78112E-F11E-46C2-AE52-9B48C7F0B03D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5:rc5:*:*:*:*:*:*", "cpeNameId": "599B6EE9-2C07-43A2-BC41-C96DE7502A8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5:rc6:*:*:*:*:*:*", "cpeNameId": "884AB775-5BA8-47A6-8556-CA9FBD4B3366"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5:rc7:*:*:*:*:*:*", "cpeNameId": "0C4F78B2-4531-4480-A171-1BAF9C8ED2FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5.0:*:*:*:*:*:*:*", "cpeNameId": "89D51C4A-2038-4CC3-BC96-B4B99709BB84"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5.0:rc1:*:*:*:*:*:*", "cpeNameId": "9479CFA4-0CFC-4DB3-9EFF-EAEA98B51CA3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5.0:rc2:*:*:*:*:*:*", "cpeNameId": "482E248D-31FE-428A-A427-D0E6692D0D6A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5.0:rc3:*:*:*:*:*:*", "cpeNameId": "BA2A8624-AAF8-4BFF-9B51-9E2B21104D1F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5.0:rc7:*:*:*:*:*:*", "cpeNameId": "A24295A6-C621-4249-B273-4EE57AD074BF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5.1:*:*:*:*:*:*:*", "cpeNameId": "4F48C1CE-B56D-4E32-8D36-CFA5CE37F833"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5.2:*:*:*:*:*:*:*", "cpeNameId": "3090C977-4C87-4DE7-B635-65DE0C95F1AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5.3:*:*:*:*:*:*:*", "cpeNameId": "E78188B1-4DD4-40F0-82A8-66F5CAB33C6C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5.4:*:*:*:*:*:*:*", "cpeNameId": "0D1A4F8C-D753-40D8-9EF6-E7D9E95E0CC6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5.5:*:*:*:*:*:*:*", "cpeNameId": "450C515D-9EB0-4F37-B3C1-EE55E128466E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5.6:*:*:*:*:*:*:*", "cpeNameId": "D171B92A-B9F2-4CF4-A51D-25DE12B1DAB7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.5.7:*:*:*:*:*:*:*", "cpeNameId": "DDB68C52-02FF-4514-A37A-FAE660ECFAEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.6:*:*:*:*:*:*:*", "cpeNameId": "513E9C7E-9CD0-453D-8044-1DCF043ABFC5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.6.1:*:*:*:*:*:*:*", "cpeNameId": "4282AD9E-F4CF-406C-82C6-E9C9C374341F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.6.2:*:*:*:*:*:*:*", "cpeNameId": "79BFAA05-E0AE-4B27-ADD2-043A5F1765DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.6.3:*:*:*:*:*:*:*", "cpeNameId": "3E22E014-6635-4FF5-AA51-0DFED4F7E4CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.6.4:*:*:*:*:*:*:*", "cpeNameId": "8D6F4072-8DBE-4637-AEBD-4E9123A6C9FA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.6.5:*:*:*:*:*:*:*", "cpeNameId": "FCCB037F-6B5B-4B3D-AB98-DBD4A72D60B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.6.6:*:*:*:*:*:*:*", "cpeNameId": "8D7C846C-1336-4777-8B52-9F75E281AFA3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.6.7:*:*:*:*:*:*:*", "cpeNameId": "55DA9CF3-9708-4520-AAA8-49B56B5BE4EE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7:*:*:*:*:*:*:*", "cpeNameId": "496F7DCA-CD17-40FF-A146-993EACB85937"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7:-:*:*:*:*:*:*", "cpeNameId": "7071E45E-8875-403E-900D-B18B78B2CFEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7:rc1:*:*:*:*:*:*", "cpeNameId": "8C21D0B7-9E71-4213-9146-7A85711840A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7:rc2:*:*:*:*:*:*", "cpeNameId": "1FD38972-2F84-4D2B-9C4D-B2A9B6F87BD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7:rc3:*:*:*:*:*:*", "cpeNameId": "CED8F0FE-B0EC-4F8C-B1B3-9690A5B2C427"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7:rc4:*:*:*:*:*:*", "cpeNameId": "805AF26E-C23B-45A2-8D72-F90A1FA0EC45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7:rc5:*:*:*:*:*:*", "cpeNameId": "FD8D5C3C-1EB6-454A-9CE8-51593EFE60B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7:rc6:*:*:*:*:*:*", "cpeNameId": "BF98A71F-D556-470F-9ECA-BA0D03919E44"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7:rc7:*:*:*:*:*:*", "cpeNameId": "3EA4A517-42BA-47DE-9435-3B2EE041B824"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7.1:*:*:*:*:*:*:*", "cpeNameId": "CB86EA69-EE70-45B2-B01F-5C3056895ADA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7.2:*:*:*:*:*:*:*", "cpeNameId": "85FB5454-E1F2-46B8-9CC7-ED28B950CC79"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7.3:*:*:*:*:*:*:*", "cpeNameId": "700591B1-5F5E-406D-AFD2-C171814E1762"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7.4:*:*:*:*:*:*:*", "cpeNameId": "5BCFD5D4-7494-49AA-B48C-E7C0B8D1881E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7.5:*:*:*:*:*:*:*", "cpeNameId": "446BC346-E811-407B-A029-1E5B1D6AF131"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7.6:*:*:*:*:*:*:*", "cpeNameId": "27FBC7AE-CBC8-417E-87F2-1FCBA47FFED2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7.7:*:*:*:*:*:*:*", "cpeNameId": "A9D96B8D-35D8-4E1E-A12B-EBDC81FF5F3C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7.8:*:*:*:*:*:*:*", "cpeNameId": "9CB7C2A8-EF23-4612-94CE-F37623A35CE5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7.9:*:*:*:*:*:*:*", "cpeNameId": "C38910BF-3CEA-4EAD-B391-942E990DB44D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.7.10:*:*:*:*:*:*:*", "cpeNameId": "CD211D99-AE1B-4259-9D88-978BF4BBE266"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8:*:*:*:*:*:*:*", "cpeNameId": "7FCAC593-0734-4D3F-AD38-55AA21A05DD0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8:-:*:*:*:*:*:*", "cpeNameId": "A4B6A9C4-8211-4E88-A2C7-C36BBBE48E24"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8:rc1:*:*:*:*:*:*", "cpeNameId": "AEC7ED2E-5B13-4144-9ED7-A60EDE512955"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8:rc2:*:*:*:*:*:*", "cpeNameId": "7463D464-9817-44F7-BCCA-16947B5F7348"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8:rc3:*:*:*:*:*:*", "cpeNameId": "75C6B48C-182A-42B6-8BA1-53057660DA89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8:rc4:*:*:*:*:*:*", "cpeNameId": "958A88C5-9246-464A-9E6E-4340B03A6C1A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8:rc5:*:*:*:*:*:*", "cpeNameId": "3412A731-F526-44FA-9E1C-42A77C9B1E29"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8:rc6:*:*:*:*:*:*", "cpeNameId": "293C40EC-887D-42A6-92E8-CDF12F0E0BAA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.1:*:*:*:*:*:*:*", "cpeNameId": "C08959E8-EC01-42E8-AA0C-9BD6621B5FE8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.2:*:*:*:*:*:*:*", "cpeNameId": "FCCE5C13-84F1-456D-8172-79A4B66D4563"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.3:*:*:*:*:*:*:*", "cpeNameId": "8DD556A5-950A-4386-B290-3BA23F8FAE74"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.4:*:*:*:*:*:*:*", "cpeNameId": "11C5676D-8CC7-4CD7-B0DA-E6266DD066AD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.5:*:*:*:*:*:*:*", "cpeNameId": "F2B231B1-804A-4ADF-A8A6-9A2DB05DDF48"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.6:*:*:*:*:*:*:*", "cpeNameId": "2DCDBE9F-80D3-4A9A-8ABD-89872C2BF47F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.7:*:*:*:*:*:*:*", "cpeNameId": "C673A048-7856-4547-8E56-BC3557D9FD38"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.8:*:*:*:*:*:*:*", "cpeNameId": "398EDB8C-C735-4B41-994E-C207F198D072"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.9:*:*:*:*:*:*:*", "cpeNameId": "8256347C-D1FF-4A19-BD31-F78F0085A475"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.10:*:*:*:*:*:*:*", "cpeNameId": "A63AAEE8-FEEB-4399-8FD5-F0A90A5C4363"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.11:*:*:*:*:*:*:*", "cpeNameId": "0F6E054C-2FB7-4F32-A653-87E436E30BFE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.12:*:*:*:*:*:*:*", "cpeNameId": "7CE8E210-4DFE-4E5D-A6D9-BD991AC6F8BF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.13:*:*:*:*:*:*:*", "cpeNameId": "744AC014-50ED-4FB4-B8AD-D5C7CF3C7CC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.14:*:*:*:*:*:*:*", "cpeNameId": "498DABA6-7087-4364-8C81-5346BE483975"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.15:*:*:*:*:*:*:*", "cpeNameId": "37255C42-4B93-475E-9935-1F0446011768"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.16:*:*:*:*:*:*:*", "cpeNameId": "A8695620-4D6E-44B4-9FE8-95C9960C240E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.8.17:*:*:*:*:*:*:*", "cpeNameId": "96D4758C-FE52-4DA8-87E1-577A3FCEF236"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:*:*:*:*:*:*:*", "cpeNameId": "72D7C54B-6ED2-4DCE-A67F-C71FB93A5823"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:-:*:*:*:*:*:*", "cpeNameId": "12D10173-3DCE-40E4-9B99-B6C7A7454106"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:rc1:*:*:*:*:*:*", "cpeNameId": "DBD96821-B70D-475C-A38B-8416AC3576D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:rc2:*:*:*:*:*:*", "cpeNameId": "221A17CE-03D4-4662-924E-23E6426BB693"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:rc3:*:*:*:*:*:*", "cpeNameId": "5B3F2BE9-697B-4E5D-93D6-2127CE19550C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:rc4:*:*:*:*:*:*", "cpeNameId": "AD35E83C-A016-47F3-8D62-9C4A0306FAD4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:rc5:*:*:*:*:*:*", "cpeNameId": "E166DE00-D241-44A0-B75B-F067310B6FEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:rc6:*:*:*:*:*:*", "cpeNameId": "65CAACB6-7E01-48F5-98DF-E1923A3F01C5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:rc7:*:*:*:*:*:*", "cpeNameId": "F12E246D-AC32-42AB-A20F-5B54C2FFC059"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9:rc8:*:*:*:*:*:*", "cpeNameId": "9896B1C6-0127-4248-A9D1-ABB07588F87A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.0:*:*:*:*:*:*:*", "cpeNameId": "C477CC26-17BE-46DA-8B9D-218D8AA51AD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.1:*:*:*:*:*:*:*", "cpeNameId": "8AF8815B-4FEF-483D-9CF9-C8BDDD29308D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.2:*:*:*:*:*:*:*", "cpeNameId": "A36A1BD4-0C74-4284-99A4-A53FEE3C8D65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.3:*:*:*:*:*:*:*", "cpeNameId": "AF59D9D7-96F7-41F7-8125-50592CE96BFF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.4:*:*:*:*:*:*:*", "cpeNameId": "CDB03998-BA6F-4F00-83F7-B54515BA4725"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.5:*:*:*:*:*:*:*", "cpeNameId": "0F83014C-CE37-47EA-9906-94AA2FED7DD9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.6:*:*:*:*:*:*:*", "cpeNameId": "2DACA082-8E91-493D-890B-FF9A78EEBC9A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.7:*:*:*:*:*:*:*", "cpeNameId": "8823DC1A-2E25-4E13-9F8F-E347154A7F72"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.8:*:*:*:*:*:*:*", "cpeNameId": "60679951-3906-4497-8CBC-8891BEE953B6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.9:*:*:*:*:*:*:*", "cpeNameId": "76030A2F-567A-493B-BD6C-09DB84455253"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.10:*:*:*:*:*:*:*", "cpeNameId": "527F6E5F-FDE0-4BEF-AB6F-9EAC1F6F6978"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.11:*:*:*:*:*:*:*", "cpeNameId": "CE3D179E-83C1-4BAE-8CB1-DE413B7901D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.12:*:*:*:*:*:*:*", "cpeNameId": "BD502B1D-8E7D-4AD4-9011-E616315740C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.13:*:*:*:*:*:*:*", "cpeNameId": "4A96891C-E4D8-4BBD-8C3A-8BEC1EDD6DF7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.14:*:*:*:*:*:*:*", "cpeNameId": "049B9559-3317-43D0-BB9E-2008182328D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.15:*:*:*:*:*:*:*", "cpeNameId": "3BAD5668-2640-4602-9837-07D764990011"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.16:*:*:*:*:*:*:*", "cpeNameId": "B76E758C-F23C-4E81-8D89-6B3C331DF70A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.17:*:*:*:*:*:*:*", "cpeNameId": "558B0C0A-04D6-41D1-AED9-4D16159FAA64"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.18:*:*:*:*:*:*:*", "cpeNameId": "BC3F9201-BBD4-48C1-9254-14DDCC7A6B7E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.19:*:*:*:*:*:*:*", "cpeNameId": "E8A01AF1-8E23-40E5-A956-AF00A7A47BA0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.20:*:*:*:*:*:*:*", "cpeNameId": "2CAF46F1-2D12-41FC-ABF2-C6F56A9CE410"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.21:*:*:*:*:*:*:*", "cpeNameId": "7A2DC702-A782-4D15-9435-ACC0778F3FB3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.22:*:*:*:*:*:*:*", "cpeNameId": "D2916473-F575-4728-B2EC-60EE62AB8BF7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.23:*:*:*:*:*:*:*", "cpeNameId": "B6409273-5794-4B9E-BDD5-7FCFCF339511"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.24:*:*:*:*:*:*:*", "cpeNameId": "2893EFED-04F5-42B0-96B4-FB29EEFAA9EE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.25:*:*:*:*:*:*:*", "cpeNameId": "F1EC5B2F-8765-464D-A5A2-DEF282D3576A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.26:*:*:*:*:*:*:*", "cpeNameId": "CE231956-F740-4AA4-9750-A9F1E16C7429"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.27:*:*:*:*:*:*:*", "cpeNameId": "B08B4A4D-A673-49B9-9809-6C8EB2D8CCFA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.28:*:*:*:*:*:*:*", "cpeNameId": "25127A10-99C3-4B29-9037-752644FEDAA3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.29:*:*:*:*:*:*:*", "cpeNameId": "7C9B9FDE-13EC-442C-A753-05D753AF7F2F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.30:*:*:*:*:*:*:*", "cpeNameId": "60DFABB9-1C9B-4A43-8A5D-4B51C46D6CF2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.31:*:*:*:*:*:*:*", "cpeNameId": "55547C90-57BE-4B48-80BC-5248CF85A54D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.32:*:*:*:*:*:*:*", "cpeNameId": "4FEC2A07-6C9E-4B57-9F1D-A8C7A2531042"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.33:*:*:*:*:*:*:*", "cpeNameId": "3A3CC360-6DB0-4058-A637-BEA9F10F3ECC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.34:*:*:*:*:*:*:*", "cpeNameId": "74A4841B-22B2-45B0-A608-52579D2983E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.35:*:*:*:*:*:*:*", "cpeNameId": "F5D48DE7-BCE0-4195-B8E2-E3A8C9884647"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.36:*:*:*:*:*:*:*", "cpeNameId": "15A99A35-647E-4AFF-B6E2-0652FE1F9FFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.37:*:*:*:*:*:*:*", "cpeNameId": "51FDBF94-6126-4C97-9650-6902E77C1811"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.38:*:*:*:*:*:*:*", "cpeNameId": "9A7EA0F2-DFB9-4CF2-82D8-F5C569BA5CD7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.39:*:*:*:*:*:*:*", "cpeNameId": "6C245624-3821-4A71-8682-AB66074B82B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.40:*:*:*:*:*:*:*", "cpeNameId": "DD0E98E7-27A5-4BDD-8907-53DA5C31F7A0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.41:*:*:*:*:*:*:*", "cpeNameId": "C879D912-54D4-4C73-91B2-500D49230B7A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.42:*:*:*:*:*:*:*", "cpeNameId": "85E02B17-E410-42FE-A83B-B8B4E7EBB532"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.43:*:*:*:*:*:*:*", "cpeNameId": "56E7B421-D6F4-45BB-A4A7-37AA444554F7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.44:*:*:*:*:*:*:*", "cpeNameId": "146F13C7-D0C9-4829-99CB-36C12B673BF9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.45:*:*:*:*:*:*:*", "cpeNameId": "1BC5E0A8-84C0-44E1-9DFD-5C633FD66E42"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.46:*:*:*:*:*:*:*", "cpeNameId": "965C07B8-7491-41D5-BFFF-C2DC61675475"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.47:*:*:*:*:*:*:*", "cpeNameId": "6F99B518-6BC7-4B89-8C2F-2A61C8F1A66C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.48:*:*:*:*:*:*:*", "cpeNameId": "1654578E-2D00-498E-9EF1-D64BBBBA7070"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.49:*:*:*:*:*:*:*", "cpeNameId": "BC5CCADF-5DEA-4540-8D2F-478F3175DA62"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.50:*:*:*:*:*:*:*", "cpeNameId": "67B5EA2D-9D68-4247-8C79-6F92FD8D39F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.51:*:*:*:*:*:*:*", "cpeNameId": "62B20DEB-030A-4CED-93BC-3F6F4D5AD54B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.52:*:*:*:*:*:*:*", "cpeNameId": "66BDA9E0-B507-4116-9FFC-6DBFE79A3CD4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.53:*:*:*:*:*:*:*", "cpeNameId": "76AB10DC-B6FD-4E05-A1E6-09C04A8A1B13"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.54:*:*:*:*:*:*:*", "cpeNameId": "6461BBE3-2AAA-4975-A75F-F561D3C1B753"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.55:*:*:*:*:*:*:*", "cpeNameId": "957D4BA7-C0CC-482D-8844-03AEBFE9F966"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.56:*:*:*:*:*:*:*", "cpeNameId": "4B6981FD-9D76-418C-BC72-EC1900EA9C04"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.57:*:*:*:*:*:*:*", "cpeNameId": "22E939B7-D460-4BE9-9529-0E26B53304B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.58:*:*:*:*:*:*:*", "cpeNameId": "CC981857-5731-4095-92A2-D10F6F27F85E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.59:*:*:*:*:*:*:*", "cpeNameId": "EB3A0428-3B0E-4608-9D96-AC0687921B92"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.60:*:*:*:*:*:*:*", "cpeNameId": "F1134646-1E83-459B-9E11-B1893162D4B6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.61:*:*:*:*:*:*:*", "cpeNameId": "01F91BC8-9830-49E4-AFCA-5910983AFA96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.62:*:*:*:*:*:*:*", "cpeNameId": "C5611992-8FA6-489D-B4C7-9871472702C4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.63:*:*:*:*:*:*:*", "cpeNameId": "B7E52E14-5B55-4458-9BB8-5A1718BAD459"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.64:*:*:*:*:*:*:*", "cpeNameId": "8407449D-67A3-4594-9340-03C4A009828C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.65:*:*:*:*:*:*:*", "cpeNameId": "0B393B17-93FA-4A1F-AF33-86AFA723BC6C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.66:*:*:*:*:*:*:*", "cpeNameId": "3F002BC4-16F2-44FB-842E-7F1CDBA7D2D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.67:*:*:*:*:*:*:*", "cpeNameId": "AD88F263-F5B8-4027-A433-B33EB293F8C7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.68:*:*:*:*:*:*:*", "cpeNameId": "998A1D28-491B-49AF-BEBA-0B7C55016EDB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.69:*:*:*:*:*:*:*", "cpeNameId": "C00A621D-4F1D-4AD8-BE42-3E584F545757"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.70:*:*:*:*:*:*:*", "cpeNameId": "4A8C8214-FDDA-4A1B-9520-756DE05E1C8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.71:*:*:*:*:*:*:*", "cpeNameId": "69E6FBB1-D0B6-486C-B905-54D292ED0BBF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.72:*:*:*:*:*:*:*", "cpeNameId": "04D7688B-E9C8-4CA0-9564-06136BD00399"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.73:*:*:*:*:*:*:*", "cpeNameId": "A11B2E7E-F239-49F6-9B0A-EB897B935734"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.74:*:*:*:*:*:*:*", "cpeNameId": "09B990BA-BB96-40E6-936B-A42138DA410E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.75:*:*:*:*:*:*:*", "cpeNameId": "EE93F1AB-E1B2-4D42-8482-FC0D5232EDCF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.76:*:*:*:*:*:*:*", "cpeNameId": "E094CC04-C34E-45D2-B7BD-8344494F2AF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.77:*:*:*:*:*:*:*", "cpeNameId": "A7AD03A1-2D39-498C-B6FC-6288DFE6A0B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.78:*:*:*:*:*:*:*", "cpeNameId": "C7332F79-76CA-466E-974C-6D94B2028E83"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.79:*:*:*:*:*:*:*", "cpeNameId": "4C7E0132-E639-4C9E-ACD4-E68A1D16EE27"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.80:*:*:*:*:*:*:*", "cpeNameId": "0BA2A075-D652-4220-80D3-765F2E0F1248"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.81:*:*:*:*:*:*:*", "cpeNameId": "6D6C7CFE-7944-44FE-B8D0-13A87E781C59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.82:*:*:*:*:*:*:*", "cpeNameId": "BD198E06-E1B2-48AD-8236-1026D62FF668"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.83:*:*:*:*:*:*:*", "cpeNameId": "9E1B704D-FA55-4EE9-93AE-345D9CEC178C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.84:*:*:*:*:*:*:*", "cpeNameId": "2AD133E5-08E3-4456-9D3E-E2E42247222A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.85:*:*:*:*:*:*:*", "cpeNameId": "A038FF7C-6591-418B-89B7-AA36E91E4693"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.86:*:*:*:*:*:*:*", "cpeNameId": "17A55453-113E-4F83-9477-C3B94C21751D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.87:*:*:*:*:*:*:*", "cpeNameId": "64DA4194-F0DF-4AC6-A84F-00718C1D262B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.88:*:*:*:*:*:*:*", "cpeNameId": "19541D86-197B-4F32-9541-1ED6128DD8D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.89:*:*:*:*:*:*:*", "cpeNameId": "08118401-AEBB-4CE7-B76D-3017139D0153"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.90:*:*:*:*:*:*:*", "cpeNameId": "DEC38CAA-D49A-4D73-9E8B-92DD13268405"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.91:*:*:*:*:*:*:*", "cpeNameId": "B8923DAF-E99E-4721-B537-489F9195A78E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.92:*:*:*:*:*:*:*", "cpeNameId": "6979C8A1-9270-4687-9A67-0EDF32FB5003"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.93:*:*:*:*:*:*:*", "cpeNameId": "B30A094A-C263-431D-89B2-B54478A622BA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.94:*:*:*:*:*:*:*", "cpeNameId": "DC1C8AC1-972B-4950-AFAE-B2D68A94E1B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.95:*:*:*:*:*:*:*", "cpeNameId": "62FF165D-2752-4AB8-B3B9-CD8FBFABD3DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.96:*:*:*:*:*:*:*", "cpeNameId": "A0B93A29-FEE2-4EA3-87E8-DF6419F51030"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.97:*:*:*:*:*:*:*", "cpeNameId": "3C34F07E-8DBA-4D82-B8FE-1AFEEF9B2BF9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.98:*:*:*:*:*:*:*", "cpeNameId": "AAB29E6F-C210-4EA2-B2F8-5E1B2041B0B2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.99:*:*:*:*:*:*:*", "cpeNameId": "75652929-F44D-4DF1-8757-F7A8C10D9793"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.100:*:*:*:*:*:*:*", "cpeNameId": "C1AB8FB2-09C2-4A4F-B4EE-E581035E270E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.101:*:*:*:*:*:*:*", "cpeNameId": "0FCB52E4-4EA8-4555-B9A1-EEB1056DC5B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.102:*:*:*:*:*:*:*", "cpeNameId": "57C00F3F-2CEE-4A7F-947F-7A53CA00E52A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.103:*:*:*:*:*:*:*", "cpeNameId": "16CB7735-79B7-4335-8184-6D29A5C85840"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.104:*:*:*:*:*:*:*", "cpeNameId": "8ED9B3BD-8DDA-4465-BF33-9291986917AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.105:*:*:*:*:*:*:*", "cpeNameId": "3400C155-68D5-4DD8-807C-1EF4A4E1BB32"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.106:*:*:*:*:*:*:*", "cpeNameId": "A8B564E7-8A6F-466F-BC53-1B839D9FD3DE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.107:*:*:*:*:*:*:*", "cpeNameId": "F648ABD4-CD53-42CE-9C51-DFBD245FACB4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.108:*:*:*:*:*:*:*", "cpeNameId": "23D39FA8-42FB-43B7-92C7-D831548A0935"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.109:*:*:*:*:*:*:*", "cpeNameId": "5B96FEF9-EE49-4B1F-A218-B141E954CFD2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.110:*:*:*:*:*:*:*", "cpeNameId": "5A3CA9E6-CACE-4937-96F4-B8D45D43AAD2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.111:*:*:*:*:*:*:*", "cpeNameId": "B7084F8D-AD91-4EF1-9901-21AB7E8239CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.112:*:*:*:*:*:*:*", "cpeNameId": "3E544363-B63B-44C1-9F2E-597BE9EF2E65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.113:*:*:*:*:*:*:*", "cpeNameId": "B1C84F8A-2DA9-41BE-872B-B00A297AEA2D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.114:*:*:*:*:*:*:*", "cpeNameId": "6F69AA79-57C2-4B8E-9F8D-5AAFACAD0248"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.115:*:*:*:*:*:*:*", "cpeNameId": "FD6D4727-C95F-4515-8D4A-9D6FDC28C793"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.116:*:*:*:*:*:*:*", "cpeNameId": "01BC52F7-3028-480F-8E37-52A7715AC90A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.117:*:*:*:*:*:*:*", "cpeNameId": "60A7B794-E16E-477D-A4C1-ECA62111DC18"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.118:*:*:*:*:*:*:*", "cpeNameId": "F663FEC6-B040-4A0E-A396-83008CF0ABAB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.119:*:*:*:*:*:*:*", "cpeNameId": "BEFDB30B-BCC5-47F0-B733-2E581725D18A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.120:*:*:*:*:*:*:*", "cpeNameId": "4C86DF14-070B-4C3D-A141-31F7FCA61C34"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.121:*:*:*:*:*:*:*", "cpeNameId": "E3406F7B-D836-49DD-8EFE-AE315BBB19FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.122:*:*:*:*:*:*:*", "cpeNameId": "DB62435E-44D2-471D-BA63-8E6FAE8D278F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.123:*:*:*:*:*:*:*", "cpeNameId": "C28E5075-1E51-43C2-BC69-1E248F152A9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.124:*:*:*:*:*:*:*", "cpeNameId": "76B2228F-19B1-4B9B-9F0F-9DC7CE0DDEFB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.125:*:*:*:*:*:*:*", "cpeNameId": "0B3C0A1E-4727-4E70-8AB9-240A38FA2C5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.126:*:*:*:*:*:*:*", "cpeNameId": "78A85D5F-28F1-456B-A1F2-F73FCDCD8442"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.127:*:*:*:*:*:*:*", "cpeNameId": "07FFD4BD-5B60-41C7-818B-C3AB067ABCF8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.128:*:*:*:*:*:*:*", "cpeNameId": "B2882FB9-CA5D-4C93-BB74-931D3EC95036"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.129:*:*:*:*:*:*:*", "cpeNameId": "1CBF16B6-7148-41A0-8BDF-BAD70ECB2360"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.130:*:*:*:*:*:*:*", "cpeNameId": "F106F4F0-7318-4685-A521-D45D280E0BF8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.131:*:*:*:*:*:*:*", "cpeNameId": "81304DDD-B706-4473-9635-1659080883DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.132:*:*:*:*:*:*:*", "cpeNameId": "EB41A9BB-D88D-49F1-83CD-523699801BF2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.133:*:*:*:*:*:*:*", "cpeNameId": "F8E3204C-6023-4133-9A7F-43F9D2AB144D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.134:*:*:*:*:*:*:*", "cpeNameId": "2A36AD35-A964-4C7A-B1D8-0F78188EE2DE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.135:*:*:*:*:*:*:*", "cpeNameId": "8FAABE9A-8B07-4930-85A9-6616D502F568"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.136:*:*:*:*:*:*:*", "cpeNameId": "9D0664AA-A1FB-4ED3-913B-8390C5192A5A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.137:*:*:*:*:*:*:*", "cpeNameId": "668A5320-81CD-4C09-AE34-9EAAB732DBBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.138:*:*:*:*:*:*:*", "cpeNameId": "3FB2B6F3-F840-47ED-A6BD-2BCA441B6108"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.139:*:*:*:*:*:*:*", "cpeNameId": "9F422368-B0CB-4DD5-BC42-60E4BECD4404"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.140:*:*:*:*:*:*:*", "cpeNameId": "3D3E1A1F-0BED-4FE6-9E2F-745C782AFCB5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.141:*:*:*:*:*:*:*", "cpeNameId": "DACB210F-4E23-4FFE-B706-5889289531D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.142:*:*:*:*:*:*:*", "cpeNameId": "781F8D80-4176-4FC3-9B77-A1BB0C88AC65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.143:*:*:*:*:*:*:*", "cpeNameId": "1F4415C4-3002-4A32-A992-54DC73CAF533"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.144:*:*:*:*:*:*:*", "cpeNameId": "7089C196-FD3C-4675-9BE6-2666C406C5D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.145:*:*:*:*:*:*:*", "cpeNameId": "9590F0EF-8260-4B9F-B66C-3E184AC93E63"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.146:*:*:*:*:*:*:*", "cpeNameId": "4FA1CA12-EB95-48B5-98F3-953859E43ED5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.147:*:*:*:*:*:*:*", "cpeNameId": "ED73D0A6-55DA-4D5B-BA38-9BCD74613827"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.148:*:*:*:*:*:*:*", "cpeNameId": "BD154522-4E63-4FB9-ABC2-77F7850B502B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.149:*:*:*:*:*:*:*", "cpeNameId": "E765B3E4-E2B5-42A5-94AD-5E3D3283B7B2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.150:*:*:*:*:*:*:*", "cpeNameId": "AAC26F5B-06AE-49E2-8FE8-17D01ABD1BEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.151:*:*:*:*:*:*:*", "cpeNameId": "91B291A8-CD84-4201-93AD-4B7981CEBDBC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.152:*:*:*:*:*:*:*", "cpeNameId": "A13E73C3-8219-4909-B7FB-312605EFE682"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.153:*:*:*:*:*:*:*", "cpeNameId": "3439519B-F130-44DB-8EF6-C65A2EF5AF5C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.154:*:*:*:*:*:*:*", "cpeNameId": "B93C5FAB-C686-4B8C-B0D5-20C03F3847DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.155:*:*:*:*:*:*:*", "cpeNameId": "F241AC0B-B446-45F4-9A2E-B4B259F4F173"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.156:*:*:*:*:*:*:*", "cpeNameId": "93A18F08-8AD4-4FD2-9A02-E58939D514FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.157:*:*:*:*:*:*:*", "cpeNameId": "334BC1BD-BCDE-4017-930B-8E2E3685773A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.158:*:*:*:*:*:*:*", "cpeNameId": "27100D3E-E3D1-4917-959E-CF6C9CB4838A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.159:*:*:*:*:*:*:*", "cpeNameId": "E9B9F90B-EDBF-452D-9EED-5906465EC142"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.160:*:*:*:*:*:*:*", "cpeNameId": "4B9782F4-75EF-407A-A270-6B9F10B3AB61"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.161:*:*:*:*:*:*:*", "cpeNameId": "4E536BAB-E89A-4298-A620-65E2EA131D54"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.162:*:*:*:*:*:*:*", "cpeNameId": "0234E459-D46E-4FF6-97A0-78C8D0C1413F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.163:*:*:*:*:*:*:*", "cpeNameId": "5672A718-38DA-42BD-8D94-C44CB7EB5B0D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.164:*:*:*:*:*:*:*", "cpeNameId": "7F359B5A-FC0F-4AC9-B676-EE99B7ACF987"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.165:*:*:*:*:*:*:*", "cpeNameId": "C12A4D9B-491F-4FCD-8F98-ACE8680C3DB9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.166:*:*:*:*:*:*:*", "cpeNameId": "A616B27B-8D52-4876-B9DA-49AE47E47B14"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.167:*:*:*:*:*:*:*", "cpeNameId": "A9FB1FBC-3EAC-4068-95C6-A8449AA30236"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.168:*:*:*:*:*:*:*", "cpeNameId": "56F2978B-DD10-4874-9226-22B3EF53C34A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.169:*:*:*:*:*:*:*", "cpeNameId": "77DCE15B-B6AA-4BFA-9B0E-2A4AA9751AA5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.170:*:*:*:*:*:*:*", "cpeNameId": "5B59BFDD-BD40-46BB-BA2E-0AAD30C6906C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.171:*:*:*:*:*:*:*", "cpeNameId": "2BE79BFF-5683-4CA6-B2C9-6001FD77BC99"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.172:*:*:*:*:*:*:*", "cpeNameId": "50BE4FDF-F0EE-4CC4-837F-576E3E212A2F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.173:*:*:*:*:*:*:*", "cpeNameId": "96A6E180-7005-48FA-A98B-DC22F7815B81"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.174:*:*:*:*:*:*:*", "cpeNameId": "F6CD2092-770F-4F3E-9661-06699D965D76"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.175:*:*:*:*:*:*:*", "cpeNameId": "EBF1E1E4-AD08-4B18-9F12-B4EEE194638D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.176:*:*:*:*:*:*:*", "cpeNameId": "6A0486A1-F99F-4E4B-AC39-C12F5D674339"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.177:*:*:*:*:*:*:*", "cpeNameId": "DF9B41BC-B6C2-48AC-9AEE-67A846D344A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.178:*:*:*:*:*:*:*", "cpeNameId": "C2E8FEC6-59E1-4AF4-94EE-7A676B5A2C82"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.179:*:*:*:*:*:*:*", "cpeNameId": "60FF0BF4-4505-484E-8152-B3514FCF95F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.180:*:*:*:*:*:*:*", "cpeNameId": "5DAFDB50-AB4D-4F94-B465-07D40DA4AFE9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.181:*:*:*:*:*:*:*", "cpeNameId": "4CBFF0C0-9773-47CF-AD66-EE00279272C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.182:*:*:*:*:*:*:*", "cpeNameId": "BB407A40-747A-4CF3-8A14-8296DBB7BF38"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.183:*:*:*:*:*:*:*", "cpeNameId": "1386612C-94AB-4DD6-90F9-23D697BD76FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.184:*:*:*:*:*:*:*", "cpeNameId": "0476CD76-2D3E-45FA-88DB-83DA9330CD85"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.185:*:*:*:*:*:*:*", "cpeNameId": "5964859C-6BA3-4286-B050-83960EF7EF71"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.186:*:*:*:*:*:*:*", "cpeNameId": "CC9E8E7E-93FE-4DB7-AF1B-8F7E63CBA37F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.187:*:*:*:*:*:*:*", "cpeNameId": "223FEF84-695D-44FF-9C33-47F8CBFDD953"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.188:*:*:*:*:*:*:*", "cpeNameId": "0CE412FB-E60A-4DFB-8094-EFBE693FF4A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.189:*:*:*:*:*:*:*", "cpeNameId": "501D8AD1-97D7-49C1-B512-061538B8F73F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.190:*:*:*:*:*:*:*", "cpeNameId": "0A2332E6-CC09-486E-A662-9766D623BF34"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.191:*:*:*:*:*:*:*", "cpeNameId": "EDEFF704-F4A6-4282-9428-DEFEFEB4A93A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.192:*:*:*:*:*:*:*", "cpeNameId": "1181DE8F-7EE2-4EC3-8F84-8B313F65047A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.193:*:*:*:*:*:*:*", "cpeNameId": "78EF3A83-66F1-40F3-9C3C-25AFF40BE88C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.194:*:*:*:*:*:*:*", "cpeNameId": "8D611766-BB3A-4528-B1CE-74CB0EAE4467"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.195:*:*:*:*:*:*:*", "cpeNameId": "0C729423-E12A-4F19-9753-94CE465C6283"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.196:*:*:*:*:*:*:*", "cpeNameId": "8F11E143-CE43-4B63-BE73-0A33CD99110D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.197:*:*:*:*:*:*:*", "cpeNameId": "FEB027DD-E13F-4A38-876F-9AFB1E0BE409"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.198:*:*:*:*:*:*:*", "cpeNameId": "6737850B-DE08-4472-B2C7-F60DCDB95CBE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.199:*:*:*:*:*:*:*", "cpeNameId": "C6EA9B80-7284-47CF-954F-EEA349A002FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.200:*:*:*:*:*:*:*", "cpeNameId": "C33F1CE0-023E-4BD6-A32C-2AD5847A9797"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.201:*:*:*:*:*:*:*", "cpeNameId": "FE090B8A-1060-42D0-BB85-D17C7A299D65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.202:*:*:*:*:*:*:*", "cpeNameId": "7F50D385-2E96-471F-B48A-36C222DED1F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.203:*:*:*:*:*:*:*", "cpeNameId": "243CF5E0-1BA3-4C09-830B-F3E5CAE77985"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.204:*:*:*:*:*:*:*", "cpeNameId": "571B9EE4-5DD5-4B3C-842F-B230D4577C98"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.205:*:*:*:*:*:*:*", "cpeNameId": "55A5490D-D0D4-4F11-80E6-6CF300B18FF8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.206:*:*:*:*:*:*:*", "cpeNameId": "97286FA5-0BCE-42D1-A0D7-1B4AD3F78A31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.207:*:*:*:*:*:*:*", "cpeNameId": "C54631BB-ABC0-4711-A5EE-CCFA9870260F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.208:*:*:*:*:*:*:*", "cpeNameId": "0939F707-4609-42F2-B906-3FC03BBAC7A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.209:*:*:*:*:*:*:*", "cpeNameId": "257E4F1B-512E-4A55-9819-3A0A0EFC431F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.210:*:*:*:*:*:*:*", "cpeNameId": "6214CC75-234D-4219-9F50-28E5D54F6661"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.210-1:*:*:*:*:*:*:*", "cpeNameId": "11E87954-7E16-41C9-A673-08D5FD40B194"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.211:*:*:*:*:*:*:*", "cpeNameId": "F95B5FE1-6964-4158-9066-9B148AA7C8AD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.212:*:*:*:*:*:*:*", "cpeNameId": "E0268D70-A7DC-4B52-AE6F-C459A59F0CF9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.213:*:*:*:*:*:*:*", "cpeNameId": "51275AB0-D417-4CE6-8847-B338B340E913"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.214:*:*:*:*:*:*:*", "cpeNameId": "50D2F1EA-0B29-4FDB-8221-BD3C1A800B1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.215:*:*:*:*:*:*:*", "cpeNameId": "12A80615-D31E-44C9-A367-355599328039"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.216:*:*:*:*:*:*:*", "cpeNameId": "A38157E4-F68B-4E60-AF7E-FD7BF9F0E6A0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.217:*:*:*:*:*:*:*", "cpeNameId": "BC328F65-1554-4FF9-A440-C6A6DC08971F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.218:*:*:*:*:*:*:*", "cpeNameId": "E7E67420-ABB7-4AB3-8A93-EF6DEFFB08CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.219:*:*:*:*:*:*:*", "cpeNameId": "0176C290-5F23-4D25-90E0-CFC2FD39785E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.220:*:*:*:*:*:*:*", "cpeNameId": "D89672F3-3069-4FA7-876C-5486351A4210"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.221:*:*:*:*:*:*:*", "cpeNameId": "1C4FC865-E82F-4AAA-BDB2-48CBAF2CEDDB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.222:*:*:*:*:*:*:*", "cpeNameId": "E9641D38-4E53-4C16-9DCB-1ABEAB859051"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.223:*:*:*:*:*:*:*", "cpeNameId": "7D0DB446-81CF-48A4-8FDF-82DB13F9EEFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.224:*:*:*:*:*:*:*", "cpeNameId": "A36C68E0-7DAF-47AE-84CE-355D19D2A184"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.225:*:*:*:*:*:*:*", "cpeNameId": "1A4AF8D7-ABBC-406D-8A9B-6064D1C0FB3A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.226:*:*:*:*:*:*:*", "cpeNameId": "DB3D137C-BAFE-4A08-A5F6-CF9CE3ECF4BA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.227:*:*:*:*:*:*:*", "cpeNameId": "AE161CD5-8D27-4A12-B17B-D329F43349D6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.228:*:*:*:*:*:*:*", "cpeNameId": "0723CFAE-5DBC-4043-AF8F-0C597B0CEAB3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.229:*:*:*:*:*:*:*", "cpeNameId": "D47DB171-26CB-4971-9D2A-7E6B574DCB33"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.230:*:*:*:*:*:*:*", "cpeNameId": "5FFE79E1-68FA-45D6-81A7-DC9AEA1554EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.231:*:*:*:*:*:*:*", "cpeNameId": "2CF57430-4909-48C5-967D-3DB6853FAAFC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.232:*:*:*:*:*:*:*", "cpeNameId": "6BFB7AAB-A1B4-403E-A26B-F14B8FD509C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.233:*:*:*:*:*:*:*", "cpeNameId": "31E31C3B-F769-4B65-AC62-A281A99ECA2D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.234:*:*:*:*:*:*:*", "cpeNameId": "6CFE18B9-2BF3-4BDA-9A19-9A8F945F039F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.235:*:*:*:*:*:*:*", "cpeNameId": "3EF2F123-9B38-401A-81CD-DCDF786F1FBC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.236:*:*:*:*:*:*:*", "cpeNameId": "0B4E0DD4-C051-4F64-B333-B896B86813D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.237:*:*:*:*:*:*:*", "cpeNameId": "57C1E65F-0E87-4296-B131-25A82A0A9667"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.238:*:*:*:*:*:*:*", "cpeNameId": "2BD9177D-1F32-4B5A-A11F-F779CC665C49"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.239:*:*:*:*:*:*:*", "cpeNameId": "737F1344-63A8-42A5-BD48-891A8E17769A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.240:*:*:*:*:*:*:*", "cpeNameId": "E1BAD9D3-D0F2-42CC-93A3-F5B6A1CEC9D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.241:*:*:*:*:*:*:*", "cpeNameId": "CA99B95F-7BBC-40BE-AA68-6A10CE2C8D4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.242:*:*:*:*:*:*:*", "cpeNameId": "A93EB856-783D-4DF9-8387-0BD4C09F9AD0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.243:*:*:*:*:*:*:*", "cpeNameId": "48503212-F9A6-4AB5-8DE9-374622582C15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.244:*:*:*:*:*:*:*", "cpeNameId": "C8F1F3B2-9299-403A-8118-461511F3F50B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.245:*:*:*:*:*:*:*", "cpeNameId": "197B1275-A4E8-4582-ACE2-4C5C5C8C5474"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.246:*:*:*:*:*:*:*", "cpeNameId": "9B64D972-8C44-4B79-9E76-8ECDEBCEBC0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.247:*:*:*:*:*:*:*", "cpeNameId": "5754042A-B1DB-4AD4-B388-76DE9263DC67"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.248:*:*:*:*:*:*:*", "cpeNameId": "2E8BDAA4-D539-42BA-B41E-4EF7C8979B48"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.249:*:*:*:*:*:*:*", "cpeNameId": "03C647CD-10CD-446B-BE6E-3D76C120F364"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.250:*:*:*:*:*:*:*", "cpeNameId": "2F217035-1A6D-43B9-A24D-6F8990190B31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.251:*:*:*:*:*:*:*", "cpeNameId": "4B197B49-5F9B-4B96-B12A-2B471778F13C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.252:*:*:*:*:*:*:*", "cpeNameId": "2481C266-83AA-4815-8405-7C2734A77FB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.253:*:*:*:*:*:*:*", "cpeNameId": "93A07E06-FA31-4E3F-9DAB-CB3846386198"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.254:*:*:*:*:*:*:*", "cpeNameId": "A1AF307F-312C-4040-8F95-9ED0230288F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.255:*:*:*:*:*:*:*", "cpeNameId": "38C39A6F-9AE7-4CB6-B524-1E1F10665007"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.256:*:*:*:*:*:*:*", "cpeNameId": "97AFE000-934E-495E-90DA-C6B13B3C2585"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.257:*:*:*:*:*:*:*", "cpeNameId": "9A1B0076-9309-4165-84AB-3C627316F802"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.258:*:*:*:*:*:*:*", "cpeNameId": "02108CDE-7848-47AA-AC02-43FF6B596975"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.259:*:*:*:*:*:*:*", "cpeNameId": "1C0EC444-2A66-4716-AC4A-4660ECFC5619"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.260:*:*:*:*:*:*:*", "cpeNameId": "FEE507B5-A54C-4EBD-BD63-4CC37CE9C472"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.261:*:*:*:*:*:*:*", "cpeNameId": "D30AE27B-C292-40B5-9296-B58140B669F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.262:*:*:*:*:*:*:*", "cpeNameId": "381C2F4E-4F46-4C12-9112-0A0F60A2F50E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.263:*:*:*:*:*:*:*", "cpeNameId": "D3492ED4-57AE-495F-9627-20898D0BB155"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.264:*:*:*:*:*:*:*", "cpeNameId": "BC81C283-32BE-483A-8017-C90388AE2515"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.265:*:*:*:*:*:*:*", "cpeNameId": "47C4B68F-6562-41A2-B6BA-1E3C60FA2FA1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.266:*:*:*:*:*:*:*", "cpeNameId": "7DE0121E-5AD4-4D6C-8406-2FB7D997F256"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.267:*:*:*:*:*:*:*", "cpeNameId": "6A265E87-7736-450B-8A3C-93FC8AA776C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.268:*:*:*:*:*:*:*", "cpeNameId": "2640A395-FEBD-4AD6-9FC8-4D8D1A906F80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.269:*:*:*:*:*:*:*", "cpeNameId": "64CF3CC1-31A9-467A-847E-F03C704256C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.270:*:*:*:*:*:*:*", "cpeNameId": "6030D6B8-14B2-476D-9275-AF6F52DD4DD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.271:*:*:*:*:*:*:*", "cpeNameId": "BD41D072-F5AF-42E0-9922-B331CB051449"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.272:*:*:*:*:*:*:*", "cpeNameId": "E0212CDC-E613-4B2A-9B60-16D962136AFF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.273:*:*:*:*:*:*:*", "cpeNameId": "452DD917-1B22-4F9B-A9AA-5FD1F9F2C442"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.274:*:*:*:*:*:*:*", "cpeNameId": "6AD4B227-D8D4-42C9-B310-ADA3F37B72BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.275:*:*:*:*:*:*:*", "cpeNameId": "EFE5E55E-9BCB-44E1-BC58-3DF14B515429"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.276:*:*:*:*:*:*:*", "cpeNameId": "10D3145D-E10C-4590-833C-0AE554FF7897"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.277:*:*:*:*:*:*:*", "cpeNameId": "B01C199E-6C8B-4BFA-9DA9-7B1905680626"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.278:*:*:*:*:*:*:*", "cpeNameId": "762C856E-6757-4DFB-A512-B6F03DDC8929"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.279:*:*:*:*:*:*:*", "cpeNameId": "169A9512-5C6F-478E-B16E-82D181C58A97"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.280:*:*:*:*:*:*:*", "cpeNameId": "F8BC9746-521D-4801-AC1D-66A84A780A65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.281:*:*:*:*:*:*:*", "cpeNameId": "1B8D8A00-4E6C-4CD0-8BC5-6EB8BE73B529"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.282:*:*:*:*:*:*:*", "cpeNameId": "5B93AA93-ABD4-45F5-B571-4CAE3CEC6AF9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.283:*:*:*:*:*:*:*", "cpeNameId": "E46991B0-6A28-4411-AF4A-EAF75291B8A5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.284:*:*:*:*:*:*:*", "cpeNameId": "21984D32-DD5B-488B-83DB-77BD0A122405"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.285:*:*:*:*:*:*:*", "cpeNameId": "D0B6234C-571C-42EE-8FD1-334921F4F502"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.286:*:*:*:*:*:*:*", "cpeNameId": "C969671F-1264-4233-B73B-570A481B64CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.287:*:*:*:*:*:*:*", "cpeNameId": "2053D2FF-B750-4B7E-BDFA-2A0F276F15C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.288:*:*:*:*:*:*:*", "cpeNameId": "B221B69F-8204-49BA-8AF4-AFF146D46FB8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.289:*:*:*:*:*:*:*", "cpeNameId": "C8142E09-6E61-4652-A9DA-38072F891A96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.290:*:*:*:*:*:*:*", "cpeNameId": "A534AF2A-A909-45A6-B7E3-A4B2F782CC92"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.291:*:*:*:*:*:*:*", "cpeNameId": "53B57317-723A-4E6B-AAB3-71676106E4CC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.292:*:*:*:*:*:*:*", "cpeNameId": "15CCD6EA-C7F2-47C2-82F4-52F075759660"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.293:*:*:*:*:*:*:*", "cpeNameId": "F1E6DE51-B3AA-4790-A531-9AE7F458DEB1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.294:*:*:*:*:*:*:*", "cpeNameId": "DAEAC0AB-0B68-4970-987B-C7670A6BD22E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.295:*:*:*:*:*:*:*", "cpeNameId": "3187B482-8D58-434C-8E34-EF7AF68AB006"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.296:*:*:*:*:*:*:*", "cpeNameId": "FDE4B426-ED64-449F-9B09-0CD8EA2FFD26"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.297:*:*:*:*:*:*:*", "cpeNameId": "998E67F4-C650-4407-9C7C-339B164FCD92"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.298:*:*:*:*:*:*:*", "cpeNameId": "60CE826D-94F2-441E-A37E-85C4FCD86554"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.299:*:*:*:*:*:*:*", "cpeNameId": "3D327ABE-B8D3-4496-9A9C-62C030CC90D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.300:*:*:*:*:*:*:*", "cpeNameId": "51E9D896-6DD7-4163-81B4-3F44CAD9A2C2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.301:*:*:*:*:*:*:*", "cpeNameId": "D1D112AB-4F07-4CD9-94D4-185B7830316F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.302:*:*:*:*:*:*:*", "cpeNameId": "9BBA920A-1DC4-48A6-B0B6-E31D342537FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.303:*:*:*:*:*:*:*", "cpeNameId": "B039FA99-E67A-409B-A18E-E6BD888E7439"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.304:*:*:*:*:*:*:*", "cpeNameId": "55859E55-03E7-4B8A-BDF6-31710F02863F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.305:*:*:*:*:*:*:*", "cpeNameId": "5ECFC1EA-4DCB-4381-8066-52D9EF210ED7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.306:*:*:*:*:*:*:*", "cpeNameId": "F85A14FE-ADE4-44AB-9DB7-E2D9BE784326"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.307:*:*:*:*:*:*:*", "cpeNameId": "31BE7E06-85C8-422D-945A-0699DDCDD577"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.308:*:*:*:*:*:*:*", "cpeNameId": "394979DD-B2FE-4F43-A635-4BA1953944CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.309:*:*:*:*:*:*:*", "cpeNameId": "079C35C6-0C73-475F-B35D-BAA4318FAB25"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.310:*:*:*:*:*:*:*", "cpeNameId": "85C1B276-0232-4F9E-BCB1-271209082177"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.311:*:*:*:*:*:*:*", "cpeNameId": "5DE9B94E-2F63-48F3-9EE3-29F97357808B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.312:*:*:*:*:*:*:*", "cpeNameId": "472662F2-3E14-450F-A806-E44B1B6C57C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.313:*:*:*:*:*:*:*", "cpeNameId": "4151B004-BFC1-434B-8DD7-7D6857831591"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.314:*:*:*:*:*:*:*", "cpeNameId": "5EB1843D-66B2-4766-B25D-291A2DD4B43F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.315:*:*:*:*:*:*:*", "cpeNameId": "5AC67AE7-DE1E-4329-9E98-1266CDFDCD3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.316:*:*:*:*:*:*:*", "cpeNameId": "665EDCA8-FBE2-48C3-B2A2-E44620F9321A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.317:*:*:*:*:*:*:*", "cpeNameId": "53E4605F-2DAF-436F-9B66-5C9483E4B0F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.318:*:*:*:*:*:*:*", "cpeNameId": "19FF749F-D1B2-4608-A238-B6FD9202A31E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.319:*:*:*:*:*:*:*", "cpeNameId": "D160B5B1-B754-4FD1-ABBE-5CF8AC941935"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.320:*:*:*:*:*:*:*", "cpeNameId": "442FB5A9-9102-48F4-B63A-684FAFCEEF6C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.321:*:*:*:*:*:*:*", "cpeNameId": "34EB7DA8-8A3B-4710-B39F-268F72709105"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.322:*:*:*:*:*:*:*", "cpeNameId": "EC519279-B76A-42BE-B6CB-8C0418032372"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.323:*:*:*:*:*:*:*", "cpeNameId": "3F56BE42-4A5B-4EED-B538-EB93D1692BD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.324:*:*:*:*:*:*:*", "cpeNameId": "CD51D183-BC77-4CA5-B961-ED0F3C008967"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.325:*:*:*:*:*:*:*", "cpeNameId": "F160C172-25E9-49B4-A253-58D8E6AE0914"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.326:*:*:*:*:*:*:*", "cpeNameId": "7B3900FD-154B-4A5B-9A6B-5609E9113274"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.327:*:*:*:*:*:*:*", "cpeNameId": "EA753912-D612-4583-9A1A-3DAA2466D1D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.328:*:*:*:*:*:*:*", "cpeNameId": "8F78B7BB-07DA-4FD5-97CB-2A1C3B38ADA9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.329:*:*:*:*:*:*:*", "cpeNameId": "5D01F5BD-260A-45C9-A220-1B1F1ED05BAC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.330:*:*:*:*:*:*:*", "cpeNameId": "4757B741-0579-4F0D-93B6-4152C0ACEDE7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.331:*:*:*:*:*:*:*", "cpeNameId": "49CB08ED-A588-4C13-AF4E-B76BA560B121"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.332:*:*:*:*:*:*:*", "cpeNameId": "B235999E-D6AC-40F3-84C5-8CB6F78213C9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.333:*:*:*:*:*:*:*", "cpeNameId": "A1FD2FA3-E019-47DA-B601-7CF78944A798"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.334:*:*:*:*:*:*:*", "cpeNameId": "EB3381CD-67DB-4D53-BDEE-811E30F95A1A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.335:*:*:*:*:*:*:*", "cpeNameId": "4E77A679-0C67-4691-B514-917657B01A5A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.336:*:*:*:*:*:*:*", "cpeNameId": "16E4641A-47F6-442F-AE88-17E4B987E3CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.9.337:*:*:*:*:*:*:*", "cpeNameId": "641CDB5F-54CC-425A-B656-9A9B58A08FBF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10:*:*:*:*:*:*:*", "cpeNameId": "801F7D56-009B-4A66-A380-891D1C09EC0E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10:-:*:*:*:*:*:*", "cpeNameId": "737F8B22-35BD-4355-8726-CAB10284B0F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10:rc1:*:*:*:*:*:*", "cpeNameId": "378C4500-0CC7-4110-8E02-B8B89064CB59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10:rc2:*:*:*:*:*:*", "cpeNameId": "C3B39C83-E8E1-4DA7-8251-F2092C6B05D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10:rc3:*:*:*:*:*:*", "cpeNameId": "78D16190-2359-4F43-9816-2080B1827AC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10:rc4:*:*:*:*:*:*", "cpeNameId": "B8C99710-34D3-4AB2-B2D2-09F4B84AE4E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10:rc5:*:*:*:*:*:*", "cpeNameId": "4322E527-2823-41C7-85A2-7B41C74EAC58"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.1:*:*:*:*:*:*:*", "cpeNameId": "9C33CAE9-C906-493D-AE83-630F775358ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.2:*:*:*:*:*:*:*", "cpeNameId": "8F61A3BF-4522-4622-947D-00D359B55176"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.3:*:*:*:*:*:*:*", "cpeNameId": "1EB67AD1-84CA-4A13-838D-BCCA096F8A43"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.4:*:*:*:*:*:*:*", "cpeNameId": "F0EF9085-D82D-451F-B3AF-70E38633405F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.5:*:*:*:*:*:*:*", "cpeNameId": "13FE2FB3-6377-4579-8372-ED7D7601F139"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.6:*:*:*:*:*:*:*", "cpeNameId": "CAD06591-0516-4D81-B575-F6C582AFFDEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.7:*:*:*:*:*:*:*", "cpeNameId": "02EB240A-C24B-44BD-86EA-60D23F353699"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.8:*:*:*:*:*:*:*", "cpeNameId": "7F10C5D0-46D5-462D-8ADC-2E4E5916E34D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.9:*:*:*:*:*:*:*", "cpeNameId": "2FAAEF0C-02F6-4CB5-8452-2ADB5F96602C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.10:*:*:*:*:*:*:*", "cpeNameId": "597FA1BA-E530-477E-8B32-7A767ABD9779"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.11:*:*:*:*:*:*:*", "cpeNameId": "BB2F91B5-234B-4006-B083-4DCB240C7735"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.12:*:*:*:*:*:*:*", "cpeNameId": "86A9E5EB-A7B2-4551-96C3-D2F96B8807EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.13:*:*:*:*:*:*:*", "cpeNameId": "07E25F8D-B2C9-4E32-8DB7-B0B700EF87B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.14:*:*:*:*:*:*:*", "cpeNameId": "B72B8BC5-A491-423C-B3B3-49C3878062F4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.15:*:*:*:*:*:*:*", "cpeNameId": "92F730C1-4118-47C8-8077-34E9367D198C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.16:*:*:*:*:*:*:*", "cpeNameId": "340A6F80-AECA-45F2-A8C0-E75A51ADEB17"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.10.17:*:*:*:*:*:*:*", "cpeNameId": "5245DF5B-3563-44B6-B5AD-9E7AC85D8CE9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:*:*:*:*:*:*:*", "cpeNameId": "7DAEC1AA-D9DB-4969-8835-19DE5562750C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:-:*:*:*:*:*:*", "cpeNameId": "53233DB2-D8A4-4392-B5B9-43F109778BC0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:rc1:*:*:*:*:*:*", "cpeNameId": "F67207B1-581C-4560-A1BA-FBCC51A59367"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:rc2:*:*:*:*:*:*", "cpeNameId": "FBAE195B-6447-49D4-AAAA-D595A811677F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:rc3:*:*:*:*:*:*", "cpeNameId": "0491309A-660F-444C-89A9-FFE1FA1A9B79"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:rc4:*:*:*:*:*:*", "cpeNameId": "35274394-863C-4A7D-9EFB-B49A5900A33C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:rc5:*:*:*:*:*:*", "cpeNameId": "5779025A-A7C7-40BE-840B-EE69D3D1BE62"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:rc6:*:*:*:*:*:*", "cpeNameId": "0E052BC2-1D38-4E80-9D23-889E827E597C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11:rc7:*:*:*:*:*:*", "cpeNameId": "DF4B5805-B18E-4733-9A8B-135508008D0A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.1:*:*:*:*:*:*:*", "cpeNameId": "0A040921-C942-4FE5-A49A-A55F24A8D54C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.2:*:*:*:*:*:*:*", "cpeNameId": "97AF733F-A86E-41A1-832C-CC20306F11FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.3:*:*:*:*:*:*:*", "cpeNameId": "5CC1CF35-345D-45F8-BF5C-6B9C6B9696B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.4:*:*:*:*:*:*:*", "cpeNameId": "137C1EF2-A31B-431E-8F29-546D88139D13"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.5:*:*:*:*:*:*:*", "cpeNameId": "BD008082-6870-4CE0-BC04-1001F619E011"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.6:*:*:*:*:*:*:*", "cpeNameId": "E4F8E539-321B-4263-BB4B-20AAF31088D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.7:*:*:*:*:*:*:*", "cpeNameId": "A93CF5C7-A951-446B-ADFD-4A099F87A003"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.8:*:*:*:*:*:*:*", "cpeNameId": "32373BAD-CD72-44AE-883B-2AAD48A81497"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.9:*:*:*:*:*:*:*", "cpeNameId": "D22968FC-60EE-4D07-B61E-8216515FDA3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.10:*:*:*:*:*:*:*", "cpeNameId": "278604F1-EE00-4BCD-8B4F-D52B1E83CC03"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.11:*:*:*:*:*:*:*", "cpeNameId": "C182B41E-1285-49CD-8537-F2B2BE11E5A6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.11.12:*:*:*:*:*:*:*", "cpeNameId": "AEDE877D-D8A5-4365-9354-355C5BDBF8D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12:*:*:*:*:*:*:*", "cpeNameId": "0975E1F0-0E5F-445B-BBAC-66294DC99443"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12:-:*:*:*:*:*:*", "cpeNameId": "DF7473CD-B405-4E90-9185-B9E682AB2EA8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12:rc1:*:*:*:*:*:*", "cpeNameId": "3704C17E-765C-494D-ABF4-6687AD9DCA2B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12:rc2:*:*:*:*:*:*", "cpeNameId": "576FB04F-8AE6-459C-B9B7-4B161AA533C9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12:rc3:*:*:*:*:*:*", "cpeNameId": "D1CC9AD0-BCFB-47FF-A991-F2D8D4241D7A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12:rc4:*:*:*:*:*:*", "cpeNameId": "5B131271-8353-4F4D-A802-6231F77D62F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12:rc5:*:*:*:*:*:*", "cpeNameId": "3871B8EE-EE4B-43DD-9B39-DAE15494AEF2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12:rc6:*:*:*:*:*:*", "cpeNameId": "2F22DBF5-138B-4E06-97A9-D48EE51DAD9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.1:*:*:*:*:*:*:*", "cpeNameId": "69B0A1AF-BDD2-4852-B63D-E4BF55573CAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.2:*:*:*:*:*:*:*", "cpeNameId": "654BD99C-D40D-4573-A72F-D135048F0BD6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.3:*:*:*:*:*:*:*", "cpeNameId": "2DFD73EB-B731-43EF-A6D9-0777823AA9ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.4:*:*:*:*:*:*:*", "cpeNameId": "50296B03-0A9B-497E-85CE-EDBABB8603B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.5:*:*:*:*:*:*:*", "cpeNameId": "184D3B86-723B-43AE-9B33-91CAD47275F7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.6:*:*:*:*:*:*:*", "cpeNameId": "2538F421-8C36-4DA8-8D4A-20811D6843BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.7:*:*:*:*:*:*:*", "cpeNameId": "E8D1E4A0-A0B2-4B0B-988F-984BF74D3B99"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.8:*:*:*:*:*:*:*", "cpeNameId": "43B25D3D-1D5D-4E14-A5CE-69FB57B0230D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.9:*:*:*:*:*:*:*", "cpeNameId": "BD4E83AA-561D-49FA-9703-CFF03AA235A3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.10:*:*:*:*:*:*:*", "cpeNameId": "109315CC-209F-40BF-A5E1-C307A1F780DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.11:*:*:*:*:*:*:*", "cpeNameId": "69494478-22B3-4371-B7C7-0558CDD786C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.12:*:*:*:*:*:*:*", "cpeNameId": "56632064-D578-4D87-9DF8-C06F096ABDFC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.13:*:*:*:*:*:*:*", "cpeNameId": "97C936CC-FC5C-4A0B-9F4A-BC253561E90D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.12.14:*:*:*:*:*:*:*", "cpeNameId": "0C13DFDE-0149-4EB6-9BA0-F62AC6FE5586"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13:*:*:*:*:*:*:*", "cpeNameId": "63D7AE43-6B91-47A7-9E3E-58B08ACEE5CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13:-:*:*:*:*:*:*", "cpeNameId": "94A3FF49-65AE-46A5-AF47-00094F5AF3E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13:rc1:*:*:*:*:*:*", "cpeNameId": "C5C9AA2D-4C67-496E-AE87-863FA0E9B8CE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13:rc2:*:*:*:*:*:*", "cpeNameId": "25E5D931-E147-4A6A-AD81-9AF12D4DCAB6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13:rc3:*:*:*:*:*:*", "cpeNameId": "853B280B-EC80-4D50-8494-0D3FBEF98F78"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13:rc4:*:*:*:*:*:*", "cpeNameId": "823B55ED-26FF-4111-A479-E477AAE70FF1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13:rc5:*:*:*:*:*:*", "cpeNameId": "8B7F3844-CA39-422C-8449-06CF8AD6672B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13:rc6:*:*:*:*:*:*", "cpeNameId": "9ECB08C7-B61F-415B-8091-4F5B47F8085F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.1:*:*:*:*:*:*:*", "cpeNameId": "226B0AC1-B943-40C0-8426-4BB9B25A2FBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.2:*:*:*:*:*:*:*", "cpeNameId": "101CC84F-1E9F-4945-AC58-F1A89AC868FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.3:*:*:*:*:*:*:*", "cpeNameId": "943EB2FE-E2B5-4056-8432-2E21A07AAE5A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.4:*:*:*:*:*:*:*", "cpeNameId": "30F2FA91-0299-4CF0-904F-CEB63D8421F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.5:*:*:*:*:*:*:*", "cpeNameId": "8A5862FC-697A-49B3-B018-683F56E40C33"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.6:*:*:*:*:*:*:*", "cpeNameId": "9907DA49-FBB8-4EA6-A3D3-D395343A6635"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.7:*:*:*:*:*:*:*", "cpeNameId": "2928EAC1-58D0-4D06-9080-D744192ED843"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.8:*:*:*:*:*:*:*", "cpeNameId": "69790995-A09C-4859-B6AF-6FD626D2F615"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.9:*:*:*:*:*:*:*", "cpeNameId": "AD833379-4556-4DFD-A670-98EE76636A5B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.10:*:*:*:*:*:*:*", "cpeNameId": "1D010FB8-D849-4388-8D10-74F4D6F59D3C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.11:*:*:*:*:*:*:*", "cpeNameId": "F659B20D-E773-4DEA-86E5-9914230B1A15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.12:*:*:*:*:*:*:*", "cpeNameId": "B779CDC3-8957-4B5C-8D66-00A277A1B3F4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.13:*:*:*:*:*:*:*", "cpeNameId": "EAC315D4-E0E0-41C8-A95B-AB5E895BFBBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.14:*:*:*:*:*:*:*", "cpeNameId": "1819E47A-069B-419A-8EF6-C9313A397178"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.15:*:*:*:*:*:*:*", "cpeNameId": "027145FE-2731-49DA-86A8-1D2FBC9FB086"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.13.16:*:*:*:*:*:*:*", "cpeNameId": "ECD3B257-E717-4928-B0C1-A784E553B3E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14:*:*:*:*:*:*:*", "cpeNameId": "A931E9A5-97C5-409C-A3BA-5FEC11A2C622"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.1:*:*:*:*:*:*:*", "cpeNameId": "C5A24D81-DC61-4E8E-A883-70A89D049530"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.2:*:*:*:*:*:*:*", "cpeNameId": "4E26113D-F6B7-453F-9387-E01F3FB22E21"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.3:*:*:*:*:*:*:*", "cpeNameId": "814EF758-607B-40CC-BE23-CE70074F76CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.4:*:*:*:*:*:*:*", "cpeNameId": "6720BFE9-C0EE-48BF-9DF5-EF2216114FA3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.5:*:*:*:*:*:*:*", "cpeNameId": "6AF9B2CB-A700-4D4B-99BD-68F8B1B60D27"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.6:*:*:*:*:*:*:*", "cpeNameId": "9FB8CFED-3C93-41CD-AA03-2B6383630B83"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.7:*:*:*:*:*:*:*", "cpeNameId": "2A024E18-8E2D-43F7-953C-15A11490F277"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.8:*:*:*:*:*:*:*", "cpeNameId": "B316EADE-3506-4B78-84D7-59222A7EA27C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.9:*:*:*:*:*:*:*", "cpeNameId": "22C19B12-730A-4C18-9414-277A199CDB44"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.10:*:*:*:*:*:*:*", "cpeNameId": "1C9ACEF0-E248-4B66-AF0C-F323FF758671"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.11:*:*:*:*:*:*:*", "cpeNameId": "CFE32D5E-B63B-4BBD-AF35-835F694D1946"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.12:*:*:*:*:*:*:*", "cpeNameId": "51A5C92D-0CAD-4718-8BD9-70AD3BF3ED1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.13:*:*:*:*:*:*:*", "cpeNameId": "70614E00-337E-4E52-9FD8-20E1C106B5DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.14:*:*:*:*:*:*:*", "cpeNameId": "6930B9C7-4CC9-4DCA-B201-2D9E690BFE80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.15:*:*:*:*:*:*:*", "cpeNameId": "9B2631F3-F6FE-4791-823F-695BE2F12D47"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.16:*:*:*:*:*:*:*", "cpeNameId": "092E3E03-A335-4443-8BED-47DDB83C5FA0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.17:*:*:*:*:*:*:*", "cpeNameId": "36D93C96-FC7E-4D4F-883E-3AF5A2FA3000"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.18:*:*:*:*:*:*:*", "cpeNameId": "7A290C14-ED57-4B9F-91FF-0FC4AAC9A1F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.19:*:*:*:*:*:*:*", "cpeNameId": "A8688970-830A-43D1-B07D-6013A971EC79"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.20:*:*:*:*:*:*:*", "cpeNameId": "17B788D0-A567-43B8-82A9-8FF9366015A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.21:*:*:*:*:*:*:*", "cpeNameId": "78A2B7F8-B9DE-4C98-A44D-EF1B61256567"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.22:*:*:*:*:*:*:*", "cpeNameId": "72C09BB8-DCC8-45E8-B7B5-993CFE154338"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.23:*:*:*:*:*:*:*", "cpeNameId": "D4585EAB-400F-4EDF-9DED-1F8CBD5B744F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.24:*:*:*:*:*:*:*", "cpeNameId": "FEFD7885-1EE8-416D-B7FE-8E11083ED450"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.25:*:*:*:*:*:*:*", "cpeNameId": "62184EBD-8376-48E6-BDA6-33DA7DA4DE55"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.26:*:*:*:*:*:*:*", "cpeNameId": "4E0A62E4-D6E6-472F-B7EB-0863D2CB2043"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.27:*:*:*:*:*:*:*", "cpeNameId": "B36914F3-9F0C-48F1-B721-8451FA606F40"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.28:*:*:*:*:*:*:*", "cpeNameId": "5406494D-C3A0-424C-A739-DF138E8457FA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.29:*:*:*:*:*:*:*", "cpeNameId": "2E069436-B02E-4F1D-BBFF-7C67DCBB1978"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.30:*:*:*:*:*:*:*", "cpeNameId": "0C8564AC-CE4D-4B8F-8588-CB6F8162FC34"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.31:*:*:*:*:*:*:*", "cpeNameId": "08176301-EEF5-439E-99BF-EB6055095F3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.32:*:*:*:*:*:*:*", "cpeNameId": "5050DE72-C59B-428C-B676-CD6A69950413"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.33:*:*:*:*:*:*:*", "cpeNameId": "6EF37D93-2185-4C48-932B-64AE54920BF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.34:*:*:*:*:*:*:*", "cpeNameId": "CD6EEA39-F27B-4E2F-ABF7-B979F9A60D16"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.35:*:*:*:*:*:*:*", "cpeNameId": "9601934D-422D-478C-932B-0B723ECF1AC8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.36:*:*:*:*:*:*:*", "cpeNameId": "117B9343-7A2A-4CF2-A3FC-5CF339397B49"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.37:*:*:*:*:*:*:*", "cpeNameId": "3DAF6A51-D407-4CAF-A800-E8C601AF7A88"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.38:*:*:*:*:*:*:*", "cpeNameId": "D818B0AA-263A-4AD4-8F30-D01F9F103771"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.39:*:*:*:*:*:*:*", "cpeNameId": "19410F95-E22A-4EA0-A64F-7334B338C559"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.40:*:*:*:*:*:*:*", "cpeNameId": "4C39B4AE-1893-4D41-A20B-E4DA4F05B12E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.41:*:*:*:*:*:*:*", "cpeNameId": "9E6243E5-7BAA-4061-BA98-AE3335BA90DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.42:*:*:*:*:*:*:*", "cpeNameId": "5289A6EE-1D01-4F96-806C-1843A14FDEF2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.43:*:*:*:*:*:*:*", "cpeNameId": "9ABCDB72-25A8-46CD-A422-35ADA558EF68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.44:*:*:*:*:*:*:*", "cpeNameId": "574EC3B6-21A3-47E9-9858-3CA9EF533E67"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.45:*:*:*:*:*:*:*", "cpeNameId": "38485FA4-4F72-4663-A066-8D01D3863321"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.46:*:*:*:*:*:*:*", "cpeNameId": "764D933F-58C1-48E3-9907-B0DDE1A4F8AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.47:*:*:*:*:*:*:*", "cpeNameId": "AE54A178-E51B-452A-9C64-DA3A3CC946AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.48:*:*:*:*:*:*:*", "cpeNameId": "B535E7F9-6273-497C-8D1E-27FC9FAECD72"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.49:*:*:*:*:*:*:*", "cpeNameId": "83203827-63F4-47AE-A1CA-217858D53769"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.50:*:*:*:*:*:*:*", "cpeNameId": "194931EE-DDB3-420C-9AF7-EC5AFD5D6E28"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.51:*:*:*:*:*:*:*", "cpeNameId": "6DBC9273-6F1D-497F-9664-184028BD6B4D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.52:*:*:*:*:*:*:*", "cpeNameId": "214855D8-7634-45D4-B464-65EDD37AF850"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.53:*:*:*:*:*:*:*", "cpeNameId": "67B2569B-44C2-4049-BDA4-2E773A4E29F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.54:*:*:*:*:*:*:*", "cpeNameId": "9EBDE6FE-5FF2-4F2D-B58A-25094E85BFB1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.55:*:*:*:*:*:*:*", "cpeNameId": "D0B5F04E-862B-490F-8305-60B811F4E6F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.56:*:*:*:*:*:*:*", "cpeNameId": "B668AD3F-F0E8-4A26-879B-046F18DD8A36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.57:*:*:*:*:*:*:*", "cpeNameId": "E16FC742-4DBD-4DB4-B969-9C064D464FE5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.58:*:*:*:*:*:*:*", "cpeNameId": "8B062B81-0F55-4FF6-B94C-C877DFA0E50B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.59:*:*:*:*:*:*:*", "cpeNameId": "3CEEC1DF-CF5C-4C9D-ADB4-671659A81424"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.60:*:*:*:*:*:*:*", "cpeNameId": "25D77D6D-411A-415B-9B4C-71C7DA916873"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.61:*:*:*:*:*:*:*", "cpeNameId": "65E712DB-951C-492B-A315-827459B80E5E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.62:*:*:*:*:*:*:*", "cpeNameId": "F11F0C93-C51B-4199-B8B7-D7B81A103E8C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.63:*:*:*:*:*:*:*", "cpeNameId": "35923443-2E09-4624-9DEE-9ACF12EAB448"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.64:*:*:*:*:*:*:*", "cpeNameId": "205E064B-A0B3-4DC9-A4F9-FA48BB6D7666"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.65:*:*:*:*:*:*:*", "cpeNameId": "B0E66BBD-FF9B-4FE2-955E-363B2426AAA4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.66:*:*:*:*:*:*:*", "cpeNameId": "65FADA8B-3BAE-4B74-805D-40121FF01EAF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.67:*:*:*:*:*:*:*", "cpeNameId": "8796300B-8BBD-4767-B13C-A04AA0BB6FEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.68:*:*:*:*:*:*:*", "cpeNameId": "EA1F0EFF-1D54-4D41-8791-38459690E25B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.69:*:*:*:*:*:*:*", "cpeNameId": "609603AF-3EA9-4959-BF95-65681DD73429"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.70:*:*:*:*:*:*:*", "cpeNameId": "626D150A-609E-46A3-9B99-2B5517D68FCF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.71:*:*:*:*:*:*:*", "cpeNameId": "54045011-3CF7-4D72-B47A-67352BD27C9B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.72:*:*:*:*:*:*:*", "cpeNameId": "A4A18A3C-C9E0-4640-A815-B4F19017E986"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.73:*:*:*:*:*:*:*", "cpeNameId": "101552E2-98D5-490C-8507-D8F3CD5E74CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.74:*:*:*:*:*:*:*", "cpeNameId": "306A3E6C-2907-416C-966D-810515DBCCCB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.75:*:*:*:*:*:*:*", "cpeNameId": "BAAF7099-2145-41D0-8529-A6065254637F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.76:*:*:*:*:*:*:*", "cpeNameId": "DDCDF175-DC63-49EC-A7AD-9BFEFE5527E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.77:*:*:*:*:*:*:*", "cpeNameId": "38B40852-28A0-490F-B4DC-3980A9C5B421"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.78:*:*:*:*:*:*:*", "cpeNameId": "6E17FF7C-84D2-4931-992C-A5E7ED78834F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.79:*:*:*:*:*:*:*", "cpeNameId": "BB0E9999-4D82-493C-98BB-FE9D9A569DED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.80:*:*:*:*:*:*:*", "cpeNameId": "4AC211FC-04A6-4405-9635-D73ECD955418"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.81:*:*:*:*:*:*:*", "cpeNameId": "92E16615-DDD7-4E66-8BF6-BAA740D2F0C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.82:*:*:*:*:*:*:*", "cpeNameId": "F7A93940-0210-4AD1-B8DD-329E01CF07C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.83:*:*:*:*:*:*:*", "cpeNameId": "31B6D10B-87F4-4EDC-B7B1-FD01674BF26E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.84:*:*:*:*:*:*:*", "cpeNameId": "4275466A-03C1-421C-A4B0-21B518067550"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.85:*:*:*:*:*:*:*", "cpeNameId": "CA858139-E95A-4FEE-B89B-63F8951AC6C5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.86:*:*:*:*:*:*:*", "cpeNameId": "E4F4C982-7F3B-45B2-84AB-3A0EA7B17608"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.87:*:*:*:*:*:*:*", "cpeNameId": "2343FBFC-440A-404C-BFBA-0C17D3A7A7DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.88:*:*:*:*:*:*:*", "cpeNameId": "D7E1A205-815C-4D28-8BA2-9BC9500AD4A7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.89:*:*:*:*:*:*:*", "cpeNameId": "39F2F19A-FB5E-4866-BAE2-356D068B45BA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.90:*:*:*:*:*:*:*", "cpeNameId": "50AD92DB-6E21-4AA8-9E00-052B90A9965E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.91:*:*:*:*:*:*:*", "cpeNameId": "F8DE7403-3DFA-4DEE-8780-A0DA10BF9528"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.92:*:*:*:*:*:*:*", "cpeNameId": "39EF80A8-F19C-4BE8-8D66-7C5CD424B4D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.93:*:*:*:*:*:*:*", "cpeNameId": "E5500E0F-C99A-4502-99E6-7981CA795BF2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.94:*:*:*:*:*:*:*", "cpeNameId": "74932CAC-8FBF-4367-9392-6D00F8FFFB99"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.95:*:*:*:*:*:*:*", "cpeNameId": "8101D71E-8866-4E44-879C-0C5B12D7EBE7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.96:*:*:*:*:*:*:*", "cpeNameId": "E3C79F48-C929-4535-A410-136A4CC98F26"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.97:*:*:*:*:*:*:*", "cpeNameId": "1BD7D338-728B-43EB-91A4-6827CD29192C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.98:*:*:*:*:*:*:*", "cpeNameId": "86B2C93A-A003-4AAA-AE7C-CD209F2063B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.99:*:*:*:*:*:*:*", "cpeNameId": "6A43476F-D00F-4E25-8FAC-647EEE0EDFF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.100:*:*:*:*:*:*:*", "cpeNameId": "4E019C3A-D2DB-457F-A70E-5E03CCA91476"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.101:*:*:*:*:*:*:*", "cpeNameId": "A73A2FC0-DC50-499F-A148-78FA51F8D760"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.102:*:*:*:*:*:*:*", "cpeNameId": "127E7A89-5961-457D-8BF7-4164707E025E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.103:*:*:*:*:*:*:*", "cpeNameId": "388373C0-5D21-45F9-BF7E-5E60B4E7318F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.104:*:*:*:*:*:*:*", "cpeNameId": "3B19EA98-6B97-4A3A-B3B0-DC182A51617F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.105:*:*:*:*:*:*:*", "cpeNameId": "EAF98B09-69E7-48C1-8B69-3AD3E29E5A2E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.106:*:*:*:*:*:*:*", "cpeNameId": "A2582828-CCCE-4D12-85D5-3A1F343C7E00"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.107:*:*:*:*:*:*:*", "cpeNameId": "AD5EA444-4A0C-4A51-A8BE-F15FE36EE0C5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.108:*:*:*:*:*:*:*", "cpeNameId": "F94B9FE0-697B-41B7-B791-B9A0C4D86168"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.109:*:*:*:*:*:*:*", "cpeNameId": "4F0FBDC5-4177-425F-ADF6-C57C3DCA5D4D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.110:*:*:*:*:*:*:*", "cpeNameId": "2D6859E3-FCB4-477E-845A-80388AC62521"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.111:*:*:*:*:*:*:*", "cpeNameId": "E63E0425-D6C3-4773-A69C-D9033B050A0E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.112:*:*:*:*:*:*:*", "cpeNameId": "B5B44EDD-66B1-47B4-BAAE-38DE4AECC0A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.113:*:*:*:*:*:*:*", "cpeNameId": "2F7F63C6-E1D8-40B9-A3BE-99A553814F5A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.114:*:*:*:*:*:*:*", "cpeNameId": "A3653829-0B32-4838-90F0-B2CCC32580DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.115:*:*:*:*:*:*:*", "cpeNameId": "758316DC-FEB4-4F05-994B-AE0A555D7AEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.116:*:*:*:*:*:*:*", "cpeNameId": "CEA596C8-E6AD-4C8C-BF8F-FEBF1BF73E80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.117:*:*:*:*:*:*:*", "cpeNameId": "D09DC33D-889B-4BA3-8311-057DCB5EB7D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.118:*:*:*:*:*:*:*", "cpeNameId": "446206CE-87D2-402D-8451-4F63D75B6CB6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.119:*:*:*:*:*:*:*", "cpeNameId": "CF788798-2DF1-4253-AA76-8B021DB84887"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.120:*:*:*:*:*:*:*", "cpeNameId": "7A8CE9D2-54CD-4BDA-AF50-12C170DC6E2E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.121:*:*:*:*:*:*:*", "cpeNameId": "08EAEBAF-0EC2-48A1-9B20-586269492003"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.122:*:*:*:*:*:*:*", "cpeNameId": "7E12FC79-A932-4613-A0E6-6E78D0916FC4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.123:*:*:*:*:*:*:*", "cpeNameId": "CEC4835E-515C-49EA-93A4-45ED21306EC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.124:*:*:*:*:*:*:*", "cpeNameId": "B8B08C25-A0CC-4BCB-BCC8-DF667EE56E09"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.125:*:*:*:*:*:*:*", "cpeNameId": "9FE63906-4FDE-46B8-A606-E814C0F6F44B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.126:*:*:*:*:*:*:*", "cpeNameId": "18D0E785-E281-4C1B-AAAB-1941B6652595"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.127:*:*:*:*:*:*:*", "cpeNameId": "F885AC80-EECE-4DD5-8FFB-6F71501CF7A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.128:*:*:*:*:*:*:*", "cpeNameId": "E98D93BF-9F5C-4817-B9A4-1EC01D911361"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.129:*:*:*:*:*:*:*", "cpeNameId": "0381E0F9-379F-4991-8218-0D49695A485C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.130:*:*:*:*:*:*:*", "cpeNameId": "70367F10-ACD6-4508-ACB5-DAC961B2DAD6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.131:*:*:*:*:*:*:*", "cpeNameId": "98C623C6-03CD-485B-BF39-D31296742AEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.132:*:*:*:*:*:*:*", "cpeNameId": "1E482272-30CF-4AC1-8D89-2594468F7D4B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.133:*:*:*:*:*:*:*", "cpeNameId": "111B8E60-2201-4175-8DF6-9254703F20FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.134:*:*:*:*:*:*:*", "cpeNameId": "E359DA12-908D-4DCE-863E-3FF8641CC7C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.135:*:*:*:*:*:*:*", "cpeNameId": "27A8264E-B347-4F33-8DB6-D654A8DF7008"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.136:*:*:*:*:*:*:*", "cpeNameId": "DFC17EF5-FF88-4BBE-AD7A-B6EF53741144"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.137:*:*:*:*:*:*:*", "cpeNameId": "DE9E6429-1CD7-4FA0-A2BB-9F73CFFA4AE6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.138:*:*:*:*:*:*:*", "cpeNameId": "3E2F69CE-601A-4558-820F-4D2101BC6DAA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.139:*:*:*:*:*:*:*", "cpeNameId": "AED13A18-393D-4413-80E6-5C8C1912C64C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.140:*:*:*:*:*:*:*", "cpeNameId": "DCCD3A03-0FA0-497E-938A-D4877C862C7D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.141:*:*:*:*:*:*:*", "cpeNameId": "A984AB3D-A744-45E7-B863-AFCE9F3BCA8D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.142:*:*:*:*:*:*:*", "cpeNameId": "8BA42A60-B968-4658-A593-5D6D1CDC2DD7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.143:*:*:*:*:*:*:*", "cpeNameId": "F1883261-CF7A-4133-BA12-E5A3648FFCD2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.144:*:*:*:*:*:*:*", "cpeNameId": "2ECB0A40-9134-477D-A33D-D1A21FD1D853"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.145:*:*:*:*:*:*:*", "cpeNameId": "37AD964D-982C-4491-9DD8-9BBEFB703649"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.146:*:*:*:*:*:*:*", "cpeNameId": "60D01110-32CE-4174-8305-9CC98A7954A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.147:*:*:*:*:*:*:*", "cpeNameId": "3C59A1B8-E591-4781-87FE-6652A4B865BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.148:*:*:*:*:*:*:*", "cpeNameId": "E3589E83-AB61-4638-83A5-4FCCDCF12939"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.149:*:*:*:*:*:*:*", "cpeNameId": "43561658-86C5-4F33-9BA9-959238156461"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.150:*:*:*:*:*:*:*", "cpeNameId": "65A8F7B6-A62D-4F12-BE5C-81E2C46F2C39"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.151:*:*:*:*:*:*:*", "cpeNameId": "359D1CB2-7092-4050-8BDE-EA9B90C2A4A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.152:*:*:*:*:*:*:*", "cpeNameId": "DCBA08B5-D75B-4EA4-8EB2-976C5EE5208C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.153:*:*:*:*:*:*:*", "cpeNameId": "AEF73713-2A2E-4202-9FAF-35F9007DC67F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.154:*:*:*:*:*:*:*", "cpeNameId": "F56CAAD2-0A98-4C49-948C-A58C81AF2136"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.155:*:*:*:*:*:*:*", "cpeNameId": "7293A6A3-0953-4BC3-8754-E3521CDDC181"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.156:*:*:*:*:*:*:*", "cpeNameId": "040458A8-9C8A-4F54-8667-DF55833A9D9B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.157:*:*:*:*:*:*:*", "cpeNameId": "47EEEBD8-F966-4731-84CE-95B543D1E665"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.158:*:*:*:*:*:*:*", "cpeNameId": "D8DD8154-1F2C-4E1F-8425-674EA9F33061"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.159:*:*:*:*:*:*:*", "cpeNameId": "23573A67-0200-408D-A6D3-92BB482B239E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.160:*:*:*:*:*:*:*", "cpeNameId": "DB501200-6B09-4237-92DA-8410374E41AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.161:*:*:*:*:*:*:*", "cpeNameId": "1654CFEE-4797-444C-BF7B-36E36EEFB3FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.162:*:*:*:*:*:*:*", "cpeNameId": "F7A73AFA-30D2-4C43-9A25-E516BB6077BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.163:*:*:*:*:*:*:*", "cpeNameId": "152842F1-FD0B-41B7-8361-62DC24194B9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.164:*:*:*:*:*:*:*", "cpeNameId": "1FB6E4A7-E49F-4CB2-B797-CDA9A3EE41F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.165:*:*:*:*:*:*:*", "cpeNameId": "86C98595-98AD-4914-BA7E-7D2EEEBDEEEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.166:*:*:*:*:*:*:*", "cpeNameId": "3A749A85-B1AF-45E0-952F-F07A3315F2B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.167:*:*:*:*:*:*:*", "cpeNameId": "F739A8BA-2722-4D43-8EE3-F0940D5C9962"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.168:*:*:*:*:*:*:*", "cpeNameId": "BA729078-2FD8-494D-80A0-A21A9C8A780C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.169:*:*:*:*:*:*:*", "cpeNameId": "B09E3BA3-FAE1-417D-802E-9FF6A63314CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.170:*:*:*:*:*:*:*", "cpeNameId": "A6354C45-5002-4677-94F6-2585EA37B4A0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.171:*:*:*:*:*:*:*", "cpeNameId": "E3DC59EC-5BDD-4E67-979E-ACF532D0AA0F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.172:*:*:*:*:*:*:*", "cpeNameId": "2915DD1D-0036-4591-921F-4ED4D6E543BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.173:*:*:*:*:*:*:*", "cpeNameId": "6AAAB0B0-C78E-4876-9C2D-5CF3FC83C87B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.174:*:*:*:*:*:*:*", "cpeNameId": "7F586C21-5084-4F3B-A5E2-20ABD2E73301"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.175:*:*:*:*:*:*:*", "cpeNameId": "31C57C02-B17B-45AC-BD33-BA14F2D2F960"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.176:*:*:*:*:*:*:*", "cpeNameId": "495DC903-2104-4E7A-ABDD-044701BEC0AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.177:*:*:*:*:*:*:*", "cpeNameId": "54ECE57B-46D2-4B43-88BA-72DFCC784626"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.178:*:*:*:*:*:*:*", "cpeNameId": "DF1994DB-64D8-449F-AB63-959905FDBED5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.179:*:*:*:*:*:*:*", "cpeNameId": "E998A6CB-5B6B-4698-93F8-60ADA5915CED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.180:*:*:*:*:*:*:*", "cpeNameId": "5780A3A7-D6D2-4597-8E20-64CAEBB9BEC5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.181:*:*:*:*:*:*:*", "cpeNameId": "943B03F2-38B3-48CF-AB60-B0CDCD3232D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.182:*:*:*:*:*:*:*", "cpeNameId": "DE1702E0-9C72-4E22-AD85-B4FF3F08BF12"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.183:*:*:*:*:*:*:*", "cpeNameId": "B448350B-6E82-4C55-BF6C-3416AA6DD09D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.184:*:*:*:*:*:*:*", "cpeNameId": "93D45017-75AC-4F34-B44B-BD725073C783"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.185:*:*:*:*:*:*:*", "cpeNameId": "17EE5023-DA86-42AA-80B8-0E03A8786DBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.186:*:*:*:*:*:*:*", "cpeNameId": "5083CC39-913E-47F4-8D17-DA2A4B3BDB38"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.187:*:*:*:*:*:*:*", "cpeNameId": "A9B26E5E-5D06-4AEE-B95C-BCCCF71E3C2A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.188:*:*:*:*:*:*:*", "cpeNameId": "F61DC571-CA27-43B5-B92E-FF49B2FA5128"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.189:*:*:*:*:*:*:*", "cpeNameId": "39A82CEC-EA57-4F55-AE22-EA9FF7F22411"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.190:*:*:*:*:*:*:*", "cpeNameId": "5C08BEA0-0968-4A2C-90A7-FBBC18870CB4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.191:*:*:*:*:*:*:*", "cpeNameId": "27C0FEC1-829C-410C-B37C-44CBE22D2714"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.192:*:*:*:*:*:*:*", "cpeNameId": "AAE8B6F5-BBF2-4EE5-BFF8-D3E64F6C7544"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.193:*:*:*:*:*:*:*", "cpeNameId": "B75C3C61-1456-4A7E-8175-FEBFECBD8887"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.194:*:*:*:*:*:*:*", "cpeNameId": "64CFCF85-0DB0-4BC3-9BAF-7752E969C6FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.195:*:*:*:*:*:*:*", "cpeNameId": "07D6C56C-CBC4-4E2B-BF3C-298D326A2515"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.196:*:*:*:*:*:*:*", "cpeNameId": "617F7A9C-A4AF-46E1-9B60-654F691A1ACA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.197:*:*:*:*:*:*:*", "cpeNameId": "D1BB57B0-9ED1-49CA-BAF9-9F32E751C423"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.198:*:*:*:*:*:*:*", "cpeNameId": "DFF76FFC-A6CE-4BCA-8BDA-A708D8CA524F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.199:*:*:*:*:*:*:*", "cpeNameId": "8D62E5E5-B08E-4B46-AFA9-9C11A8F2088C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.200:*:*:*:*:*:*:*", "cpeNameId": "4C6DC033-8105-45EB-8B7C-8AD380243F77"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.201:*:*:*:*:*:*:*", "cpeNameId": "02618C38-B7E6-468C-A240-77183CD793ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.202:*:*:*:*:*:*:*", "cpeNameId": "B133CCC3-3525-44C9-9BA6-07731081AF3B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.203:*:*:*:*:*:*:*", "cpeNameId": "2040E6FD-3C1D-4922-8A3E-D93B2024A64F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.204:*:*:*:*:*:*:*", "cpeNameId": "FC48B609-0A74-4ADF-BE7A-8E5A929FF9B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.205:*:*:*:*:*:*:*", "cpeNameId": "2D66C248-5CA3-46AF-819D-8EDC819E5DEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.206:*:*:*:*:*:*:*", "cpeNameId": "0EC2FE2D-3784-41D9-AD97-154F8E9D485A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.207:*:*:*:*:*:*:*", "cpeNameId": "890C3442-53E3-4F78-A62B-2A3DF161993D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.208:*:*:*:*:*:*:*", "cpeNameId": "3CFC3FF9-ABA7-4471-B42B-31B08DB57404"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.209:*:*:*:*:*:*:*", "cpeNameId": "62582930-FD26-41A5-A063-51CCE542611E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.210:*:*:*:*:*:*:*", "cpeNameId": "F0B251D3-1C8A-4EE4-BC8C-798633A46547"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.211:*:*:*:*:*:*:*", "cpeNameId": "6D317823-F155-4FD8-B745-D6A2CA0DCF4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.212:*:*:*:*:*:*:*", "cpeNameId": "93A1BCA4-151B-4C62-9321-C36060232635"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.213:*:*:*:*:*:*:*", "cpeNameId": "2A1F44F0-ED1D-4627-AFDD-52246F44FCA8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.214:*:*:*:*:*:*:*", "cpeNameId": "630134DA-8836-4D64-A8DB-C952FD0879B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.215:*:*:*:*:*:*:*", "cpeNameId": "F647FD73-A1BD-4519-96EF-BC5962B49049"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.216:*:*:*:*:*:*:*", "cpeNameId": "84F052BA-7078-4E5C-AF40-2E298CEBAA0D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.217:*:*:*:*:*:*:*", "cpeNameId": "8586BB5B-5356-497E-8039-D4718A8D233E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.218:*:*:*:*:*:*:*", "cpeNameId": "A7103A90-E7B5-46AC-B508-F3888B37524D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.219:*:*:*:*:*:*:*", "cpeNameId": "AAEF1C1C-6618-417A-A3EE-8BB6EB63F1C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.220:*:*:*:*:*:*:*", "cpeNameId": "00A3991D-98AC-4422-9B19-3B2515EF7B06"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.221:*:*:*:*:*:*:*", "cpeNameId": "CC8EF11A-F131-442A-B0F4-0810D38EB89E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.222:*:*:*:*:*:*:*", "cpeNameId": "E9CDB672-F2E0-42B9-8F20-B3BCAF324A36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.223:*:*:*:*:*:*:*", "cpeNameId": "1AC50DA1-BA05-43A5-A50F-8EF350DD96D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.224:*:*:*:*:*:*:*", "cpeNameId": "42E73115-25A7-4EDF-9402-81BA0AC8B470"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.225:*:*:*:*:*:*:*", "cpeNameId": "85B8548F-576C-442E-A2EA-30CFF43407AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.226:*:*:*:*:*:*:*", "cpeNameId": "3794F34E-4B0D-487C-890D-884AA41EF6D7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.227:*:*:*:*:*:*:*", "cpeNameId": "29337989-0DC4-4B35-BA5F-E157DAAD1557"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.228:*:*:*:*:*:*:*", "cpeNameId": "7F43F714-4550-416B-B228-EEF6FC8B1716"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.229:*:*:*:*:*:*:*", "cpeNameId": "9AC44F08-C276-4E15-811B-8CC5010672D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.230:*:*:*:*:*:*:*", "cpeNameId": "8EEDFC00-6778-4242-87AA-1BF8B788A7AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.231:*:*:*:*:*:*:*", "cpeNameId": "4F7C7BF1-9231-4FA0-A31F-A8A21DF8388E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.232:*:*:*:*:*:*:*", "cpeNameId": "B76B39F5-A59B-4C38-9381-5BCB6A78AC30"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.233:*:*:*:*:*:*:*", "cpeNameId": "97DA7801-C4EB-49B8-BCB6-B53FB848E2A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.234:*:*:*:*:*:*:*", "cpeNameId": "B249D0C2-FF7F-48DC-AF81-4B69D6844B27"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.235:*:*:*:*:*:*:*", "cpeNameId": "6B01EB29-4E04-41BD-BC2A-10619B7D39E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.236:*:*:*:*:*:*:*", "cpeNameId": "C81712BA-4FF9-4DD1-AD12-BABC49E8A004"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.237:*:*:*:*:*:*:*", "cpeNameId": "2EA256E4-3D89-4EEB-91B7-FFF529E84CAA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.238:*:*:*:*:*:*:*", "cpeNameId": "A0E92899-D97F-498F-8124-94BF18838682"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.239:*:*:*:*:*:*:*", "cpeNameId": "E4088748-A84D-4D3C-A8F9-479DB4DFEAAF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.240:*:*:*:*:*:*:*", "cpeNameId": "EBEBA8E4-803E-4EF0-A3EA-295960568227"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.241:*:*:*:*:*:*:*", "cpeNameId": "07C3F8E4-4820-447B-8D85-5297B73BD561"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.242:*:*:*:*:*:*:*", "cpeNameId": "EE853DB7-F2DA-4461-926E-E8586C8B9769"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.243:*:*:*:*:*:*:*", "cpeNameId": "EFB0DC56-2543-4A76-B959-03F1D12AFF46"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.244:*:*:*:*:*:*:*", "cpeNameId": "F491B8F2-2AEC-4382-9095-6C6C933316B2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.245:*:*:*:*:*:*:*", "cpeNameId": "EA198FA8-3EC5-458B-8210-D4176F4D2991"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.246:*:*:*:*:*:*:*", "cpeNameId": "45949E40-A94B-4C31-8110-9EB5F16CFA74"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.247:*:*:*:*:*:*:*", "cpeNameId": "D6CA348F-100D-4CB7-884C-05BCD92C93AD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.248:*:*:*:*:*:*:*", "cpeNameId": "774EFE10-D2D0-4C23-ACFC-AD61E9765BA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.249:*:*:*:*:*:*:*", "cpeNameId": "1B531DDE-03EC-4C95-B0DD-C316CE378AD8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.250:*:*:*:*:*:*:*", "cpeNameId": "7105F9F5-3435-481E-B46A-BE6F3AA78446"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.251:*:*:*:*:*:*:*", "cpeNameId": "CCB75783-8321-4164-9877-0AF392D531FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.252:*:*:*:*:*:*:*", "cpeNameId": "14D27D39-5785-461D-A4F7-46F07A67342D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.253:*:*:*:*:*:*:*", "cpeNameId": "3F9F5FE6-B76D-4F70-9F2D-0C647C026561"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.254:*:*:*:*:*:*:*", "cpeNameId": "0C15C6BC-2A46-4556-B847-17B7CA0F4DE3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.255:*:*:*:*:*:*:*", "cpeNameId": "F4FA95EA-4D16-4C6E-86D9-1D0E95E8AD42"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.256:*:*:*:*:*:*:*", "cpeNameId": "41A5A246-0D51-4C1E-A781-DA73D49C53B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.257:*:*:*:*:*:*:*", "cpeNameId": "339FB596-B009-493F-8DA9-19A69E175ED5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.258:*:*:*:*:*:*:*", "cpeNameId": "CCF5717D-F04D-4048-94EA-C4E7A4C45F95"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.259:*:*:*:*:*:*:*", "cpeNameId": "2A03EFB0-FD68-478A-B718-5D411878D8BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.260:*:*:*:*:*:*:*", "cpeNameId": "DA6AC544-7494-4683-83E9-D59AF89B5401"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.261:*:*:*:*:*:*:*", "cpeNameId": "5C4BFBA7-A9B0-425B-AE4F-0C6ED6E21759"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.262:*:*:*:*:*:*:*", "cpeNameId": "345ED523-FD6D-489D-ADBE-FC738A8816C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.263:*:*:*:*:*:*:*", "cpeNameId": "99653F61-52E2-4A51-80F3-C48F7059918B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.264:*:*:*:*:*:*:*", "cpeNameId": "424A4C5C-FB0F-4FCD-8D64-4EF4B44C04DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.265:*:*:*:*:*:*:*", "cpeNameId": "8C58D077-E378-4DA8-8AEA-9B41A26CCF78"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.266:*:*:*:*:*:*:*", "cpeNameId": "FF1979DA-6280-4D83-87A2-76F9B51A484B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.267:*:*:*:*:*:*:*", "cpeNameId": "9316876F-BD99-4370-B45A-622A21A1C234"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.268:*:*:*:*:*:*:*", "cpeNameId": "7364C13D-4E86-45D4-93CE-F8A77D11245E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.269:*:*:*:*:*:*:*", "cpeNameId": "A91EF74E-716D-4D53-B818-CE1FFA90561B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.270:*:*:*:*:*:*:*", "cpeNameId": "9F8B9A50-D4BF-455B-ACAE-9773F80690D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.271:*:*:*:*:*:*:*", "cpeNameId": "14B3F541-9955-4712-A8B1-4394A3D11DAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.272:*:*:*:*:*:*:*", "cpeNameId": "994323DF-37C1-48B8-BF6D-CF726E6ADED2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.273:*:*:*:*:*:*:*", "cpeNameId": "5794FF97-3D47-47A1-9934-DF5587AD915B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.274:*:*:*:*:*:*:*", "cpeNameId": "C853072E-5EC8-483D-A2CA-4AD2297E51FF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.275:*:*:*:*:*:*:*", "cpeNameId": "98009745-52F2-4846-B454-E90321008CFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.276:*:*:*:*:*:*:*", "cpeNameId": "9A192DE3-8954-4CE7-A200-FBCAE1BFF0D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.277:*:*:*:*:*:*:*", "cpeNameId": "651E5F82-D722-4636-B41C-17ECB9F614AD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.278:*:*:*:*:*:*:*", "cpeNameId": "8A8873EE-B55C-4EFF-8885-329450882E8B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.279:*:*:*:*:*:*:*", "cpeNameId": "CEC23D4D-DCBC-4269-904F-EB1829C48B4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.280:*:*:*:*:*:*:*", "cpeNameId": "6670595A-51D0-4860-A97D-CEF230135DCF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.281:*:*:*:*:*:*:*", "cpeNameId": "C6198A8B-6286-4E96-8629-D7C35E60DB89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.282:*:*:*:*:*:*:*", "cpeNameId": "E3D67109-1796-404D-8308-A39BF1338C3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.283:*:*:*:*:*:*:*", "cpeNameId": "D630C6EC-A2AB-480D-AA68-544966BFD6AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.284:*:*:*:*:*:*:*", "cpeNameId": "6BD57B4C-7ECD-41B1-9631-C1BFBBD6B049"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.285:*:*:*:*:*:*:*", "cpeNameId": "C8FCDB6A-75F8-4B62-A698-D9943A805CBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.286:*:*:*:*:*:*:*", "cpeNameId": "BA369E82-203F-4291-9419-56F1E4A53D15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.287:*:*:*:*:*:*:*", "cpeNameId": "A544C41E-F4FC-4293-A3D6-B5F91E5EF1A7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.288:*:*:*:*:*:*:*", "cpeNameId": "A0BDF59E-7C92-443B-B035-B250F80E4DC9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.289:*:*:*:*:*:*:*", "cpeNameId": "73D2125C-A474-417B-B135-1903D427F538"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.290:*:*:*:*:*:*:*", "cpeNameId": "477BA94B-EB37-4234-BA72-469682042745"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.291:*:*:*:*:*:*:*", "cpeNameId": "F1E29F38-68F3-4CEE-8AD5-828E7C63ED7A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.292:*:*:*:*:*:*:*", "cpeNameId": "6829F830-B295-4BEA-9037-EAE6C6D83D45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.293:*:*:*:*:*:*:*", "cpeNameId": "22CF6A05-5745-4A7F-8559-702E9C3C8830"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.294:*:*:*:*:*:*:*", "cpeNameId": "A36397CA-8253-443A-BEB3-EB7F21F084D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.295:*:*:*:*:*:*:*", "cpeNameId": "9597112C-DEE5-4DE7-A87B-A8CA716B2212"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.296:*:*:*:*:*:*:*", "cpeNameId": "98F92400-37C0-40CA-A0A7-AE36BA845F6B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.297:*:*:*:*:*:*:*", "cpeNameId": "48BF44DC-C00D-4964-B152-341BACB0F556"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.298:*:*:*:*:*:*:*", "cpeNameId": "0E913D3C-18EF-4895-98ED-42C69A1C76B2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.299:*:*:*:*:*:*:*", "cpeNameId": "B8D13EF3-4ECA-4429-8BE2-175CA0247B11"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.300:*:*:*:*:*:*:*", "cpeNameId": "4D091AD8-D0D7-4EBA-814C-88E1BA8374F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.301:*:*:*:*:*:*:*", "cpeNameId": "B1830564-E39A-448F-950A-1B20281BB3B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.302:*:*:*:*:*:*:*", "cpeNameId": "8EA0AAA8-D9AB-47A4-84B1-733B8A5685BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.303:*:*:*:*:*:*:*", "cpeNameId": "8271E5F1-FC03-47FC-9102-A0491D04E4A6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.304:*:*:*:*:*:*:*", "cpeNameId": "8A6B6167-7ED8-4001-BBE1-60520A1507D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.305:*:*:*:*:*:*:*", "cpeNameId": "D314E91D-4DB8-4F05-A3E9-D0AD324F2B40"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.306:*:*:*:*:*:*:*", "cpeNameId": "5DE889B3-0BAD-4FA8-9450-7ADAEA53BCB6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.307:*:*:*:*:*:*:*", "cpeNameId": "0A1ACC8A-123F-4239-8F9D-9DBB85D19A60"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.308:*:*:*:*:*:*:*", "cpeNameId": "2C104BF2-78BD-46F5-A42B-8A7737F08831"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.309:*:*:*:*:*:*:*", "cpeNameId": "3AB452D7-1B5C-4AEC-BA48-88EAE679521A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.310:*:*:*:*:*:*:*", "cpeNameId": "A2B6D891-8756-47AC-BB50-74EED68F5348"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.311:*:*:*:*:*:*:*", "cpeNameId": "CD98624C-BF2D-4AD5-8DC6-23C0376ADEDE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.312:*:*:*:*:*:*:*", "cpeNameId": "A353C4E5-BCD5-404E-BA32-E44D42939E26"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.313:*:*:*:*:*:*:*", "cpeNameId": "EA493CF9-9392-46DA-B897-F85D4EF3B00E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.314:*:*:*:*:*:*:*", "cpeNameId": "50DDF9BB-6311-4505-AA6A-6240E950DD68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.315:*:*:*:*:*:*:*", "cpeNameId": "6929ED83-8C13-41A6-9C4A-CA1F36116442"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.316:*:*:*:*:*:*:*", "cpeNameId": "41B4751B-1E9E-493B-AE0D-BF29E6317911"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.317:*:*:*:*:*:*:*", "cpeNameId": "8DAAD8CA-4620-48BE-95E9-9623F7AACD63"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.318:*:*:*:*:*:*:*", "cpeNameId": "2C0D3085-6703-41F9-81D9-28EA3A593F9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.319:*:*:*:*:*:*:*", "cpeNameId": "A439957C-0CFF-4BDF-A644-00A2602DF673"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.320:*:*:*:*:*:*:*", "cpeNameId": "3EDC01DA-28BA-4672-A0BE-8B3346F51F19"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.321:*:*:*:*:*:*:*", "cpeNameId": "77BA70B4-3A94-4325-BDC1-22564AF064F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.322:*:*:*:*:*:*:*", "cpeNameId": "0743F164-F7F4-485E-AFB7-35D7DC7455E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.323:*:*:*:*:*:*:*", "cpeNameId": "5FDB4BD5-157B-43B7-BA06-8C5FF941542F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.324:*:*:*:*:*:*:*", "cpeNameId": "DE4432A7-318F-4B7B-8CEB-9FA31468CC36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.325:*:*:*:*:*:*:*", "cpeNameId": "80F87AA1-DAEE-4931-ADF7-4183B893D8F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.326:*:*:*:*:*:*:*", "cpeNameId": "5C25C636-C95F-4E94-AC85-5E684E14069F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.327:*:*:*:*:*:*:*", "cpeNameId": "ED6E0851-1828-44F8-BF12-233B8E28DBC8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.328:*:*:*:*:*:*:*", "cpeNameId": "976DF29A-943C-4C28-A071-DA2911DEDECE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.329:*:*:*:*:*:*:*", "cpeNameId": "3EE5D34F-9BBA-4FBA-9157-A4A9FA953C68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.330:*:*:*:*:*:*:*", "cpeNameId": "27711BD8-D761-4F4F-8330-FB1150982CCD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.331:*:*:*:*:*:*:*", "cpeNameId": "CBD4F61B-627B-4ACC-B743-57C302AB29F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.332:*:*:*:*:*:*:*", "cpeNameId": "E5247303-B19B-42F3-B1F1-DED50AB8E3CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.333:*:*:*:*:*:*:*", "cpeNameId": "F7C8E776-3213-4F39-9637-25902C283906"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.334:*:*:*:*:*:*:*", "cpeNameId": "D9008EE6-5CED-451D-8E36-07626739C582"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.335:*:*:*:*:*:*:*", "cpeNameId": "3F094A53-6652-4404-AE4C-3CCA8BE6BAC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.14.336:*:*:*:*:*:*:*", "cpeNameId": "8540A828-6A7F-499A-9F47-861E278F7001"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:*:*:*:*:*:*:*", "cpeNameId": "D44D12DF-CC78-4ADD-AA64-D1FF33FCFC11"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:-:*:*:*:*:*:*", "cpeNameId": "82324BC8-B6FA-4FD7-B301-3CAA806DF77D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:rc1:*:*:*:*:*:*", "cpeNameId": "710D7761-A5EC-4338-BBC6-1EA829347DD9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:rc2:*:*:*:*:*:*", "cpeNameId": "A9B4765F-04DB-41A9-9BDC-D9EBC8A916CE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:rc3:*:*:*:*:*:*", "cpeNameId": "6D023E11-92E4-4DC4-A704-A653569DEF7E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:rc4:*:*:*:*:*:*", "cpeNameId": "BE180D29-2D25-4945-85F5-4FF1B61A755F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:rc5:*:*:*:*:*:*", "cpeNameId": "B550A739-A864-4C04-8B4F-DB875CCE5876"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:rc6:*:*:*:*:*:*", "cpeNameId": "EE7802F2-4421-4A8F-A5E7-10ABA30BB95D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15:rc7:*:*:*:*:*:*", "cpeNameId": "913B33F6-C76A-415E-978B-DFE69DD12443"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.1:*:*:*:*:*:*:*", "cpeNameId": "885FF46B-AF78-41E0-9992-134FC5483062"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.2:*:*:*:*:*:*:*", "cpeNameId": "417EF125-85BE-4436-8270-385A03FBF5DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.3:*:*:*:*:*:*:*", "cpeNameId": "A60F0159-BE82-4549-A156-D0C420BCD669"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.4:*:*:*:*:*:*:*", "cpeNameId": "205719B0-36E0-490F-A726-DBF0A18C7B6D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.5:*:*:*:*:*:*:*", "cpeNameId": "F6FC9B68-7A46-413B-B2F2-B96FC679293B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.6:*:*:*:*:*:*:*", "cpeNameId": "860DB2BE-F0BD-4E93-ACAF-73AB5A4287EC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.7:*:*:*:*:*:*:*", "cpeNameId": "72F15093-84F6-4F64-AD90-9C0B8534002F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.8:*:*:*:*:*:*:*", "cpeNameId": "1241D778-09B7-41CF-A7F0-3F33365EAEEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.9:*:*:*:*:*:*:*", "cpeNameId": "85AF8455-0705-4C7B-A8D7-C827098D3CBC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.10:*:*:*:*:*:*:*", "cpeNameId": "59B6BDD9-9094-469D-B556-347EAFFAC84A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.11:*:*:*:*:*:*:*", "cpeNameId": "195BB390-1666-4C78-8E5E-E8BB8F7CD6C7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.12:*:*:*:*:*:*:*", "cpeNameId": "4611F4AE-C544-40B2-BAB0-4D75918253B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.13:*:*:*:*:*:*:*", "cpeNameId": "174828D2-1D1F-4A0F-9D4A-3D6CEEB670A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.14:*:*:*:*:*:*:*", "cpeNameId": "4A9AF5EF-2143-422E-9406-12394AE6F056"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.15:*:*:*:*:*:*:*", "cpeNameId": "0ED2B63D-794A-436E-98B2-8BB1746F8E37"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.16:*:*:*:*:*:*:*", "cpeNameId": "A3EE611D-A161-44D4-B8BC-3D77C35AC1DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.17:*:*:*:*:*:*:*", "cpeNameId": "77C22DEA-C18D-4F57-A5B2-D9432480F6F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.15.18:*:*:*:*:*:*:*", "cpeNameId": "98BC40B2-34EE-44D0-AD07-D41DA8D98FEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:*:*:*:*:*:*:*", "cpeNameId": "CE47DAE6-002F-46BE-8496-FC478C0B0928"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:-:*:*:*:*:*:*", "cpeNameId": "96F106B5-E746-4DE6-BCEB-07F1F572960D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:rc:*:*:*:*:*:*", "cpeNameId": "C0F0B475-896B-4239-8475-5B90B74BE05E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:rc1:*:*:*:*:*:*", "cpeNameId": "206EC973-ED2E-49E1-A4AC-54F7D30DD628"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:rc2:*:*:*:*:*:*", "cpeNameId": "AAD4C356-7CE1-4A45-96FE-6D75643AB293"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:rc3:*:*:*:*:*:*", "cpeNameId": "4BFA1B60-7E55-4547-8B4B-AFC1256015D6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:rc4:*:*:*:*:*:*", "cpeNameId": "78E3876E-D2C3-49BA-BE26-2066849638AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:rc5:*:*:*:*:*:*", "cpeNameId": "B9536FB8-C7B1-4C28-82CD-8D8150E7BCCB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:rc6:*:*:*:*:*:*", "cpeNameId": "BEC1B244-1D7B-47BC-A1BB-6F95945EA2C7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16:rc7:*:*:*:*:*:*", "cpeNameId": "1D3A9DBB-AF78-4A75-A55E-C851D1277498"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.1:*:*:*:*:*:*:*", "cpeNameId": "C1BE1F09-D07F-4AE4-9764-73721620F745"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.2:*:*:*:*:*:*:*", "cpeNameId": "563DD6A5-BEDD-437A-BAD5-981FD66FAA1A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.3:*:*:*:*:*:*:*", "cpeNameId": "6DC9ED49-7975-48B1-B630-06680709899F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.4:*:*:*:*:*:*:*", "cpeNameId": "39F925A0-630B-4CBF-9BFC-C40C0E81BFA8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.5:*:*:*:*:*:*:*", "cpeNameId": "A0E5D15C-E27F-4B55-9668-078BA5CCD7AA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.6:*:*:*:*:*:*:*", "cpeNameId": "6DE6DECA-3142-43DA-B930-A48EAFF9CED3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.7:*:*:*:*:*:*:*", "cpeNameId": "0438E224-2F8A-4089-BF5E-D7763A431E39"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.8:*:*:*:*:*:*:*", "cpeNameId": "0814DBD3-2193-40B5-8CE1-5C992D4C59C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.9:*:*:*:*:*:*:*", "cpeNameId": "C75890A0-5944-4BB6-B44B-83FDDA55308A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.10:*:*:*:*:*:*:*", "cpeNameId": "50932CE7-4BA6-4944-839E-800831391197"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.11:*:*:*:*:*:*:*", "cpeNameId": "21B4D5C0-665E-4B96-8A71-F84E2731725A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.12:*:*:*:*:*:*:*", "cpeNameId": "26861D80-6855-42B4-A2C5-5A5314C63454"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.13:*:*:*:*:*:*:*", "cpeNameId": "161AE6FB-AF4F-4A02-A235-9BA4D3A8BFE7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.14:*:*:*:*:*:*:*", "cpeNameId": "04DDF552-0DBA-4D2D-97A9-05F348E45E2D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.15:*:*:*:*:*:*:*", "cpeNameId": "8D8D509C-F3B3-4D99-AE7B-85ACE6CDCE9A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.16:*:*:*:*:*:*:*", "cpeNameId": "F62EAE49-6093-4A2A-AEDC-DB4D450BCDCF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.17:*:*:*:*:*:*:*", "cpeNameId": "D4A046F1-9970-4BC2-A4F8-E58871919793"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.16.18:*:*:*:*:*:*:*", "cpeNameId": "9A7D44E8-1ABB-4FCA-900F-63CF5B432394"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:*:*:*:*:*:*:*", "cpeNameId": "3F9A62D1-EC46-4586-BF5B-075E503B34AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:-:*:*:*:*:*:*", "cpeNameId": "1355298F-E180-4ACE-BE37-E4671C6D87FA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:rc1:*:*:*:*:*:*", "cpeNameId": "869F2A88-8ECA-4277-8EF8-04722B6397F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:rc2:*:*:*:*:*:*", "cpeNameId": "E213D2C7-56A5-4CDB-9FFA-D562EBE66B32"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:rc3:*:*:*:*:*:*", "cpeNameId": "23DCE750-11FB-46DF-B936-8AEAE54EDCF1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:rc4:*:*:*:*:*:*", "cpeNameId": "95518E21-4F70-4E7F-8A5E-41A71733B838"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:rc5:*:*:*:*:*:*", "cpeNameId": "86A613D5-2EDD-46C6-BD54-6EE7E0BD677F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:rc6:*:*:*:*:*:*", "cpeNameId": "7ACCD69E-0ADE-4675-919A-6ADCADB4E243"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17:rc7:*:*:*:*:*:*", "cpeNameId": "0CDA0188-9155-4355-B8E0-EC98BCA4D106"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.1:*:*:*:*:*:*:*", "cpeNameId": "8AFFDBAA-464C-4017-8E0B-80E70560BD9C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.2:*:*:*:*:*:*:*", "cpeNameId": "A00BC577-2BDB-4CB9-A918-5EFA87297409"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.3:*:*:*:*:*:*:*", "cpeNameId": "D03EB1B1-6645-4442-9A5B-084C2C086199"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.4:*:*:*:*:*:*:*", "cpeNameId": "4321A1DC-4069-4924-ADAF-060727BD410C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.5:*:*:*:*:*:*:*", "cpeNameId": "6E0A1034-4FFA-4B8B-BA2F-DDDF74911FD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.6:*:*:*:*:*:*:*", "cpeNameId": "0DA7186B-D3B7-4E95-B66E-8FF81C72BC75"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.7:*:*:*:*:*:*:*", "cpeNameId": "2F936CBB-766A-4DFB-A60A-72F1A37577EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.8:*:*:*:*:*:*:*", "cpeNameId": "CB3F392D-0A8A-4D3E-8E62-9E7FD830F988"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.9:*:*:*:*:*:*:*", "cpeNameId": "D1A962D5-849E-4799-B4E2-58BF062A8E35"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.10:*:*:*:*:*:*:*", "cpeNameId": "358D2C77-1EDB-44D7-914F-C1B93B184AE2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.11:*:*:*:*:*:*:*", "cpeNameId": "1B36CCD2-6734-4F62-887B-0B29DEAB8948"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.12:*:*:*:*:*:*:*", "cpeNameId": "939C2382-3F25-4D16-B047-662EF7362D14"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.13:*:*:*:*:*:*:*", "cpeNameId": "4787E970-6703-4A4A-8A25-2A6DF37E9115"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.14:*:*:*:*:*:*:*", "cpeNameId": "D9DE2C08-37BB-4B4E-9CC9-257FB5D0CC55"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.15:*:*:*:*:*:*:*", "cpeNameId": "56CA0D63-01A8-4C7D-9285-0FE01EE5A4CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.16:*:*:*:*:*:*:*", "cpeNameId": "0EB823BC-6F14-4123-AFE3-5BD35C06053B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.17:*:*:*:*:*:*:*", "cpeNameId": "8DB0A362-21DC-463F-8741-7983D7091926"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.18:*:*:*:*:*:*:*", "cpeNameId": "D52B62A2-3084-4DC4-A603-BCAC0CE52FEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.17.19:*:*:*:*:*:*:*", "cpeNameId": "A5AE9508-CB21-4232-B63E-532C504349B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:*:*:*:*:*:*:*", "cpeNameId": "817415B8-9A60-4887-9222-0D9F02CFB071"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:-:*:*:*:*:*:*", "cpeNameId": "8835D366-AAEA-40BE-A53D-C0C034420403"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:rc1:*:*:*:*:*:*", "cpeNameId": "2213E83B-F249-4DA4-A296-9AE97B5995D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:rc2:*:*:*:*:*:*", "cpeNameId": "48BFC151-DD12-4AA8-860C-CC88EC732BFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:rc3:*:*:*:*:*:*", "cpeNameId": "9FA2195C-1574-4F87-9EBF-C6C98F88BAFF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:rc4:*:*:*:*:*:*", "cpeNameId": "67BF2AB1-0C74-4B1F-8E1C-B1D82E89DDB4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:rc5:*:*:*:*:*:*", "cpeNameId": "AE91D0F4-8012-4BAC-A0C6-BB99AD9D2E46"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:rc6:*:*:*:*:*:*", "cpeNameId": "1766D430-184A-4072-B189-A1497C75D6BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:rc7:*:*:*:*:*:*", "cpeNameId": "CAA30654-34CD-4B4F-B233-29B87ED2FBB8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18:rc8:*:*:*:*:*:*", "cpeNameId": "00096540-8FA8-46CA-BB68-93B1C5272D2D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.0:*:*:*:*:*:*:*", "cpeNameId": "A009147C-ACF6-4854-AAE6-3A23AE21C4CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.0-193.el8:*:*:*:*:*:*:*", "cpeNameId": "FCA98709-2F68-4E1B-9430-7D7166871698"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.1:*:*:*:*:*:*:*", "cpeNameId": "13793707-6FDB-4423-A8E6-2ADC8BD61C3A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.2:*:*:*:*:*:*:*", "cpeNameId": "EAB280BE-E42E-47BD-BC9B-9EE32D6C2A40"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.3:*:*:*:*:*:*:*", "cpeNameId": "587AE0EF-5106-4CEA-9358-2D066510D151"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.4:*:*:*:*:*:*:*", "cpeNameId": "A3318DEA-3BE2-4302-BC9B-A034934F9D1D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.5:*:*:*:*:*:*:*", "cpeNameId": "6DFCE771-61CC-4086-9ABA-D355FF8F3148"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.6:*:*:*:*:*:*:*", "cpeNameId": "445E159B-AA55-48BD-93C7-2B930AD4EB83"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.7:*:*:*:*:*:*:*", "cpeNameId": "B27A8950-AB89-4120-80DA-B349652A523D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.8:*:*:*:*:*:*:*", "cpeNameId": "8E631816-CFC2-4D77-AE17-D796C455F715"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.9:*:*:*:*:*:*:*", "cpeNameId": "8FD85D0C-385D-488A-A090-32B066B8C2EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.10:*:*:*:*:*:*:*", "cpeNameId": "FEEDBD99-9EB3-41AF-815C-571AF46B5D85"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.11:*:*:*:*:*:*:*", "cpeNameId": "7E7CBF51-E6C8-46E1-8DD3-CFBAB87EA47B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.12:*:*:*:*:*:*:*", "cpeNameId": "F965D923-D9D7-4EF1-B1FB-07EA2FEEBE31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.13:*:*:*:*:*:*:*", "cpeNameId": "E5834B3F-3734-4FEB-9440-7AE8BE96EBB5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.14:*:*:*:*:*:*:*", "cpeNameId": "09696490-5ABF-48D2-823F-C1822003B392"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.15:*:*:*:*:*:*:*", "cpeNameId": "E6911EAC-4DB4-41E9-9401-B4226373EE5A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.16:*:*:*:*:*:*:*", "cpeNameId": "AC125B64-72FD-4946-B3A7-663299025809"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.17:*:*:*:*:*:*:*", "cpeNameId": "EF3569D5-2C62-4458-974E-918A784BD62A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.18:*:*:*:*:*:*:*", "cpeNameId": "1FA907F8-0BCB-4507-8714-DC1D5781D42D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.19:*:*:*:*:*:*:*", "cpeNameId": "942860D3-A3FF-4932-A6FB-9459A59644BE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.18.20:*:*:*:*:*:*:*", "cpeNameId": "EC116A00-67FF-4F9B-9B3B-EFB39878E41F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:*:*:*:*:*:*:*", "cpeNameId": "A3163086-ED2B-4462-9265-6F1DCEAB4D54"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:-:*:*:*:*:*:*", "cpeNameId": "057CC752-CE29-466B-827D-3930C41F1C3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:rc1:*:*:*:*:*:*", "cpeNameId": "AFC357CC-56A5-4555-959A-34F88351D81B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:rc2:*:*:*:*:*:*", "cpeNameId": "ED61D354-4BB9-4D66-87FB-86662D7B6B12"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:rc3:*:*:*:*:*:*", "cpeNameId": "A84469B4-B1DD-4DED-AC99-EA9C2CA93CF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:rc4:*:*:*:*:*:*", "cpeNameId": "EE659E91-B594-49B5-BC25-C4BAB3BE192E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:rc5:*:*:*:*:*:*", "cpeNameId": "2B7349C1-F08A-44E5-8FB8-3F2804E5A07F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:rc6:*:*:*:*:*:*", "cpeNameId": "EB37BD16-E204-41BE-ADE4-01B875CBE896"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:rc7:*:*:*:*:*:*", "cpeNameId": "745C3308-0D37-4503-B9FD-1C7A675E7C3A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19:rc8:*:*:*:*:*:*", "cpeNameId": "C09DBABE-8232-4196-8C42-2D4509AD02FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.1:*:*:*:*:*:*:*", "cpeNameId": "CBFE536A-5936-4037-A140-B381A09E0313"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.2:*:*:*:*:*:*:*", "cpeNameId": "E7375DDA-E673-4CB3-9A7A-751E0A34FC42"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.3:*:*:*:*:*:*:*", "cpeNameId": "99F55D5C-293A-4F8A-8C8C-D324BECF805D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.4:*:*:*:*:*:*:*", "cpeNameId": "C61FC074-FB83-48ED-8299-CF0565B28BF0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.5:*:*:*:*:*:*:*", "cpeNameId": "813A19FD-6C0F-442D-BD13-D924AAB177A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.6:*:*:*:*:*:*:*", "cpeNameId": "5387070B-08B1-4B14-ABD0-845D0DD8F84B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.7:*:*:*:*:*:*:*", "cpeNameId": "E39CE6E9-2A15-486F-881E-000CEB221CFC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.8:*:*:*:*:*:*:*", "cpeNameId": "3951D003-9ACB-4530-AD87-BA6495862F19"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.9:*:*:*:*:*:*:*", "cpeNameId": "16722D4A-04DC-40F0-B6BE-19B503E6F896"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.10:*:*:*:*:*:*:*", "cpeNameId": "1F88CB52-D7B5-4946-A367-45DE35034F51"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.11:*:*:*:*:*:*:*", "cpeNameId": "77B502BA-B846-4C9C-A8CE-3EF988CECC92"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.12:*:*:*:*:*:*:*", "cpeNameId": "23451725-61D8-4924-88FD-F296F0BB0BDD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.13:*:*:*:*:*:*:*", "cpeNameId": "2647DBE8-332D-4420-A7FE-971F97D450E5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.14:*:*:*:*:*:*:*", "cpeNameId": "EC80AF58-D2F3-439F-8A3D-0333C832805C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.15:*:*:*:*:*:*:*", "cpeNameId": "5FF48FD7-42B6-446C-9142-C46F87307A23"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.16:*:*:*:*:*:*:*", "cpeNameId": "27DD882E-6137-45D8-95CA-46E0A0E9D546"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.17:*:*:*:*:*:*:*", "cpeNameId": "3D79ECA3-B493-4422-B61B-F9D8725540BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.18:*:*:*:*:*:*:*", "cpeNameId": "D815E2B8-DD92-47E3-A1C3-E9B7859ED848"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.19:*:*:*:*:*:*:*", "cpeNameId": "3ED97E59-18F8-4970-8DCF-108DB66C0B64"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.20:*:*:*:*:*:*:*", "cpeNameId": "F5B56565-8277-4435-81A3-14A07CD1CFB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.21:*:*:*:*:*:*:*", "cpeNameId": "08DEF207-BE10-4D38-B198-E0E81A7D8DD8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.22:*:*:*:*:*:*:*", "cpeNameId": "6406E989-2DA9-4473-8A19-F34C0AA0A101"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.23:*:*:*:*:*:*:*", "cpeNameId": "BAB4A7B7-201A-49DD-8CEA-C8276A386DB5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.24:*:*:*:*:*:*:*", "cpeNameId": "C1807F8B-4224-4C20-A7E6-A1A37CFE804C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.25:*:*:*:*:*:*:*", "cpeNameId": "BC055247-93EC-4557-97C5-3F2476EE0F15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.26:*:*:*:*:*:*:*", "cpeNameId": "7D6369DC-902C-4BC1-A26D-C5C913143EB6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.26.1:*:*:*:*:*:*:*", "cpeNameId": "8C01371D-728D-41FF-8EDB-479FFEB181A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.27:*:*:*:*:*:*:*", "cpeNameId": "A32084B7-D6A4-4F74-B282-DDB6DEF0C5AA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.28:*:*:*:*:*:*:*", "cpeNameId": "E0A0C51F-ED33-48CF-927D-0CA8970B6D1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.29:*:*:*:*:*:*:*", "cpeNameId": "21FF2212-87CD-409F-8FA3-A36D8AA94607"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.30:*:*:*:*:*:*:*", "cpeNameId": "429E0577-DB63-4580-8B2F-9F00743EB4B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.31:*:*:*:*:*:*:*", "cpeNameId": "3371D4B5-E4D9-483E-AA24-B99A03C20991"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.32:*:*:*:*:*:*:*", "cpeNameId": "316A0495-6409-4E82-A2FF-2A3158DF6020"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.33:*:*:*:*:*:*:*", "cpeNameId": "2ADFFFEE-80CB-4EF8-8893-D1D2CDBF2687"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.34:*:*:*:*:*:*:*", "cpeNameId": "D3C47B41-3976-412A-877C-08C558B67F17"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.35:*:*:*:*:*:*:*", "cpeNameId": "C12B86A6-026B-4109-9E3B-5A334A73871F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.36:*:*:*:*:*:*:*", "cpeNameId": "855C5C5D-CC69-4629-9D55-4E25F1346965"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.37:*:*:*:*:*:*:*", "cpeNameId": "35B14A6C-CDA5-4E1F-B6C6-4E8305D32DFB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.38:*:*:*:*:*:*:*", "cpeNameId": "9CB2A48B-F8FC-47BE-9DF4-2B95585425F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.39:*:*:*:*:*:*:*", "cpeNameId": "E6A1D1E0-0373-4295-897D-C7E699C018E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.40:*:*:*:*:*:*:*", "cpeNameId": "970D15E0-EE86-4AAB-9840-3CD713AEF03B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.41:*:*:*:*:*:*:*", "cpeNameId": "0B47B7E6-5110-44D8-BDEA-4080A6A28FCF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.42:*:*:*:*:*:*:*", "cpeNameId": "2FF8D63B-85F6-43EC-B69F-231ECF7D0312"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.43:*:*:*:*:*:*:*", "cpeNameId": "935B8487-6BDD-4FFF-9F7E-00A86BB69CDD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.44:*:*:*:*:*:*:*", "cpeNameId": "48F99607-CA4F-4629-A68D-4349153DF423"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.45:*:*:*:*:*:*:*", "cpeNameId": "1CFB073B-B310-49DC-893B-B46DE6336F4E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.46:*:*:*:*:*:*:*", "cpeNameId": "8F2CA065-9492-44F8-9C69-B151B71803CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.47:*:*:*:*:*:*:*", "cpeNameId": "65D05643-4760-4FC5-97A3-BC5CCCA46CE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.48:*:*:*:*:*:*:*", "cpeNameId": "805F2CFA-C623-43A6-BA75-8A677011B7C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.49:*:*:*:*:*:*:*", "cpeNameId": "E9B45E20-6F1C-4909-95E4-17956AB05513"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.50:*:*:*:*:*:*:*", "cpeNameId": "02565DD0-1F69-44F5-9710-F4559686BCB5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.51:*:*:*:*:*:*:*", "cpeNameId": "4A2A0E35-E26F-470C-8293-E71B0D280E37"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.52:*:*:*:*:*:*:*", "cpeNameId": "E4259B27-55AA-4906-A88E-2F156833874F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.53:*:*:*:*:*:*:*", "cpeNameId": "2399AB59-0AAB-45C3-9359-778E0CEF66FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.54:*:*:*:*:*:*:*", "cpeNameId": "46C3AEDA-6F26-4416-BF76-1FEBBD354F3F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.55:*:*:*:*:*:*:*", "cpeNameId": "10F1A367-B071-4F9A-A2CB-0C7FF216A216"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.56:*:*:*:*:*:*:*", "cpeNameId": "DF3D3A29-EB49-483C-9737-67E18806F753"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.57:*:*:*:*:*:*:*", "cpeNameId": "D79FAF76-5403-4082-95B6-702810120DAA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.58:*:*:*:*:*:*:*", "cpeNameId": "93DF7061-A282-4290-9D97-63ACC7575826"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.59:*:*:*:*:*:*:*", "cpeNameId": "88CB7AC8-7CAA-4947-8578-AB8B5A9C7D8C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.60:*:*:*:*:*:*:*", "cpeNameId": "8B9A9641-54E1-40FE-AD41-551002220084"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.61:*:*:*:*:*:*:*", "cpeNameId": "04A60F34-73F7-49AB-AB09-1083721DE784"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.62:*:*:*:*:*:*:*", "cpeNameId": "D4A637B9-0057-4393-A19F-69879DA1CA8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.63:*:*:*:*:*:*:*", "cpeNameId": "AF1FE2CD-7236-4965-952B-6F172159373C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.64:*:*:*:*:*:*:*", "cpeNameId": "7D1F715A-1A92-4ECE-85BB-0CC907BEDD91"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.65:*:*:*:*:*:*:*", "cpeNameId": "4116C6D8-AF20-48AF-8ADA-0506911A3459"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.66:*:*:*:*:*:*:*", "cpeNameId": "4388B248-80C6-4086-B1E6-4CEE1BF7602F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.67:*:*:*:*:*:*:*", "cpeNameId": "50EF8BC5-16C3-4AD8-A2D1-1A2608CD7374"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.68:*:*:*:*:*:*:*", "cpeNameId": "5D10408F-E5C0-40B2-A497-3E71FB6DD431"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.69:*:*:*:*:*:*:*", "cpeNameId": "10504EA1-D9B1-44C8-A9EC-B8D32AAFCF5B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.70:*:*:*:*:*:*:*", "cpeNameId": "AA9003D3-8912-4A70-8B69-3F2F345FFD89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.71:*:*:*:*:*:*:*", "cpeNameId": "233CCC29-E4BB-4DAD-9F45-CEC77425C279"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.72:*:*:*:*:*:*:*", "cpeNameId": "B3336506-E63D-491E-B756-15C59D0B0EAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.73:*:*:*:*:*:*:*", "cpeNameId": "57449032-831C-45A0-9FE9-E630FB005BEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.74:*:*:*:*:*:*:*", "cpeNameId": "27086504-19AA-48F8-AAC3-FE71072F4AC6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.75:*:*:*:*:*:*:*", "cpeNameId": "858F7980-5197-42DE-B55C-CA706999F200"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.76:*:*:*:*:*:*:*", "cpeNameId": "31423569-8FBC-411E-9F95-9820746128BE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.77:*:*:*:*:*:*:*", "cpeNameId": "D3EB9447-CCF7-4803-ABBB-15477850C76B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.78:*:*:*:*:*:*:*", "cpeNameId": "68BD1635-2CE6-464F-B32D-D0AE25DEB9E5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.79:*:*:*:*:*:*:*", "cpeNameId": "8FFF3C74-22E6-4418-AD93-AA773E549428"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.80:*:*:*:*:*:*:*", "cpeNameId": "721DC148-9BCB-4B12-88AA-0BAF3A380C77"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.81:*:*:*:*:*:*:*", "cpeNameId": "9D3ED37A-08C8-4430-BB0A-EFA6D1AF1D5C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.82:*:*:*:*:*:*:*", "cpeNameId": "00536E1F-7C8D-4DDC-8629-ABE2B4EDA61B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.83:*:*:*:*:*:*:*", "cpeNameId": "6877CB77-34C0-4B45-BED7-7966B69D89F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.84:*:*:*:*:*:*:*", "cpeNameId": "614F4D67-484D-488A-8DB5-9FF8F939927B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.85:*:*:*:*:*:*:*", "cpeNameId": "C3D19825-51CE-43E1-904C-1344DB3775A9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.86:*:*:*:*:*:*:*", "cpeNameId": "2C509040-DF4B-4BD3-8428-4BB9ED4D3BEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.87:*:*:*:*:*:*:*", "cpeNameId": "4455DE42-A354-4EF5-A49A-345954CD65EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.88:*:*:*:*:*:*:*", "cpeNameId": "0F57DC5F-F143-44EE-9037-3BBF9BF3A1E7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.89:*:*:*:*:*:*:*", "cpeNameId": "D4475A2E-E667-4618-A347-10EC5EA6657D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.90:*:*:*:*:*:*:*", "cpeNameId": "2C94A5E1-6EC8-4F69-8C81-18BA6B3E22CC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.91:*:*:*:*:*:*:*", "cpeNameId": "31EE797A-51CC-46B2-B768-1FA25A37706D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.92:*:*:*:*:*:*:*", "cpeNameId": "4748A9ED-7812-4451-81CD-B75547B3C532"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.93:*:*:*:*:*:*:*", "cpeNameId": "119FC260-DEC1-4E63-AF81-2F3360E78EB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.94:*:*:*:*:*:*:*", "cpeNameId": "25A22D4C-1973-4287-B791-87F903F64B97"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.95:*:*:*:*:*:*:*", "cpeNameId": "ACD2D3C9-BA85-4EEE-9A65-FE83E3495315"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.96:*:*:*:*:*:*:*", "cpeNameId": "3B169D06-CA15-4A4A-980A-A056E6C81881"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.97:*:*:*:*:*:*:*", "cpeNameId": "A18ABB80-25F6-4328-B68F-A3B4B23763E4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.98:*:*:*:*:*:*:*", "cpeNameId": "F8BEC111-87BF-4B6C-BBF6-62EE9A763119"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.99:*:*:*:*:*:*:*", "cpeNameId": "2CE59324-24EA-46B0-939D-BA1815313EA7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.100:*:*:*:*:*:*:*", "cpeNameId": "86C29F08-DF43-426C-9E23-1E3416463DBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.101:*:*:*:*:*:*:*", "cpeNameId": "81DE128C-6A1B-4676-A99B-58B77482593A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.102:*:*:*:*:*:*:*", "cpeNameId": "FDA36DFA-EE0A-4DEE-B7C2-A2AF9F84E0CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.103:*:*:*:*:*:*:*", "cpeNameId": "FE71C8C4-8159-49DC-87F0-4A98BEA448C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.104:*:*:*:*:*:*:*", "cpeNameId": "35D6D06A-7705-4EA0-9209-55B7ED61E83A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.105:*:*:*:*:*:*:*", "cpeNameId": "B2DA3294-00F2-4509-A8B2-0F53D69F2B36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.106:*:*:*:*:*:*:*", "cpeNameId": "D337E554-D6A9-4CFC-9985-F670B7654434"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.107:*:*:*:*:*:*:*", "cpeNameId": "FE52DA4B-3ACB-4510-AA7A-9CCFE25E5B87"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.108:*:*:*:*:*:*:*", "cpeNameId": "82BED585-BBDF-41AE-B925-D4CA36F697BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.109:*:*:*:*:*:*:*", "cpeNameId": "C1526792-F597-4674-B998-9A4FF075956E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.110:*:*:*:*:*:*:*", "cpeNameId": "B48E2837-F8E0-42BA-A7D2-B9EA5A770E1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.111:*:*:*:*:*:*:*", "cpeNameId": "B52E1607-47C2-4AD5-95D0-F35A901E5D3F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.112:*:*:*:*:*:*:*", "cpeNameId": "0CDD6E73-775F-49CF-A3D6-E9054EB43D36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.113:*:*:*:*:*:*:*", "cpeNameId": "8A144377-4D4C-48F7-80AB-A8B50F86D132"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.114:*:*:*:*:*:*:*", "cpeNameId": "4B6DF9A7-218F-435C-A5AB-61A5575D9DBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.115:*:*:*:*:*:*:*", "cpeNameId": "8D64C2A7-DF73-481A-8A55-790CD5DABBC0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.116:*:*:*:*:*:*:*", "cpeNameId": "36E4D70D-9E0D-44AC-9CE9-168111BE078D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.117:*:*:*:*:*:*:*", "cpeNameId": "BFF2F68A-DA2E-4118-A4CB-E7FA7C719C97"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.118:*:*:*:*:*:*:*", "cpeNameId": "B8DEB967-1BA5-43BA-B659-5AC369F5527B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.118-2:*:*:*:*:*:*:*", "cpeNameId": "8BDE7B9C-7D49-4FB9-9095-89B0FD601AC4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.119:*:*:*:*:*:*:*", "cpeNameId": "1EBD0B5F-457A-4365-B3B0-45E4C0B21B93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.120:*:*:*:*:*:*:*", "cpeNameId": "0C712977-921D-4FD3-BCBB-6F4A86AA7594"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.121:*:*:*:*:*:*:*", "cpeNameId": "0D8947E0-FBE1-424F-BA96-F5A83CF87A3E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.122:*:*:*:*:*:*:*", "cpeNameId": "A79D9A4E-58CD-4825-9EC3-0B0499C90BF3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.123:*:*:*:*:*:*:*", "cpeNameId": "A61315CE-EC4F-4734-8B07-9670C7DAF959"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.124:*:*:*:*:*:*:*", "cpeNameId": "8B2AB2CC-ED8F-40C0-A027-7A93B70D0ABF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.125:*:*:*:*:*:*:*", "cpeNameId": "DF0EBF12-4078-42F7-A92B-5D54056AE5EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.126:*:*:*:*:*:*:*", "cpeNameId": "A2A07202-24D9-4929-93CE-AD808F353C60"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.127:*:*:*:*:*:*:*", "cpeNameId": "1AB674F5-1B69-4DE7-AF61-50787A69A5D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.128:*:*:*:*:*:*:*", "cpeNameId": "3D2F68B8-736E-4899-9B1B-ED6E8DE6CF3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.129:*:*:*:*:*:*:*", "cpeNameId": "76CD5FC7-448D-4F20-864B-3567B07D1B56"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.130:*:*:*:*:*:*:*", "cpeNameId": "C61BEEDC-1AA7-4453-9C1F-1B61D1EA024F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.131:*:*:*:*:*:*:*", "cpeNameId": "418276D9-F035-4B0B-BCCB-D5FB488D5B31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.132:*:*:*:*:*:*:*", "cpeNameId": "C5D35F68-0A1C-44A4-952A-DDDF21BC09EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.133:*:*:*:*:*:*:*", "cpeNameId": "1F548D92-C48B-4886-A2B3-6E74E8E0F55B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.134:*:*:*:*:*:*:*", "cpeNameId": "F20B9429-FA58-466C-9DFA-9E806AF804B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.135:*:*:*:*:*:*:*", "cpeNameId": "36A1C0D1-63B5-4817-8BA5-C60D3D6B6B38"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.136:*:*:*:*:*:*:*", "cpeNameId": "33C1E0F9-16D2-4829-A3BE-88C14FF70938"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.137:*:*:*:*:*:*:*", "cpeNameId": "C7C55512-FBE6-47D5-8A7A-BBD5577D17E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.138:*:*:*:*:*:*:*", "cpeNameId": "769005B9-5005-411C-B4EE-CF0C62490EF8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.139:*:*:*:*:*:*:*", "cpeNameId": "06D197F7-661E-4C49-B099-4545C422C7A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.140:*:*:*:*:*:*:*", "cpeNameId": "776A104E-F94D-406D-BF76-9B11C3365D7A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.141:*:*:*:*:*:*:*", "cpeNameId": "5035E747-DEF4-4DA3-83CF-5BD2A6A9A54A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.142:*:*:*:*:*:*:*", "cpeNameId": "D4080EBB-DEB7-4E16-BE55-BEFAFB7E93E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.143:*:*:*:*:*:*:*", "cpeNameId": "853BB9C3-4467-4FD8-9A46-E2009C5F4357"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.144:*:*:*:*:*:*:*", "cpeNameId": "2AEB23BA-8389-4940-B626-9E7DAF29822D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.145:*:*:*:*:*:*:*", "cpeNameId": "84991F4A-4107-48A6-8D6E-D85F2EF55EBF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.146:*:*:*:*:*:*:*", "cpeNameId": "7A9370E6-CF76-4989-9368-76B2E434A857"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.147:*:*:*:*:*:*:*", "cpeNameId": "DEE46645-5E8C-4F37-BCD0-322E77397F59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.148:*:*:*:*:*:*:*", "cpeNameId": "2093C809-0485-44CC-B0ED-5C2B7DBFEA99"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.149:*:*:*:*:*:*:*", "cpeNameId": "98DAC7B2-8F21-49EF-B53B-23B8A22A8975"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.150:*:*:*:*:*:*:*", "cpeNameId": "E28A93DC-B824-4692-A0F3-B5CAB77B3A48"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.151:*:*:*:*:*:*:*", "cpeNameId": "365D8293-E1BC-4F24-A5FF-B7E12943EE70"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.152:*:*:*:*:*:*:*", "cpeNameId": "FFEFA6D6-3D07-4911-A0D8-3C7A27A95143"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.153:*:*:*:*:*:*:*", "cpeNameId": "051C7A5C-25A0-408C-AFFA-19DB17B0DFE2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.154:*:*:*:*:*:*:*", "cpeNameId": "34798860-1C32-431D-8095-4D25E900D047"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.155:*:*:*:*:*:*:*", "cpeNameId": "BCB220C7-6880-4054-B512-91A8A5F683CE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.156:*:*:*:*:*:*:*", "cpeNameId": "3DDC9F23-49BA-42AE-9251-D0DE0DEF8DD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.157:*:*:*:*:*:*:*", "cpeNameId": "B65EAD3A-8DA1-40A2-B14F-C3D61E19D592"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.158:*:*:*:*:*:*:*", "cpeNameId": "D8A0F47B-9F15-4DC9-9134-C2410BF8E55E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.159:*:*:*:*:*:*:*", "cpeNameId": "FD07FFAC-9B06-43E9-A1AE-F085B99D2A65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.160:*:*:*:*:*:*:*", "cpeNameId": "B6133234-102E-4B8C-A0F0-E9E1538BD098"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.161:*:*:*:*:*:*:*", "cpeNameId": "E03ADD0A-1D87-4772-BE21-A5ED5FC96BE8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.162:*:*:*:*:*:*:*", "cpeNameId": "39EDA362-7B7A-4D97-B8FB-B7B9696B05E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.163:*:*:*:*:*:*:*", "cpeNameId": "6D54CD36-C5A1-437B-85B6-B59A45D1E007"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.164:*:*:*:*:*:*:*", "cpeNameId": "00F1FD43-244A-4CC2-B16C-BC98C99FBB27"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.165:*:*:*:*:*:*:*", "cpeNameId": "D34CA2D9-09FB-473B-9C0F-0C392B3132F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.166:*:*:*:*:*:*:*", "cpeNameId": "4AE874DA-0375-4E7E-84DC-BCAB385B5C30"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.167:*:*:*:*:*:*:*", "cpeNameId": "DD93F0EB-9B9D-4F5B-BDE0-F0F251381EB2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.168:*:*:*:*:*:*:*", "cpeNameId": "D28DA286-D5D2-40D2-82CA-FC8C79CC5F23"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.169:*:*:*:*:*:*:*", "cpeNameId": "8A84A955-ECC0-4B19-B09D-5BB422561099"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.170:*:*:*:*:*:*:*", "cpeNameId": "79343991-197E-4074-A17D-DA9A050EED4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.171:*:*:*:*:*:*:*", "cpeNameId": "BD8EBDB7-7226-4A65-8E8E-74D5A3F671B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.172:*:*:*:*:*:*:*", "cpeNameId": "0CA2E704-2400-4391-9D42-637DC8C25BED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.173:*:*:*:*:*:*:*", "cpeNameId": "8A6A2923-E6F6-4B77-9F0E-BA6FD58DE8D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.174:*:*:*:*:*:*:*", "cpeNameId": "18805724-EB20-4960-8D96-D7D17DDBDE30"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.175:*:*:*:*:*:*:*", "cpeNameId": "5BD11FEB-E163-4734-823A-A784C4C6FE9A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.176:*:*:*:*:*:*:*", "cpeNameId": "960EB99C-0D42-4892-9989-4473683490E4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.177:*:*:*:*:*:*:*", "cpeNameId": "5A04EB31-D67D-4DF0-81D6-D2EB42FCDCD2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.178:*:*:*:*:*:*:*", "cpeNameId": "B2F1908E-4EA9-490A-A154-8B4621189CAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.179:*:*:*:*:*:*:*", "cpeNameId": "66E97557-5D46-4DEB-B1DE-C668E5B8B3FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.180:*:*:*:*:*:*:*", "cpeNameId": "9979A105-8BA0-4AE2-BDFB-7D79DE2FBBFB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.181:*:*:*:*:*:*:*", "cpeNameId": "90E6E2D5-7A6D-4E95-9A52-FF7B9A8A2441"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.182:*:*:*:*:*:*:*", "cpeNameId": "69A2955B-EC3D-41AF-978F-CBFBC556F92D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.183:*:*:*:*:*:*:*", "cpeNameId": "D3F33DDF-A839-49B6-B3B8-EEACA952A9E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.184:*:*:*:*:*:*:*", "cpeNameId": "19F1F05C-A087-44E8-983E-2EB143DC1D8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.185:*:*:*:*:*:*:*", "cpeNameId": "F145BE0F-E7F0-442E-BDA7-C63C7E168E2B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.186:*:*:*:*:*:*:*", "cpeNameId": "B4D0C3FD-6476-413B-BF42-8C2641E289AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.187:*:*:*:*:*:*:*", "cpeNameId": "8D0F70F4-570E-4C9E-B51B-42BB544A72EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.188:*:*:*:*:*:*:*", "cpeNameId": "780D6AF4-4E15-4413-832E-0F50248A4B0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.189:*:*:*:*:*:*:*", "cpeNameId": "20F1C4AC-ECCF-4001-8CEA-457D8E6BDE3E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.190:*:*:*:*:*:*:*", "cpeNameId": "2CCC5886-AA10-470F-B2E9-B38438848CD2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.191:*:*:*:*:*:*:*", "cpeNameId": "0E0DFF46-8703-4A82-B4CB-DD923D09ACA8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.192:*:*:*:*:*:*:*", "cpeNameId": "3456DA2C-41BD-4021-B3F4-C0C7EFBA35B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.193:*:*:*:*:*:*:*", "cpeNameId": "44D8482E-577B-4B3E-A84D-A1FA11CE744D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.194:*:*:*:*:*:*:*", "cpeNameId": "278C5BBE-D4E2-43AC-B338-0B4C819B16FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.195:*:*:*:*:*:*:*", "cpeNameId": "30A50973-7C58-419D-8FED-111FD1615CD3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.196:*:*:*:*:*:*:*", "cpeNameId": "68839FE1-F3CD-49BF-902D-28A47A024FC8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.197:*:*:*:*:*:*:*", "cpeNameId": "8C685C52-5BE6-4D58-BBE3-AE69FF1B758C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.198:*:*:*:*:*:*:*", "cpeNameId": "2F461C57-E447-4647-BFFC-C44767B5CDEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.199:*:*:*:*:*:*:*", "cpeNameId": "65EF0724-0838-446F-85BC-A51CDD060978"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.200:*:*:*:*:*:*:*", "cpeNameId": "16752BB9-187D-48B0-8E87-D676FF91C631"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.201:*:*:*:*:*:*:*", "cpeNameId": "2BDCFC6A-E39A-4AD7-ABFA-5F15BDB22286"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.202:*:*:*:*:*:*:*", "cpeNameId": "CD1E47CB-CE3F-4154-8131-133CE38302D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.203:*:*:*:*:*:*:*", "cpeNameId": "73D48406-40CE-4D07-B08C-6C6ED58D13A3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.204:*:*:*:*:*:*:*", "cpeNameId": "6231157D-84BB-46D9-B0CF-AAF2FD31D3C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.205:*:*:*:*:*:*:*", "cpeNameId": "253E528A-1462-4B93-9978-C23C7DD14FF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.206:*:*:*:*:*:*:*", "cpeNameId": "2233D818-CCDB-4166-901F-29D032F730AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.207:*:*:*:*:*:*:*", "cpeNameId": "25D133DF-5D1B-46EA-9019-C81A1623C74D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.208:*:*:*:*:*:*:*", "cpeNameId": "1172736D-6A80-4AD1-B861-43797791A6F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.209:*:*:*:*:*:*:*", "cpeNameId": "FD71CF2C-F734-4E31-AAB7-41AC133EBFDA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.210:*:*:*:*:*:*:*", "cpeNameId": "2BA3CAE2-A53E-4516-9E32-DCF40D28A710"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.211:*:*:*:*:*:*:*", "cpeNameId": "50B9C1D0-7B42-43CC-9103-A96EA1B8D3B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.212:*:*:*:*:*:*:*", "cpeNameId": "D12B8C79-B286-47EA-86E0-4C415154600F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.213:*:*:*:*:*:*:*", "cpeNameId": "C90B250E-D388-459F-91FF-19CF7A6292AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.214:*:*:*:*:*:*:*", "cpeNameId": "EE578B4A-6420-46EA-8C33-994379131EB6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.215:*:*:*:*:*:*:*", "cpeNameId": "5581DCBE-D268-477A-AA1F-B4204F1CE309"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.216:*:*:*:*:*:*:*", "cpeNameId": "4633CDC1-D620-43BD-A59B-1CCE17C70740"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.217:*:*:*:*:*:*:*", "cpeNameId": "62DDB6C3-A7A1-466E-A101-6FE1AA552C94"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.218:*:*:*:*:*:*:*", "cpeNameId": "F6798282-7FF8-43E0-8B9D-1A9BDB0E3E48"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.219:*:*:*:*:*:*:*", "cpeNameId": "57D287C6-0EF3-4B47-A893-F3712CC12478"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.220:*:*:*:*:*:*:*", "cpeNameId": "A0B09A4E-2318-48CE-810F-84F2E721D722"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.221:*:*:*:*:*:*:*", "cpeNameId": "0F3D6297-A92E-479B-91F3-4162BFDC9184"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.222:*:*:*:*:*:*:*", "cpeNameId": "14FFED1D-629A-428E-A473-8327DB224D64"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.223:*:*:*:*:*:*:*", "cpeNameId": "9625BCC9-FBBE-42C7-82C2-F7D75F866E53"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.224:*:*:*:*:*:*:*", "cpeNameId": "D5BC9FF8-1337-4A3B-A66C-CC31C701B22C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.225:*:*:*:*:*:*:*", "cpeNameId": "2ED5BE75-F496-47BA-B521-36F6844FFE01"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.226:*:*:*:*:*:*:*", "cpeNameId": "02E6B2D5-DA63-4574-90D7-15F7EAA70DA1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.227:*:*:*:*:*:*:*", "cpeNameId": "EB84BCF0-8987-46AC-9E6F-D9E17DEFD1D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.228:*:*:*:*:*:*:*", "cpeNameId": "7ACE67A9-9EAD-4AB0-A99D-F37993392E37"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.229:*:*:*:*:*:*:*", "cpeNameId": "ED71AA15-673C-416E-9CAF-3440D41A1E22"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.230:*:*:*:*:*:*:*", "cpeNameId": "CB9E000D-CEAE-488E-B9F7-756EF13ECBE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.231:*:*:*:*:*:*:*", "cpeNameId": "F79CB637-6B2C-46DC-BD81-8B0583AAC33C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.232:*:*:*:*:*:*:*", "cpeNameId": "6CDDD19B-7E18-4A0E-AC09-B86E9401F516"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.233:*:*:*:*:*:*:*", "cpeNameId": "3EF64EBF-557B-4AB2-B2E5-0D03035197DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.234:*:*:*:*:*:*:*", "cpeNameId": "9E2D001E-2282-4A78-AB00-B37189C8CD59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.235:*:*:*:*:*:*:*", "cpeNameId": "31A795CF-5B8E-4B6C-94DC-3B37A8423823"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.236:*:*:*:*:*:*:*", "cpeNameId": "813866EF-11A3-41D9-9735-ECFEFCDBA1AD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.237:*:*:*:*:*:*:*", "cpeNameId": "C0F81506-A565-4F17-BEC9-1B54FAD059CC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.238:*:*:*:*:*:*:*", "cpeNameId": "1509FEA6-FA47-46C8-A117-8913CCFDB5AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.239:*:*:*:*:*:*:*", "cpeNameId": "C05A4F03-15E3-4C08-8958-6A057F7911B8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.240:*:*:*:*:*:*:*", "cpeNameId": "4EAF2417-3F1E-446A-AD33-77B21AE04E06"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.241:*:*:*:*:*:*:*", "cpeNameId": "8FFB9F0D-3B6F-494F-89AC-EAC4438C0B1C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.242:*:*:*:*:*:*:*", "cpeNameId": "A27EEF03-9001-4C7D-B063-C1FE8FC05EE0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.243:*:*:*:*:*:*:*", "cpeNameId": "529CAB2E-5F5C-4699-BC48-E93341EE6B67"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.244:*:*:*:*:*:*:*", "cpeNameId": "9FF0D590-EAB2-4B36-BBE2-008A4E800722"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.245:*:*:*:*:*:*:*", "cpeNameId": "590BFECB-A2B4-4C3F-9017-6D565899E1F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.246:*:*:*:*:*:*:*", "cpeNameId": "CB0BB20C-811F-4B9B-B827-3A42CA5539D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.247:*:*:*:*:*:*:*", "cpeNameId": "B532E91C-FEBE-4C29-B9C7-E899AF134D48"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.248:*:*:*:*:*:*:*", "cpeNameId": "8222442A-C4EC-45CD-9A4C-76E562756CBE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.249:*:*:*:*:*:*:*", "cpeNameId": "444D84A8-CE8F-4BE2-A463-B4E693104BA6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.250:*:*:*:*:*:*:*", "cpeNameId": "7243A073-0900-4470-98B8-FE5839442E3F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.251:*:*:*:*:*:*:*", "cpeNameId": "B4EAB6D9-28E2-45CD-BE10-5EF905373AF3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.252:*:*:*:*:*:*:*", "cpeNameId": "CF09CCB5-9276-41A3-8330-8037A633B793"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.253:*:*:*:*:*:*:*", "cpeNameId": "9BB592D7-81CC-4DE7-9256-FAE66467FFD7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.254:*:*:*:*:*:*:*", "cpeNameId": "C78BD176-2DFC-4BAE-95C1-3A495252A65A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.255:*:*:*:*:*:*:*", "cpeNameId": "2AF01112-197B-43DE-9BF8-940F1114DC73"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.256:*:*:*:*:*:*:*", "cpeNameId": "220C4EBF-9B86-4AB1-AD37-100994B4606D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.257:*:*:*:*:*:*:*", "cpeNameId": "34F7CCEF-8221-4005-A144-93D314E39C81"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.258:*:*:*:*:*:*:*", "cpeNameId": "19A0EB8D-1846-4C52-BEEA-F6CC1691C50C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.259:*:*:*:*:*:*:*", "cpeNameId": "B6F4132F-B9B0-4168-98D7-23FCCBDD4034"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.260:*:*:*:*:*:*:*", "cpeNameId": "E7F6FAE1-DF95-48E5-94D9-C505AF592766"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.261:*:*:*:*:*:*:*", "cpeNameId": "3BCD7AF9-57AB-41EC-99D4-59DD6DCA3703"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.262:*:*:*:*:*:*:*", "cpeNameId": "64A647E0-3291-4C17-9D9A-2BC6DDF24E90"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.263:*:*:*:*:*:*:*", "cpeNameId": "1BCAE71C-8745-49B7-BE6F-5CB2A8D517AF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.264:*:*:*:*:*:*:*", "cpeNameId": "7C4D53E7-3844-4706-815D-BD08282AF4B8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.265:*:*:*:*:*:*:*", "cpeNameId": "F18EF476-4996-436A-B878-1F7704C4BA6B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.266:*:*:*:*:*:*:*", "cpeNameId": "6318BBB0-A46C-48AE-9E42-7F578BCE43DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.267:*:*:*:*:*:*:*", "cpeNameId": "70B14EE0-CF5D-4C62-9890-766155C47DAE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.268:*:*:*:*:*:*:*", "cpeNameId": "ABF8E5BF-203F-406C-9375-6A59B113BBD9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.269:*:*:*:*:*:*:*", "cpeNameId": "B09A3D45-168E-4202-99BC-79DFB2B525C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.270:*:*:*:*:*:*:*", "cpeNameId": "145FF0A9-3D06-4565-8889-49C01832E864"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.271:*:*:*:*:*:*:*", "cpeNameId": "5433BF7F-2B40-4A88-BD8A-74EBE7EAE74C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.272:*:*:*:*:*:*:*", "cpeNameId": "28BF7326-B002-4098-96DB-D8FADE599CA5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.273:*:*:*:*:*:*:*", "cpeNameId": "94E36506-E573-4DEA-888B-744D1C8405D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.274:*:*:*:*:*:*:*", "cpeNameId": "2A72354A-578E-4F14-93EB-43F27D1576A9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.275:*:*:*:*:*:*:*", "cpeNameId": "426D0CBB-8FB3-41BC-A8A9-A736E70DAC53"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.276:*:*:*:*:*:*:*", "cpeNameId": "25BF6B74-B708-44E5-9B77-A5D761C23F46"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.277:*:*:*:*:*:*:*", "cpeNameId": "DAAAE94E-0CB1-45F6-B0C3-F635B18E632E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.278:*:*:*:*:*:*:*", "cpeNameId": "7B05EE50-A29E-4B6E-A5EE-9BCAA71189B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.279:*:*:*:*:*:*:*", "cpeNameId": "499DEB1C-5D4D-4BE5-8C11-6FD0625F2C36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.280:*:*:*:*:*:*:*", "cpeNameId": "82BC603A-39C9-4AF9-825C-D60073FD89E9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.281:*:*:*:*:*:*:*", "cpeNameId": "AA26E4CE-A2EC-4364-B383-EE0D9C01E0FF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.282:*:*:*:*:*:*:*", "cpeNameId": "A71BD6DD-9C99-4280-9CE6-2317277093B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.283:*:*:*:*:*:*:*", "cpeNameId": "96B8EF49-D308-498E-9453-CCDEDFD6F1CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.284:*:*:*:*:*:*:*", "cpeNameId": "635FD61D-F2A4-4489-AD75-12D1139945DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.285:*:*:*:*:*:*:*", "cpeNameId": "8211CA20-56DB-414D-A7EB-61321EA0634F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.286:*:*:*:*:*:*:*", "cpeNameId": "186F5E6F-D0A3-4136-9F39-956426280FC1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.287:*:*:*:*:*:*:*", "cpeNameId": "236744C4-C218-40C5-8C9E-9072697D85E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.288:*:*:*:*:*:*:*", "cpeNameId": "971D0042-FFBE-4691-ABAD-B3165231CA50"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.289:*:*:*:*:*:*:*", "cpeNameId": "6FAF8454-2869-4D87-979E-9A4D4DD049B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.290:*:*:*:*:*:*:*", "cpeNameId": "5EEE72A7-AE8B-416E-86F4-C879A022DD84"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.291:*:*:*:*:*:*:*", "cpeNameId": "178F9E75-B366-4C4F-9935-07403284159E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.292:*:*:*:*:*:*:*", "cpeNameId": "BFB882D2-DC9B-4211-9265-594F1FEE3D8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.293:*:*:*:*:*:*:*", "cpeNameId": "F181ED04-D2A3-4E9C-B80D-F57C0617297B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.294:*:*:*:*:*:*:*", "cpeNameId": "8AFA87B0-C839-4A7F-961B-ABE5CA349819"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.295:*:*:*:*:*:*:*", "cpeNameId": "9BFFCA5D-A751-449A-B8AB-2D26A90AFBE3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.296:*:*:*:*:*:*:*", "cpeNameId": "7247CC3C-3671-4C0D-AD87-559BEDAAEBC5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.297:*:*:*:*:*:*:*", "cpeNameId": "498B3288-2A00-4DB0-8426-A5FD866506EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.298:*:*:*:*:*:*:*", "cpeNameId": "D6251071-E7F2-4748-9DF7-27FCA27BD552"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.299:*:*:*:*:*:*:*", "cpeNameId": "03440F15-FEB8-42BC-BD63-6E954F0750DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.300:*:*:*:*:*:*:*", "cpeNameId": "E4568623-9282-496E-AA3F-E3E790BDFC1F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.301:*:*:*:*:*:*:*", "cpeNameId": "7CB5DA04-B4B0-4349-85B2-1342A953EED9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.302:*:*:*:*:*:*:*", "cpeNameId": "A3F297C6-A6AB-4C5F-9821-76E8E3411796"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.303:*:*:*:*:*:*:*", "cpeNameId": "8B892759-81F1-45AE-A7F5-2D0641A039E4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.304:*:*:*:*:*:*:*", "cpeNameId": "0936A133-FA0A-44C7-AE7F-5C4C1B16DDD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.305:*:*:*:*:*:*:*", "cpeNameId": "FC874434-AC4D-41A1-8B43-757808B2C957"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.306:*:*:*:*:*:*:*", "cpeNameId": "49CE5CB3-4BA8-41AF-B5EB-9C17E66E0423"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.307:*:*:*:*:*:*:*", "cpeNameId": "A8607B67-F6D3-4684-ADDC-CBACCC6DA92C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.308:*:*:*:*:*:*:*", "cpeNameId": "A4130D9C-E192-4437-A85F-6D04F21F2922"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.309:*:*:*:*:*:*:*", "cpeNameId": "B5E4DA49-77F3-4693-90B0-FC8C2C38F402"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.310:*:*:*:*:*:*:*", "cpeNameId": "2E6D4833-8E6A-45E4-A620-2BE985362CF2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.311:*:*:*:*:*:*:*", "cpeNameId": "79DA4B1F-6BE0-40B0-8496-6499C590D8F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.312:*:*:*:*:*:*:*", "cpeNameId": "0268D7D3-1545-4DC8-A418-AA77BC04C9E7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.313:*:*:*:*:*:*:*", "cpeNameId": "3B30BB14-4B29-4EC6-A810-DC776B5C6E34"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.314:*:*:*:*:*:*:*", "cpeNameId": "369CEBAF-43F1-4E56-B6B9-C0057CF18CB9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.315:*:*:*:*:*:*:*", "cpeNameId": "D1C8EC15-FFB1-440F-9EEA-2F306393A1EE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.316:*:*:*:*:*:*:*", "cpeNameId": "7D65AEC1-209F-4CE2-A5FA-4D3FB56FD265"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.317:*:*:*:*:*:*:*", "cpeNameId": "E9C2D84D-3412-4889-868B-AEA2AD1982C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.318:*:*:*:*:*:*:*", "cpeNameId": "BFC397A0-62B9-4BCF-8907-501A3CDF1CD6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.319:*:*:*:*:*:*:*", "cpeNameId": "ACE5B4F6-6FB3-41D2-AA6D-E2586039CC21"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.320:*:*:*:*:*:*:*", "cpeNameId": "3FDC48E9-0721-483D-A020-FEF09F03EA18"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.321:*:*:*:*:*:*:*", "cpeNameId": "8D6E7C06-CA6C-4909-90F2-2FC40A514CF9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.322:*:*:*:*:*:*:*", "cpeNameId": "D7FA71FA-20D6-4321-80E4-B25B40B76038"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.323:*:*:*:*:*:*:*", "cpeNameId": "B72EE284-1EC1-4237-813A-3E67D1F179F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.324:*:*:*:*:*:*:*", "cpeNameId": "43FA688C-7739-40FD-976B-5FACDDE03C7F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.19.325:*:*:*:*:*:*:*", "cpeNameId": "1EC6A2D9-C8EB-4DAE-8A58-A9B47A8DA4B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20:*:*:*:*:*:*:*", "cpeNameId": "8C67D194-B1D7-4051-AA33-92C51027DFD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20:-:*:*:*:*:*:*", "cpeNameId": "FD6751D9-F3BF-44A1-96E9-14200EFB10F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20:rc1:*:*:*:*:*:*", "cpeNameId": "2E165BBB-7ACE-4705-A561-4148FDEA5546"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20:rc2:*:*:*:*:*:*", "cpeNameId": "F1D314A9-1DF2-4F05-A2AC-A4E19C87344D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20:rc3:*:*:*:*:*:*", "cpeNameId": "62C17388-85F5-4B5C-8B00-C7E8FD35347D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20:rc4:*:*:*:*:*:*", "cpeNameId": "6CC936D0-B763-4020-BC02-D86893FAEDA5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20:rc5:*:*:*:*:*:*", "cpeNameId": "5502C362-1E75-45CF-A175-41ADAD728EC1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.1:*:*:*:*:*:*:*", "cpeNameId": "30D0FBCC-5241-4766-BF83-F895B210AEFF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.2:*:*:*:*:*:*:*", "cpeNameId": "19FD564F-6544-473E-AE92-E9F3A34A3915"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.3:*:*:*:*:*:*:*", "cpeNameId": "440CABC7-91B1-45F6-A7D0-7D651E83E4C4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.4:*:*:*:*:*:*:*", "cpeNameId": "687316F0-7676-4930-B35C-65F5785ACDB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.5:*:*:*:*:*:*:*", "cpeNameId": "08A1755A-6A9C-46E0-AF0D-114FBF5AD672"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.6:*:*:*:*:*:*:*", "cpeNameId": "E20224EA-90C0-488A-A112-50B24770FB18"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.7:*:*:*:*:*:*:*", "cpeNameId": "C7DC8B10-AA07-4A31-B69D-1F80B66B87A5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.8:*:*:*:*:*:*:*", "cpeNameId": "8308368B-FBD0-47FF-BBB5-31B3F2137230"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.9:*:*:*:*:*:*:*", "cpeNameId": "C6D9451D-8272-441F-BE73-D603AD128A54"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.10:*:*:*:*:*:*:*", "cpeNameId": "1A7CEC42-FD0B-42FC-8535-425F343C800B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.11:*:*:*:*:*:*:*", "cpeNameId": "24C953F7-E916-4832-8B61-7E38B4DC8D3E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.12:*:*:*:*:*:*:*", "cpeNameId": "5C414ABD-B2DB-462C-8158-C8BBD94F140B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.13:*:*:*:*:*:*:*", "cpeNameId": "585B3F97-9003-4712-BA9E-79321E91B741"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.14:*:*:*:*:*:*:*", "cpeNameId": "53CB87AA-41C1-46DC-9856-CA45D75B0014"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.15:*:*:*:*:*:*:*", "cpeNameId": "A15CF5B3-5D88-4D8E-AD1F-7713BEB5C30F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.16:*:*:*:*:*:*:*", "cpeNameId": "C046C34D-86F8-4C72-9ADC-FA20CEE3F445"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:4.20.17:*:*:*:*:*:*:*", "cpeNameId": "4F253460-0D25-4B15-BEFB-2C9D38696714"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:*:*:*:*:*:*:*", "cpeNameId": "F1A9DC6E-F2B2-49B8-967F-B40F23FAFB7E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:-:*:*:*:*:*:*", "cpeNameId": "68861FE5-8011-45EC-81E6-CAD841D55D3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:rc1:*:*:*:*:*:*", "cpeNameId": "C4BD32F7-499E-4227-AF6D-59072E60F157"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:rc2:*:*:*:*:*:*", "cpeNameId": "DD1A0E3E-284D-4F8D-BF08-4AE49A833CC9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:rc3:*:*:*:*:*:*", "cpeNameId": "2445098F-589D-4D79-8677-4B95F63C151A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:rc4:*:*:*:*:*:*", "cpeNameId": "2D923219-DCF7-4DC8-AE44-20988AA062A0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:rc5:*:*:*:*:*:*", "cpeNameId": "02886709-FD0A-4947-8146-A318E301776F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:rc6:*:*:*:*:*:*", "cpeNameId": "03288CF7-0A3E-48CB-BBA7-F9EE8ABBC436"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0:rc7:*:*:*:*:*:*", "cpeNameId": "7FDFAB88-77F1-48D7-ADBF-0E44ECE86EBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.1:*:*:*:*:*:*:*", "cpeNameId": "D72D410B-8C2E-4851-99A3-F77FBECB7192"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.2:*:*:*:*:*:*:*", "cpeNameId": "985EBB6A-4987-4667-B8DE-311EBD874180"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.3:*:*:*:*:*:*:*", "cpeNameId": "DC64E4B7-3DB1-4E70-8BCC-CDECB8D31362"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.4:*:*:*:*:*:*:*", "cpeNameId": "B277C12A-C8A3-4E99-B157-821EF02AAD43"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.5:*:*:*:*:*:*:*", "cpeNameId": "D7759414-6475-4870-B8D1-EC7CC9251787"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.6:*:*:*:*:*:*:*", "cpeNameId": "4FD20397-5105-42E9-A718-85812EC83A0C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.7:*:*:*:*:*:*:*", "cpeNameId": "3E7A5DCA-0363-44FE-B21B-17BD8D97542B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.8:*:*:*:*:*:*:*", "cpeNameId": "FD8EA77C-B293-4769-962F-F04BF5671CE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.9:*:*:*:*:*:*:*", "cpeNameId": "50FF6FD7-302E-4015-82D5-647A4C6330EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.10:*:*:*:*:*:*:*", "cpeNameId": "AF3FD6C7-DA7B-4070-92DE-6B670AD96588"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.11:*:*:*:*:*:*:*", "cpeNameId": "BDB9CFFC-3980-48D5-94A2-7B8BB9141797"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.12:*:*:*:*:*:*:*", "cpeNameId": "479AF2D1-C2BD-4C9A-A595-737A34153CA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.13:*:*:*:*:*:*:*", "cpeNameId": "567ACE3B-A900-44C1-8E1A-CED4090B1BE8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.14:*:*:*:*:*:*:*", "cpeNameId": "F3477A97-8034-4BB5-9E2D-1401A7346F7A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.15:*:*:*:*:*:*:*", "cpeNameId": "06CFCE19-7968-4803-BB10-B0FC75D8CD98"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.16:*:*:*:*:*:*:*", "cpeNameId": "75E407ED-7B92-420D-81F5-62766D1CB144"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.17:*:*:*:*:*:*:*", "cpeNameId": "F5B8EAB8-B0FA-4766-9008-A04B31F2A44B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.18:*:*:*:*:*:*:*", "cpeNameId": "E04C3C10-48FE-466C-A251-7862AF2EAE03"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.19:*:*:*:*:*:*:*", "cpeNameId": "2F0ADCFD-FCE8-4617-BEB1-7FA793BC11E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.20:*:*:*:*:*:*:*", "cpeNameId": "BDDC588A-C797-45AC-A0BB-DAD27E22B169"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.0.21:*:*:*:*:*:*:*", "cpeNameId": "ADFBAC21-4341-4D67-BA2C-832D6C60DAE0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:*:*:*:*:*:*:*", "cpeNameId": "54A3A8C8-F682-431C-B4CD-1F0A788869DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:-:*:*:*:*:*:*", "cpeNameId": "67CBC5E4-B5FE-477E-A138-EDED2966BE18"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:rc1:*:*:*:*:*:*", "cpeNameId": "F39A244D-E0F0-4DCC-AD7F-E15708AB2EC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:rc2:*:*:*:*:*:*", "cpeNameId": "77CA693C-812E-4A6E-A089-665FDADA5C0A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:rc3:*:*:*:*:*:*", "cpeNameId": "DFDA10B2-0129-4B2C-A521-15357B8A1915"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:rc4:*:*:*:*:*:*", "cpeNameId": "757115D8-A302-4C43-8E3D-147732BC8D76"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:rc5:*:*:*:*:*:*", "cpeNameId": "D945FFB9-09EC-432E-8ADC-8DD7BF1425D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:rc6:*:*:*:*:*:*", "cpeNameId": "D49F9C63-A58E-4B0D-BEF2-747DC11400DE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1:rc7:*:*:*:*:*:*", "cpeNameId": "41B60E1E-725B-49BB-BAD2-49F4782B541B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.1:*:*:*:*:*:*:*", "cpeNameId": "9208299B-C868-470C-AB8C-3A30CC019E6E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.2:*:*:*:*:*:*:*", "cpeNameId": "2D16B549-05AC-4BA5-82C1-4427346FCCF4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.3:*:*:*:*:*:*:*", "cpeNameId": "5431B6CE-299C-491D-92AD-1A8D9072719B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.4:*:*:*:*:*:*:*", "cpeNameId": "F26D0108-392B-453D-9A12-FCF4079344BE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.5:*:*:*:*:*:*:*", "cpeNameId": "F897824B-28D1-4016-9917-A2A1797B62D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.6:*:*:*:*:*:*:*", "cpeNameId": "C9CA624B-39C9-4830-B160-05E7FCF09D31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.7:*:*:*:*:*:*:*", "cpeNameId": "994E581F-695C-4184-8A34-1E9FE8B84F93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.8:*:*:*:*:*:*:*", "cpeNameId": "D33D7A54-7ACE-438C-9ECC-1E06D0C93588"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.9:*:*:*:*:*:*:*", "cpeNameId": "48DFF9BD-88B8-48DB-950E-281038152F6F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.10:*:*:*:*:*:*:*", "cpeNameId": "12542ACC-E1CB-47D7-AFC8-0B24BB2F7DA4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.11:*:*:*:*:*:*:*", "cpeNameId": "CDDEA9C3-FB0A-4C54-AF83-BBE40DFE29A3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.12:*:*:*:*:*:*:*", "cpeNameId": "E4ACF724-E5E7-4B3E-9457-E52CF676CBB5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.13:*:*:*:*:*:*:*", "cpeNameId": "DB88B940-85D4-4644-8772-90F42B7DC544"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.14:*:*:*:*:*:*:*", "cpeNameId": "F60C9252-9886-478D-9343-2232B706DA06"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.15:*:*:*:*:*:*:*", "cpeNameId": "6868170C-EE5E-4A7F-A201-B854E66C0240"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.16:*:*:*:*:*:*:*", "cpeNameId": "42B36DEC-CDB3-4CA4-9DB4-24F1A6FD275E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.17:*:*:*:*:*:*:*", "cpeNameId": "878CFEA9-CB28-4BFA-8360-D439385AD5BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.18:*:*:*:*:*:*:*", "cpeNameId": "64D36E7C-F03D-4C82-A5FA-2884D5544CAC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.19:*:*:*:*:*:*:*", "cpeNameId": "30EEE361-F28F-4B03-ADEE-CF34BB6BE917"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.20:*:*:*:*:*:*:*", "cpeNameId": "C4D5E875-B03B-40D6-88EA-0F26A8C86E29"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.1.21:*:*:*:*:*:*:*", "cpeNameId": "E5EE3A38-80F6-4427-ADDD-DE8598A449C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2:*:*:*:*:*:*:*", "cpeNameId": "708DF5F1-3FC2-4692-8628-23A2BCD56CDC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2:-:*:*:*:*:*:*", "cpeNameId": "4A9A1D62-6315-4B91-BEC9-AF9EF6F6FDAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2:rc1:*:*:*:*:*:*", "cpeNameId": "84163FF3-5555-41C3-B321-35C2D89A6854"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2:rc2:*:*:*:*:*:*", "cpeNameId": "F7A55C0A-44F2-4CD3-8A0F-9CFECF21F0D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2:rc3:*:*:*:*:*:*", "cpeNameId": "A5798A8D-D141-4085-B19B-9D32403E837C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2:rc4:*:*:*:*:*:*", "cpeNameId": "6AD74851-D9E8-4C2D-9E0E-176FF60A600D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.1:*:*:*:*:*:*:*", "cpeNameId": "7E156392-773D-4495-A4CE-F5D843C5FEBF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.2:*:*:*:*:*:*:*", "cpeNameId": "A11D4292-91CC-4F12-AF01-769D20986BC1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.3:*:*:*:*:*:*:*", "cpeNameId": "DF31FE84-23CC-48CD-BACC-C2F5879023E9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.4:*:*:*:*:*:*:*", "cpeNameId": "CDF894F7-EB7A-4A0E-AC8F-F87B6AFE4311"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.5:*:*:*:*:*:*:*", "cpeNameId": "992ABD6A-693C-4DB3-B023-B37D66796BD0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.6:*:*:*:*:*:*:*", "cpeNameId": "D8674307-6283-4A09-BF4E-3FACDF808289"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.7:*:*:*:*:*:*:*", "cpeNameId": "12B6C6F1-32F2-4C0F-82EA-492CBC7185D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.8:*:*:*:*:*:*:*", "cpeNameId": "0541FF1A-3588-4B1B-971D-7EBAEBD703EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.9:*:*:*:*:*:*:*", "cpeNameId": "E3FD35AB-B680-4EED-BCAB-106AAC3E9E46"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.10:*:*:*:*:*:*:*", "cpeNameId": "0A60430B-1D1E-43B4-BEEA-190D558DD6E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.11:*:*:*:*:*:*:*", "cpeNameId": "E35007C9-A8F4-4E0B-B996-627F9F3CA3A9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.12:*:*:*:*:*:*:*", "cpeNameId": "EF4B624E-6F70-4C9B-A9DE-2C711C45053A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.13:*:*:*:*:*:*:*", "cpeNameId": "48762B71-2980-485A-843C-0566FDA8F7AD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.14:*:*:*:*:*:*:*", "cpeNameId": "25A6C343-6D24-43CB-966C-DD6A57DB8AD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.15:*:*:*:*:*:*:*", "cpeNameId": "A6E25845-65F8-4B58-8B1F-645850B981D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.16:*:*:*:*:*:*:*", "cpeNameId": "FD154B36-EEE2-45F4-B035-738854DB8463"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.17:*:*:*:*:*:*:*", "cpeNameId": "BD8F511F-9901-411A-A340-71B7A714411E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.18:*:*:*:*:*:*:*", "cpeNameId": "747B8381-BCB7-48A7-99E3-3660A9FBF3F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.19:*:*:*:*:*:*:*", "cpeNameId": "035E9DE8-63BA-4EC7-8425-1EE27BA8CE55"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.20:*:*:*:*:*:*:*", "cpeNameId": "1E4CDC34-80B7-4F05-BB90-6C2714A0FA8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.2.21:*:*:*:*:*:*:*", "cpeNameId": "68BFF46E-9B1A-4A4C-B03C-587844610AFB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3:*:*:*:*:*:*:*", "cpeNameId": "21F5CD7B-AC95-4D78-9757-99093ED2094B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3:-:*:*:*:*:*:*", "cpeNameId": "961A0592-0690-4383-AA0C-FF52F896EA74"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3:rc1:*:*:*:*:*:*", "cpeNameId": "C67AB208-B2AD-4B21-BB6B-C839E0874C9B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.1:*:*:*:*:*:*:*", "cpeNameId": "81E3B88A-DC72-457D-BCCE-F773A198FFFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.2:*:*:*:*:*:*:*", "cpeNameId": "E64FB740-133B-4AAA-A2DC-2198C0F58D1B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.3:*:*:*:*:*:*:*", "cpeNameId": "D5F4E9B2-BB7B-425C-80D9-06AFBED0D808"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.4:*:*:*:*:*:*:*", "cpeNameId": "49D5583E-E8A9-4897-A2C6-AE3481D580DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.5:*:*:*:*:*:*:*", "cpeNameId": "25187C15-1C36-41FB-A90F-2385F6A9C349"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.6:*:*:*:*:*:*:*", "cpeNameId": "8409B0CA-6F72-4643-8146-ABEF90EE2DB3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.7:*:*:*:*:*:*:*", "cpeNameId": "17F798CD-1EC1-40BC-B535-9A41768D5BA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.8:*:*:*:*:*:*:*", "cpeNameId": "9025DD8F-91D2-404E-969C-2BEF62B5FF8F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.9:*:*:*:*:*:*:*", "cpeNameId": "E66D9744-32E2-4BF8-84B0-8E0A85F62F53"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.10:*:*:*:*:*:*:*", "cpeNameId": "EA942BE3-366A-463B-8C3C-A4C36C894385"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.11:*:*:*:*:*:*:*", "cpeNameId": "69C576AC-72FD-4696-9426-3E2D8F97B7AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.12:*:*:*:*:*:*:*", "cpeNameId": "F20292FB-DDAA-4331-8CCC-E0339B6E309F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.13:*:*:*:*:*:*:*", "cpeNameId": "CF1EC873-6878-4EF3-B478-3A435984B295"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.14:*:*:*:*:*:*:*", "cpeNameId": "76ECB189-F757-45C4-AB63-BC7499A4E9D6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.15:*:*:*:*:*:*:*", "cpeNameId": "37721982-4E3D-40B1-AC6A-DBDA2DD9E489"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.16:*:*:*:*:*:*:*", "cpeNameId": "06812A7C-411D-4A39-9158-D4B8B43A8D7B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.17:*:*:*:*:*:*:*", "cpeNameId": "E8C9CCC6-3D5B-43E5-BE69-3BF8A3DFDE96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.3.18:*:*:*:*:*:*:*", "cpeNameId": "37BCD5D2-D0A2-44E6-8375-F98117F02B9B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:*:*:*:*:*:*:*", "cpeNameId": "30F8A912-AEBA-4E8E-A946-D5FF48283C90"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:-:*:*:*:*:*:*", "cpeNameId": "38597FA2-E6FA-4060-A67D-C2441E02BC11"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:rc1:*:*:*:*:*:*", "cpeNameId": "0381F214-3BC5-4D07-A22F-18E0C97C33D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:rc2:*:*:*:*:*:*", "cpeNameId": "7058D69E-78BC-4917-A2ED-2D9A20503F8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:rc3:*:*:*:*:*:*", "cpeNameId": "A581FE35-F56F-44A9-B6AD-3900F6C4E830"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:rc4:*:*:*:*:*:*", "cpeNameId": "09E1C6F8-674B-4766-9267-69F9D2584B2B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:rc5:*:*:*:*:*:*", "cpeNameId": "D8331CE4-CE6E-45D2-9267-688218C5FA66"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:rc6:*:*:*:*:*:*", "cpeNameId": "E25FA831-4D9A-43A0-8520-18B2B425CC89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4:rc7:*:*:*:*:*:*", "cpeNameId": "B36308F6-FE14-40AE-836F-ADE4A02943B1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.0:rc1:*:*:*:*:*:*", "cpeNameId": "1AD9C3F6-3A0B-4AA0-8B15-3E5F14BF88CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.0:rc2:*:*:*:*:*:*", "cpeNameId": "02FEACE2-E424-4F2E-938B-464CBB64228B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.0:rc6:*:*:*:*:*:*", "cpeNameId": "9E511445-4E4D-44ED-A39F-BF79061A44B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.1:*:*:*:*:*:*:*", "cpeNameId": "1C281E83-7893-4458-9E7C-BC2E857281DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.2:*:*:*:*:*:*:*", "cpeNameId": "A3D762F0-7229-48BE-A593-90AF341A2B12"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.3:*:*:*:*:*:*:*", "cpeNameId": "FB304A30-43E2-4CB7-BDF6-D02968DE2769"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.4:*:*:*:*:*:*:*", "cpeNameId": "283FA41E-5A43-4BFF-B51A-D1FB18F8DE7D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.5:*:*:*:*:*:*:*", "cpeNameId": "02511C03-2EB5-4DDD-B4D5-F46566461307"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.6:*:*:*:*:*:*:*", "cpeNameId": "EE95F16F-BFE6-4880-80BE-0F30ED1E944A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.7:*:*:*:*:*:*:*", "cpeNameId": "FAEE1F59-C796-4E59-B6FB-5D16B39695BA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.8:*:*:*:*:*:*:*", "cpeNameId": "3D6FE7E7-6008-4B70-9614-B6F2C599131E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.9:*:*:*:*:*:*:*", "cpeNameId": "99B2EAA8-667C-487F-B0BF-3710995B951E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.10:*:*:*:*:*:*:*", "cpeNameId": "6FDA9090-C62C-4030-BB12-A0112FDCBF5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.11:*:*:*:*:*:*:*", "cpeNameId": "91DB3188-8E8C-4940-82C3-530F1FCF342A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.12:*:*:*:*:*:*:*", "cpeNameId": "4227319D-32DC-46E1-BB7E-9457C1F4F2C2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.13:*:*:*:*:*:*:*", "cpeNameId": "9E0E22BD-ED8B-4F4F-A0F1-402B94D84DD3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.14:*:*:*:*:*:*:*", "cpeNameId": "501029E0-B4D2-4145-8B1D-D1101340CBF1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.15:*:*:*:*:*:*:*", "cpeNameId": "7C3BE561-3C2B-4784-ACAE-960E3788F8A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.16:*:*:*:*:*:*:*", "cpeNameId": "01AC5F1D-CFD1-4B99-B90D-3A7F9E7C4F83"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.17:*:*:*:*:*:*:*", "cpeNameId": "3DAB053F-F9CF-47D5-BE1B-7C31F90B290F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.18:*:*:*:*:*:*:*", "cpeNameId": "73C26194-FDEA-45E7-80A8-65515A3AAF8F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.19:*:*:*:*:*:*:*", "cpeNameId": "7FC45267-94B3-49F5-B69F-5AE3AB28E1A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.20:*:*:*:*:*:*:*", "cpeNameId": "5ACE9C2C-D667-4936-BB37-72D8117CCBEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.21:*:*:*:*:*:*:*", "cpeNameId": "4CE3E880-139D-4507-BCFE-1624D74B0C80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.22:*:*:*:*:*:*:*", "cpeNameId": "DAC48916-1563-4077-A414-ADB689B1FDBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.23:*:*:*:*:*:*:*", "cpeNameId": "F322D1AA-8286-430D-B02A-5BDDB8C1122A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.24:*:*:*:*:*:*:*", "cpeNameId": "63EA159A-C722-4C17-A32E-20026026B727"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.25:*:*:*:*:*:*:*", "cpeNameId": "DF965E16-45D2-4E37-A24E-D362554D1F8E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.26:*:*:*:*:*:*:*", "cpeNameId": "1066FD9A-2313-40A4-A0B2-9C0263C26982"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.27:*:*:*:*:*:*:*", "cpeNameId": "6EC9BCEC-2231-455C-B28D-0DF13CB13479"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.28:*:*:*:*:*:*:*", "cpeNameId": "64D65D7E-E68D-49A1-AA45-CEFE1DBC20D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.29:*:*:*:*:*:*:*", "cpeNameId": "1ADDA3E8-2C58-47CD-A70D-DA04F3A431F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.30:*:*:*:*:*:*:*", "cpeNameId": "EF04CFE2-5DF9-4DE0-8E8F-FB4786456345"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.31:*:*:*:*:*:*:*", "cpeNameId": "8000B946-CAAE-4883-9745-A61904A0247A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.32:*:*:*:*:*:*:*", "cpeNameId": "770B138D-EB04-4F3A-8FA6-3637A3683AEF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.33:*:*:*:*:*:*:*", "cpeNameId": "0B322150-1C25-4F57-844C-BF85420500E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.34:*:*:*:*:*:*:*", "cpeNameId": "DD3EDA18-4BBD-4AD7-9661-5D47B62F591E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.35:*:*:*:*:*:*:*", "cpeNameId": "9C73DBB9-FC61-4E93-B2B0-955791097636"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.36:*:*:*:*:*:*:*", "cpeNameId": "0289901E-E986-443D-A30B-ED22F06A7638"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.37:*:*:*:*:*:*:*", "cpeNameId": "4F5E4958-95CD-4C22-BD8B-3794C74CCD47"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.38:*:*:*:*:*:*:*", "cpeNameId": "EB2A8683-5741-4161-8109-B7788AD97247"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.39:*:*:*:*:*:*:*", "cpeNameId": "8EF7B26D-4943-4DCC-9D59-0AADBEDDAED8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.40:*:*:*:*:*:*:*", "cpeNameId": "E32CC068-8B1A-45C4-8AB0-278C5A74B61C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.41:*:*:*:*:*:*:*", "cpeNameId": "6916813D-E2BF-4D74-BE79-EACD1ED1AFAC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.42:*:*:*:*:*:*:*", "cpeNameId": "9CA95178-D4D4-44FD-AC62-CA6CC68A8D65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.43:*:*:*:*:*:*:*", "cpeNameId": "F95E6F47-0F75-41A3-B478-1F34A602D7EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.44:*:*:*:*:*:*:*", "cpeNameId": "09B818EE-5D8B-4728-8FBA-4C46A9233AEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.45:*:*:*:*:*:*:*", "cpeNameId": "C340CD96-6163-499E-960C-F8C77A190CA7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.46:*:*:*:*:*:*:*", "cpeNameId": "D56E537C-FBC5-4C9C-ACEB-0265AB8DA1BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.47:*:*:*:*:*:*:*", "cpeNameId": "4F62EACD-F957-4121-A129-5514BED8A209"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.48:*:*:*:*:*:*:*", "cpeNameId": "8A9A30F9-762F-496F-B154-FAA7F5B35201"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.49:*:*:*:*:*:*:*", "cpeNameId": "588B838C-6578-4616-850F-59E58692EB1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.50:*:*:*:*:*:*:*", "cpeNameId": "88925256-EBA9-4999-B534-02A3F1514E8B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.51:*:*:*:*:*:*:*", "cpeNameId": "CB3ED166-B1C8-458D-8D95-8D03C00A669E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.52:*:*:*:*:*:*:*", "cpeNameId": "5C242B7B-208A-43C7-BA04-79E1F6E1C5FF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.53:*:*:*:*:*:*:*", "cpeNameId": "D9F0FC36-D6FA-408D-8921-009B98466D10"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.54:*:*:*:*:*:*:*", "cpeNameId": "496B7A05-51DC-43DC-890F-86578ED35874"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.55:*:*:*:*:*:*:*", "cpeNameId": "D015DA7D-CDFF-4FC4-924C-541E663FCC4E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.56:*:*:*:*:*:*:*", "cpeNameId": "B853157A-8731-436A-979A-BA2871A3CF9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.57:*:*:*:*:*:*:*", "cpeNameId": "FF8B97BB-61A3-4CAB-BE7B-A6EA63D575F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.58:*:*:*:*:*:*:*", "cpeNameId": "58F8F42F-DE39-4963-BBCD-2AF4B13B8152"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.59:*:*:*:*:*:*:*", "cpeNameId": "D20CCD61-4FC1-4E23-A134-0B93A8099C3C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.60:*:*:*:*:*:*:*", "cpeNameId": "C66ED101-4E13-4838-901E-A73F76499BBD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.61:*:*:*:*:*:*:*", "cpeNameId": "F4125335-934B-4535-9983-3E2BA61E96F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.62:*:*:*:*:*:*:*", "cpeNameId": "A583E905-8A22-42B5-9D96-B51FFD0614FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.63:*:*:*:*:*:*:*", "cpeNameId": "6D54EE82-FEC8-449B-B648-C736D4E26388"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.64:*:*:*:*:*:*:*", "cpeNameId": "AD9F8955-6D21-4FE1-B814-B7B5B6E51C1D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.65:*:*:*:*:*:*:*", "cpeNameId": "AA1F4832-E754-48FF-90A7-C83B71865F79"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.66:*:*:*:*:*:*:*", "cpeNameId": "7FA63DB7-AF4D-4ADA-AA62-E7E780629C01"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.67:*:*:*:*:*:*:*", "cpeNameId": "68125684-9408-4FF0-9691-78CE2C43472D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.68:*:*:*:*:*:*:*", "cpeNameId": "887CCD5A-CC1E-4F61-9A22-33CD3DB9590E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.69:*:*:*:*:*:*:*", "cpeNameId": "79E482C6-C081-4307-920F-E0C4DA650C4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.70:*:*:*:*:*:*:*", "cpeNameId": "BDBD2808-2754-4C34-81D4-C944911306CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.71:*:*:*:*:*:*:*", "cpeNameId": "33A308BB-8E22-4AD8-BDA8-3711554B706D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.72:*:*:*:*:*:*:*", "cpeNameId": "DD3870C8-2652-4D75-AAE0-3CEF3CF665D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.73:*:*:*:*:*:*:*", "cpeNameId": "44142F88-98AA-4496-B640-6FA14C77CEC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.74:*:*:*:*:*:*:*", "cpeNameId": "AF5903C8-5637-45BD-9A92-AEAFA81D93BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.75:*:*:*:*:*:*:*", "cpeNameId": "DACFFC27-6EB1-4433-B9F3-E58F2C6FB2B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.76:*:*:*:*:*:*:*", "cpeNameId": "55971333-67C2-40F0-AA0C-3382C5622911"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.77:*:*:*:*:*:*:*", "cpeNameId": "3BEED01C-4CCB-4958-8E29-DCC951578EF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.78:*:*:*:*:*:*:*", "cpeNameId": "4F171F41-EFAC-4188-B720-4C6840AF4261"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.79:*:*:*:*:*:*:*", "cpeNameId": "284FEF7C-A0D0-4494-8F98-9129D6A58041"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.80:*:*:*:*:*:*:*", "cpeNameId": "DD648053-6D4E-41CB-9113-66151119FDA0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.81:*:*:*:*:*:*:*", "cpeNameId": "82E37ED2-64A7-4300-BF90-20AF181B6F97"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.82:*:*:*:*:*:*:*", "cpeNameId": "AF69E066-55C4-4A86-B15F-BA9549CEB5AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.83:*:*:*:*:*:*:*", "cpeNameId": "D1721424-8F46-4939-A665-4621D22D7279"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.84:*:*:*:*:*:*:*", "cpeNameId": "E27F0C29-711F-4838-8481-F932273C9034"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.85:*:*:*:*:*:*:*", "cpeNameId": "087A9FF9-13D3-4192-A81A-FD3D742FAAEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.86:*:*:*:*:*:*:*", "cpeNameId": "24FE8157-16DC-4670-81B5-B35131D0D3E3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.87:*:*:*:*:*:*:*", "cpeNameId": "FEA33B3F-6CB7-4138-A92A-AD3C8258FC74"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.88:*:*:*:*:*:*:*", "cpeNameId": "6D4674AC-D1BA-41F6-B9B7-E276352BEDA6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.89:*:*:*:*:*:*:*", "cpeNameId": "D416D23A-A4AE-4C6A-926A-202ED3167667"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.90:*:*:*:*:*:*:*", "cpeNameId": "5CE1A537-5A52-474B-AAF0-E0A7D2952B45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.91:*:*:*:*:*:*:*", "cpeNameId": "F5999482-9471-4351-B0B3-0DB7907B9CED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.92:*:*:*:*:*:*:*", "cpeNameId": "C97C06E4-2C93-436C-ABA6-15AA6599A35A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.93:*:*:*:*:*:*:*", "cpeNameId": "1031888B-A914-4DC7-A6E9-392CCC45A76E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.94:*:*:*:*:*:*:*", "cpeNameId": "404206E9-E734-42FC-900E-BD6E0A8A4461"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.95:*:*:*:*:*:*:*", "cpeNameId": "511842CB-909F-4861-8D7C-28B54497BF86"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.96:*:*:*:*:*:*:*", "cpeNameId": "A9657041-BEE6-4EE8-94AD-4447DDE7D048"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.97:*:*:*:*:*:*:*", "cpeNameId": "0A9E3B65-5FB8-4A6A-A2D8-CA2453AF07EC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.98:*:*:*:*:*:*:*", "cpeNameId": "22048CDC-DCAC-4609-95F0-929AEE830465"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.99:*:*:*:*:*:*:*", "cpeNameId": "627DBE54-010D-4F1C-9001-CC5E02BF3050"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.100:*:*:*:*:*:*:*", "cpeNameId": "938FECE2-6792-451E-8311-7E3E38A036FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.101:*:*:*:*:*:*:*", "cpeNameId": "5432BFDA-778D-4E2E-A1D3-CBED78826AD4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.102:*:*:*:*:*:*:*", "cpeNameId": "3AA63EBE-68D6-44E3-BAF2-581B3E42DA43"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.103:*:*:*:*:*:*:*", "cpeNameId": "82A4E722-C3C7-437B-97C7-010E4E7FB1F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.104:*:*:*:*:*:*:*", "cpeNameId": "FEF2BA89-9777-4690-A1E0-5A9539F19063"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.105:*:*:*:*:*:*:*", "cpeNameId": "0FEBCB84-25C5-4B8F-84AD-2840655A9CB7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.106:*:*:*:*:*:*:*", "cpeNameId": "CA4865C8-CD0B-4624-B878-C160F5793EBF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.107:*:*:*:*:*:*:*", "cpeNameId": "8CD6838F-3F26-49B5-9826-3481D09DD0FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.108:*:*:*:*:*:*:*", "cpeNameId": "F925DF95-F46A-41A4-A0D4-FF783FAAF1AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.109:*:*:*:*:*:*:*", "cpeNameId": "2CEDA5AF-C713-4643-B009-513BA2E3C74D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.110:*:*:*:*:*:*:*", "cpeNameId": "A53BF0C3-2C50-4301-8616-02277328F4BF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.111:*:*:*:*:*:*:*", "cpeNameId": "CC8637E1-FDE1-40A6-BE9A-64596A91042E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.112:*:*:*:*:*:*:*", "cpeNameId": "A29F5C22-296D-438A-A22F-7F59BD3C77A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.113:*:*:*:*:*:*:*", "cpeNameId": "42237EE2-4AF1-49D8-8C47-53936F3F6D15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.114:*:*:*:*:*:*:*", "cpeNameId": "DF5875E7-C829-41E7-B637-7C7FD45469B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.115:*:*:*:*:*:*:*", "cpeNameId": "9EEEB133-6D86-45B8-8F2E-4CD7E1677D4D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.116:*:*:*:*:*:*:*", "cpeNameId": "EFB125EB-E097-459C-BB6C-8CA683495E49"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.117:*:*:*:*:*:*:*", "cpeNameId": "8AB69237-A001-4D78-B1DC-05E19113CAEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.118:*:*:*:*:*:*:*", "cpeNameId": "F529F470-E283-4E30-A94D-9155B2F4D0E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.119:*:*:*:*:*:*:*", "cpeNameId": "E393B29E-8B63-4003-9C92-11923EDDF4FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.120:*:*:*:*:*:*:*", "cpeNameId": "9142B8C8-A1A2-4597-9736-08F85EA6DF0A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.121:*:*:*:*:*:*:*", "cpeNameId": "6ED37745-F2C8-4CAB-B848-E3F1D5B92D5A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.122:*:*:*:*:*:*:*", "cpeNameId": "73345EA5-BC19-481D-9E8D-BC43F1B2A009"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.123:*:*:*:*:*:*:*", "cpeNameId": "D1B464F3-C13B-4562-9A1D-9A52A83F8CE4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.124:*:*:*:*:*:*:*", "cpeNameId": "E7237F6D-DA3F-4755-97C0-72C41F937096"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.125:*:*:*:*:*:*:*", "cpeNameId": "EF179B39-F479-4FF0-9853-5C41F4138C80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.126:*:*:*:*:*:*:*", "cpeNameId": "D623E6BE-F45C-4E2D-83EB-883633218B57"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.127:*:*:*:*:*:*:*", "cpeNameId": "7634F69F-587C-4861-B1E1-2F144582DD36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.128:*:*:*:*:*:*:*", "cpeNameId": "23B07FF3-3EC0-487F-B76D-C86CBF6426EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.129:*:*:*:*:*:*:*", "cpeNameId": "E3AB773D-5743-4A09-AB6F-139D852B344E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.130:*:*:*:*:*:*:*", "cpeNameId": "1C0588B6-8690-46A5-AE2E-73E7BF0CACDB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.131:*:*:*:*:*:*:*", "cpeNameId": "AF351F54-8187-410D-86F1-B3F82AD2ED55"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.132:*:*:*:*:*:*:*", "cpeNameId": "067199B5-CFA0-4568-BA4D-6288A392D99C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.133:*:*:*:*:*:*:*", "cpeNameId": "CF1D7CCF-56EB-4D68-AED7-D187649BA593"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.134:*:*:*:*:*:*:*", "cpeNameId": "5446FBC8-EDD6-449D-B4FC-7C9C2679FDE4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.135:*:*:*:*:*:*:*", "cpeNameId": "3B8D2DC6-E618-4E03-ABF0-0BD7B4B8EB69"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.136:*:*:*:*:*:*:*", "cpeNameId": "94473DCF-880F-4134-9004-72FB278A583E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.137:*:*:*:*:*:*:*", "cpeNameId": "F3AE7B24-62E3-4995-B088-1484F2073EEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.138:*:*:*:*:*:*:*", "cpeNameId": "17D753C7-C945-4B66-AA44-7CA3F4512771"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.139:*:*:*:*:*:*:*", "cpeNameId": "60F84A69-CC41-4E35-BED3-8967F672C006"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.140:*:*:*:*:*:*:*", "cpeNameId": "704BA190-B269-4E2E-B176-2E609688075D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.141:*:*:*:*:*:*:*", "cpeNameId": "FEF922EA-398E-42BB-A3D4-617330FE8BA5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.142:*:*:*:*:*:*:*", "cpeNameId": "E13D9FC4-EA1C-4834-A8DD-9F8B32080526"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.143:*:*:*:*:*:*:*", "cpeNameId": "2749EF98-5412-46F6-8D49-0EDD6A58E528"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.144:*:*:*:*:*:*:*", "cpeNameId": "1CBA264D-9620-40D3-A6E9-BDD0378FBBE4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.145:*:*:*:*:*:*:*", "cpeNameId": "9753CAB1-3E31-4FB0-8901-B66F68248C4B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.146:*:*:*:*:*:*:*", "cpeNameId": "D6BBAA0A-DC53-4541-A7C9-02B7CC882C6F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.147:*:*:*:*:*:*:*", "cpeNameId": "75DD6B1D-A210-439C-BB15-5A9857869B4C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.148:*:*:*:*:*:*:*", "cpeNameId": "83C33FEE-E6EE-42A4-B71C-36B017ADA254"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.149:*:*:*:*:*:*:*", "cpeNameId": "7594839C-A015-437B-843D-443C74240AFC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.150:*:*:*:*:*:*:*", "cpeNameId": "85681E7B-7D21-4391-88BB-F24FCC85B69E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.151:*:*:*:*:*:*:*", "cpeNameId": "CAD0E871-57D4-4E39-B8BE-B48B56E383AD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.152:*:*:*:*:*:*:*", "cpeNameId": "8B9FBF3A-7807-4307-AA5A-AFB027788A0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.153:*:*:*:*:*:*:*", "cpeNameId": "45B35B38-1583-4FDE-A76C-F489FC1661B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.154:*:*:*:*:*:*:*", "cpeNameId": "B5CBD335-2006-441B-B668-D4C4E5361E92"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.155:*:*:*:*:*:*:*", "cpeNameId": "1BB865B8-A4BD-46DC-8C13-31A508A1C470"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.156:*:*:*:*:*:*:*", "cpeNameId": "020363CE-5C5B-427C-A15C-F5C1C1975467"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.157:*:*:*:*:*:*:*", "cpeNameId": "941EBBFB-C6F1-48D5-9B2B-CA5C89D87AAE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.158:*:*:*:*:*:*:*", "cpeNameId": "C6F4FAFB-B2D4-4C6A-A2FD-279349D1B6B8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.159:*:*:*:*:*:*:*", "cpeNameId": "D6E8DC84-DA54-45C7-A50D-CB982342FBA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.160:*:*:*:*:*:*:*", "cpeNameId": "B06561F9-9A69-45F5-8E38-E4ACD6603562"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.161:*:*:*:*:*:*:*", "cpeNameId": "387585D8-ED6F-4F42-B695-CBEE28059C70"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.162:*:*:*:*:*:*:*", "cpeNameId": "D3B66B2E-4E69-4FA5-8B87-289E005FDE04"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.163:*:*:*:*:*:*:*", "cpeNameId": "5EE4932A-8EC9-4F83-B39E-43949583A002"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.164:*:*:*:*:*:*:*", "cpeNameId": "23613ABA-9AF6-4994-BEA5-72EADE59E05D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.165:*:*:*:*:*:*:*", "cpeNameId": "274A8333-1FF8-4D90-9F8F-6ED87E4D38C2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.166:*:*:*:*:*:*:*", "cpeNameId": "D2E5BB0E-741E-4F29-A740-36E5944DA22E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.167:*:*:*:*:*:*:*", "cpeNameId": "A0D34177-A31C-4A31-95EC-FC51AAFDCCA4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.168:*:*:*:*:*:*:*", "cpeNameId": "91D62EB4-F2E8-490E-B95E-8795D3419321"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.169:*:*:*:*:*:*:*", "cpeNameId": "D07F44B5-8B12-4624-806B-3926EE9DFEC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.170:*:*:*:*:*:*:*", "cpeNameId": "F96D2A95-B029-4CF9-B156-05CF4447C703"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.171:*:*:*:*:*:*:*", "cpeNameId": "8ECD8767-3374-4B80-A15B-F5238068915B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.172:*:*:*:*:*:*:*", "cpeNameId": "360CFD8E-8542-4074-A12A-DBA9971EA65B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.173:*:*:*:*:*:*:*", "cpeNameId": "E8C8A6D8-B27B-4F5B-8E51-61E11B3F215F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.174:*:*:*:*:*:*:*", "cpeNameId": "15A35FE0-6FEE-41DC-8BF0-6915C879C270"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.175:*:*:*:*:*:*:*", "cpeNameId": "37C5FB0A-CA6D-4613-8A8B-A18D0FDA6F64"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.176:*:*:*:*:*:*:*", "cpeNameId": "FFE0EDBC-A325-48BA-ACB3-9F8D08670377"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.177:*:*:*:*:*:*:*", "cpeNameId": "E5195C74-6E40-48DB-B840-6064E935C3EE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.178:*:*:*:*:*:*:*", "cpeNameId": "12D64B6B-F676-44EF-9DC6-C177E27260EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.179:*:*:*:*:*:*:*", "cpeNameId": "A05ECB81-2B19-4D35-8D1F-4434137A84DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.180:*:*:*:*:*:*:*", "cpeNameId": "9C361490-6959-42D0-BCC4-83D577D132F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.181:*:*:*:*:*:*:*", "cpeNameId": "D0326F99-0B11-462B-8D94-064C0A3241B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.182:*:*:*:*:*:*:*", "cpeNameId": "D15195DE-63BF-4173-905B-E7D6FA91CA75"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.183:*:*:*:*:*:*:*", "cpeNameId": "68713BB8-A777-453A-A8DF-73D9D7BF2E85"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.184:*:*:*:*:*:*:*", "cpeNameId": "4CAD090F-0814-485B-8E21-4D47722887FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.185:*:*:*:*:*:*:*", "cpeNameId": "9959172B-D94C-4CB9-BF46-DD313AA048F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.186:*:*:*:*:*:*:*", "cpeNameId": "24962B43-D41C-4D08-B761-2DC8B7CA6266"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.187:*:*:*:*:*:*:*", "cpeNameId": "38C0DBA3-BE34-4386-9A2E-157382F3225A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.188:*:*:*:*:*:*:*", "cpeNameId": "7ACF7B19-A720-4BA7-BED3-568CC376C778"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.189:*:*:*:*:*:*:*", "cpeNameId": "B7B05048-9CFF-419B-86B0-EE2F56B47B83"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.190:*:*:*:*:*:*:*", "cpeNameId": "BAE9F693-4B6C-4E3E-A9A0-511AE8544242"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.191:*:*:*:*:*:*:*", "cpeNameId": "9D62345B-E1AE-4963-B5CF-35F5162E8801"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.192:*:*:*:*:*:*:*", "cpeNameId": "B355E118-131B-406B-B4BA-152ECC8A3BBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.193:*:*:*:*:*:*:*", "cpeNameId": "F03D2948-9154-4DBA-BACE-7C345323033A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.194:*:*:*:*:*:*:*", "cpeNameId": "FBCB3E35-2179-4C11-AB45-FF4ED4FDF319"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.195:*:*:*:*:*:*:*", "cpeNameId": "C3EE187D-F47C-4715-9DB8-E907435E01EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.196:*:*:*:*:*:*:*", "cpeNameId": "0C0A8C7F-62FD-4514-AA66-564CAADC6E45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.197:*:*:*:*:*:*:*", "cpeNameId": "B3CE9D05-5F55-4B0E-B305-0A3B005018DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.198:*:*:*:*:*:*:*", "cpeNameId": "2317D623-D839-407E-A14E-F5F852B84FEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.199:*:*:*:*:*:*:*", "cpeNameId": "EB66E33F-BA65-49D7-B9EA-4A98B64ACC4E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.200:*:*:*:*:*:*:*", "cpeNameId": "011BFD26-2596-4913-9424-0AECA7030C16"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.201:*:*:*:*:*:*:*", "cpeNameId": "D4ACDED5-7B2F-49A2-A926-D916CFDB0C63"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.202:*:*:*:*:*:*:*", "cpeNameId": "B7F9F37A-7A22-49AD-A0B1-F71767104083"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.203:*:*:*:*:*:*:*", "cpeNameId": "2AD7A4A5-2505-4B4D-8783-F0A51E6A046A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.204:*:*:*:*:*:*:*", "cpeNameId": "95FA5A9A-3EEF-40F7-A80B-F714544B33EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.205:*:*:*:*:*:*:*", "cpeNameId": "2E6CB57E-4C3F-42E5-B9FB-AB8280BE7A6F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.206:*:*:*:*:*:*:*", "cpeNameId": "7676F080-CF07-4DA1-AF8D-9EF7B716A3E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.207:*:*:*:*:*:*:*", "cpeNameId": "825F2314-2B15-4F76-B6CD-5C9DADC5BE95"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.208:*:*:*:*:*:*:*", "cpeNameId": "7B6DA918-9935-4683-A67B-08144DD82180"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.209:*:*:*:*:*:*:*", "cpeNameId": "95865082-502B-4EAF-BB46-FF14CB436ACA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.210:*:*:*:*:*:*:*", "cpeNameId": "E291ACF9-9E86-4E1E-BCB5-E208F959C0B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.211:*:*:*:*:*:*:*", "cpeNameId": "0A1A262D-D3CD-49B4-84ED-3064C2FED37A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.212:*:*:*:*:*:*:*", "cpeNameId": "57B76811-C4C0-4A91-A8EF-F37450F7F017"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.213:*:*:*:*:*:*:*", "cpeNameId": "205B4275-EF2F-4D30-9EC3-8E0571547292"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.214:*:*:*:*:*:*:*", "cpeNameId": "F5586B8B-CDBF-434C-A994-8D07A0DDB39C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.215:*:*:*:*:*:*:*", "cpeNameId": "D37B51B4-57EC-4373-9428-3C3D4A29208F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.216:*:*:*:*:*:*:*", "cpeNameId": "398941C0-8C2C-41F5-A1C9-9585DAC725E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.217:*:*:*:*:*:*:*", "cpeNameId": "7B403008-68BC-4E2D-9684-EA7D660D620C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.218:*:*:*:*:*:*:*", "cpeNameId": "FEE28F9A-4B9B-44F3-96E9-B98FB0AC8528"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.219:*:*:*:*:*:*:*", "cpeNameId": "2AF545DD-D84F-46B2-AA73-55A6B4659260"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.220:*:*:*:*:*:*:*", "cpeNameId": "A062E707-3089-4A1F-A78C-D2B8FF520A2B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.221:*:*:*:*:*:*:*", "cpeNameId": "CE524691-6654-439A-ACAC-6B617AF5AF1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.222:*:*:*:*:*:*:*", "cpeNameId": "7ACB644E-9AED-4BE0-AA14-66A4391EC095"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.223:*:*:*:*:*:*:*", "cpeNameId": "FF39B72D-B1B2-4DC2-B709-C6693BC9A5E7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.224:*:*:*:*:*:*:*", "cpeNameId": "517DC3B4-3906-44AE-8AA5-EF2587DBDC72"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.225:*:*:*:*:*:*:*", "cpeNameId": "BF5626A2-7798-4612-B4A5-BA04E42E0BED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.226:*:*:*:*:*:*:*", "cpeNameId": "F43E60E1-E9FB-44BC-BC12-DE00249731EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.227:*:*:*:*:*:*:*", "cpeNameId": "640CDE67-2025-448F-AA11-6B110B29D2A5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.228:*:*:*:*:*:*:*", "cpeNameId": "D2FA83FC-CF87-4E06-B474-4EEF45D68215"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.229:*:*:*:*:*:*:*", "cpeNameId": "66BF34B9-77D9-4194-A0B7-B4475B335F2E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.230:*:*:*:*:*:*:*", "cpeNameId": "299E37F1-CADB-4659-916C-6212694A18E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.231:*:*:*:*:*:*:*", "cpeNameId": "6485B4A3-B4A4-4051-BF33-D2CE21DA64EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.232:*:*:*:*:*:*:*", "cpeNameId": "B4F3A62A-C3EE-48BD-B70D-61471639DC9C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.233:*:*:*:*:*:*:*", "cpeNameId": "69E1C22D-523B-4340-A48B-2DB4BEB9248F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.234:*:*:*:*:*:*:*", "cpeNameId": "9F851704-26CF-4676-8855-D74AF799B382"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.235:*:*:*:*:*:*:*", "cpeNameId": "7C708908-5963-46DC-B508-3A5F7499055C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.236:*:*:*:*:*:*:*", "cpeNameId": "6C87ADCB-B88B-4DFA-992F-26B4947C3458"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.237:*:*:*:*:*:*:*", "cpeNameId": "6BB385D9-D9D8-470E-89CE-902222E39ADC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.238:*:*:*:*:*:*:*", "cpeNameId": "B4DAD459-71A8-44A5-861A-1BAF66749233"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.239:*:*:*:*:*:*:*", "cpeNameId": "1897BE2D-B7E6-4886-8CAC-C6AE563CBEE5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.240:*:*:*:*:*:*:*", "cpeNameId": "CE8BA9F0-78BC-4495-801A-2D41AC5B3187"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.241:*:*:*:*:*:*:*", "cpeNameId": "A5EC3DC7-E2C0-431A-A2EC-B6C3828C4BCA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.242:*:*:*:*:*:*:*", "cpeNameId": "E7DD7787-5F9A-4EB3-80D5-122199BE1430"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.243:*:*:*:*:*:*:*", "cpeNameId": "CEA6083C-45E3-459C-A5E7-04CABE3258FF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.244:*:*:*:*:*:*:*", "cpeNameId": "A046118E-2030-4FA1-AB54-FA3166B389EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.245:*:*:*:*:*:*:*", "cpeNameId": "798F9326-D8B4-47C7-A887-279D9837B680"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.246:*:*:*:*:*:*:*", "cpeNameId": "95624FFF-60D2-4964-9EBB-A6AFA64F213D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.247:*:*:*:*:*:*:*", "cpeNameId": "29DEE5F4-3ADD-4E88-9187-7135A238F9C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.248:*:*:*:*:*:*:*", "cpeNameId": "8E8D2C97-D48F-4BD9-BED5-88EE4813F6E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.249:*:*:*:*:*:*:*", "cpeNameId": "5A1E1612-3E81-4021-9A85-34B86AFBC77C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.250:*:*:*:*:*:*:*", "cpeNameId": "EA54F6F0-C64D-41B4-A582-92D43FDD3CB2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.251:*:*:*:*:*:*:*", "cpeNameId": "1B17D69F-3CC2-4B00-B2D5-A4434E4C2402"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.252:*:*:*:*:*:*:*", "cpeNameId": "AAC99975-FBC6-439C-B9E6-011CABDAE8F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.253:*:*:*:*:*:*:*", "cpeNameId": "5375B4A1-C18E-453D-9179-672CB459B0D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.254:*:*:*:*:*:*:*", "cpeNameId": "730B192E-0CAB-41AE-8EE8-57F381628032"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.255:*:*:*:*:*:*:*", "cpeNameId": "59A6D935-0EBF-4499-A8F9-5BB002FF5417"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.256:*:*:*:*:*:*:*", "cpeNameId": "60604FAE-6D70-4DF3-9A88-CC3F6A614F58"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.257:*:*:*:*:*:*:*", "cpeNameId": "28E9A455-1593-4AF5-9451-B313D622E813"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.258:*:*:*:*:*:*:*", "cpeNameId": "B5718D89-967C-42C8-AA82-C97D345B3B10"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.259:*:*:*:*:*:*:*", "cpeNameId": "87BB858F-8D92-452F-B51C-12ACE0798353"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.260:*:*:*:*:*:*:*", "cpeNameId": "AE07B665-D693-4561-A9B4-9932CD77333B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.261:*:*:*:*:*:*:*", "cpeNameId": "EF86313B-7F46-43B8-8338-AE692B75A0A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.262:*:*:*:*:*:*:*", "cpeNameId": "E1B563A5-0659-4D95-89A0-8FCC2A436214"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.263:*:*:*:*:*:*:*", "cpeNameId": "8D53F67C-F067-4BF8-AE22-78A1176571BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.264:*:*:*:*:*:*:*", "cpeNameId": "7111A17A-1784-4740-B976-38B722A838CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.265:*:*:*:*:*:*:*", "cpeNameId": "2D41AA24-795C-4C26-8A5A-D07B59EBD394"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.266:*:*:*:*:*:*:*", "cpeNameId": "A97784BF-DCF7-40A8-87DA-0CB401BEC707"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.267:*:*:*:*:*:*:*", "cpeNameId": "073D9BD8-4FBC-4DF6-8017-37FB83733D26"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.268:*:*:*:*:*:*:*", "cpeNameId": "91DAF395-305E-4836-A12C-1E2377F31FA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.269:*:*:*:*:*:*:*", "cpeNameId": "5FCE10E6-EC75-4696-82C2-8958D55E379A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.270:*:*:*:*:*:*:*", "cpeNameId": "431FAE79-4814-471C-ADD1-50E98CA62255"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.271:*:*:*:*:*:*:*", "cpeNameId": "90DCF88A-E713-42F3-9D1E-2CCCAA5074ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.272:*:*:*:*:*:*:*", "cpeNameId": "6B454F24-35C3-4974-86AC-E42EC930E187"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.273:*:*:*:*:*:*:*", "cpeNameId": "02AE5EE4-8747-4828-AC90-7DC0689482DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.274:*:*:*:*:*:*:*", "cpeNameId": "F006D7E9-C3E7-43D0-BFF9-1905CC924F0E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.275:*:*:*:*:*:*:*", "cpeNameId": "81C1BF7F-E953-42D0-965C-B5F736085500"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.276:*:*:*:*:*:*:*", "cpeNameId": "CFCF98F3-408F-4FB9-B097-3CE467D5C047"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.277:*:*:*:*:*:*:*", "cpeNameId": "8B64B495-66D8-4EE8-9391-2078D025F252"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.278:*:*:*:*:*:*:*", "cpeNameId": "25928F5C-D970-404D-B6CB-E3DFCD7EC853"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.279:*:*:*:*:*:*:*", "cpeNameId": "478BD5C9-EF9A-4FBB-9BCF-DF23EA8F3492"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.280:*:*:*:*:*:*:*", "cpeNameId": "9513977F-A95A-4F0F-AADE-B21201231052"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.281:*:*:*:*:*:*:*", "cpeNameId": "14DBE587-6D62-4B91-BC57-0C84D152E7EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.282:*:*:*:*:*:*:*", "cpeNameId": "6057E10C-DE66-4645-A2B5-44203C31F784"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.283:*:*:*:*:*:*:*", "cpeNameId": "951347D3-550A-41E6-B000-E2D716A96A20"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.284:*:*:*:*:*:*:*", "cpeNameId": "5979A8F6-3B9D-4C0C-8C75-9FA49E82A345"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.285:*:*:*:*:*:*:*", "cpeNameId": "F1278C94-D023-48BF-A6D6-36D0DF76CFF3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.4.286:*:*:*:*:*:*:*", "cpeNameId": "7E65B46E-A161-4126-9E85-B9F5B4C0005D"}]}} \ No newline at end of file diff --git a/cpematch/2D/2D2F5369-7873-4CD6-9F27-DE3EDC7C26AC.json b/cpematch/2D/2D2F5369-7873-4CD6-9F27-DE3EDC7C26AC.json index 154e8421fcc..e5a0cdae335 100644 --- a/cpematch/2D/2D2F5369-7873-4CD6-9F27-DE3EDC7C26AC.json +++ b/cpematch/2D/2D2F5369-7873-4CD6-9F27-DE3EDC7C26AC.json @@ -1 +1 @@ -{"matchString": {"matchCriteriaId": "2D2F5369-7873-4CD6-9F27-DE3EDC7C26AC", "criteria": "cpe:2.3:a:wpmet:elementskit:*:*:*:*:pro:wordpress:*:*", "versionEndExcluding": "3.6.7", "lastModified": "2025-01-07T22:04:57.893", "cpeLastModified": "2025-01-07T22:04:57.893", "created": "2025-01-07T22:04:57.893", "status": "Active", "matches": [{"cpeName": "cpe:2.3:a:wpmet:elementskit:-:*:*:*:pro:wordpress:*:*", "cpeNameId": "5AC5DDCD-C5E4-46B6-9D50-97C74EAB4437"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit:3.6.3:*:*:*:pro:wordpress:*:*", "cpeNameId": "B1FDB478-EB3E-40A9-BF30-A40067126E83"}]}} \ No newline at end of file +{"matchString": {"matchCriteriaId": "2D2F5369-7873-4CD6-9F27-DE3EDC7C26AC", "criteria": "cpe:2.3:a:wpmet:elementskit:*:*:*:*:pro:wordpress:*:*", "versionEndExcluding": "3.6.7", "lastModified": "2025-01-09T18:48:35.567", "cpeLastModified": "2025-01-09T18:48:35.567", "created": "2025-01-07T22:04:57.893", "status": "Active", "matches": [{"cpeName": "cpe:2.3:a:wpmet:elementskit:-:*:*:*:pro:wordpress:*:*", "cpeNameId": "5AC5DDCD-C5E4-46B6-9D50-97C74EAB4437"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit:2.3.6:*:*:*:pro:wordpress:*:*", "cpeNameId": "54B1AB4B-A68B-4330-93B7-9C7908D85D72"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit:2.6.4:*:*:*:pro:wordpress:*:*", "cpeNameId": "4C582DB4-CECC-46EF-9409-201DBA60724D"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit:3.6.0:*:*:*:pro:wordpress:*:*", "cpeNameId": "F4C1F0C2-BB36-44E2-828B-6CBD2BF6CCB3"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit:3.6.1:*:*:*:pro:wordpress:*:*", "cpeNameId": "0BF9B631-428E-4347-B9FB-31D64A00EFE8"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit:3.6.2:*:*:*:pro:wordpress:*:*", "cpeNameId": "6A077D6D-F089-4555-9EAB-93F2592339B6"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit:3.6.3:*:*:*:pro:wordpress:*:*", "cpeNameId": "B1FDB478-EB3E-40A9-BF30-A40067126E83"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit:3.6.5:*:*:*:pro:wordpress:*:*", "cpeNameId": "D8A4070A-6854-4C5B-AB84-CE8B4F57ADB8"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit:3.6.6:*:*:*:pro:wordpress:*:*", "cpeNameId": "3E488688-4931-4C71-AF81-CC6A88C16C63"}]}} \ No newline at end of file diff --git a/cpematch/47/47CE311A-7EE4-405F-984B-AC3A71E177CA.json b/cpematch/47/47CE311A-7EE4-405F-984B-AC3A71E177CA.json index f4cb6e1d5a6..7eadbc7e1cc 100644 --- a/cpematch/47/47CE311A-7EE4-405F-984B-AC3A71E177CA.json +++ b/cpematch/47/47CE311A-7EE4-405F-984B-AC3A71E177CA.json @@ -1 +1 @@ -{"matchString": {"matchCriteriaId": "47CE311A-7EE4-405F-984B-AC3A71E177CA", "criteria": "cpe:2.3:a:wpmet:elementskit:*:*:*:*:pro:wordpress:*:*", "versionEndExcluding": "3.6.1", "lastModified": "2025-01-07T21:56:08.960", "cpeLastModified": "2025-01-07T21:56:08.960", "created": "2025-01-07T21:56:08.960", "status": "Active", "matches": [{"cpeName": "cpe:2.3:a:wpmet:elementskit:-:*:*:*:pro:wordpress:*:*", "cpeNameId": "5AC5DDCD-C5E4-46B6-9D50-97C74EAB4437"}]}} \ No newline at end of file +{"matchString": {"matchCriteriaId": "47CE311A-7EE4-405F-984B-AC3A71E177CA", "criteria": "cpe:2.3:a:wpmet:elementskit:*:*:*:*:pro:wordpress:*:*", "versionEndExcluding": "3.6.1", "lastModified": "2025-01-09T18:48:35.567", "cpeLastModified": "2025-01-09T18:48:35.567", "created": "2025-01-07T21:56:08.960", "status": "Active", "matches": [{"cpeName": "cpe:2.3:a:wpmet:elementskit:-:*:*:*:pro:wordpress:*:*", "cpeNameId": "5AC5DDCD-C5E4-46B6-9D50-97C74EAB4437"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit:2.3.6:*:*:*:pro:wordpress:*:*", "cpeNameId": "54B1AB4B-A68B-4330-93B7-9C7908D85D72"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit:2.6.4:*:*:*:pro:wordpress:*:*", "cpeNameId": "4C582DB4-CECC-46EF-9409-201DBA60724D"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit:3.6.0:*:*:*:pro:wordpress:*:*", "cpeNameId": "F4C1F0C2-BB36-44E2-828B-6CBD2BF6CCB3"}]}} \ No newline at end of file diff --git a/cpematch/49/49350E3D-5C97-4857-90E9-CC2C78E9FA76.json b/cpematch/49/49350E3D-5C97-4857-90E9-CC2C78E9FA76.json index 1c5944bf3cf..11641a6efa8 100644 --- a/cpematch/49/49350E3D-5C97-4857-90E9-CC2C78E9FA76.json +++ b/cpematch/49/49350E3D-5C97-4857-90E9-CC2C78E9FA76.json @@ -1 +1 @@ -{"matchString": {"matchCriteriaId": "49350E3D-5C97-4857-90E9-CC2C78E9FA76", "criteria": "cpe:2.3:a:wpmet:elementskit:*:*:*:*:pro:wordpress:*:*", "versionEndExcluding": "3.6.2", "lastModified": "2025-01-07T22:09:12.960", "cpeLastModified": "2025-01-07T22:09:12.960", "created": "2025-01-07T22:09:12.960", "status": "Active", "matches": [{"cpeName": "cpe:2.3:a:wpmet:elementskit:-:*:*:*:pro:wordpress:*:*", "cpeNameId": "5AC5DDCD-C5E4-46B6-9D50-97C74EAB4437"}]}} \ No newline at end of file +{"matchString": {"matchCriteriaId": "49350E3D-5C97-4857-90E9-CC2C78E9FA76", "criteria": "cpe:2.3:a:wpmet:elementskit:*:*:*:*:pro:wordpress:*:*", "versionEndExcluding": "3.6.2", "lastModified": "2025-01-09T18:48:35.567", "cpeLastModified": "2025-01-09T18:48:35.567", "created": "2025-01-07T22:09:12.960", "status": "Active", "matches": [{"cpeName": "cpe:2.3:a:wpmet:elementskit:-:*:*:*:pro:wordpress:*:*", "cpeNameId": "5AC5DDCD-C5E4-46B6-9D50-97C74EAB4437"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit:2.3.6:*:*:*:pro:wordpress:*:*", "cpeNameId": "54B1AB4B-A68B-4330-93B7-9C7908D85D72"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit:2.6.4:*:*:*:pro:wordpress:*:*", "cpeNameId": "4C582DB4-CECC-46EF-9409-201DBA60724D"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit:3.6.0:*:*:*:pro:wordpress:*:*", "cpeNameId": "F4C1F0C2-BB36-44E2-828B-6CBD2BF6CCB3"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit:3.6.1:*:*:*:pro:wordpress:*:*", "cpeNameId": "0BF9B631-428E-4347-B9FB-31D64A00EFE8"}]}} \ No newline at end of file diff --git a/cpematch/66/66B11D95-C9D9-4D15-B338-C26B1B4C6941.json b/cpematch/66/66B11D95-C9D9-4D15-B338-C26B1B4C6941.json new file mode 100644 index 00000000000..f49e23e4766 --- /dev/null +++ b/cpematch/66/66B11D95-C9D9-4D15-B338-C26B1B4C6941.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "66B11D95-C9D9-4D15-B338-C26B1B4C6941", "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.1.107", "versionEndExcluding": "6.1.122", "lastModified": "2025-01-09T19:08:59.313", "cpeLastModified": "2025-01-09T19:08:59.313", "created": "2025-01-09T19:08:59.313", "status": "Active", "matches": [{"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.107:*:*:*:*:*:*:*", "cpeNameId": "9F7EB5C3-3C76-4816-BB64-A0D47A8FF148"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.108:*:*:*:*:*:*:*", "cpeNameId": "A0B4BCED-0919-484E-B64A-2D6F944128BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.109:*:*:*:*:*:*:*", "cpeNameId": "14C4B1A8-4457-4620-A2F4-A7BAAB479E01"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.110:*:*:*:*:*:*:*", "cpeNameId": "08F57941-7A99-4F2F-982B-54B72CA90ECA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.111:*:*:*:*:*:*:*", "cpeNameId": "F75C660D-8C20-4B05-BAB3-2D3BEF6EBC9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.112:*:*:*:*:*:*:*", "cpeNameId": "82BF8B3E-D66C-40EF-B175-1E5A2466D997"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.113:*:*:*:*:*:*:*", "cpeNameId": "CF72EDAE-B29A-4A22-BF70-8FD89123C957"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.114:*:*:*:*:*:*:*", "cpeNameId": "86E6F51B-573A-4DB5-99FA-BB89A65DD613"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.115:*:*:*:*:*:*:*", "cpeNameId": "63567DC6-8639-44B7-BDBC-C600977ECD7C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.116:*:*:*:*:*:*:*", "cpeNameId": "7A6E8D0B-1EF6-4080-A3AD-45CD2B6C35AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.117:*:*:*:*:*:*:*", "cpeNameId": "AD8652AE-1F37-43B4-BC34-39F852FD3301"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.119:*:*:*:*:*:*:*", "cpeNameId": "3E564E16-38CA-428F-98CC-5F14B13A30CB"}]}} \ No newline at end of file diff --git a/cpematch/69/69A85312-CCB2-4931-B314-E2653E54C4C6.json b/cpematch/69/69A85312-CCB2-4931-B314-E2653E54C4C6.json index 3cb26854c07..e57398f3c04 100644 --- a/cpematch/69/69A85312-CCB2-4931-B314-E2653E54C4C6.json +++ b/cpematch/69/69A85312-CCB2-4931-B314-E2653E54C4C6.json @@ -1 +1 @@ -{"matchString": {"matchCriteriaId": "69A85312-CCB2-4931-B314-E2653E54C4C6", "criteria": "cpe:2.3:a:wpmet:elementskit:*:*:*:*:pro:wordpress:*:*", "versionEndExcluding": "3.6.6", "lastModified": "2025-01-07T22:02:37.997", "cpeLastModified": "2025-01-07T22:02:37.997", "created": "2025-01-07T22:02:37.997", "status": "Active", "matches": [{"cpeName": "cpe:2.3:a:wpmet:elementskit:-:*:*:*:pro:wordpress:*:*", "cpeNameId": "5AC5DDCD-C5E4-46B6-9D50-97C74EAB4437"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit:3.6.3:*:*:*:pro:wordpress:*:*", "cpeNameId": "B1FDB478-EB3E-40A9-BF30-A40067126E83"}]}} \ No newline at end of file +{"matchString": {"matchCriteriaId": "69A85312-CCB2-4931-B314-E2653E54C4C6", "criteria": "cpe:2.3:a:wpmet:elementskit:*:*:*:*:pro:wordpress:*:*", "versionEndExcluding": "3.6.6", "lastModified": "2025-01-09T18:48:35.567", "cpeLastModified": "2025-01-09T18:48:35.567", "created": "2025-01-07T22:02:37.997", "status": "Active", "matches": [{"cpeName": "cpe:2.3:a:wpmet:elementskit:-:*:*:*:pro:wordpress:*:*", "cpeNameId": "5AC5DDCD-C5E4-46B6-9D50-97C74EAB4437"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit:2.3.6:*:*:*:pro:wordpress:*:*", "cpeNameId": "54B1AB4B-A68B-4330-93B7-9C7908D85D72"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit:2.6.4:*:*:*:pro:wordpress:*:*", "cpeNameId": "4C582DB4-CECC-46EF-9409-201DBA60724D"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit:3.6.0:*:*:*:pro:wordpress:*:*", "cpeNameId": "F4C1F0C2-BB36-44E2-828B-6CBD2BF6CCB3"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit:3.6.1:*:*:*:pro:wordpress:*:*", "cpeNameId": "0BF9B631-428E-4347-B9FB-31D64A00EFE8"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit:3.6.2:*:*:*:pro:wordpress:*:*", "cpeNameId": "6A077D6D-F089-4555-9EAB-93F2592339B6"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit:3.6.3:*:*:*:pro:wordpress:*:*", "cpeNameId": "B1FDB478-EB3E-40A9-BF30-A40067126E83"}, {"cpeName": "cpe:2.3:a:wpmet:elementskit:3.6.5:*:*:*:pro:wordpress:*:*", "cpeNameId": "D8A4070A-6854-4C5B-AB84-CE8B4F57ADB8"}]}} \ No newline at end of file diff --git a/cpematch/74/74BA9823-CCED-4B24-815D-B82543954BF8.json b/cpematch/74/74BA9823-CCED-4B24-815D-B82543954BF8.json new file mode 100644 index 00000000000..cb7940c4573 --- /dev/null +++ b/cpematch/74/74BA9823-CCED-4B24-815D-B82543954BF8.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "74BA9823-CCED-4B24-815D-B82543954BF8", "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.2", "versionEndExcluding": "6.6.68", "lastModified": "2025-01-09T18:08:42.600", "cpeLastModified": "2025-01-09T18:08:42.600", "created": "2025-01-09T18:08:42.600", "status": "Active", "matches": [{"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2:-:*:*:*:*:*:*", "cpeNameId": "1169272C-BBEA-40DB-8272-4C826E9538C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*", "cpeNameId": "E28CC08F-A8C8-41F0-8B9B-69F577BA01E9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*", "cpeNameId": "1DF6965C-CF25-4833-AD19-5B4BBF4DA32E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*", "cpeNameId": "BEC899D6-049D-46DE-8B6C-36CB5ED02548"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:*", "cpeNameId": "C4A2FA72-6D42-476C-94B2-04713E760B6B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2:rc5:*:*:*:*:*:*", "cpeNameId": "6678F684-9CC5-4D18-B4E7-E627DAF11BF7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2:rc6:*:*:*:*:*:*", "cpeNameId": "BD104CC4-9CB1-4B5B-9FB2-AEAD085AE628"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2:rc7:*:*:*:*:*:*", "cpeNameId": "C0837C65-003D-4D18-8137-00585ED37DED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2:rc8:*:*:*:*:*:*", "cpeNameId": "7CE3A56A-19AE-4E88-AECB-316BEC1D5EB6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.0:rc1:*:*:*:*:*:*", "cpeNameId": "D6F8058D-EF1A-4187-9F6F-BB09A4C41F38"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.0:rc2:*:*:*:*:*:*", "cpeNameId": "0ACB4ECF-5031-4BFE-A7B7-97AE471871B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.0:rc3:*:*:*:*:*:*", "cpeNameId": "C7F43C6B-8673-4121-90DF-B578F2801110"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.0:rc4:*:*:*:*:*:*", "cpeNameId": "863A0838-669D-40BB-8DDF-F1A1D221EB7F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.0:rc5:*:*:*:*:*:*", "cpeNameId": "B7353B5E-C483-49FD-9503-328684843B80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.0:rc6:*:*:*:*:*:*", "cpeNameId": "156908BB-9B9E-4D10-9959-C22F247BB6FA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.1:*:*:*:*:*:*:*", "cpeNameId": "FE2BEA06-F67E-42CF-A481-1D83978BCA2A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.2:*:*:*:*:*:*:*", "cpeNameId": "8103109C-71B8-476F-997B-8DEB06AAEBF0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.3:*:*:*:*:*:*:*", "cpeNameId": "89EE49CF-2690-4316-947B-2695CBA50E00"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.4:*:*:*:*:*:*:*", "cpeNameId": "05A86547-7B27-4CAA-A1AA-F4EA197E3BD7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.5:*:*:*:*:*:*:*", "cpeNameId": "26AE4D28-D6A5-478F-A529-26B739E7054E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.6:*:*:*:*:*:*:*", "cpeNameId": "63DDA132-5AB2-4CFF-ACC6-F5FF2AB1400E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.7:*:*:*:*:*:*:*", "cpeNameId": "034CD058-5816-44A5-B13B-9F5A48180FAA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.8:*:*:*:*:*:*:*", "cpeNameId": "892DA63F-D86B-4FD6-9F27-8CFA173AEC59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.9:*:*:*:*:*:*:*", "cpeNameId": "99A70DD2-9396-4181-9A5E-15AA0223E5F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.10:*:*:*:*:*:*:*", "cpeNameId": "CD10F4E6-970E-4F86-94E1-A1EE17C66398"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.11:*:*:*:*:*:*:*", "cpeNameId": "CBC39BBD-7F8B-412E-B28B-4D03844979D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.12:*:*:*:*:*:*:*", "cpeNameId": "061399AB-7B17-401E-AA9B-D270E78A8C57"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.13:*:*:*:*:*:*:*", "cpeNameId": "C7F53FB8-5F99-4273-9AB5-FDD44CA6BB23"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.14:*:*:*:*:*:*:*", "cpeNameId": "D8B5CAAA-4076-47D1-9A3B-4C1D9E388180"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.15:*:*:*:*:*:*:*", "cpeNameId": "E1131D22-1ECE-498E-8C7B-C02B290319C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.2.16:*:*:*:*:*:*:*", "cpeNameId": "04EBA43D-8EFD-4838-918B-D40D2E686017"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3:-:*:*:*:*:*:*", "cpeNameId": "79E5017F-BBF4-44EE-8DE8-FFC33C7AF117"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3:rc1:*:*:*:*:*:*", "cpeNameId": "EAABF30A-689E-4D86-B06B-C5CDB63C100A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3:rc2:*:*:*:*:*:*", "cpeNameId": "BDEBBF51-457F-45BC-B4C0-0AB1C79ACBD9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3:rc3:*:*:*:*:*:*", "cpeNameId": "300AD1DF-157D-41D0-8A19-9D3CDD69C90A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3:rc4:*:*:*:*:*:*", "cpeNameId": "5F0278A8-AD9F-4517-892D-C2293A937C13"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3:rc5:*:*:*:*:*:*", "cpeNameId": "486C9057-BD07-4562-B17D-254BA2FD18B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3:rc6:*:*:*:*:*:*", "cpeNameId": "78072C23-298C-4933-A691-21F9AFD028AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3:rc7:*:*:*:*:*:*", "cpeNameId": "A332478B-A181-40C6-8321-46A03D0A9A59"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3.1:*:*:*:*:*:*:*", "cpeNameId": "C5A262C5-03ED-4EB3-8EC4-C8D81E0A31F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3.2:*:*:*:*:*:*:*", "cpeNameId": "6935C9B1-1E01-4913-97DB-CF683C30B649"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3.3:*:*:*:*:*:*:*", "cpeNameId": "18D65783-E19A-462F-970F-3F360A4465EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3.4:*:*:*:*:*:*:*", "cpeNameId": "78C4FA4D-3C32-4D8F-9BE7-80AEA8DA132A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3.5:*:*:*:*:*:*:*", "cpeNameId": "EA8A0152-C071-47C4-8042-CC77521AEF69"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3.6:*:*:*:*:*:*:*", "cpeNameId": "91A4F87E-2342-4D2D-AC6D-E23B97C50EF3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3.7:*:*:*:*:*:*:*", "cpeNameId": "894CE6B3-3E3B-42B0-AE9E-FF50C5032AB3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3.8:*:*:*:*:*:*:*", "cpeNameId": "0C38DD95-E6DD-4170-BC9E-9F2F9606F243"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3.9:*:*:*:*:*:*:*", "cpeNameId": "D8886E14-BEA8-4F0C-BE81-4E79339738B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3.10:*:*:*:*:*:*:*", "cpeNameId": "6AFB3CC1-17BE-4B78-AAED-C878A9673470"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3.11:*:*:*:*:*:*:*", "cpeNameId": "EB35199C-7694-48CF-A3CE-071E82332BAB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3.12:*:*:*:*:*:*:*", "cpeNameId": "1FA512A5-D8D8-4BC8-AF03-A58047FF2D68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.3.13:*:*:*:*:*:*:*", "cpeNameId": "AD5FCDFC-541B-4AC0-8CAE-629B9AB94DC9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4:-:*:*:*:*:*:*", "cpeNameId": "83E5A912-AAD8-4A94-81B2-2F6A24C8A489"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4:rc1:*:*:*:*:*:*", "cpeNameId": "DDA10D69-67F7-4B1D-93D7-8A5A748F6C25"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4:rc2:*:*:*:*:*:*", "cpeNameId": "FAFD5368-C833-4E9F-BAC2-5E67C1AED0ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4:rc3:*:*:*:*:*:*", "cpeNameId": "148F01E8-5A2E-47F8-AE25-222332BE2986"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4:rc4:*:*:*:*:*:*", "cpeNameId": "3E235E1B-7DBF-44DA-9A0A-82BB378B653D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4:rc5:*:*:*:*:*:*", "cpeNameId": "6757F97B-0CC1-478F-8E6C-1FA9FAC72A2E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4:rc6:*:*:*:*:*:*", "cpeNameId": "97B13CDD-F0A4-417D-9A03-66A2BDAB2A82"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4:rc7:*:*:*:*:*:*", "cpeNameId": "4F70C4E8-FD1F-4A92-8276-F9F9B90B931C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4.1:*:*:*:*:*:*:*", "cpeNameId": "2C06EC90-C0BF-4257-9461-C8B7F1A1C5FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4.2:*:*:*:*:*:*:*", "cpeNameId": "B5E39239-6F72-4D53-8F3A-3CDA2CFE3E93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4.3:*:*:*:*:*:*:*", "cpeNameId": "E6FC4FB9-573F-460D-B1F4-A7E82B585BB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4.4:*:*:*:*:*:*:*", "cpeNameId": "A2EC927F-1A3D-41C6-9C2D-7E9DD889ED8C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4.5:*:*:*:*:*:*:*", "cpeNameId": "02BAFBF5-CFA3-4B7E-96DE-EE60A14A7EA9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4.6:*:*:*:*:*:*:*", "cpeNameId": "6B4D7500-521D-4CA0-81BF-C6368A783680"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4.7:*:*:*:*:*:*:*", "cpeNameId": "8B8D8A31-718F-4596-832B-AF86EFD69D6F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4.8:*:*:*:*:*:*:*", "cpeNameId": "9DF078C6-FF6D-451B-88CA-E7D232BF2B3E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4.9:*:*:*:*:*:*:*", "cpeNameId": "914EC41A-CBDF-4B71-87B4-10796413AC3B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4.10:*:*:*:*:*:*:*", "cpeNameId": "D6B14513-F9B4-4ACD-94C5-625584EC5BD9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4.11:*:*:*:*:*:*:*", "cpeNameId": "28D6D5D5-F0DB-4DDC-8880-C567D47960BE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4.12:*:*:*:*:*:*:*", "cpeNameId": "B8EC6DB8-00AB-46C6-A2BA-A62875AC4529"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4.13:*:*:*:*:*:*:*", "cpeNameId": "9939B28C-8EA8-4A51-8123-F791EE3D70CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4.14:*:*:*:*:*:*:*", "cpeNameId": "AF0DDB66-698D-4A9C-A8B1-101F4943FA68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4.15:*:*:*:*:*:*:*", "cpeNameId": "3B38029B-C4AC-4B15-9F57-965526DB0B36"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.4.16:*:*:*:*:*:*:*", "cpeNameId": "C621AB7B-4708-48E7-A4E7-FF1BF38F33B2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5:-:*:*:*:*:*:*", "cpeNameId": "A80D8003-A1D9-4697-ACF3-C8C4B2CD471C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5:rc1:*:*:*:*:*:*", "cpeNameId": "E438D075-507D-41C0-B200-DC993357C174"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5:rc2:*:*:*:*:*:*", "cpeNameId": "AD292E24-AC9C-4864-B5EA-D4E619ABCA86"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5:rc3:*:*:*:*:*:*", "cpeNameId": "4F4EEA10-D4DB-48BE-A98B-AAEBD81956CC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5:rc4:*:*:*:*:*:*", "cpeNameId": "9D094BF9-E278-4685-ACD0-2119D9B7BBEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5:rc5:*:*:*:*:*:*", "cpeNameId": "D18AC1AA-3ADC-4E7F-B950-5B2CD32872C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5:rc6:*:*:*:*:*:*", "cpeNameId": "EA059EE3-FF5E-48F5-A146-491C388DD4A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5:rc7:*:*:*:*:*:*", "cpeNameId": "CFE2ACA0-C823-4A12-9BBC-A9C1144A6AFB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5.1:*:*:*:*:*:*:*", "cpeNameId": "9CC9F182-6A2B-4824-A26F-14A3C1AD7FD8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5.2:*:*:*:*:*:*:*", "cpeNameId": "8A6A2735-55B4-4BA0-A015-A6DEBC7843F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5.3:*:*:*:*:*:*:*", "cpeNameId": "E36EF007-BFCF-4FC9-A9CB-F474D1DE7A07"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5.4:*:*:*:*:*:*:*", "cpeNameId": "F3A9CAE5-207A-4E22-92D7-56057FCAF9EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5.5:*:*:*:*:*:*:*", "cpeNameId": "5532494F-EB3F-47CC-B858-8E4C7D0DCB9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5.6:*:*:*:*:*:*:*", "cpeNameId": "DC8A24AA-ADF4-4798-95BA-65EC0F1C6ED4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5.7:*:*:*:*:*:*:*", "cpeNameId": "303897F0-7D96-4723-B25B-1F8ED64ABE30"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5.8:*:*:*:*:*:*:*", "cpeNameId": "31C57602-5FE8-4C44-9C34-4BF2D0774DE5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5.9:*:*:*:*:*:*:*", "cpeNameId": "28E565A4-925E-4F42-9E6E-318B8ED7BF61"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5.10:*:*:*:*:*:*:*", "cpeNameId": "1FA9CD76-EF11-45B9-A943-04276B376848"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5.11:*:*:*:*:*:*:*", "cpeNameId": "E1891F07-83C7-4766-8D81-77635FB8B270"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5.12:*:*:*:*:*:*:*", "cpeNameId": "C4028EC2-F3E6-4FDD-8E12-DC6BE4EC7237"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.5.13:*:*:*:*:*:*:*", "cpeNameId": "FCB352EC-6DE9-43B5-9BE1-BA336462C79A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6:-:*:*:*:*:*:*", "cpeNameId": "7708857B-B652-435E-8214-CFB2F756F7C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:*", "cpeNameId": "708B88D8-2A55-4C45-868F-D8F66C47D15E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:*", "cpeNameId": "C48DE5D1-CDF2-4A3C-8016-4794413F9BD8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6:rc3:*:*:*:*:*:*", "cpeNameId": "B895E9CB-0F9E-4B4E-BEA5-D5DBFA4FA317"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6:rc4:*:*:*:*:*:*", "cpeNameId": "25FB4811-BC5B-4066-B45D-015C8DF6AAA3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6:rc5:*:*:*:*:*:*", "cpeNameId": "667A7812-875A-4C8F-81B7-27257319E42C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6:rc6:*:*:*:*:*:*", "cpeNameId": "CF63FB11-7713-4C59-AD54-E1DEF5D3DF5A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6:rc7:*:*:*:*:*:*", "cpeNameId": "494210A9-8E24-4DAB-A9F3-B51B4EBC2EA9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.1:*:*:*:*:*:*:*", "cpeNameId": "48D20EB8-21AA-4DB7-9703-2953612A9A8F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.2:*:*:*:*:*:*:*", "cpeNameId": "493589E0-42C6-4184-9A22-D667EF8F7668"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.3:*:*:*:*:*:*:*", "cpeNameId": "DD99FA9C-5522-4516-A845-AD0347B8C111"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.4:*:*:*:*:*:*:*", "cpeNameId": "4B05FC17-F00C-431F-AF57-6898726E08ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.5:*:*:*:*:*:*:*", "cpeNameId": "6177881A-975B-474F-9C64-3821DB5E97ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.6:*:*:*:*:*:*:*", "cpeNameId": "DA74BBF4-9E69-468F-BCBA-BD85810A9DAC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.7:*:*:*:*:*:*:*", "cpeNameId": "57F39A24-CA69-43C4-91F8-846185741DED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.8:*:*:*:*:*:*:*", "cpeNameId": "D4C594C7-7CCE-4CE4-B587-71B1F90C64F4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.9:*:*:*:*:*:*:*", "cpeNameId": "3DB8BB56-8CED-4F06-8893-2B58D4DEF032"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.10:*:*:*:*:*:*:*", "cpeNameId": "737B1EE7-5BFA-4030-A1CD-3C04FD1B70BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.11:*:*:*:*:*:*:*", "cpeNameId": "909CFBD2-FFCD-4A6D-893F-0F64AFDD1E63"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.12:*:*:*:*:*:*:*", "cpeNameId": "213EDC79-F5D2-4D52-B5C6-83A21C781924"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.13:*:*:*:*:*:*:*", "cpeNameId": "36A0032F-6075-4595-BEA3-C8FD8FD82D51"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.14:*:*:*:*:*:*:*", "cpeNameId": "B2D98F70-DC33-4434-A9B9-F634DB261166"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.15:*:*:*:*:*:*:*", "cpeNameId": "321D7187-47FD-4AC9-8402-50C55A769462"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.16:*:*:*:*:*:*:*", "cpeNameId": "02B3F009-31A0-4E53-8A89-D2851F60161D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.17:*:*:*:*:*:*:*", "cpeNameId": "7964199C-934F-4EFC-8E10-769866A1CEF4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.18:*:*:*:*:*:*:*", "cpeNameId": "662DDE22-7180-40FE-AF01-F1D279B03479"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.19:*:*:*:*:*:*:*", "cpeNameId": "9EC8C911-B236-4DBC-AA91-7C5575FEA941"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.20:*:*:*:*:*:*:*", "cpeNameId": "E176BD49-D984-4DFD-BF94-B377343221D6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.21:*:*:*:*:*:*:*", "cpeNameId": "16CA36A1-B086-40E0-B626-A0041AD2B1B8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.22:*:*:*:*:*:*:*", "cpeNameId": "A0E240F0-1310-42EE-AED3-C127C92205E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.23:*:*:*:*:*:*:*", "cpeNameId": "A54F204C-8C1A-4FC4-9A38-B5D06F1663FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.24:*:*:*:*:*:*:*", "cpeNameId": "B5EF8483-CD4B-4B16-BBA4-BA817EC0A5E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.25:*:*:*:*:*:*:*", "cpeNameId": "38DE4FA7-E5C9-492F-889B-AC68708B13AA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.26:*:*:*:*:*:*:*", "cpeNameId": "86B955E4-8792-4840-A49E-23F1AD342821"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.27:*:*:*:*:*:*:*", "cpeNameId": "B0A9F8BB-3A53-4E29-BD15-361010510D10"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.28:*:*:*:*:*:*:*", "cpeNameId": "958125CC-ED54-4956-926D-6D42F6EED1E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.29:*:*:*:*:*:*:*", "cpeNameId": "EFDBB2F8-FA58-4E00-98F6-8885EE1E41D7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.30:*:*:*:*:*:*:*", "cpeNameId": "7F77386F-180B-4457-9655-FD2A67C4F65A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.31:*:*:*:*:*:*:*", "cpeNameId": "EB7F70B9-E173-40F8-B4F0-B8D8DC3913FA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.32:*:*:*:*:*:*:*", "cpeNameId": "7243F9D6-586E-4EEC-8B9E-A249EFB7B4D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.33:*:*:*:*:*:*:*", "cpeNameId": "E3D20161-DD78-402C-BD1D-02769B6A6C5F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.34:*:*:*:*:*:*:*", "cpeNameId": "AD267688-519F-4863-9379-8CB50DD27AE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.35:*:*:*:*:*:*:*", "cpeNameId": "1E4CA740-CB8A-4FB5-99CB-DA8DCF35DA02"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.36:*:*:*:*:*:*:*", "cpeNameId": "96AA1D16-A016-43DB-B0AB-FED45308D249"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.37:*:*:*:*:*:*:*", "cpeNameId": "D0A60FC5-E516-4560-B201-E9E7A3723645"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.38:*:*:*:*:*:*:*", "cpeNameId": "48C3A765-D278-4115-A7F8-0EAFE267BE54"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.39:*:*:*:*:*:*:*", "cpeNameId": "0F797385-0498-4377-B7F8-80FD439BFE3B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.40:*:*:*:*:*:*:*", "cpeNameId": "3F5097D6-6C8D-42A1-960B-CBA03E28B27F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.41:*:*:*:*:*:*:*", "cpeNameId": "C1AFD87A-72AE-4D46-B1F0-564094D3642F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.42:*:*:*:*:*:*:*", "cpeNameId": "6350E59C-B75C-4804-BD07-97CD611B7987"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.43:*:*:*:*:*:*:*", "cpeNameId": "542B2E1A-138C-4763-AAA6-0BFB5684CEF7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.44:*:*:*:*:*:*:*", "cpeNameId": "E250C350-641F-43DD-AEB4-1C946615157A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.45:*:*:*:*:*:*:*", "cpeNameId": "9CC34563-2759-4871-A4D2-C61DE8DA4E57"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.46:*:*:*:*:*:*:*", "cpeNameId": "A70F492D-EF48-4858-A873-B94D01C0A62A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.47:*:*:*:*:*:*:*", "cpeNameId": "06C4E559-4CE8-4E08-B443-7C305DEDA9E5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.48:*:*:*:*:*:*:*", "cpeNameId": "E482A830-7B81-4A42-A6B1-6F2E1F4D8173"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.49:*:*:*:*:*:*:*", "cpeNameId": "F9494DAB-1EA4-418D-B5C2-DBEBBD1564D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.50:*:*:*:*:*:*:*", "cpeNameId": "8A295CA4-B6C5-42E8-A119-ECF4416B4507"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.51:*:*:*:*:*:*:*", "cpeNameId": "57406E52-F157-4374-9FE6-3A974C64A5FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.52:*:*:*:*:*:*:*", "cpeNameId": "9BEB7881-4A89-41D9-919D-B462CBCA99F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.53:*:*:*:*:*:*:*", "cpeNameId": "CD60A649-DC43-4858-98E4-A9A84DAE254A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.54:*:*:*:*:*:*:*", "cpeNameId": "F719B1E7-9582-448B-9268-F1C4ABCB747E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.55:*:*:*:*:*:*:*", "cpeNameId": "98069CAA-0B81-48B1-9361-8646021ABCCF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.56:*:*:*:*:*:*:*", "cpeNameId": "7D55FD8F-1397-412E-ABBF-7CFF1D535DE5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.57:*:*:*:*:*:*:*", "cpeNameId": "F2412ACF-AD3C-4825-A861-BC86CB5773A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.58:*:*:*:*:*:*:*", "cpeNameId": "90298D18-9EA2-48D1-B8E5-A415753CD736"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.59:*:*:*:*:*:*:*", "cpeNameId": "B0A40B08-F604-4023-8546-70B000B581FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.60:*:*:*:*:*:*:*", "cpeNameId": "BA797BFD-CCD6-4D99-A0FE-EE8DBA7E10E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.61:*:*:*:*:*:*:*", "cpeNameId": "3098341D-1ACE-44C5-B68D-738D2F0755AF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.62:*:*:*:*:*:*:*", "cpeNameId": "8D335F96-0F12-49EB-9D54-4424F810B356"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.63:*:*:*:*:*:*:*", "cpeNameId": "D8EEFA5B-7B50-42BA-8337-E071DB25937D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.64:*:*:*:*:*:*:*", "cpeNameId": "51581C6F-56FC-46E5-AE9D-E414765DD203"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.66:*:*:*:*:*:*:*", "cpeNameId": "6F7D9B3C-6DBC-4FBB-977F-FC19E881B352"}]}} \ No newline at end of file diff --git a/cpematch/9B/9BA275D4-DEB9-4C8F-A871-6626A8FD5BF6.json b/cpematch/9B/9BA275D4-DEB9-4C8F-A871-6626A8FD5BF6.json new file mode 100644 index 00000000000..17ad254b79e --- /dev/null +++ b/cpematch/9B/9BA275D4-DEB9-4C8F-A871-6626A8FD5BF6.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "9BA275D4-DEB9-4C8F-A871-6626A8FD5BF6", "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.5", "versionEndExcluding": "6.1.122", "lastModified": "2025-01-09T19:14:36.423", "cpeLastModified": "2025-01-09T19:14:36.423", "created": "2025-01-09T19:14:36.423", "status": "Active", "matches": [{"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5:*:*:*:*:*:*:*", "cpeNameId": "49DBB1C3-9AEF-4EC4-B62D-7D36F14EDFD9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5:-:*:*:*:*:*:*", "cpeNameId": "1F518EBF-1562-4E27-97CD-A3D668C77A8C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5:rc1:*:*:*:*:*:*", "cpeNameId": "5F85EA91-CF9D-413C-B2F0-C0DC16BF7928"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5:rc2:*:*:*:*:*:*", "cpeNameId": "B9A5A534-B718-4FFF-A889-D8A6EF731364"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5:rc3:*:*:*:*:*:*", "cpeNameId": "66795BCD-62BE-4EB7-B4C3-518EFDE1141E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5:rc4:*:*:*:*:*:*", "cpeNameId": "721CD8C6-1746-4BCA-B717-602990CE7D91"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5:rc5:*:*:*:*:*:*", "cpeNameId": "D4DCAF09-9CDF-4447-9167-4E76E661FBFA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5:rc6:*:*:*:*:*:*", "cpeNameId": "A393E2BB-4C21-483A-BD5E-5A4D6C03F2C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.0:*:*:*:*:*:*:*", "cpeNameId": "A2498E9A-09C4-421D-8C35-B607F76CA6D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.1:*:*:*:*:*:*:*", "cpeNameId": "F5C09E99-2653-42DE-8190-FF0FB4C94259"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.2:*:*:*:*:*:*:*", "cpeNameId": "0ED9D07A-5B08-4143-A891-7918475D27BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.3:*:*:*:*:*:*:*", "cpeNameId": "F033B4EC-A735-4E10-95EE-2AC9D67081EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.4:*:*:*:*:*:*:*", "cpeNameId": "9503CF12-7383-44DB-A50D-059A08956EC1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.5:*:*:*:*:*:*:*", "cpeNameId": "12D41A14-FC96-4874-B278-E57CFFCCC35F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.6:*:*:*:*:*:*:*", "cpeNameId": "733139E7-4729-4263-9BE9-4602D18C0307"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.7:*:*:*:*:*:*:*", "cpeNameId": "99D531E7-1606-42D1-AC48-03A258311B52"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.8:*:*:*:*:*:*:*", "cpeNameId": "DD45ED79-46BC-4D9E-BF13-2BCE447AB6AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.9:*:*:*:*:*:*:*", "cpeNameId": "EB76FD18-B13F-4423-B1AE-4D87EDCA59A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.10:*:*:*:*:*:*:*", "cpeNameId": "2D1E5A60-CACD-4B64-9771-8F27ECADF991"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.11:*:*:*:*:*:*:*", "cpeNameId": "D09F9D38-9B1B-40F3-89E6-C467A9247974"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.12:*:*:*:*:*:*:*", "cpeNameId": "0AFA53D6-C904-4260-A566-048D0DF14FE4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.13:*:*:*:*:*:*:*", "cpeNameId": "E3DD3225-582E-4CF7-9DEC-D58918ED5701"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.14:*:*:*:*:*:*:*", "cpeNameId": "6AA45C4C-C46A-4205-BE20-43DE712696D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.15:*:*:*:*:*:*:*", "cpeNameId": "01C8594F-1A7A-40E5-B6C3-F75CCFD1B7C9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.16:*:*:*:*:*:*:*", "cpeNameId": "32BF3DF9-BAC9-43EE-BA2B-BC53A137F299"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.17:*:*:*:*:*:*:*", "cpeNameId": "A6E18AD7-4B98-4E98-9C64-DF1A80536DCF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.18:*:*:*:*:*:*:*", "cpeNameId": "0E98522F-394C-4301-A85B-5E482CD4F4C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.5.19:*:*:*:*:*:*:*", "cpeNameId": "2A985199-F75F-4599-A95E-0AF97592DF71"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6:*:*:*:*:*:*:*", "cpeNameId": "D0B85891-4974-4AB3-834C-EC49CAAC82B8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6:-:*:*:*:*:*:*", "cpeNameId": "5174E1A3-A838-45BA-B4FA-AADFDF875FFC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6:rc1:*:*:*:*:*:*", "cpeNameId": "01524D2C-7501-4EC9-A0C3-A8F8B7D28FCF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6:rc2:*:*:*:*:*:*", "cpeNameId": "C6C932B1-DC39-43AD-A810-6F6BE4DC628C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6:rc3:*:*:*:*:*:*", "cpeNameId": "5AC13E72-7329-411C-8E43-AE91350E1984"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6:rc4:*:*:*:*:*:*", "cpeNameId": "E13CE8E0-4117-4CD6-B6DB-E9D85428FF27"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6:rc5:*:*:*:*:*:*", "cpeNameId": "F6F494A6-4576-4C86-AB89-78ABB06F8591"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.1:*:*:*:*:*:*:*", "cpeNameId": "7316EA10-E698-4056-9A73-CAEF10EF0D72"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.2:*:*:*:*:*:*:*", "cpeNameId": "F38E533D-F9F5-4B99-A2DF-23EE93C6716E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.3:*:*:*:*:*:*:*", "cpeNameId": "57E0290A-7943-4D3C-91E1-57110F6D698F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.4:*:*:*:*:*:*:*", "cpeNameId": "ABCD688B-6347-40A3-B19B-8D06DFA5A811"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.5:*:*:*:*:*:*:*", "cpeNameId": "05E67E62-01D6-4CAA-9BD2-5434427AD908"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.6:*:*:*:*:*:*:*", "cpeNameId": "AA5B4529-484F-4DB2-9ECF-181DDC0B2B86"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.7:*:*:*:*:*:*:*", "cpeNameId": "B2939052-3458-4C45-9A39-A1A835D29A02"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.7-1:*:*:*:*:*:*:*", "cpeNameId": "CDA63823-0948-48CE-9C3E-772A3FAF8386"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.8:*:*:*:*:*:*:*", "cpeNameId": "EC18E58B-1BFA-4C37-A35D-C17EBD6EE988"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.9:*:*:*:*:*:*:*", "cpeNameId": "BAD41340-BC92-4275-AAE6-6CD24B17CBA0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.10:*:*:*:*:*:*:*", "cpeNameId": "45C947BE-C438-4231-A0C2-28DA89A6C6B8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.11:*:*:*:*:*:*:*", "cpeNameId": "D285AD12-A45A-4F70-B4E2-29D2BDCABD83"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.12:*:*:*:*:*:*:*", "cpeNameId": "49E0F195-1D05-48F7-8E36-EACE60F54D21"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.13:*:*:*:*:*:*:*", "cpeNameId": "EAFD2DCB-733B-4E34-A1E5-9EC194692E96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.14:*:*:*:*:*:*:*", "cpeNameId": "228F9C86-B2C4-49E8-8171-FAE5C314C21A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.15:*:*:*:*:*:*:*", "cpeNameId": "4BF5012C-B142-489D-9B66-3FDFE7BB0686"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.16:*:*:*:*:*:*:*", "cpeNameId": "E46B8C4B-152A-4072-8544-3EF2CC90BC5C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.17:*:*:*:*:*:*:*", "cpeNameId": "16831F51-025C-481A-BB1B-F5A74E68D195"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.18:*:*:*:*:*:*:*", "cpeNameId": "6AFCEAAB-98C1-4E23-92CC-41C3103CED87"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.6.19:*:*:*:*:*:*:*", "cpeNameId": "D95E3BC5-BF59-4243-ADAA-4A70FEAB0042"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7:*:*:*:*:*:*:*", "cpeNameId": "D513E95A-293B-43E6-BB81-E30994D64488"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7:-:*:*:*:*:*:*", "cpeNameId": "EB1BB502-B09E-49F0-A7D2-A270EB7B6702"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7:rc1:*:*:*:*:*:*", "cpeNameId": "DAED72C2-F722-4E03-94CF-5CFC54AB3375"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7:rc2:*:*:*:*:*:*", "cpeNameId": "95928159-FAD7-4535-98AC-9BB8DE1BA8C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7:rc3:*:*:*:*:*:*", "cpeNameId": "BA4208E6-4ECB-4CC4-872B-9CCE02BCAE88"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7:rc4:*:*:*:*:*:*", "cpeNameId": "2203FB54-7292-4E7D-8AC5-AFF97AA62CB9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7:rc5:*:*:*:*:*:*", "cpeNameId": "F1565C19-81C0-4A57-840B-9A43914D232C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7:rc6:*:*:*:*:*:*", "cpeNameId": "F482AFCB-1119-4612-A3B3-6DCEA83454DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7:rc7:*:*:*:*:*:*", "cpeNameId": "0D9F6240-7FAF-46FE-93B6-5FDAF8026BB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.0:*:*:*:*:*:*:*", "cpeNameId": "7B2127FA-A707-4697-AD6B-CD155779E65D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.1:*:*:*:*:*:*:*", "cpeNameId": "1C140291-35F7-4777-9E23-B7CFD8361171"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.2:*:*:*:*:*:*:*", "cpeNameId": "B6DB2ACF-7055-4752-A880-931ECB34B58D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.3:*:*:*:*:*:*:*", "cpeNameId": "FFB09BE7-096E-4492-99AA-DB5504F4658B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.4:*:*:*:*:*:*:*", "cpeNameId": "1F1130BB-5BB2-48B5-849B-D111B75333D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.5:*:*:*:*:*:*:*", "cpeNameId": "A7DB133D-DDE7-4AE2-82AE-498E752AEA34"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.6:*:*:*:*:*:*:*", "cpeNameId": "92E0341D-5A2D-4CEA-A178-F8F3653CAA73"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.7:*:*:*:*:*:*:*", "cpeNameId": "63B4BA4D-2ED3-4979-AFB4-2317C7E3A1F4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.8:*:*:*:*:*:*:*", "cpeNameId": "1978F055-6B35-4431-A0FF-932F67E3E3AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.9:*:*:*:*:*:*:*", "cpeNameId": "F21A00EF-24CC-4632-90E7-67057A458DD9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.10:*:*:*:*:*:*:*", "cpeNameId": "D7F5F840-3660-45B8-A3C7-CB2AC7B95F6E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.11:*:*:*:*:*:*:*", "cpeNameId": "8E9708FA-F771-4BCB-AEC0-11556349160A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.12:*:*:*:*:*:*:*", "cpeNameId": "2A7711FD-E383-4D01-943D-9BAC425548D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.13:*:*:*:*:*:*:*", "cpeNameId": "6FB98443-3298-46FF-9819-3656A0E0A48D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.14:*:*:*:*:*:*:*", "cpeNameId": "05C7E01F-6097-4979-9807-A0ADE319D01F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.15:*:*:*:*:*:*:*", "cpeNameId": "8979AEB4-CADB-43E8-B3CE-C95CFEBF23EE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.16:*:*:*:*:*:*:*", "cpeNameId": "3DAB3E83-7F34-46E3-B14C-37C895CBE274"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.17:*:*:*:*:*:*:*", "cpeNameId": "8B4BF440-12E0-416D-8CAF-C07D04F07C2A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.18:*:*:*:*:*:*:*", "cpeNameId": "0D1B13B2-39EF-4E53-87CE-763DBA03DA05"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.7.19:*:*:*:*:*:*:*", "cpeNameId": "8CFCB3C4-4D44-4C18-BFCC-AD5FE0C06B4B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8:*:*:*:*:*:*:*", "cpeNameId": "07476EA3-FFDE-4B8C-912C-23138078B5EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8:-:*:*:*:*:*:*", "cpeNameId": "5178891D-6B7B-4263-879E-E69653C4D719"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8:rc1:*:*:*:*:*:*", "cpeNameId": "4BBEF5DE-A47A-4676-B324-008ABEC06865"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8:rc2:*:*:*:*:*:*", "cpeNameId": "3238D662-CCC8-4AB2-8157-A26CCE26D2D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8:rc3:*:*:*:*:*:*", "cpeNameId": "782D5463-6D0E-4C21-B4BA-5E91F105D4F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8:rc4:*:*:*:*:*:*", "cpeNameId": "C35E4C5D-1E1D-466F-A67C-2FC1F25CB430"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8:rc5:*:*:*:*:*:*", "cpeNameId": "83AAD5D5-4B05-4B36-9CE2-8200C3C961C5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8:rc6:*:*:*:*:*:*", "cpeNameId": "0E7ED941-6C90-4C40-8DB3-5E1B1B277E72"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.0:-:*:*:*:*:*:*", "cpeNameId": "5CF73E72-A891-4A42-9B0F-C7C9A5B8C8A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.0:rc1:*:*:*:*:*:*", "cpeNameId": "3A738E69-098D-4FCF-B7BD-4029B795DA7B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.0:rc2:*:*:*:*:*:*", "cpeNameId": "65ED0818-2628-4C3E-9153-7964EBEBE623"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.0:rc3:*:*:*:*:*:*", "cpeNameId": "B10D552F-439F-41F8-A37B-92C049C8DDFA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.0:rc4:*:*:*:*:*:*", "cpeNameId": "0C80D4FE-591B-4062-B4E0-034C8E6824DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.0:rc5:*:*:*:*:*:*", "cpeNameId": "A1FD0D8B-97CB-488B-B7CF-52C0CD54F200"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.0:rc6:*:*:*:*:*:*", "cpeNameId": "83533D12-466A-4B04-BC3A-1F3C5D8750B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.1:*:*:*:*:*:*:*", "cpeNameId": "C5B329AA-50C3-4D56-B10E-85876E2D6AFF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.2:*:*:*:*:*:*:*", "cpeNameId": "DA50D3B5-AE38-4686-B2AC-0C85E4CD89FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.3:*:*:*:*:*:*:*", "cpeNameId": "E54D1F8D-F883-4051-BF12-057D3F0FB128"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.4:*:*:*:*:*:*:*", "cpeNameId": "2A27C723-EFF7-416C-AFF2-D51C97DDE1DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.5:*:*:*:*:*:*:*", "cpeNameId": "4E4A5F0F-AE99-43F4-8003-657F1AC0AA93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.6:*:*:*:*:*:*:*", "cpeNameId": "57FFF781-B984-4F38-837E-255B22971C5F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.7:*:*:*:*:*:*:*", "cpeNameId": "ABBD5CFC-8A56-41FF-98BF-3F3DAF0F3841"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.8:*:*:*:*:*:*:*", "cpeNameId": "5DBF7892-0D9B-4153-9AAA-F72B0283A4A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.9:*:*:*:*:*:*:*", "cpeNameId": "6353E571-9A60-4036-B95E-2C814AAF7752"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.10:*:*:*:*:*:*:*", "cpeNameId": "EA57F68D-826E-43DB-A61A-DBE3B1C191C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.11:*:*:*:*:*:*:*", "cpeNameId": "80319CAF-347D-468D-B8FC-FD9C043FC4DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.12:*:*:*:*:*:*:*", "cpeNameId": "A5CE9EA4-85BD-43F3-8F6B-A09C25FD9167"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.13:*:*:*:*:*:*:*", "cpeNameId": "F91ADB87-9531-4398-BB0B-C063A074973B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.14:*:*:*:*:*:*:*", "cpeNameId": "7F82A887-A988-475B-9478-8CFCF7C3A704"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.15:*:*:*:*:*:*:*", "cpeNameId": "987E4679-4B40-4434-B0D7-3DEDAAB2F6BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.16:*:*:*:*:*:*:*", "cpeNameId": "9C363333-E73E-4B58-8D4C-37BD1D0B51C1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.17:*:*:*:*:*:*:*", "cpeNameId": "27BE33C0-428F-4A80-A80B-BC74C075B66C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.8.18:*:*:*:*:*:*:*", "cpeNameId": "9EE86950-40B6-4663-8A3A-7E1D03696B0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9:*:*:*:*:*:*:*", "cpeNameId": "121E9A60-F4D2-433C-98BF-0AFA0E4A266F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.0:-:*:*:*:*:*:*", "cpeNameId": "469494B6-32FD-4685-BE2F-A210B6063294"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc1:*:*:*:*:*:*", "cpeNameId": "7F13BEF4-27D5-40F6-9765-358FD93E1792"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc2:*:*:*:*:*:*", "cpeNameId": "5ACD024B-F179-4BD5-BAAE-51108956284E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc3:*:*:*:*:*:*", "cpeNameId": "EB2E632F-62CB-44FF-8C0C-E0D47D05E493"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc4:*:*:*:*:*:*", "cpeNameId": "F87B3257-4230-45BA-9667-307E0A4904CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc5:*:*:*:*:*:*", "cpeNameId": "2CCEF2FF-6123-42D5-B8BB-D8E248F8843C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc6:*:*:*:*:*:*", "cpeNameId": "C025B18C-40C5-4D4E-83AC-6BFEA8EE6936"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.1:*:*:*:*:*:*:*", "cpeNameId": "44A6C28C-2EBF-4D99-AE8C-887010615909"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.2:*:*:*:*:*:*:*", "cpeNameId": "31CF2F4F-4453-4907-AA98-E8137382086D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.3:*:*:*:*:*:*:*", "cpeNameId": "F63DD037-0FDF-4CEC-8117-A3982CD33949"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.4:*:*:*:*:*:*:*", "cpeNameId": "5BEC457A-2479-43CE-98B2-71459DE758CB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.5:*:*:*:*:*:*:*", "cpeNameId": "09C574BD-509E-420D-A4F1-3BD1C32E39C9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.6:*:*:*:*:*:*:*", "cpeNameId": "456FDC00-52BA-493A-B35B-CBB030B87FFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.7:*:*:*:*:*:*:*", "cpeNameId": "0C7FD0C5-7C16-45A5-AA4F-92609FC022D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.8:*:*:*:*:*:*:*", "cpeNameId": "C5131E57-D5F0-40F5-9D16-7C22AA4F9767"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.9:*:*:*:*:*:*:*", "cpeNameId": "D3CEA5D0-4D9E-4C39-87F9-BC90F5B770B8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.10:*:*:*:*:*:*:*", "cpeNameId": "76C03A6F-AF3B-4F19-95D9-F4150871865A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.11:*:*:*:*:*:*:*", "cpeNameId": "69578C8A-5886-441D-B835-5D0EDD95D146"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.12:*:*:*:*:*:*:*", "cpeNameId": "59581E9A-A564-46D2-B63E-4A838F09E213"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.13:*:*:*:*:*:*:*", "cpeNameId": "31137D81-EDA5-431E-BBA0-F1BA9752D0CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.14:*:*:*:*:*:*:*", "cpeNameId": "4D283523-B6B5-4CA3-A445-5FDA69F42FB9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.15:*:*:*:*:*:*:*", "cpeNameId": "0415500F-6FA8-4B11-BC14-0F8334371749"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.9.16:*:*:*:*:*:*:*", "cpeNameId": "086B2B23-E533-4D2E-9E90-0EC4BD2646EE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10:-:*:*:*:*:*:*", "cpeNameId": "2E1F1B79-2711-4459-B972-D3C83C48D2D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10:rc1:*:*:*:*:*:*", "cpeNameId": "4255DBFB-D157-45ED-BA6C-1BACB64A1623"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10:rc2:*:*:*:*:*:*", "cpeNameId": "C7BA0F25-7DD0-427A-A8FF-D5CCD17EA554"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10:rc4:*:*:*:*:*:*", "cpeNameId": "0962C2F4-E79A-4C61-8380-55EAAAD4AE1B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.0:-:*:*:*:*:*:*", "cpeNameId": "6B1D1EAB-0195-4F05-88FF-F862563F89FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.0:rc1:*:*:*:*:*:*", "cpeNameId": "EBBE0FA3-6C50-4C78-83C3-9BE6F9A064E3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.0:rc2:*:*:*:*:*:*", "cpeNameId": "E59C1055-110F-4E68-BB9C-8E3C564F72F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.0:rc3:*:*:*:*:*:*", "cpeNameId": "955307F1-B773-46C3-983A-DEA36FDEBCBD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.0:rc4:*:*:*:*:*:*", "cpeNameId": "4AC5F069-6642-4E36-ACF3-EE93FCEAC751"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.0:rc5:*:*:*:*:*:*", "cpeNameId": "EF537B63-6913-49CD-8CEB-A9B744FE8E4E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.1:*:*:*:*:*:*:*", "cpeNameId": "919C724B-829B-4250-B6F3-66C503930681"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.2:*:*:*:*:*:*:*", "cpeNameId": "7B9D0BBB-79E9-4CA5-81CF-2F8783866A20"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.3:*:*:*:*:*:*:*", "cpeNameId": "6F0C6AC0-1A96-4202-B3A4-42216BDC476C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.4:*:*:*:*:*:*:*", "cpeNameId": "59CCCD55-2025-4BD2-BB41-7FBF6B449783"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.5:*:*:*:*:*:*:*", "cpeNameId": "6BD60207-E9A0-4688-A2D3-3A68CAC97BFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.6:*:*:*:*:*:*:*", "cpeNameId": "54839987-2658-4873-BB81-585C8849EE8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.7:*:*:*:*:*:*:*", "cpeNameId": "FB32ECFD-B8DB-4422-83B4-7F26B1DCC763"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.8:*:*:*:*:*:*:*", "cpeNameId": "0FCF254D-C922-4F67-B85C-7247077BBF63"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.9:*:*:*:*:*:*:*", "cpeNameId": "2313CF18-EB32-4DB8-9B68-B24F46689725"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.10:*:*:*:*:*:*:*", "cpeNameId": "77C0418A-B48F-4E70-B71F-5030B901EC8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.11:*:*:*:*:*:*:*", "cpeNameId": "32769B56-4C74-41FE-A7D3-5D87006BE1B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.12:*:*:*:*:*:*:*", "cpeNameId": "C5244E7D-A816-42FD-80A2-22A1EBD41FA8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.13:*:*:*:*:*:*:*", "cpeNameId": "0E80BF7E-93CE-4658-854B-7EFB6AC17CEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.14:*:*:*:*:*:*:*", "cpeNameId": "BCB6377E-BAD8-4063-8DB2-A16392D24089"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.15:*:*:*:*:*:*:*", "cpeNameId": "09DAF5C5-3ADF-4BFB-B681-DEFAD2874241"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.16:*:*:*:*:*:*:*", "cpeNameId": "878924C9-1FEA-49D2-BB99-6AE2A8812570"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.17:*:*:*:*:*:*:*", "cpeNameId": "13722F1D-D730-4F7C-AB84-1267068EF08C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.18:*:*:*:*:*:*:*", "cpeNameId": "2A86DC03-D4AC-4EAE-88FE-54D103F5A3D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.19:*:*:*:*:*:*:*", "cpeNameId": "B833D784-AF50-4A28-88B3-B00A2ABA00D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.20:*:*:*:*:*:*:*", "cpeNameId": "EC92790E-8CEB-4EE7-9655-BE16A14BCAC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.21:*:*:*:*:*:*:*", "cpeNameId": "A0D9BB71-2049-4DEA-B438-0EE2AA9A09ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.22:*:*:*:*:*:*:*", "cpeNameId": "4F726530-1114-4DF2-956E-81715A37EE2A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.23:*:*:*:*:*:*:*", "cpeNameId": "6A9B3C74-81DE-4FDA-A058-89DD6494DD5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.24:*:*:*:*:*:*:*", "cpeNameId": "B98E61C1-1F45-4150-B477-FBFF4FAC3ED3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.25:*:*:*:*:*:*:*", "cpeNameId": "AEDF3A34-9D1B-4E78-9BC8-BFC839CBA294"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.26:*:*:*:*:*:*:*", "cpeNameId": "0B823FEF-0461-49A6-A380-1FCA2F2765FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.27:*:*:*:*:*:*:*", "cpeNameId": "494E65F5-4C04-45D6-830F-4EE9103EBB79"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.28:*:*:*:*:*:*:*", "cpeNameId": "83414679-66B4-40C0-B061-FF9FE1B23F95"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.29:*:*:*:*:*:*:*", "cpeNameId": "2EDD7AD5-8E29-4C05-B2B9-690CE6523AE8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.30:*:*:*:*:*:*:*", "cpeNameId": "F4A2F70D-4AEF-4F79-8BD3-2AAA3BED01E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.31:*:*:*:*:*:*:*", "cpeNameId": "6D4C13F5-4DC9-4498-B598-0C72F44C408F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.32:*:*:*:*:*:*:*", "cpeNameId": "0CC82644-C0F1-4FE3-BE00-1AA49A715186"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.33:*:*:*:*:*:*:*", "cpeNameId": "1CE00059-6557-4873-88DC-0D8989EA8352"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.34:*:*:*:*:*:*:*", "cpeNameId": "D681DBE9-23F8-4AB1-A4C6-73075E8753B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.35:*:*:*:*:*:*:*", "cpeNameId": "DA0FCEE1-0A6E-488B-A168-9885CE8A892B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.36:*:*:*:*:*:*:*", "cpeNameId": "8EC26158-07A8-4F5B-AED4-B1B247C7804F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.37:*:*:*:*:*:*:*", "cpeNameId": "AE2694A8-5857-4C19-81BE-E371A011643C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.38:*:*:*:*:*:*:*", "cpeNameId": "ABEB722B-6903-4915-B85C-1D2A05674826"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.39:*:*:*:*:*:*:*", "cpeNameId": "6AD9EBB8-8E60-4501-A44E-057A3BEEDA17"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.40:*:*:*:*:*:*:*", "cpeNameId": "F0D558A0-55C0-460B-BE39-F06AF16FAC31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.41:*:*:*:*:*:*:*", "cpeNameId": "275C969B-FC08-441F-BDBC-F24EC5810A99"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.42:*:*:*:*:*:*:*", "cpeNameId": "731A0F3B-A32B-4345-BE91-ABA294048D2A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.43:*:*:*:*:*:*:*", "cpeNameId": "3FE2BC04-D69F-4239-B3D8-17898AE1EC6E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.44:*:*:*:*:*:*:*", "cpeNameId": "575245F7-0BE3-4A47-A20F-0D1ECF247B3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.45:*:*:*:*:*:*:*", "cpeNameId": "4BC74ACC-355D-41FE-9D78-D50DD08425F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.46:*:*:*:*:*:*:*", "cpeNameId": "E63871AE-A0FC-41E1-B4AE-99FEA83DE6EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.47:*:*:*:*:*:*:*", "cpeNameId": "2D465F1B-9417-4099-9468-09D21B58EFE0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.48:*:*:*:*:*:*:*", "cpeNameId": "78FC9A7F-B877-4B4B-93C7-C5BAEB84BEF1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.49:*:*:*:*:*:*:*", "cpeNameId": "2343BB66-E088-4CAA-9458-F62F5624D1BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.50:*:*:*:*:*:*:*", "cpeNameId": "BED11231-C3C0-4B9A-A667-E96A5EB42728"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.51:*:*:*:*:*:*:*", "cpeNameId": "4BA151A6-3479-4D73-92A0-25D7D74DD76C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.52:*:*:*:*:*:*:*", "cpeNameId": "4CFCF22F-C2C8-46CA-A8C2-A6DB5AAD3670"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.53:*:*:*:*:*:*:*", "cpeNameId": "6326FFB7-116E-4FB8-B2C1-909CC3B6C3C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.54:*:*:*:*:*:*:*", "cpeNameId": "A7FDB1DD-DC8A-4424-A81A-37F8A0B2F1D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.55:*:*:*:*:*:*:*", "cpeNameId": "A9A96456-8676-4108-B958-7A0E3493F315"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.56:*:*:*:*:*:*:*", "cpeNameId": "7444E85B-6F15-4980-8721-5B0A708042E3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.57:*:*:*:*:*:*:*", "cpeNameId": "2D88C78E-CA4C-40A2-BF04-E487DE3D79C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.58:*:*:*:*:*:*:*", "cpeNameId": "D8167B04-7EDF-4F1B-B967-EFCDC6FB0D63"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.59:*:*:*:*:*:*:*", "cpeNameId": "66E8BCA7-8C84-42E6-A891-0840BE07CE79"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.60:*:*:*:*:*:*:*", "cpeNameId": "3FE27316-DB42-42B3-95E5-EBF8CB7498C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.61:*:*:*:*:*:*:*", "cpeNameId": "47AD2C14-A08F-4D75-960F-1D5C72EB1979"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.62:*:*:*:*:*:*:*", "cpeNameId": "E93FBE71-458B-4F4A-BA1E-153759B14744"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.63:*:*:*:*:*:*:*", "cpeNameId": "7FD84D94-2BA9-4552-9807-F06A66D760BA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.64:*:*:*:*:*:*:*", "cpeNameId": "9424301F-3046-46B4-863C-E887D542C94B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.65:*:*:*:*:*:*:*", "cpeNameId": "70F56D3D-6046-4B8E-961A-C9835F0B9090"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.66:*:*:*:*:*:*:*", "cpeNameId": "C4C18611-ABA7-482D-82FD-8CE9E3CBDB33"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.67:*:*:*:*:*:*:*", "cpeNameId": "0B905626-8718-42FB-9908-7573102CB541"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.68:*:*:*:*:*:*:*", "cpeNameId": "365DA1ED-E1C9-4A4C-9A38-54FDA5832296"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.69:*:*:*:*:*:*:*", "cpeNameId": "27BBA256-9FD8-4A99-A301-31761D2CB794"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.70:*:*:*:*:*:*:*", "cpeNameId": "3B7F8DF6-7523-4D9B-B7B7-10E77A9D132C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.71:*:*:*:*:*:*:*", "cpeNameId": "580454E1-93EE-4311-852E-4B749F7905DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.72:*:*:*:*:*:*:*", "cpeNameId": "1307A5B0-2E1A-48AD-A718-46BF09EA2F52"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.73:*:*:*:*:*:*:*", "cpeNameId": "33F6E183-DDDE-4425-86CB-91EFEA45EB7C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.74:*:*:*:*:*:*:*", "cpeNameId": "861EB0F3-ECA9-4F1B-8842-DB4EFB6A00A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.75:*:*:*:*:*:*:*", "cpeNameId": "2D8BE345-69E8-49AC-A829-8FE9A71E0570"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.76:*:*:*:*:*:*:*", "cpeNameId": "71972DCE-D514-471A-8C19-6F1266FBB229"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.77:*:*:*:*:*:*:*", "cpeNameId": "F8C0EEE1-9B24-411B-ADC9-740859F33B48"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.78:*:*:*:*:*:*:*", "cpeNameId": "A8B37EA6-CA2C-46D6-A181-278E5C31F0DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.79:*:*:*:*:*:*:*", "cpeNameId": "F27C5E99-159C-490C-AF32-50BE9563EB52"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.80:*:*:*:*:*:*:*", "cpeNameId": "17813E0B-D346-4177-8F05-9533B4C60865"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.81:*:*:*:*:*:*:*", "cpeNameId": "8D01EFE4-8A1B-4CCF-95E7-AC5A1539D62E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.82:*:*:*:*:*:*:*", "cpeNameId": "1F0FC27E-9086-4213-9CFE-FD6F1B9A4AF1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.83:*:*:*:*:*:*:*", "cpeNameId": "481F6A95-F56E-4D6D-854C-6F04ECBD66B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.84:*:*:*:*:*:*:*", "cpeNameId": "46CC33A3-5940-4D55-8E84-E73C3BD823F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.85:*:*:*:*:*:*:*", "cpeNameId": "2D2A56E7-26AC-4B25-B518-580C7B57B9AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.86:*:*:*:*:*:*:*", "cpeNameId": "74D61A28-F673-4952-8B5C-02F3C13CB122"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.87:*:*:*:*:*:*:*", "cpeNameId": "339A37D8-F764-445B-8DB3-84A8FAECE0E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.88:*:*:*:*:*:*:*", "cpeNameId": "D97DAA30-8EFA-4A17-BCF4-1DA94DEA4EDB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.89:*:*:*:*:*:*:*", "cpeNameId": "E27E4623-1A1D-4DFD-82DA-A2C5CC7F7697"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.90:*:*:*:*:*:*:*", "cpeNameId": "E504954E-D296-441C-873E-BB0A99B128A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.91:*:*:*:*:*:*:*", "cpeNameId": "972594C2-DBE3-4358-974A-4F4669143532"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.92:*:*:*:*:*:*:*", "cpeNameId": "844FF0AF-746F-460B-AF09-70F04AEFCF31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.93:*:*:*:*:*:*:*", "cpeNameId": "0759AD27-6E8F-4FB0-86A0-581270987FC8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.94:*:*:*:*:*:*:*", "cpeNameId": "4762F42E-1EB4-43B9-B4C6-FED6BD72F8F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.95:*:*:*:*:*:*:*", "cpeNameId": "3AB26935-F86A-4944-AB5E-2030498A5150"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.96:*:*:*:*:*:*:*", "cpeNameId": "1F32FA33-C031-4CB3-9FE9-5B8F2AB4F0DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.97:*:*:*:*:*:*:*", "cpeNameId": "EA2A46B2-E9A8-4939-B34C-305DADC1E706"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.98:*:*:*:*:*:*:*", "cpeNameId": "6F40D4DA-5127-4F65-B450-DACBFF729694"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.99:*:*:*:*:*:*:*", "cpeNameId": "4ACCE8A9-B038-41D4-853D-6FFCC67C6B64"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.100:*:*:*:*:*:*:*", "cpeNameId": "7BC07033-922F-4E00-9A7F-A9799C0665BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.101:*:*:*:*:*:*:*", "cpeNameId": "63A5156F-CEE7-4BF7-8421-892C0A117BFF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.102:*:*:*:*:*:*:*", "cpeNameId": "FE32C7D9-7BCC-4896-9D3A-954D3A175242"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.103:*:*:*:*:*:*:*", "cpeNameId": "0E21CE22-A7B8-4F83-BEE7-6672AE3A2C44"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.104:*:*:*:*:*:*:*", "cpeNameId": "A4E75A55-DB3C-43F3-AA43-A04380CB435A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.105:*:*:*:*:*:*:*", "cpeNameId": "217BD320-E966-48FB-A3DA-EAC81FBA3D02"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.106:*:*:*:*:*:*:*", "cpeNameId": "A13D5A45-1F78-4F9D-8932-09FB4963FE2B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.107:*:*:*:*:*:*:*", "cpeNameId": "94B537FB-3FC1-4A2A-90C5-A41C4E757EAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.108:*:*:*:*:*:*:*", "cpeNameId": "A36CC6BB-339C-4928-B79B-7047AD126CAE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.109:*:*:*:*:*:*:*", "cpeNameId": "787AABB6-F55D-41A7-99FA-AE59AD411920"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.110:*:*:*:*:*:*:*", "cpeNameId": "E8453C19-A25E-42BC-AC28-3967873C0502"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.111:*:*:*:*:*:*:*", "cpeNameId": "F25CCCEB-3631-4B9B-852D-A76ED56BA4DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.112:*:*:*:*:*:*:*", "cpeNameId": "5A726FC3-8B4B-4E63-9865-6A5C6BC9451D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.113:*:*:*:*:*:*:*", "cpeNameId": "CD45E388-608F-4BE6-8152-527548FE08DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.114:*:*:*:*:*:*:*", "cpeNameId": "A7BDF880-128D-4D74-8D98-E41C861040C5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.115:*:*:*:*:*:*:*", "cpeNameId": "6692FB97-9395-401A-B1CB-AD484F90B89A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.116:*:*:*:*:*:*:*", "cpeNameId": "9A64BA88-6D08-409E-BFE1-24CFA920C75A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.117:*:*:*:*:*:*:*", "cpeNameId": "2D582BFD-C229-4552-B828-115F83D73F89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.118:*:*:*:*:*:*:*", "cpeNameId": "CA086871-EB47-4699-8451-993791AA05DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.119:*:*:*:*:*:*:*", "cpeNameId": "483BEBC5-E6D4-4ED8-A5E5-DB2DD73986DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.120:*:*:*:*:*:*:*", "cpeNameId": "68EF2A7B-021A-4153-BDB1-A68499185EFB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.121:*:*:*:*:*:*:*", "cpeNameId": "C55B56E4-06A2-43C2-BE53-5681C0687D73"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.122:*:*:*:*:*:*:*", "cpeNameId": "CB7B49F3-DDD7-4A9E-BF7D-89BCA4437C52"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.123:*:*:*:*:*:*:*", "cpeNameId": "4A20AD3E-FA89-4524-8D02-B2728615111C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.124:*:*:*:*:*:*:*", "cpeNameId": "C30938C7-DF69-4F4C-ADF6-BF47C209872E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.125:*:*:*:*:*:*:*", "cpeNameId": "D091A040-31A4-4643-BD08-9D25F02BDDED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.126:*:*:*:*:*:*:*", "cpeNameId": "FF6CD639-C348-4BAA-8C59-8FE73D9966DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.127:*:*:*:*:*:*:*", "cpeNameId": "3F24CE79-3D3D-421A-AC44-E68C17FC5D92"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.128:*:*:*:*:*:*:*", "cpeNameId": "F9E550EF-FFA3-4194-9071-7922680C7E6E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.129:*:*:*:*:*:*:*", "cpeNameId": "987DB34E-E170-4E7E-B08A-CD32A73E9156"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.130:*:*:*:*:*:*:*", "cpeNameId": "A7E67D9A-9FA7-43ED-B536-312C5C01CD6E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.131:*:*:*:*:*:*:*", "cpeNameId": "D9C69A17-571F-45C1-9120-1BE31A33A948"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.132:*:*:*:*:*:*:*", "cpeNameId": "166EDBC5-3C18-4042-8C19-F339F25162FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.133:*:*:*:*:*:*:*", "cpeNameId": "CBA08C9F-0426-4B96-A6E8-7253C152FFBC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.134:*:*:*:*:*:*:*", "cpeNameId": "182AECF8-FAC1-4E1B-BE84-ABB34E11A3F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.135:*:*:*:*:*:*:*", "cpeNameId": "A7249039-E52A-4756-A93F-06A3284AEDEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.136:*:*:*:*:*:*:*", "cpeNameId": "84C67C6F-FA0B-41EE-9D20-11A0BC255F63"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.137:*:*:*:*:*:*:*", "cpeNameId": "00A8D67B-9DFD-4BBE-9A8D-976B22573BC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.138:*:*:*:*:*:*:*", "cpeNameId": "94A225AF-5670-4866-967D-29ECA4887457"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.139:*:*:*:*:*:*:*", "cpeNameId": "579F476A-FED8-4232-ADF1-3889FDC4C86C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.140:*:*:*:*:*:*:*", "cpeNameId": "84F54287-F019-47C9-9CB7-7B6B6CCBA9E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.141:*:*:*:*:*:*:*", "cpeNameId": "3E72C4BF-107C-4C73-AD2D-13564B590074"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.142:*:*:*:*:*:*:*", "cpeNameId": "FC309597-3B6C-4DB1-920B-97C1428824C2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.143:*:*:*:*:*:*:*", "cpeNameId": "0F20169C-AA6F-433A-AB4B-2FB83AFE4CBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.144:*:*:*:*:*:*:*", "cpeNameId": "02E301AD-B083-4D5E-81D5-7C1990FAA3B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.145:*:*:*:*:*:*:*", "cpeNameId": "BAA0E2C0-1BF2-4F95-BBDA-D294FFC56C90"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.146:*:*:*:*:*:*:*", "cpeNameId": "333D6187-DE99-4496-951B-79FC37281B50"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.147:*:*:*:*:*:*:*", "cpeNameId": "5B8EA31C-9846-414C-B164-133B7C72AFAC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.148:*:*:*:*:*:*:*", "cpeNameId": "48B13BAF-B20A-4DEA-9516-565B3030BD3F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.149:*:*:*:*:*:*:*", "cpeNameId": "2BDBBF02-8793-439B-B2B7-F1398DDC5165"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.150:*:*:*:*:*:*:*", "cpeNameId": "845A54DE-9847-4628-81AE-9202E104E5A7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.151:*:*:*:*:*:*:*", "cpeNameId": "429BF264-A007-4AFC-9AC8-17CA5BE8091F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.152:*:*:*:*:*:*:*", "cpeNameId": "A21895BD-17BD-4347-BB11-AC22832B5545"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.153:*:*:*:*:*:*:*", "cpeNameId": "C72F8FFE-0954-4360-ABC2-97FDC0DB5D45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.154:*:*:*:*:*:*:*", "cpeNameId": "76BE03E9-E28F-44A8-9B89-9700CF4E3689"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.155:*:*:*:*:*:*:*", "cpeNameId": "C28104D3-94AE-44FA-9395-B7B19859B677"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.156:*:*:*:*:*:*:*", "cpeNameId": "27FB0DEA-7659-4394-8E83-0EC289A5CAA4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.157:*:*:*:*:*:*:*", "cpeNameId": "D9820BF1-0B1A-432F-889F-F152AAA957DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.158:*:*:*:*:*:*:*", "cpeNameId": "C0BDDEFA-7B1D-4108-BCC9-FFA63A3DDC7E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.159:*:*:*:*:*:*:*", "cpeNameId": "8A23C014-F216-43C3-9D3C-5CEED86EE41D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.160:*:*:*:*:*:*:*", "cpeNameId": "1978465D-F79C-40EB-A6EF-50EFF77BB974"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.161:*:*:*:*:*:*:*", "cpeNameId": "29914586-1720-4AE1-A204-01432051782B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.162:*:*:*:*:*:*:*", "cpeNameId": "FBE6A9B7-94E5-456F-B336-59EE1C9C62E5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.163:*:*:*:*:*:*:*", "cpeNameId": "31DF5109-302D-4C99-BF27-7752453D8B5E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.164:*:*:*:*:*:*:*", "cpeNameId": "3262D873-56B3-449E-A70A-17DA2F4D9382"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.165:*:*:*:*:*:*:*", "cpeNameId": "21C9EF71-018C-41DE-ADCD-FF6A38C77E4C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.166:*:*:*:*:*:*:*", "cpeNameId": "46897616-FAB1-4E27-8F2B-7B59CF5B96D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.167:*:*:*:*:*:*:*", "cpeNameId": "2547AA22-645F-4613-A353-93431C5784F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.168:*:*:*:*:*:*:*", "cpeNameId": "FF6BB8B3-8746-4110-9FFC-C8FA51F8CD8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.169:*:*:*:*:*:*:*", "cpeNameId": "76B2AC55-7FE1-4EB6-B66F-AA2DA71D67CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.170:*:*:*:*:*:*:*", "cpeNameId": "E8A369DE-6CF8-43BF-ACC2-34CCEAAEADEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.171:*:*:*:*:*:*:*", "cpeNameId": "192DCF0D-9152-475F-828E-817AD9C86E8B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.172:*:*:*:*:*:*:*", "cpeNameId": "DF8383A9-7BF3-473B-9EE1-38C0FB296913"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.173:*:*:*:*:*:*:*", "cpeNameId": "7AB9EEF7-D575-4CB3-B57E-173AE0807897"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.174:*:*:*:*:*:*:*", "cpeNameId": "2658DE93-2BC0-4AC0-86D9-0487D4571A3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.175:*:*:*:*:*:*:*", "cpeNameId": "9C9415F0-7A65-436A-AAD8-31F99B9D7389"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.176:*:*:*:*:*:*:*", "cpeNameId": "1D0378DF-6D92-4307-904F-C66E45A7951E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.177:*:*:*:*:*:*:*", "cpeNameId": "EAE9A661-784D-4767-AF9B-7FBFA7D82738"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.178:*:*:*:*:*:*:*", "cpeNameId": "C17A6F7B-CD4A-49F4-A75B-B67338DDDDD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.179:*:*:*:*:*:*:*", "cpeNameId": "E79DFC9A-C359-4DD6-990B-2174E5B0024A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.180:*:*:*:*:*:*:*", "cpeNameId": "0A2AFA9A-832F-4C6C-BF9A-7C5A1C0E4FCA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.181:*:*:*:*:*:*:*", "cpeNameId": "4ED76815-B1FF-4FF7-B33D-4CC39C1A3948"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.182:*:*:*:*:*:*:*", "cpeNameId": "094B86B6-B8A4-408E-93F5-7514E0889F80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.183:*:*:*:*:*:*:*", "cpeNameId": "0ECF42BB-D201-4ED6-BA24-8B3A388564DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.184:*:*:*:*:*:*:*", "cpeNameId": "588AC0CC-AEA3-4230-8820-D46E13AFED1A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.185:*:*:*:*:*:*:*", "cpeNameId": "1B6E85FD-9863-43D4-830D-C46AC7CF8EA5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.186:*:*:*:*:*:*:*", "cpeNameId": "E1320383-8026-48C2-AA55-3D6DD4C91761"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.187:*:*:*:*:*:*:*", "cpeNameId": "78BC22D4-F955-4AC6-A00F-AD4832C1F2FA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.188:*:*:*:*:*:*:*", "cpeNameId": "E562975C-CD47-45F9-815A-F1549043871A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.189:*:*:*:*:*:*:*", "cpeNameId": "9F7D5828-8590-4C04-9BA2-03D8A9265783"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.190:*:*:*:*:*:*:*", "cpeNameId": "052F6967-B479-47A5-B705-66ADF5BAE5B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.191:*:*:*:*:*:*:*", "cpeNameId": "E6E1C494-101F-4F6C-B9F9-453EF9EC7D30"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.192:*:*:*:*:*:*:*", "cpeNameId": "A1A79F09-A517-41C9-81E2-0D1B960AC8E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.193:*:*:*:*:*:*:*", "cpeNameId": "329B75BA-C9CB-4193-A56B-4C175431194D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.194:*:*:*:*:*:*:*", "cpeNameId": "B3CC767E-10C4-4966-8921-50BB6E99E682"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.195:*:*:*:*:*:*:*", "cpeNameId": "BDAF83E0-E596-47CA-9FD5-E310643531AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.196:*:*:*:*:*:*:*", "cpeNameId": "B52AB3E0-7C8A-4E9B-9AB7-970D110AD689"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.197:*:*:*:*:*:*:*", "cpeNameId": "A98AABF5-2C66-4202-8CC8-7BD6A5BD206C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.198:*:*:*:*:*:*:*", "cpeNameId": "D2FB7CC8-3184-4B7B-8F15-206D478B957B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.199:*:*:*:*:*:*:*", "cpeNameId": "F17EC735-6954-48DE-9B79-129B113894DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.200:*:*:*:*:*:*:*", "cpeNameId": "215BF96E-9953-4137-9343-E664467C544B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.201:*:*:*:*:*:*:*", "cpeNameId": "4F5AA1AE-A206-4735-811F-D278CE94F425"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.202:*:*:*:*:*:*:*", "cpeNameId": "21709E5C-334E-4C9A-93FC-D33A6A234EBE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.203:*:*:*:*:*:*:*", "cpeNameId": "90B8792D-F589-4658-8105-D62452F51118"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.204:*:*:*:*:*:*:*", "cpeNameId": "783138D6-77F2-42BD-B712-64D5E3069478"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.205:*:*:*:*:*:*:*", "cpeNameId": "FDFF6DBF-A75C-45BA-A6EB-7EE625C06625"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.206:*:*:*:*:*:*:*", "cpeNameId": "3AFE0482-4EE2-4916-B1D9-6164C7CE9424"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.207:*:*:*:*:*:*:*", "cpeNameId": "B70FE32B-60B4-491B-BE0C-1709EFA5893C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.208:*:*:*:*:*:*:*", "cpeNameId": "0B61E6D6-2C0A-41BF-A847-2A0989F51690"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.209:*:*:*:*:*:*:*", "cpeNameId": "FAD83EB2-0BC4-4AD0-B7D0-84D486786E11"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.210:*:*:*:*:*:*:*", "cpeNameId": "4F085545-FA13-4D9D-ACC8-F268C0942C68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.211:*:*:*:*:*:*:*", "cpeNameId": "1110C146-0596-4E9A-9D9A-759EEE029BE7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.212:*:*:*:*:*:*:*", "cpeNameId": "C4725039-FE74-42A4-8F28-71890581F507"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.213:*:*:*:*:*:*:*", "cpeNameId": "01623D91-F403-4331-8911-FC3D9F207EEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.214:*:*:*:*:*:*:*", "cpeNameId": "6E428F60-24AE-403A-918B-A89C96B757C7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.215:*:*:*:*:*:*:*", "cpeNameId": "3800AEF1-ED61-41F4-9D70-EA3E0B77361D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.216:*:*:*:*:*:*:*", "cpeNameId": "0E9E733E-B81F-4112-AD2F-CE938439024B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.217:*:*:*:*:*:*:*", "cpeNameId": "48B7E2F6-5130-443C-8771-BE9DCDFBDD10"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.218:*:*:*:*:*:*:*", "cpeNameId": "3B485A54-4F57-4E7C-B620-A82938273FA7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.219:*:*:*:*:*:*:*", "cpeNameId": "C7F27EB7-A65A-45A2-A904-9F60507D342A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.220:*:*:*:*:*:*:*", "cpeNameId": "447A4E02-26AC-4CA2-B76D-B3508CF9B860"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.221:*:*:*:*:*:*:*", "cpeNameId": "436B2D40-F48C-4162-99D2-30D16807E3B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.222:*:*:*:*:*:*:*", "cpeNameId": "6BF3B63B-B671-44C8-8CBC-9FD21CA0E820"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.223:*:*:*:*:*:*:*", "cpeNameId": "121ACF12-28C3-4E2A-88C5-D5EF13920A90"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.224:*:*:*:*:*:*:*", "cpeNameId": "A67E472A-DC6E-4691-B5F1-225DE7946514"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.225:*:*:*:*:*:*:*", "cpeNameId": "CD10FD8D-0844-48A8-986D-33CA0DB5B3AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.226:*:*:*:*:*:*:*", "cpeNameId": "A11586F3-BA48-43B1-B808-2FD2280550F7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.227:*:*:*:*:*:*:*", "cpeNameId": "D3DD83A4-36EB-4F6B-86DB-524C91470807"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.229:*:*:*:*:*:*:*", "cpeNameId": "B816AFF0-A9B1-4F57-93E1-BB2D2A273A68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.230:*:*:*:*:*:*:*", "cpeNameId": "A940CCEF-1858-4FB9-BEC7-C2CD5A8DA5C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.244:*:*:*:*:*:*:*", "cpeNameId": "CA513596-6180-494F-A47C-4DC449B53BB7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:*:*:*:*:*:*:*", "cpeNameId": "63BC1E47-0228-41F4-989F-B4714260762B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:-:*:*:*:*:*:*", "cpeNameId": "BEEBF8B2-4493-470F-90B7-A9A57717C54C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:rc1:*:*:*:*:*:*", "cpeNameId": "AC145652-F483-4B19-B8C4-624F28E03010"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:rc2:*:*:*:*:*:*", "cpeNameId": "B9AE2C09-C300-4B2D-A5A7-E5D4CE11A0F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:rc3:*:*:*:*:*:*", "cpeNameId": "24855508-8DA6-4CA8-9B38-21B1C4505824"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:rc4:*:*:*:*:*:*", "cpeNameId": "B5E9A0D7-9681-4F6C-BBE8-30403B1C6F83"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:rc5:*:*:*:*:*:*", "cpeNameId": "95BCDE4B-2F7F-4F21-A2F1-A30E9C6370D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:rc6:*:*:*:*:*:*", "cpeNameId": "F455B799-C4F3-4B7A-8B65-0383984C3717"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:rc7:*:*:*:*:*:*", "cpeNameId": "1F290906-F5FA-45DF-922F-62ECC063EA76"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.1:*:*:*:*:*:*:*", "cpeNameId": "34D4AA87-9172-4704-BEA7-9DDEB516DB84"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.2:*:*:*:*:*:*:*", "cpeNameId": "8BF52BA5-E253-4CDD-A135-1531A86D543E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.3:*:*:*:*:*:*:*", "cpeNameId": "145EB557-D73C-47BB-87A6-B7029FA35A40"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.4:*:*:*:*:*:*:*", "cpeNameId": "7EEB122E-2E7E-4662-8AF2-B5F702EA3A6A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.5:*:*:*:*:*:*:*", "cpeNameId": "A3738040-9287-4A85-AE74-8E90D460C227"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.6:*:*:*:*:*:*:*", "cpeNameId": "C1C5E2C0-BA06-4A09-8063-F0CA9FC0ABFE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.7:*:*:*:*:*:*:*", "cpeNameId": "F2C4DB30-0C29-4A72-ACAD-AC339F102D29"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.8:*:*:*:*:*:*:*", "cpeNameId": "B8F6A213-C6B1-442B-BB9F-2B987BDEA023"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.9:*:*:*:*:*:*:*", "cpeNameId": "54EA37D0-6527-4F8B-A416-2ADF4F749CF8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.10:*:*:*:*:*:*:*", "cpeNameId": "620126E3-8499-4B1E-A182-2E3AF06B336B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.11:*:*:*:*:*:*:*", "cpeNameId": "193D233C-D3F2-4B20-AFFF-7B602948094F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.12:*:*:*:*:*:*:*", "cpeNameId": "90F5A23D-3E38-40C2-B5F8-8F4D6C1FA3E7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.13:*:*:*:*:*:*:*", "cpeNameId": "2B0BFF44-FCAF-4E26-BEB4-6F302ECCC398"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.14:*:*:*:*:*:*:*", "cpeNameId": "6F1AF9D1-837E-4681-A1B5-DBE553BB65DE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.15:*:*:*:*:*:*:*", "cpeNameId": "B9251847-EA27-4EBA-B9F3-1162156DBDFA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.16:*:*:*:*:*:*:*", "cpeNameId": "16A3579F-40D9-4FB0-B7D3-54FC47821FE8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.17:*:*:*:*:*:*:*", "cpeNameId": "BDFD9B25-4336-4D39-8C82-48867CB816ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.18:*:*:*:*:*:*:*", "cpeNameId": "82BF44C5-7264-4478-B8FC-06100D67440C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.19:*:*:*:*:*:*:*", "cpeNameId": "B4AE9BDA-08FC-43E5-B69A-12D179D1F0F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.20:*:*:*:*:*:*:*", "cpeNameId": "9FA3583C-D6CB-4E2D-8807-AD4BE72A8400"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.21:*:*:*:*:*:*:*", "cpeNameId": "4C39A0D8-85D6-4087-A5C7-E31B4763C30E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.22:*:*:*:*:*:*:*", "cpeNameId": "3734E58B-67DE-4CFE-8A0A-E198902F5EF3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12:-:*:*:*:*:*:*", "cpeNameId": "909AE298-650A-40FC-89B6-3C9B84F18D0D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12:rc1:*:*:*:*:*:*", "cpeNameId": "2DF254E6-DCA2-415F-A9CF-A8F8214C70C9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12:rc2:*:*:*:*:*:*", "cpeNameId": "28EA1789-0AA1-4DDF-8A3B-186FAE60250E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12:rc3:*:*:*:*:*:*", "cpeNameId": "18273D65-2C56-44F3-86BB-210E8183A30E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12:rc4:*:*:*:*:*:*", "cpeNameId": "1C698D86-842A-4A52-AC8A-0ACE001B6150"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12:rc5:*:*:*:*:*:*", "cpeNameId": "5DA86DC0-64A9-4E9C-A37C-A4EFB1764A84"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12:rc6:*:*:*:*:*:*", "cpeNameId": "DD2A90B7-FAAF-49E4-A5FE-F6E9ADF6A147"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12:rc7:*:*:*:*:*:*", "cpeNameId": "A990F6D8-E66C-4AD6-9606-71E2B8FB4CFE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.1:*:*:*:*:*:*:*", "cpeNameId": "7497D744-2E4C-45AD-9B58-D9ECD626175B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.2:*:*:*:*:*:*:*", "cpeNameId": "10641D0D-05A7-4B3D-82FB-FFE591B7DBD7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.3:*:*:*:*:*:*:*", "cpeNameId": "5AD0A9F1-5AD4-4ABB-A833-99BA7D351577"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.4:*:*:*:*:*:*:*", "cpeNameId": "4665239B-D45C-4558-9F54-695E98369E8C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.5:*:*:*:*:*:*:*", "cpeNameId": "8E690484-7C22-4011-9B03-9983E23095F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.6:*:*:*:*:*:*:*", "cpeNameId": "F9520114-68E1-4BB9-B088-7C1A27ACE515"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.7:*:*:*:*:*:*:*", "cpeNameId": "AD1AB54E-70EA-4B7E-B7D9-87F45E7F87A9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.8:*:*:*:*:*:*:*", "cpeNameId": "8C5ABC42-12D2-499A-B6CC-C9B1E15AEA71"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.9:*:*:*:*:*:*:*", "cpeNameId": "46196B73-964E-4ABC-B0E5-48B5F5CB7BFF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.10:*:*:*:*:*:*:*", "cpeNameId": "36A6AB9B-68B3-4234-A8E6-74EC108A160C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.11:*:*:*:*:*:*:*", "cpeNameId": "A12D7920-D1CA-44DC-A290-E26C4FE41EEF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.12:*:*:*:*:*:*:*", "cpeNameId": "9794C38E-32C0-4EB8-B4FE-D02D6E4ECFEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.13:*:*:*:*:*:*:*", "cpeNameId": "B5621156-BE25-4483-A3D0-4DD273245B57"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.14:*:*:*:*:*:*:*", "cpeNameId": "D1BB4FE7-AF71-4FEF-BD81-A88B9E860487"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.15:*:*:*:*:*:*:*", "cpeNameId": "9B349C0E-D91F-485E-A777-06055A4DF1D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.16:*:*:*:*:*:*:*", "cpeNameId": "0101B6BB-6E04-4238-A384-245C8C831FE0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.17:*:*:*:*:*:*:*", "cpeNameId": "B70E75C0-1784-4F2D-9890-72635AD1ABC8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.18:*:*:*:*:*:*:*", "cpeNameId": "FC1C2672-396B-452C-97B1-6C7F0583CB21"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.19:*:*:*:*:*:*:*", "cpeNameId": "6CE0FEDB-F644-4A9C-A88A-8F9D69B58BBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.25:*:*:*:*:*:*:*", "cpeNameId": "E9B47122-76AA-45F9-9BA9-9AA7D47E1819"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13:-:*:*:*:*:*:*", "cpeNameId": "760A4977-F4EC-4445-8EED-8F3540557E96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", "cpeNameId": "789E9076-49A9-4149-A146-FFAB80FD6312"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", "cpeNameId": "510FD2D9-571A-4924-B0B5-266204ABEF00"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", "cpeNameId": "B7FC9139-392C-42D9-B092-06ADE363B7C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", "cpeNameId": "78FDEB4A-AC37-4CEB-90F2-69700A1DFCB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*", "cpeNameId": "2B4C5B22-5D8E-46CA-A9A7-D488F2847060"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13:rc6:*:*:*:*:*:*", "cpeNameId": "55D4CFE3-C4CD-4A45-A04A-BFDA91D27503"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13:rc7:*:*:*:*:*:*", "cpeNameId": "DD429168-8AFF-457A-A8A7-8723FDC00949"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.0-52:*:*:*:*:*:*:*", "cpeNameId": "292646CC-C335-4347-87AE-6E1555659B40"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.1:*:*:*:*:*:*:*", "cpeNameId": "30F1E081-ED8A-457C-8465-D9C070DF0721"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.2:*:*:*:*:*:*:*", "cpeNameId": "17573538-60C1-4BBE-8321-EDE2F7F0E1A3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.3:*:*:*:*:*:*:*", "cpeNameId": "E0E67EF3-1AC9-4F29-B215-A82FF3493F6D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.4:*:*:*:*:*:*:*", "cpeNameId": "C6A71459-E60F-4B6A-B838-AE055D002725"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.5:*:*:*:*:*:*:*", "cpeNameId": "2F2A9933-4925-48E1-A572-276C4704E76F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.6:*:*:*:*:*:*:*", "cpeNameId": "9B5FC7E8-F482-43BD-B50D-7371AB3D4692"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.7:*:*:*:*:*:*:*", "cpeNameId": "94B23D33-6B16-475B-BF18-12A4FD5BE981"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.8:*:*:*:*:*:*:*", "cpeNameId": "71FC3F52-9D0F-4FA1-BEC8-7E662B3F0865"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.9:*:*:*:*:*:*:*", "cpeNameId": "5F17B3D4-BEAA-4606-B54B-419BE8532261"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.10:*:*:*:*:*:*:*", "cpeNameId": "73EC9A1A-02F6-4D0A-993F-5F2F9277F242"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.11:*:*:*:*:*:*:*", "cpeNameId": "45FFC97B-0FB5-4F9F-8660-FDCF0FBD5166"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.12:*:*:*:*:*:*:*", "cpeNameId": "2C6FC6E4-806F-4C8F-BC99-E279D18A47F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.13:*:*:*:*:*:*:*", "cpeNameId": "EBA292BE-DC50-49A1-8C5B-284C05E30E80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.14:*:*:*:*:*:*:*", "cpeNameId": "950E8486-A34F-4B8C-B6B9-213FB5D2B553"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.15:*:*:*:*:*:*:*", "cpeNameId": "DD0ACE31-23BC-46AE-8C24-DDE99C1677FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.16:*:*:*:*:*:*:*", "cpeNameId": "7D6ABA87-CFF7-4467-B1EB-26F1B2C8CD86"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.17:*:*:*:*:*:*:*", "cpeNameId": "B6F4951C-AB24-43F3-8361-34CD2C0DA81E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.18:*:*:*:*:*:*:*", "cpeNameId": "C7B2B5A1-F367-42EA-BB1B-F03C29AE7228"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.19:*:*:*:*:*:*:*", "cpeNameId": "39AC74B5-3F06-44E2-8F03-3C3F552C6111"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14:-:*:*:*:*:*:*", "cpeNameId": "290B9F79-3C87-4725-9517-AF89CC5F87D6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14:rc1:*:*:*:*:*:*", "cpeNameId": "A83E7C0B-A2D1-46BB-A787-DF9B68EA842A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14:rc2:*:*:*:*:*:*", "cpeNameId": "3FC14149-AA1E-48B5-8F75-5B5DD861A257"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14:rc3:*:*:*:*:*:*", "cpeNameId": "FA98B0B7-3C8F-4AC4-96E2-C1ED5869C608"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14:rc4:*:*:*:*:*:*", "cpeNameId": "21FB0B0F-DD53-4505-A841-D56D4C98ADDA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14:rc5:*:*:*:*:*:*", "cpeNameId": "4DDE3D5C-B126-49B9-8255-B97A9F55DC75"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14:rc6:*:*:*:*:*:*", "cpeNameId": "AC770C18-100E-4D5A-8E7C-548B363374D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.1:*:*:*:*:*:*:*", "cpeNameId": "6ED5E726-F7B4-446F-8B58-8756B5D09D3A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.2:*:*:*:*:*:*:*", "cpeNameId": "EEEEDE36-29F0-45B2-A5AD-AC615F9ECBFE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.3:*:*:*:*:*:*:*", "cpeNameId": "820DBC02-C9B5-4003-84F4-6C88EE2C3161"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.4:*:*:*:*:*:*:*", "cpeNameId": "75EEBB8F-B653-4BE3-8748-7973BB51D982"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.5:*:*:*:*:*:*:*", "cpeNameId": "EB2BAAA7-D118-4EE4-8974-B5E91B2DD088"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.6:*:*:*:*:*:*:*", "cpeNameId": "A90AEBB1-634D-4E4C-9EB4-5A378DA9921E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.7:*:*:*:*:*:*:*", "cpeNameId": "713408CD-13C2-4E22-A7CF-1CFA01082262"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.8:*:*:*:*:*:*:*", "cpeNameId": "AF7173EC-5AA6-4152-ADE2-77F860F5DCBD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.9:*:*:*:*:*:*:*", "cpeNameId": "5C3FF227-DDB0-4ACE-9170-4BE4CDA39239"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.10:*:*:*:*:*:*:*", "cpeNameId": "B9A635C8-CD0F-4897-A6E6-11F42F597CF7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.11:*:*:*:*:*:*:*", "cpeNameId": "D302868E-99BB-4C0C-9EC5-22E0F2F7B58A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.12:*:*:*:*:*:*:*", "cpeNameId": "227CCDD9-0DA9-4E19-A3A0-98182C78A04D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.13:*:*:*:*:*:*:*", "cpeNameId": "BA9F4788-9EAB-4974-B38D-F49FA29FCAB7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.14:*:*:*:*:*:*:*", "cpeNameId": "30A4EDD4-FFDC-46D1-9525-65CE02584D95"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.15:*:*:*:*:*:*:*", "cpeNameId": "253EE3A7-BB19-4AC4-B7F6-9B50D49FE43B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.16:*:*:*:*:*:*:*", "cpeNameId": "CFD0FB79-CC87-491D-8B44-C835289F1FF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.17:*:*:*:*:*:*:*", "cpeNameId": "6D7A8649-F82D-4F46-8B54-B4A42730DC62"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.18:*:*:*:*:*:*:*", "cpeNameId": "F5056E34-3AA2-4E1D-9445-D36A5E9AC2AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.19:*:*:*:*:*:*:*", "cpeNameId": "173C2A8A-1254-4EA0-8FE0-266FB47C42E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.20:*:*:*:*:*:*:*", "cpeNameId": "91634B25-518C-487C-90FC-C295D8AEF303"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.21:*:*:*:*:*:*:*", "cpeNameId": "1188704C-1DAC-4A1B-876D-B462547A9A1D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15:-:*:*:*:*:*:*", "cpeNameId": "599716EA-4916-4E30-8C24-4C6384D09138"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*", "cpeNameId": "CC920260-1BAF-4237-9263-2BCB29AE387F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*", "cpeNameId": "E052153B-5861-4C61-8207-1ED350609920"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:*", "cpeNameId": "6DBE44D0-670B-4B11-93BC-5CE160AE79A0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15:rc4:*:*:*:*:*:*", "cpeNameId": "D2702E38-FC04-4035-9742-46E5C2C32FF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15:rc5:*:*:*:*:*:*", "cpeNameId": "A638E326-4ACA-4CBB-8541-3860AEC16C9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15:rc6:*:*:*:*:*:*", "cpeNameId": "3E354D0D-99D1-4D2E-A42D-66946B7130B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15:rc7:*:*:*:*:*:*", "cpeNameId": "3FA3424A-B73B-4456-B871-280BBF7DE793"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.0:*:*:*:*:*:*:*", "cpeNameId": "3B152660-5C53-45F1-82AE-702237DAC922"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.0-58:*:*:*:*:*:*:*", "cpeNameId": "06ABD7CB-C7BF-4F85-ABD4-36F90A9114F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.1:*:*:*:*:*:*:*", "cpeNameId": "C92526FC-5702-4551-95C4-5D185E57703A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.2:*:*:*:*:*:*:*", "cpeNameId": "A70688C6-4AA2-4110-BC86-CA9E324DF3EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.3:*:*:*:*:*:*:*", "cpeNameId": "64CD2A28-6AE0-4894-8B00-F5232E3C34A9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.3:-:*:*:*:*:*:*", "cpeNameId": "FE18FBEA-C217-402C-8731-7C387B4B3D7F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.4:*:*:*:*:*:*:*", "cpeNameId": "969BD4C0-B372-451B-9376-0CA5FB3C286F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.5:*:*:*:*:*:*:*", "cpeNameId": "7309FA34-EDC1-41D1-BB4E-09F09900678F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.6:*:*:*:*:*:*:*", "cpeNameId": "DA042DB6-921A-4071-A171-7D0C2BBBC8F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.7:*:*:*:*:*:*:*", "cpeNameId": "0E69D848-C6AF-45F1-B581-3435108E1E1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.8:*:*:*:*:*:*:*", "cpeNameId": "73679DB9-DB66-4D04-9362-9F7FDE3ED7DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.9:*:*:*:*:*:*:*", "cpeNameId": "A914D016-CDDA-4F8C-8D11-AD68CA078395"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.10:*:*:*:*:*:*:*", "cpeNameId": "B8732B41-FD4D-4BB5-B500-664C2BA3129F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.11:*:*:*:*:*:*:*", "cpeNameId": "A58F2B5E-D805-40E6-B2EC-38AB78F48EBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.12:*:*:*:*:*:*:*", "cpeNameId": "C570EA74-0498-4116-8B63-2E08DB9EAF91"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.13:*:*:*:*:*:*:*", "cpeNameId": "D43ECFE8-45FA-41D1-94B9-F6A3601D99C4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.14:*:*:*:*:*:*:*", "cpeNameId": "9B285A1E-C507-4EDB-A79D-7F3A707A00D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.15:*:*:*:*:*:*:*", "cpeNameId": "479523C1-5DFC-4ADF-88A9-60D25E740ECD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.16:*:*:*:*:*:*:*", "cpeNameId": "283D07E0-7CF7-428B-B5E7-F9F389F42621"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.17:*:*:*:*:*:*:*", "cpeNameId": "28209832-3CD5-4EB8-BFF7-94C00921B21A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.18:*:*:*:*:*:*:*", "cpeNameId": "C402A420-3087-4169-B118-B9576726F29A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.19:*:*:*:*:*:*:*", "cpeNameId": "71FF4C04-4676-4339-904C-E431CA842C9A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.20:*:*:*:*:*:*:*", "cpeNameId": "D3AC6061-A8AD-4B32-9631-AAD5AE8AE846"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.21:*:*:*:*:*:*:*", "cpeNameId": "01512FC7-2E77-4185-84AD-233C3850F0C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.22:*:*:*:*:*:*:*", "cpeNameId": "13950585-5CDE-450C-8569-0F629C7EDB2E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.23:*:*:*:*:*:*:*", "cpeNameId": "84D3D456-7CBD-4BB2-940D-07D97BA08C58"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.24:*:*:*:*:*:*:*", "cpeNameId": "4B07A2D0-5A94-41AD-8478-EB93089837BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.25:*:*:*:*:*:*:*", "cpeNameId": "4B57878E-85D9-4630-81F9-971E521E1D04"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.26:*:*:*:*:*:*:*", "cpeNameId": "10C93845-0531-404A-B632-86FC15D22E78"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.27:*:*:*:*:*:*:*", "cpeNameId": "6B435B64-AB1B-4029-B6A5-01DD5C19206F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.28:*:*:*:*:*:*:*", "cpeNameId": "101F745E-07DD-436D-9573-77D88FEE7DA8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.29:*:*:*:*:*:*:*", "cpeNameId": "2126A535-152D-4C7D-BEEC-5E05EFF76DBF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.30:*:*:*:*:*:*:*", "cpeNameId": "3D5050EC-725E-41E0-A0BB-89C5CC71ACC5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.31:*:*:*:*:*:*:*", "cpeNameId": "CADD5BFF-62AF-44DA-8433-F0221493495C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.32:*:*:*:*:*:*:*", "cpeNameId": "D41546A8-EBED-4F57-BD4A-9E1B2A5C17CC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.33:*:*:*:*:*:*:*", "cpeNameId": "2AD16C2A-38AA-4931-922E-B883B7574C58"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.34:*:*:*:*:*:*:*", "cpeNameId": "99C916A9-866D-4905-9878-8DD27F5E980D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.35:*:*:*:*:*:*:*", "cpeNameId": "5F3D2240-53BA-4C7D-8199-FE7F31339D4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.36:*:*:*:*:*:*:*", "cpeNameId": "FF57011F-9545-414B-B253-52F38B78B77A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.37:*:*:*:*:*:*:*", "cpeNameId": "606225EC-ECF3-4F47-91A8-7F9D17842D62"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.38:*:*:*:*:*:*:*", "cpeNameId": "4DB0EF0E-5BF0-47C3-A2F9-B3522AFF7190"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.39:*:*:*:*:*:*:*", "cpeNameId": "A08CEA1B-91C1-4711-BD80-0F7ADDE94BA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.40:*:*:*:*:*:*:*", "cpeNameId": "89D88D81-DD0E-43FD-B671-78B808D88647"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.41:*:*:*:*:*:*:*", "cpeNameId": "DD7E6E45-BF7C-46DF-958C-735232ECCBED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.42:*:*:*:*:*:*:*", "cpeNameId": "B2520F43-B7D8-4373-8869-07DCFD59FF11"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.43:*:*:*:*:*:*:*", "cpeNameId": "F16FC01A-7763-44B0-B502-4FC46DA358AF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.44:*:*:*:*:*:*:*", "cpeNameId": "030D2A9C-692A-4DB1-9D63-44DBCC0C68F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.45:*:*:*:*:*:*:*", "cpeNameId": "94C51A53-591C-4ED3-BBD6-7549EE1F8068"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.46:*:*:*:*:*:*:*", "cpeNameId": "ACC8D217-A7B0-4C18-9B70-FA0E5262BFB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.47:*:*:*:*:*:*:*", "cpeNameId": "191C3ACC-27A6-438E-9334-742147EFFBFE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.48:*:*:*:*:*:*:*", "cpeNameId": "8B81D3ED-5819-4470-BE97-D8DEA91AFBB3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.49:*:*:*:*:*:*:*", "cpeNameId": "BAF8556B-BB65-4F53-8EB5-059A294DCD67"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.50:*:*:*:*:*:*:*", "cpeNameId": "D99EABCA-D9E3-44D7-AF96-2D5F1474CD15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.51:*:*:*:*:*:*:*", "cpeNameId": "89386483-66E5-4C04-B476-C08F5BD6D0D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.52:*:*:*:*:*:*:*", "cpeNameId": "076DEA19-48DB-476C-8CFA-06ACE89F67EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.53:*:*:*:*:*:*:*", "cpeNameId": "E3AAC0BA-7638-428F-9D89-08A94750E9EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.54:*:*:*:*:*:*:*", "cpeNameId": "56A56B25-D086-4413-8692-A5882F02760F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.55:*:*:*:*:*:*:*", "cpeNameId": "4BF52F71-274C-4E09-9D64-84AAC8D6F67E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.56:*:*:*:*:*:*:*", "cpeNameId": "2D041A4C-8395-4B72-B6B7-06ECBA8E8693"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.57:*:*:*:*:*:*:*", "cpeNameId": "6B5C0E6D-8C22-41CE-8CF7-5A85861A47D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.58:*:*:*:*:*:*:*", "cpeNameId": "FCE4E1B8-7046-4626-A6D1-53B7095B20A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.59:*:*:*:*:*:*:*", "cpeNameId": "729B700C-BDB9-4DFB-A795-98DFBE32EEC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.60:*:*:*:*:*:*:*", "cpeNameId": "1D98E598-4BF4-43D6-904C-9290DDF06272"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.61:*:*:*:*:*:*:*", "cpeNameId": "6CCCAF65-435F-482C-BA22-7DDC145109F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.62:*:*:*:*:*:*:*", "cpeNameId": "B90909CA-2810-4537-A85A-4CBA4A6AF37C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.63:*:*:*:*:*:*:*", "cpeNameId": "6F0C3B38-C13C-4A80-9EBD-65AC9FCC8F9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.64:*:*:*:*:*:*:*", "cpeNameId": "F91D8B0C-B2AC-43A8-8D6C-536E4C07BDA3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.65:*:*:*:*:*:*:*", "cpeNameId": "4C75DDA0-056C-4560-B8F6-FD3A28965C0F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.66:*:*:*:*:*:*:*", "cpeNameId": "479D10C6-D8AE-4C6C-95D8-D4935062ACDA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.67:*:*:*:*:*:*:*", "cpeNameId": "ADBEA5B5-A3FF-4667-A57F-EAA8FBC5F51A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.68:*:*:*:*:*:*:*", "cpeNameId": "E5298249-E4F2-40FD-9A02-0FFE62A97655"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.69:*:*:*:*:*:*:*", "cpeNameId": "AF74FFF5-EACB-41FA-9DDE-6E9F7C2D49E9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.70:*:*:*:*:*:*:*", "cpeNameId": "626D6B66-055F-40EF-87D0-BCA1ACB41632"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.71:*:*:*:*:*:*:*", "cpeNameId": "13BB2C1F-A7E8-4FEA-802A-FCB5DB17689E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.72:*:*:*:*:*:*:*", "cpeNameId": "687ACBBC-002B-4A57-B0C5-495C006BF83A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.73:*:*:*:*:*:*:*", "cpeNameId": "2FFC61CE-E920-4907-9237-ADCB03CF57F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.74:*:*:*:*:*:*:*", "cpeNameId": "21586670-7837-44DE-98F5-E8664ECB39F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.75:*:*:*:*:*:*:*", "cpeNameId": "257AECB1-0BFD-4F2F-9E1D-8B99451293E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.76:*:*:*:*:*:*:*", "cpeNameId": "4C6C2994-8803-478D-98AD-268D0B994FD2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.77:*:*:*:*:*:*:*", "cpeNameId": "67B26A96-5B92-41D5-A933-110235C90FC2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.78:*:*:*:*:*:*:*", "cpeNameId": "93765A6E-5FF1-428E-B6DD-08E9761E4BC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.79:*:*:*:*:*:*:*", "cpeNameId": "1E46E1F7-EC81-48DB-8D87-615670C42211"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.80:*:*:*:*:*:*:*", "cpeNameId": "403BE072-9172-420B-A0DF-A011387FC467"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.81:*:*:*:*:*:*:*", "cpeNameId": "76501F14-5447-4316-96C1-406CBB85ACEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.82:*:*:*:*:*:*:*", "cpeNameId": "EC139CB2-1B4C-41BA-B74E-6E21D4C75A65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.83:*:*:*:*:*:*:*", "cpeNameId": "B82C5952-6221-4637-A4F9-27F26C848140"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.84:*:*:*:*:*:*:*", "cpeNameId": "6D9BBF85-E068-4434-9F1D-FC5E2BCCCE15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.85:*:*:*:*:*:*:*", "cpeNameId": "4DFB6EEB-3B7C-4BBE-9C57-22212F5CF117"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.86:*:*:*:*:*:*:*", "cpeNameId": "54FA7373-2A0F-441F-B2DE-D0026C9E6E2A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.87:*:*:*:*:*:*:*", "cpeNameId": "D2002224-68A5-4CEB-84E8-C68A68A70477"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.88:*:*:*:*:*:*:*", "cpeNameId": "240ADDF1-F9B5-4E8A-BB28-8D25FD6EAFAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.89:*:*:*:*:*:*:*", "cpeNameId": "E8949735-535C-4365-9E77-3F5AFA127F45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.90:*:*:*:*:*:*:*", "cpeNameId": "27480E5A-75A6-4924-AE94-56C368919E20"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.91:*:*:*:*:*:*:*", "cpeNameId": "F1444DEC-505C-4B47-89E1-558CA1FE252D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.92:*:*:*:*:*:*:*", "cpeNameId": "366E992F-2DEB-4B73-8D13-0AAA6CDAB1AA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.93:*:*:*:*:*:*:*", "cpeNameId": "8B194E4D-C302-4781-A3EB-287B9338BB49"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.94:*:*:*:*:*:*:*", "cpeNameId": "8C4F3FDB-C7D3-4FAF-ADC9-F9C48692180C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.95:*:*:*:*:*:*:*", "cpeNameId": "78DB19FE-CDF2-4493-934F-F78BAC1E3525"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.96:*:*:*:*:*:*:*", "cpeNameId": "BD7068CF-1BF4-4836-A365-A1CAA95D8492"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.97:*:*:*:*:*:*:*", "cpeNameId": "8D4F726D-1B15-4756-B043-23B295E50326"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.98:*:*:*:*:*:*:*", "cpeNameId": "26CC4C2E-D776-4C60-9E36-FCAC66C0CA93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.99:*:*:*:*:*:*:*", "cpeNameId": "FB96FD42-EA7B-4EA4-BE27-FB6AE67A19D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.100:*:*:*:*:*:*:*", "cpeNameId": "8D34EF8C-BCA7-4EC8-9C69-559A59897E86"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.101:*:*:*:*:*:*:*", "cpeNameId": "6675EF7C-AACC-4247-A01C-896C9A44CFB9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.102:*:*:*:*:*:*:*", "cpeNameId": "2FEF936B-B116-4F46-8301-200550628240"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.103:*:*:*:*:*:*:*", "cpeNameId": "DE221176-159A-4357-8F12-AC71670703B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.104:*:*:*:*:*:*:*", "cpeNameId": "C1896DF2-E302-460B-9502-CF7063E5DF9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.105:*:*:*:*:*:*:*", "cpeNameId": "9E101463-342E-4486-823F-3BC4BD391306"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.106:*:*:*:*:*:*:*", "cpeNameId": "CA88855E-C837-4947-93E0-B9D7F9B827E7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.107:*:*:*:*:*:*:*", "cpeNameId": "B13F0C93-E3E4-4641-9EAB-3EA2990A1C89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.108:*:*:*:*:*:*:*", "cpeNameId": "130C0395-CE35-4126-A645-AADC5CD80532"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.109:*:*:*:*:*:*:*", "cpeNameId": "45D1D3CB-FD9D-42FB-A1D3-534BC36E80EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.110:*:*:*:*:*:*:*", "cpeNameId": "A931A0BD-98A1-47EB-9A75-0E8789CD2174"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.111:*:*:*:*:*:*:*", "cpeNameId": "CED0554E-DE06-438B-BD20-D55AB97E2137"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.112:*:*:*:*:*:*:*", "cpeNameId": "01469DE3-F508-4F50-B7EF-CFFAF6B0244A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.113:*:*:*:*:*:*:*", "cpeNameId": "EE8A8B31-F5BC-463C-8C3F-F99C8605D124"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.114:*:*:*:*:*:*:*", "cpeNameId": "7555AB4A-AA90-4F9E-AC9A-522F0EBB84B6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.115:*:*:*:*:*:*:*", "cpeNameId": "37780F52-A144-418A-8605-87E836109FA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.116:*:*:*:*:*:*:*", "cpeNameId": "67C9CBE9-0CF6-4DC1-96C9-8B8D0C572C76"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.117:*:*:*:*:*:*:*", "cpeNameId": "ADB012DE-27D7-4796-A07A-55897A9208B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.118:*:*:*:*:*:*:*", "cpeNameId": "6CAF3A99-3538-4B78-AB6F-1FD5BC1D3731"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.119:*:*:*:*:*:*:*", "cpeNameId": "F62E2EC5-1929-49E3-8920-4EFC89470EF3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.120:*:*:*:*:*:*:*", "cpeNameId": "1ACD20AE-5810-4832-9596-E0F2B77F6DED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.121:*:*:*:*:*:*:*", "cpeNameId": "0840D171-E172-4AEB-9A04-748165172F57"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.122:*:*:*:*:*:*:*", "cpeNameId": "108F7161-9C83-4AF5-81CE-7210DBE16A3B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.123:*:*:*:*:*:*:*", "cpeNameId": "AFC5B1D0-7550-4CA6-B9D8-7362589804BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.124:*:*:*:*:*:*:*", "cpeNameId": "607A4975-DD27-45FB-8492-B2D610C8CE49"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.125:*:*:*:*:*:*:*", "cpeNameId": "7CFAB9E2-3565-4DBE-A4A3-F420E0E6F1B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.126:*:*:*:*:*:*:*", "cpeNameId": "934C84D4-9205-4231-918D-52F8653AD03A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.127:*:*:*:*:*:*:*", "cpeNameId": "94F04153-424F-4287-9D87-86D843B8EC6B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.128:*:*:*:*:*:*:*", "cpeNameId": "3A0743EE-08EE-4033-974B-534685606B8D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.129:*:*:*:*:*:*:*", "cpeNameId": "1851B737-51D3-44EC-BAD0-C326CB4B258A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.130:*:*:*:*:*:*:*", "cpeNameId": "5E3B9172-8C12-4171-BE40-947651A6C1D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.131:*:*:*:*:*:*:*", "cpeNameId": "68CDD386-3C55-4849-BFDD-71A5DF5ECF00"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.132:*:*:*:*:*:*:*", "cpeNameId": "3F25FB70-CBCF-4363-947B-8D0749D054A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.133:*:*:*:*:*:*:*", "cpeNameId": "183855CE-2982-4596-954A-C8AD340BB217"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.134:*:*:*:*:*:*:*", "cpeNameId": "2C960D3A-EB30-4662-92DE-2F4DCA1B61DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.135:*:*:*:*:*:*:*", "cpeNameId": "795D4E07-5632-4B2F-889E-52121C56C87A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.136:*:*:*:*:*:*:*", "cpeNameId": "39F63867-B3B8-4B11-8568-793FE9BF0657"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.137:*:*:*:*:*:*:*", "cpeNameId": "86AFC96E-5CC1-4C7C-8D07-20BF5FD72F51"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.138:*:*:*:*:*:*:*", "cpeNameId": "6D98B672-ABF1-4E6A-85CA-C98156AD289F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.139:*:*:*:*:*:*:*", "cpeNameId": "60BDBDA5-D58A-4E1E-87FB-110840F829F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.140:*:*:*:*:*:*:*", "cpeNameId": "44DCAB0F-015F-4450-9454-1B281A41F7FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.141:*:*:*:*:*:*:*", "cpeNameId": "3C8C0EA5-6615-4404-9C0E-507EA505E607"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.142:*:*:*:*:*:*:*", "cpeNameId": "AACA090B-6D25-4504-8EEF-02C1DA914B55"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.143:*:*:*:*:*:*:*", "cpeNameId": "04411AB1-68B2-43CF-8AAF-023A00274276"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.144:*:*:*:*:*:*:*", "cpeNameId": "D1A15124-7544-4990-8884-8EC08CBDB231"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.145:*:*:*:*:*:*:*", "cpeNameId": "DBDB8123-C794-42AF-B554-13E794244440"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.146:*:*:*:*:*:*:*", "cpeNameId": "CD3243D1-4C4E-424A-BCFE-7FAF5782049D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.147:*:*:*:*:*:*:*", "cpeNameId": "D14C7C5E-C636-4B9B-941A-1B5D3FE4AF3B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.148:*:*:*:*:*:*:*", "cpeNameId": "43B668A9-8ADC-487B-8857-F8CC74D99990"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.149:*:*:*:*:*:*:*", "cpeNameId": "8C6DF61D-1354-424F-88D4-C76B0044C4BA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.150:*:*:*:*:*:*:*", "cpeNameId": "405263B7-A847-493D-BAC8-67CDC081E8A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.151:*:*:*:*:*:*:*", "cpeNameId": "AFB5460A-5F15-4E58-A1D9-438F22B08C61"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.152:*:*:*:*:*:*:*", "cpeNameId": "6FD5D09F-908B-4EA6-ADDA-D5D4867282C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.153:*:*:*:*:*:*:*", "cpeNameId": "35BC07C8-138B-48CB-94C8-F4F2DE1CEA73"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.154:*:*:*:*:*:*:*", "cpeNameId": "104BA652-53EA-4BE7-AEF6-1E69DF5BAB94"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.155:*:*:*:*:*:*:*", "cpeNameId": "82D13E0C-C092-4C55-8F8E-A8EC9F7C5B28"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.156:*:*:*:*:*:*:*", "cpeNameId": "0208D826-E36F-43ED-94E2-47B3786BDA8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.157:*:*:*:*:*:*:*", "cpeNameId": "29BE7FF8-0D66-4613-9FF9-1491805EF6E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.158:*:*:*:*:*:*:*", "cpeNameId": "F0BD86B6-9DA2-4CB5-925F-AED18EA69B7A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.159:*:*:*:*:*:*:*", "cpeNameId": "1967C928-055E-41A6-9452-11327EFD81F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.160:*:*:*:*:*:*:*", "cpeNameId": "39762989-4F30-40E8-9958-8100639F003F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.161:*:*:*:*:*:*:*", "cpeNameId": "93EFCF93-5625-453D-B8C8-D532F2F6B2EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.162:*:*:*:*:*:*:*", "cpeNameId": "AD93992B-560A-4880-AB8E-2B12E1ED9CE6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.163:*:*:*:*:*:*:*", "cpeNameId": "9F1AF162-C909-4161-9860-93F52BA93C11"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.164:*:*:*:*:*:*:*", "cpeNameId": "E82128C3-95AC-4517-8595-90030EB8B1B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.165:*:*:*:*:*:*:*", "cpeNameId": "DD75A3C4-3B2C-47C3-8249-25430F6326F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.166:*:*:*:*:*:*:*", "cpeNameId": "C4AE610D-F204-40F4-9F0E-A12F96513628"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.167:*:*:*:*:*:*:*", "cpeNameId": "AD2CD499-D496-457D-B206-76DD055935D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.168:*:*:*:*:*:*:*", "cpeNameId": "D17DDC10-C0C2-4595-99AA-7D081F156E28"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.170:*:*:*:*:*:*:*", "cpeNameId": "68B1E403-BB7E-46D6-93FB-39CCDEC9F903"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.171:*:*:*:*:*:*:*", "cpeNameId": "20D00418-523B-451C-A87C-A7494767A55C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.172:*:*:*:*:*:*:*", "cpeNameId": "BF5B290A-52DC-4153-9821-1E04DA80704B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16:-:*:*:*:*:*:*", "cpeNameId": "C83A7E51-CA73-46EC-8635-C725205B637D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*", "cpeNameId": "028A348E-72E2-4B13-9D61-56938AFFB6F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:*", "cpeNameId": "6495A470-21D2-43F0-B762-C6ECB6134C5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16:rc3:*:*:*:*:*:*", "cpeNameId": "6342FCDA-7AC5-4E1B-A8F7-C4A7CB62F606"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16:rc4:*:*:*:*:*:*", "cpeNameId": "3379676E-35B7-4474-8A99-EF053E0FD968"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16:rc5:*:*:*:*:*:*", "cpeNameId": "AE10DE94-CADF-4B77-B540-4197CCAB49EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16:rc6:*:*:*:*:*:*", "cpeNameId": "EFBAB573-844C-4A77-BC98-353AB1C86E1A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16:rc7:*:*:*:*:*:*", "cpeNameId": "71AEECF0-21D6-492A-999E-8D6687D719A7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.0:*:*:*:*:*:*:*", "cpeNameId": "081E7EC8-3E8E-48D4-8187-1B96F6BE062F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.0:rc1:*:*:*:*:*:*", "cpeNameId": "EB5911C8-9712-4439-99F2-5BCDED060240"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.1:*:*:*:*:*:*:*", "cpeNameId": "2730ED9E-094C-40E1-B3C5-75C02A9E1BBD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.2:*:*:*:*:*:*:*", "cpeNameId": "7A33187A-7AA3-4565-BD7A-EE2304904D3B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.3:*:*:*:*:*:*:*", "cpeNameId": "F0C5525B-4224-4481-9190-16DFA7982F9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.4:*:*:*:*:*:*:*", "cpeNameId": "891F8D0E-202D-4728-9D83-764496E40CB9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.5:*:*:*:*:*:*:*", "cpeNameId": "AFC47178-4013-4A67-BFBE-F2C1D8C43FAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.6:*:*:*:*:*:*:*", "cpeNameId": "A563BA20-7E45-4F95-97CC-B991BEE12EC2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.7:*:*:*:*:*:*:*", "cpeNameId": "62897C18-4BA0-46BF-A3C6-A2F57B2C400F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.8:*:*:*:*:*:*:*", "cpeNameId": "0D9ED6C5-B404-47B6-BDDA-21FB4E7392DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.9:*:*:*:*:*:*:*", "cpeNameId": "DBB9E77F-F972-4486-AE16-C40C76D64E87"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.10:*:*:*:*:*:*:*", "cpeNameId": "7D6A655C-B244-446F-8CDC-4D17D47253AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.11:*:*:*:*:*:*:*", "cpeNameId": "B5EB9714-867F-44F9-9AA3-BE8D500D4BC5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.12:*:*:*:*:*:*:*", "cpeNameId": "8BF0B6A9-F5F7-4EF6-A81F-9AA1DEBFBCE3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.13:*:*:*:*:*:*:*", "cpeNameId": "BE8039FF-A2FF-4592-BCF2-FDE1271C80D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.14:*:*:*:*:*:*:*", "cpeNameId": "70857AD4-FC92-4F1B-905E-19EC450C5B11"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.15:*:*:*:*:*:*:*", "cpeNameId": "AC26CE14-E5B3-4159-805B-6EC9D9B37D83"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.16:*:*:*:*:*:*:*", "cpeNameId": "544C971D-5F36-423D-AB36-E217BE202DB8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.17:*:*:*:*:*:*:*", "cpeNameId": "2A58FEF7-CB40-428A-806B-BE0B32BBB723"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.18:*:*:*:*:*:*:*", "cpeNameId": "7FBBF4E8-6F44-4592-8069-C21668D738E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.19:*:*:*:*:*:*:*", "cpeNameId": "CA37F5FB-5C02-45F3-B7B7-1F56F552B120"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.20:*:*:*:*:*:*:*", "cpeNameId": "83FC3AB5-576E-489E-A697-0865FE9D7439"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.62:*:*:*:*:*:*:*", "cpeNameId": "AC968C04-563B-44E7-A323-6CF404B73D4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:-:*:*:*:*:*:*", "cpeNameId": "805B659E-0A6A-4EDE-9E81-F83A30B3264A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*", "cpeNameId": "A87C09DD-69B1-4CA9-8AE6-3DBF4DF3F11D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*", "cpeNameId": "8F54EDC5-48AB-4577-8C36-660DC7D71454"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:rc3:*:*:*:*:*:*", "cpeNameId": "BA251D8D-4559-451C-9974-E9C6B8087A08"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:rc4:*:*:*:*:*:*", "cpeNameId": "75F94F87-13C3-44A6-80AF-C0C5C599E2A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:rc5:*:*:*:*:*:*", "cpeNameId": "CB671C15-924A-43CA-91DB-1D9FA9D0CC25"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:rc6:*:*:*:*:*:*", "cpeNameId": "A9B040E0-4FFC-4F00-ADB0-5AC01F8F04ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:rc7:*:*:*:*:*:*", "cpeNameId": "EC464421-E417-4360-86C8-511D0221DCF2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:rc8:*:*:*:*:*:*", "cpeNameId": "B3CC3FB2-843F-4B86-86B3-D72EEFBA33FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.1:*:*:*:*:*:*:*", "cpeNameId": "E3D26A37-A963-4501-AD97-1E252FA7A48E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.2:*:*:*:*:*:*:*", "cpeNameId": "7B9C1788-8178-4BDD-8547-0B3193B030A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.3:*:*:*:*:*:*:*", "cpeNameId": "C4DE0AAD-9698-4ADE-A59B-3A730D1B10C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.4:*:*:*:*:*:*:*", "cpeNameId": "EA1887EA-7FF5-4222-B72B-F17A05C0B035"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.5:*:*:*:*:*:*:*", "cpeNameId": "662B2A28-A112-4710-A201-3017CBD3FC8F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.6:*:*:*:*:*:*:*", "cpeNameId": "77EB0841-4431-4A1E-A99F-ACE36FC6FE50"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.7:*:*:*:*:*:*:*", "cpeNameId": "F2EA9343-31D9-42B5-B7DB-D7DDDE92F4F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.8:*:*:*:*:*:*:*", "cpeNameId": "31AD3C06-0526-4470-BC59-67D196013B43"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.9:*:*:*:*:*:*:*", "cpeNameId": "D3C822DE-EC22-4C9B-9AA7-C084613C6FF9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.10:*:*:*:*:*:*:*", "cpeNameId": "4CE524CA-B05D-4C9E-B81A-1937E7FFE6DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.11:*:*:*:*:*:*:*", "cpeNameId": "234E800C-A082-4960-BA0D-975F256DDD4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.12:*:*:*:*:*:*:*", "cpeNameId": "878DE0B7-411C-4C58-B753-C6D22E664553"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.13:*:*:*:*:*:*:*", "cpeNameId": "996D982B-11AA-4504-A9CD-8787C813BFBD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.14:*:*:*:*:*:*:*", "cpeNameId": "5E2AEB31-D1FD-4E9D-9CA9-0F9457674EA9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.15:*:*:*:*:*:*:*", "cpeNameId": "2C08D207-8B50-400F-9807-FB3072AD4E6A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:-:*:*:*:*:*:*", "cpeNameId": "0FD8602E-5D63-49B5-AB56-CB2948250E45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:rc1:*:*:*:*:*:*", "cpeNameId": "1DECE9B9-E9A2-4045-BD0B-C6510F69937D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:rc2:*:*:*:*:*:*", "cpeNameId": "EE2606B9-AA8F-4D28-8575-7AD825CAD250"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:rc3:*:*:*:*:*:*", "cpeNameId": "BC668967-571A-466D-8C69-9495260D3BBD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:rc4:*:*:*:*:*:*", "cpeNameId": "FD9CE501-B79F-4899-A816-149019C673E4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:rc5:*:*:*:*:*:*", "cpeNameId": "2E4EE9B2-FC64-4E7E-9757-5109B02E0AAF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:rc6:*:*:*:*:*:*", "cpeNameId": "D5A2141A-53D1-4E5B-B7C7-4FB179F6F219"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:rc7:*:*:*:*:*:*", "cpeNameId": "CF8E007E-9F74-4780-A09E-D101B3076FDF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:rc9:*:*:*:*:*:*", "cpeNameId": "E38067B2-E041-45F1-8A88-DE716AEDC5A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.1:*:*:*:*:*:*:*", "cpeNameId": "5EE504EE-64C4-4361-86B4-E5A7BD65776C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.2:*:*:*:*:*:*:*", "cpeNameId": "787215C4-0507-4760-BF1F-2A8491B66E4F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.3:*:*:*:*:*:*:*", "cpeNameId": "D2A628F1-1878-4C0B-87E6-B21A7CE382D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.4:*:*:*:*:*:*:*", "cpeNameId": "4890EDC3-B4E8-4CD2-AC95-A9DB9CB74FBF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.5:*:*:*:*:*:*:*", "cpeNameId": "BAA68B22-F0BC-45AD-A350-E8774FC53150"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.6:*:*:*:*:*:*:*", "cpeNameId": "C27B6005-D7EB-47DE-B01C-D5BD2B818D3A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.7:*:*:*:*:*:*:*", "cpeNameId": "89AE071D-DFF0-40A5-B7CE-BA33F9FCC5E7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.8:*:*:*:*:*:*:*", "cpeNameId": "F32F879F-B0ED-4F85-B1AD-A45D6DE80D86"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.9:*:*:*:*:*:*:*", "cpeNameId": "AE86A00C-455A-4075-9AC6-714B1F66D934"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.10:*:*:*:*:*:*:*", "cpeNameId": "704396EF-097A-4DFF-8DAE-4B19965C49AF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.11:*:*:*:*:*:*:*", "cpeNameId": "5CFE2D2B-62BD-448C-B0D4-5F7A9B8AB669"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.12:*:*:*:*:*:*:*", "cpeNameId": "F9A857D7-99FC-4761-B4DF-76E758BDE2BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.13:*:*:*:*:*:*:*", "cpeNameId": "A2A3B308-1BA2-4C79-88AF-861CE6482E28"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.14:*:*:*:*:*:*:*", "cpeNameId": "534CA992-2337-4EA8-B1F7-256574B35175"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.15:*:*:*:*:*:*:*", "cpeNameId": "2074E50B-BBEE-4902-B9F2-24E1B862076E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.16:*:*:*:*:*:*:*", "cpeNameId": "D2A2905E-45CE-4135-8D5D-0FF92766109E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.17:*:*:*:*:*:*:*", "cpeNameId": "4794F12E-3EDA-4619-BBB0-E275E1F06710"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.18:*:*:*:*:*:*:*", "cpeNameId": "17C90012-A0AA-459E-946A-B3C82983B22B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.19:*:*:*:*:*:*:*", "cpeNameId": "222B7748-23E3-4A4D-B9D5-4C5A6D5B2AEF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:-:*:*:*:*:*:*", "cpeNameId": "A7C04E0A-EF2B-426E-8AFE-CDFB04C2EE00"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*", "cpeNameId": "91317E86-8C24-4B48-BD6D-8EF732A881D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*", "cpeNameId": "4D6C0AAC-C284-42AB-8F4E-E54D5294D180"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*", "cpeNameId": "08BCB0AD-FBD2-4A2B-B8AE-9733E31BA02A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*", "cpeNameId": "5EC4698A-FD3A-4387-B636-810BCCBE2F15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*", "cpeNameId": "6FBD2340-901D-4CE1-BA59-55C77404D099"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*", "cpeNameId": "009D67E0-1C71-4212-BE27-834E15E8112B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*", "cpeNameId": "9294C90D-628E-44F8-B196-9ADEF3B72C89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:rc8:*:*:*:*:*:*", "cpeNameId": "1EF80A31-F9CD-4870-9F50-F71C1D3F4DC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.1:*:*:*:*:*:*:*", "cpeNameId": "3409D2C8-FB81-4CE9-9B26-677FAAD94F42"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.2:*:*:*:*:*:*:*", "cpeNameId": "0B80A369-7E22-4E25-8D33-298AD0B23074"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.3:*:*:*:*:*:*:*", "cpeNameId": "9E737761-792A-4225-9385-3EBF3CBBBA81"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.4:*:*:*:*:*:*:*", "cpeNameId": "5435810C-35B3-4401-9434-7EE8DE82604B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.5:*:*:*:*:*:*:*", "cpeNameId": "937FA107-2C1F-4AF8-955A-66F90A3DBB9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.6:*:*:*:*:*:*:*", "cpeNameId": "DD0D3175-C807-4197-BC7D-3737DEB5602D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.7:*:*:*:*:*:*:*", "cpeNameId": "A60E3F91-9293-4B3E-98E9-0D11D1942C1B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.8:*:*:*:*:*:*:*", "cpeNameId": "1A2B6F42-AF1B-473E-8033-83C73609D4E4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.9:*:*:*:*:*:*:*", "cpeNameId": "7664EA3B-7AD2-46EC-92EF-552091071A5F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.10:*:*:*:*:*:*:*", "cpeNameId": "93A56D61-5B65-4D74-ABEF-766372AF7AA0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.11:*:*:*:*:*:*:*", "cpeNameId": "C9534805-84C6-45B9-86BF-7D05E4136C96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.12:*:*:*:*:*:*:*", "cpeNameId": "DE9B1782-E79B-4EF2-8CDB-3D24CF153AC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.13:*:*:*:*:*:*:*", "cpeNameId": "BC90F145-D85D-4388-A4F8-2151884F1663"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.14:*:*:*:*:*:*:*", "cpeNameId": "C0BCABF8-19C2-4B49-9A49-EF7128C5B8B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.15:*:*:*:*:*:*:*", "cpeNameId": "88BDA49D-7A90-40EB-B71E-A570891B9EE6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.16:*:*:*:*:*:*:*", "cpeNameId": "9C3D06BA-AF02-4FFD-AE35-347B04643683"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.17:*:*:*:*:*:*:*", "cpeNameId": "124836C8-7921-4BFE-A64C-AE9F640C9130"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0:-:*:*:*:*:*:*", "cpeNameId": "3A2B23AB-CBA1-42BB-8FA6-C64C95B4FFC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:*", "cpeNameId": "28304135-D881-4B0E-B7C6-826D7CA6F1CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0:rc2:*:*:*:*:*:*", "cpeNameId": "80E35649-C2A2-423F-93D6-8DA4F6A8B4E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0:rc3:*:*:*:*:*:*", "cpeNameId": "D7F3713F-F696-4D43-80A5-98433FA9F02D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0:rc4:*:*:*:*:*:*", "cpeNameId": "C16C9B3F-BD8C-4404-B51D-91856734622D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0:rc5:*:*:*:*:*:*", "cpeNameId": "453F7A7A-15F4-4D21-B85B-6C1DE66FF9F4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0:rc6:*:*:*:*:*:*", "cpeNameId": "42BE5475-0D59-4599-AC53-94A247DA277C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0:rc7:*:*:*:*:*:*", "cpeNameId": "9F921345-A999-4E40-9F3F-4F009C78FBAE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.1:*:*:*:*:*:*:*", "cpeNameId": "DA897396-3BC0-4AC4-B42D-98475AAEFDB1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.2:*:*:*:*:*:*:*", "cpeNameId": "EAFB7D30-6006-44B3-9687-77CBE235323A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.3:*:*:*:*:*:*:*", "cpeNameId": "09573A93-AEDE-4BBA-88F3-6F5CC94F2EE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.4:*:*:*:*:*:*:*", "cpeNameId": "DA0AA4FE-4C59-448A-88DC-C8A8EAF513E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.5:*:*:*:*:*:*:*", "cpeNameId": "C8D96C96-4D7D-4FA4-9CEA-660BF39FC1D7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.6:*:*:*:*:*:*:*", "cpeNameId": "C978C4EF-7AF5-4AA8-BD1D-954E9D7476AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.7:*:*:*:*:*:*:*", "cpeNameId": "70248903-1B6E-43D3-963F-9CCA75253E2A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.8:*:*:*:*:*:*:*", "cpeNameId": "22375451-92E0-4690-B7C4-82B63F7F54AA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.9:*:*:*:*:*:*:*", "cpeNameId": "792202AB-6A0E-491B-87FC-3F98835781A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.10:*:*:*:*:*:*:*", "cpeNameId": "FF48867C-F23F-4340-96AC-8C40D01A93A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.11:*:*:*:*:*:*:*", "cpeNameId": "E8A33859-F785-4E67-83D6-3304A2AC8F1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.12:*:*:*:*:*:*:*", "cpeNameId": "BBCB0428-C568-4F4B-8069-BFC5DE18BA66"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.13:*:*:*:*:*:*:*", "cpeNameId": "785980A5-8FCC-4DEB-8C31-6B66B3F2ED06"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.14:*:*:*:*:*:*:*", "cpeNameId": "3D9CF1CA-591F-4D6B-835F-71E494855265"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.15:*:*:*:*:*:*:*", "cpeNameId": "3DB8BB3F-8384-49A3-9B5C-0C812B669916"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.16:*:*:*:*:*:*:*", "cpeNameId": "97B95EF5-6328-416C-A983-BAD4DB8178EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.17:*:*:*:*:*:*:*", "cpeNameId": "5D22785E-D725-46B7-83E8-9AA3F1B1EE61"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.18:*:*:*:*:*:*:*", "cpeNameId": "F5B47278-06DD-4334-BEAA-82D99836E0CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.19:*:*:*:*:*:*:*", "cpeNameId": "2D6FBBDE-1828-44E5-AE5B-0844E49DD7DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:-:*:*:*:*:*:*", "cpeNameId": "E1B09DBA-878F-4B52-AE09-74B0B8F5D68F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*", "cpeNameId": "30EC2354-B32A-44E9-9861-CEA7D545DFBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*", "cpeNameId": "BFAC13C0-7539-40DF-B674-4ECCA1868626"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*", "cpeNameId": "585AB024-3F59-4BDB-A302-D224DF5D8495"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*", "cpeNameId": "4A21513E-7139-44E5-88E8-9B991661CF3C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*", "cpeNameId": "8D834469-69DF-4937-AFF3-A0B90AB70455"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*", "cpeNameId": "25204659-6277-44F6-B75E-69B25412BE26"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*", "cpeNameId": "79676ADB-9CD8-4734-9FBF-13CA081A2193"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:rc8:*:*:*:*:*:*", "cpeNameId": "80492410-4FE5-4C8B-897C-243E42C03469"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.1:*:*:*:*:*:*:*", "cpeNameId": "3C595643-58A0-402D-8A1A-E2148719F38F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.2:*:*:*:*:*:*:*", "cpeNameId": "5F145B48-D5DB-4B52-ABDC-41BAACF04213"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.3:*:*:*:*:*:*:*", "cpeNameId": "59A7EC30-0E14-45EE-A5DA-9D98F4793E93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.4:*:*:*:*:*:*:*", "cpeNameId": "28AD2EF2-9A1F-4C90-A938-33E394A94615"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.5:*:*:*:*:*:*:*", "cpeNameId": "37B29EC5-AB56-4407-871C-6AF5177AE78F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.6:*:*:*:*:*:*:*", "cpeNameId": "76D2F6EA-F7DC-413B-85EC-C8B7916DCD0C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.7:*:*:*:*:*:*:*", "cpeNameId": "3E05D19C-FFAF-44BC-B9CB-D7054765D6D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.8:*:*:*:*:*:*:*", "cpeNameId": "9625E836-75C2-4337-BAA1-70F3958C06CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.9:*:*:*:*:*:*:*", "cpeNameId": "492A02F0-DBF7-40C0-9CD6-AFADC763E814"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.10:*:*:*:*:*:*:*", "cpeNameId": "9A0A4990-A036-4290-AD79-B7531545BA07"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.11:*:*:*:*:*:*:*", "cpeNameId": "5FDD9C37-5F34-43FE-98FA-3D3D7ED73B6F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.12:*:*:*:*:*:*:*", "cpeNameId": "54D136A5-6D3A-4CF8-8ECD-0A4B3345ED61"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.13:*:*:*:*:*:*:*", "cpeNameId": "A1D987CD-234D-48E5-BC87-D5BDAB19AD8D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.14:*:*:*:*:*:*:*", "cpeNameId": "51407BCD-81B8-4C16-9246-F7AC5E654783"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.15:*:*:*:*:*:*:*", "cpeNameId": "E0851513-6D8C-45D5-AA02-1A897F200C76"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.16:*:*:*:*:*:*:*", "cpeNameId": "FBCFC7A2-8E0C-400E-9903-F88E27BC6692"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.17:*:*:*:*:*:*:*", "cpeNameId": "D83234B0-70C7-49E3-B041-458A4388E5F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.18:*:*:*:*:*:*:*", "cpeNameId": "7BFD121A-9AAE-4FA4-B4BB-79BCFC945942"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.19:*:*:*:*:*:*:*", "cpeNameId": "5CEF4F40-C180-4D35-BFBE-CE813D0DB03A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.20:*:*:*:*:*:*:*", "cpeNameId": "8629FDD2-5ACC-47D6-A355-161F5C9E9DE2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.21:*:*:*:*:*:*:*", "cpeNameId": "5FAA107F-2A9C-4F4A-ADB6-BDE37B733B3A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.22:*:*:*:*:*:*:*", "cpeNameId": "8425DCE9-412B-439B-BCFA-0296FCF4AC3B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.23:*:*:*:*:*:*:*", "cpeNameId": "2CAA00B8-15FB-49C3-8D03-4EAC237C0C30"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.24:*:*:*:*:*:*:*", "cpeNameId": "55BE846B-6D72-4890-A345-41A221706A91"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.25:*:*:*:*:*:*:*", "cpeNameId": "6E8595D6-1B26-48C0-8BB5-7AA9956DA2EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.26:*:*:*:*:*:*:*", "cpeNameId": "579C1BAF-C0BD-4A23-8220-878509BD4041"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.27:*:*:*:*:*:*:*", "cpeNameId": "918EEE53-3E32-4088-A31F-7706A0658354"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.28:*:*:*:*:*:*:*", "cpeNameId": "E5894A09-16F4-4390-9756-7B55B730A5C7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.29:*:*:*:*:*:*:*", "cpeNameId": "4A87BD1D-E5CA-4D1E-BC1C-866333AC8B70"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.30:*:*:*:*:*:*:*", "cpeNameId": "EA84BB70-A3D7-488F-B591-6F660E5F72D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.31:*:*:*:*:*:*:*", "cpeNameId": "099FB693-8DF2-40B8-987C-638A2B85F830"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.32:*:*:*:*:*:*:*", "cpeNameId": "5A2E5E92-E0A5-4B86-979F-C06CBC9AF59E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.33:*:*:*:*:*:*:*", "cpeNameId": "4D00786A-3089-4F53-9833-D854D82A886A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.34:*:*:*:*:*:*:*", "cpeNameId": "394E558D-3CCA-4443-81A4-464D00F1796F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.35:*:*:*:*:*:*:*", "cpeNameId": "244B5E4B-3CCC-469E-BC89-424CC37562E5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.36:*:*:*:*:*:*:*", "cpeNameId": "A25A0D88-A1D0-44DD-9C59-0EC251F83B79"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.37:*:*:*:*:*:*:*", "cpeNameId": "FFD0F957-52D3-47DB-9B9B-9D40AB55A9E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.38:*:*:*:*:*:*:*", "cpeNameId": "A7384483-B54D-422E-BD1C-47B466DF7808"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.39:*:*:*:*:*:*:*", "cpeNameId": "BD0A672F-9FD5-470F-91C8-77E96F4B3741"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.40:*:*:*:*:*:*:*", "cpeNameId": "29E4B4C2-838C-48BD-B509-576D1E26C738"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.41:*:*:*:*:*:*:*", "cpeNameId": "C139FA8B-93DA-4053-B303-A3C1DC1382FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.42:*:*:*:*:*:*:*", "cpeNameId": "BF0F83BA-BD56-4364-B55F-EE486FFD9897"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.43:*:*:*:*:*:*:*", "cpeNameId": "37F54B64-6DB3-410B-9795-F9468CCD37D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.44:*:*:*:*:*:*:*", "cpeNameId": "A2813E22-3300-4145-9AF5-091D4FB91EDE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.45:*:*:*:*:*:*:*", "cpeNameId": "E862B1DC-542D-4E20-BEDE-89AC2B3B5D7F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.46:*:*:*:*:*:*:*", "cpeNameId": "940E4409-174B-45E7-B73A-69D72C14D42E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.47:*:*:*:*:*:*:*", "cpeNameId": "2E917523-B369-4B0C-B2FE-330ABAF30D9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.48:*:*:*:*:*:*:*", "cpeNameId": "7AE6B80A-97F9-46E1-91BF-10C5CFE9F291"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.49:*:*:*:*:*:*:*", "cpeNameId": "6C3E0D45-EDD1-48D6-B60C-99C23C609BB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.50:*:*:*:*:*:*:*", "cpeNameId": "3DB32BBC-2AFB-4C81-AB59-6F8C3BA243E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.51:*:*:*:*:*:*:*", "cpeNameId": "5AC8AA4E-C62F-4E70-9E99-6FDC429D2E4E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.52:*:*:*:*:*:*:*", "cpeNameId": "D833500B-5B7B-4D77-980F-A92A0E26CE6B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.53:*:*:*:*:*:*:*", "cpeNameId": "19E0C2D7-36FA-461C-B763-F0B8DBF346A7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.54:*:*:*:*:*:*:*", "cpeNameId": "CD384F60-5A3F-4B0C-A5A2-3ECEA68BB813"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.55:*:*:*:*:*:*:*", "cpeNameId": "768733C9-E2A4-4C01-8956-5FB868E592E3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.56:*:*:*:*:*:*:*", "cpeNameId": "0FC6F402-E917-4E7F-8D83-3D22EF171CAB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.57:*:*:*:*:*:*:*", "cpeNameId": "E8BCDBFF-F548-45B0-9AF9-3FB4B1E38539"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.58:*:*:*:*:*:*:*", "cpeNameId": "E8B92EC7-BB1E-4A65-A431-3125DA3DF1DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.59:*:*:*:*:*:*:*", "cpeNameId": "5C514FE3-ED8D-4DEA-874A-4B61A7578749"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.60:*:*:*:*:*:*:*", "cpeNameId": "215F5625-C874-4841-82C5-AE4A9E6ED912"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.61:*:*:*:*:*:*:*", "cpeNameId": "764780E0-FF24-42A3-A99B-CE11CB846C95"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.62:*:*:*:*:*:*:*", "cpeNameId": "5C2774B8-AF4C-4A7B-BBF4-9516ABF4B4E9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.63:*:*:*:*:*:*:*", "cpeNameId": "BC276565-052E-41EF-9F0F-7ECD9D9678BE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.64:*:*:*:*:*:*:*", "cpeNameId": "DB256AAF-90E8-463A-8C21-D57CC6368D0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.65:*:*:*:*:*:*:*", "cpeNameId": "C9A9E342-DEBC-44E6-82F3-3CCBCBD1F565"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.66:*:*:*:*:*:*:*", "cpeNameId": "68B83B2F-DA58-4442-A4E4-5EFBD7DA2E64"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.67:*:*:*:*:*:*:*", "cpeNameId": "FBD55969-6EB5-4ED7-AD05-1D03D728B999"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.68:*:*:*:*:*:*:*", "cpeNameId": "5A5B47CF-90B7-4BEF-B5AE-EE4FED51E095"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.69:*:*:*:*:*:*:*", "cpeNameId": "0ADD17CA-B3B5-4F53-B4F4-ED079642A461"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.70:*:*:*:*:*:*:*", "cpeNameId": "6F29E18D-63C6-4544-A0E7-92F17EB3ACFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.71:*:*:*:*:*:*:*", "cpeNameId": "A7455D5B-D8E2-4CBE-BF3D-D3CF1A6004FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.72:*:*:*:*:*:*:*", "cpeNameId": "91A1363B-FA51-4A72-AD5E-3784118C73E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.73:*:*:*:*:*:*:*", "cpeNameId": "7C1AD665-9759-452D-86AA-C903E4225BA7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.74:*:*:*:*:*:*:*", "cpeNameId": "7058C57F-5141-4FAC-932A-BDDF0F20C78A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.75:*:*:*:*:*:*:*", "cpeNameId": "2F7FAD3F-6381-42EE-B130-D942FAC1AED0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.76:*:*:*:*:*:*:*", "cpeNameId": "4F7988C5-FA25-4C7C-B0DC-5C084A8CA6DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.77:*:*:*:*:*:*:*", "cpeNameId": "9F7ABB2D-A627-40C5-BC86-9BC9BBBEDBB9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.78:*:*:*:*:*:*:*", "cpeNameId": "71DE43EB-3996-47C3-963A-B93C9E6C6142"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.79:*:*:*:*:*:*:*", "cpeNameId": "191F54D4-44BC-49D5-8FB9-5DFFD648B9F7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.80:*:*:*:*:*:*:*", "cpeNameId": "14B574EE-69F8-4E87-9017-91CBFDAEC743"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.81:*:*:*:*:*:*:*", "cpeNameId": "94E966D4-1DB0-4695-98DA-A28CB90D32EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.82:*:*:*:*:*:*:*", "cpeNameId": "8D92799A-0542-4509-923F-6006E116D1BE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.83:*:*:*:*:*:*:*", "cpeNameId": "C2EF5D53-F86A-4D8A-AB79-DD6491B257F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.84:*:*:*:*:*:*:*", "cpeNameId": "61BB8657-3718-4355-BAA8-92F84B14D1A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.85:*:*:*:*:*:*:*", "cpeNameId": "A599E08D-FD19-4E86-A335-C107B0C6CB0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.86:*:*:*:*:*:*:*", "cpeNameId": "324E1D15-3D11-4683-9B0A-D3BA95E6B7C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.87:*:*:*:*:*:*:*", "cpeNameId": "D320A094-647B-4DC5-83FB-BC79A60AAE61"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.88:*:*:*:*:*:*:*", "cpeNameId": "407DC4FD-0E42-48C0-8A16-07F5CB7F308F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.89:*:*:*:*:*:*:*", "cpeNameId": "2DCEF9A6-CB07-404E-ADCC-E2BD0F69354D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.90:*:*:*:*:*:*:*", "cpeNameId": "CD2E5E6E-F436-4447-BB45-4CA1EBCC1F0F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.91:*:*:*:*:*:*:*", "cpeNameId": "D5909F53-54F8-4E30-87B2-E5B74AEEF668"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.92:*:*:*:*:*:*:*", "cpeNameId": "825880D5-240B-4E5E-88D7-9FBE9377D725"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.93:*:*:*:*:*:*:*", "cpeNameId": "C34961F8-366C-44F9-884F-D95ED75D74E9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.94:*:*:*:*:*:*:*", "cpeNameId": "49338264-F467-4F72-851C-41E72F2E8849"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.95:*:*:*:*:*:*:*", "cpeNameId": "D583DD92-8DB8-4D08-8F84-FEACBF885E5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.96:*:*:*:*:*:*:*", "cpeNameId": "ABD92EA7-61F0-4324-AD60-18A4A9E0345B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.97:*:*:*:*:*:*:*", "cpeNameId": "9CA68F01-482D-4C81-9FAF-8FCB3F4EB631"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.98:*:*:*:*:*:*:*", "cpeNameId": "DB87B10B-0B00-43E6-9712-B7749C08C5B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.99:*:*:*:*:*:*:*", "cpeNameId": "FA3EF181-E416-4607-B59D-A6CEA2D95875"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.100:*:*:*:*:*:*:*", "cpeNameId": "92234FA1-8B41-45EB-BADB-32779B7E4E3C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.101:*:*:*:*:*:*:*", "cpeNameId": "2965F5F4-6322-4A74-BE47-C1E4FF4E4BB3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.102:*:*:*:*:*:*:*", "cpeNameId": "D936A06E-46B7-44F1-AEA1-6C899F68E2DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.103:*:*:*:*:*:*:*", "cpeNameId": "C3564FF2-0B2D-42BF-AA29-3AAF57DF9D0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.104:*:*:*:*:*:*:*", "cpeNameId": "CEF383F0-D9F1-4948-B102-C491944BECBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.105:*:*:*:*:*:*:*", "cpeNameId": "BC26835E-2E39-465E-B48C-E871C740CB06"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.106:*:*:*:*:*:*:*", "cpeNameId": "2142A9D9-E547-4FE9-BDA3-B7B27D3CEF4D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.107:*:*:*:*:*:*:*", "cpeNameId": "9F7EB5C3-3C76-4816-BB64-A0D47A8FF148"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.108:*:*:*:*:*:*:*", "cpeNameId": "A0B4BCED-0919-484E-B64A-2D6F944128BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.109:*:*:*:*:*:*:*", "cpeNameId": "14C4B1A8-4457-4620-A2F4-A7BAAB479E01"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.110:*:*:*:*:*:*:*", "cpeNameId": "08F57941-7A99-4F2F-982B-54B72CA90ECA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.111:*:*:*:*:*:*:*", "cpeNameId": "F75C660D-8C20-4B05-BAB3-2D3BEF6EBC9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.112:*:*:*:*:*:*:*", "cpeNameId": "82BF8B3E-D66C-40EF-B175-1E5A2466D997"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.113:*:*:*:*:*:*:*", "cpeNameId": "CF72EDAE-B29A-4A22-BF70-8FD89123C957"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.114:*:*:*:*:*:*:*", "cpeNameId": "86E6F51B-573A-4DB5-99FA-BB89A65DD613"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.115:*:*:*:*:*:*:*", "cpeNameId": "63567DC6-8639-44B7-BDBC-C600977ECD7C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.116:*:*:*:*:*:*:*", "cpeNameId": "7A6E8D0B-1EF6-4080-A3AD-45CD2B6C35AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.117:*:*:*:*:*:*:*", "cpeNameId": "AD8652AE-1F37-43B4-BC34-39F852FD3301"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.119:*:*:*:*:*:*:*", "cpeNameId": "3E564E16-38CA-428F-98CC-5F14B13A30CB"}]}} \ No newline at end of file diff --git a/cpematch/C1/C18D359D-A98F-430F-85A0-CE282256CE09.json b/cpematch/C1/C18D359D-A98F-430F-85A0-CE282256CE09.json new file mode 100644 index 00000000000..8bdf5267adf --- /dev/null +++ b/cpematch/C1/C18D359D-A98F-430F-85A0-CE282256CE09.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "C18D359D-A98F-430F-85A0-CE282256CE09", "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.6.60", "versionEndExcluding": "6.6.68", "lastModified": "2025-01-09T18:05:10.607", "cpeLastModified": "2025-01-09T18:05:10.607", "created": "2025-01-09T18:05:10.607", "status": "Active", "matches": [{"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.60:*:*:*:*:*:*:*", "cpeNameId": "BA797BFD-CCD6-4D99-A0FE-EE8DBA7E10E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.61:*:*:*:*:*:*:*", "cpeNameId": "3098341D-1ACE-44C5-B68D-738D2F0755AF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.62:*:*:*:*:*:*:*", "cpeNameId": "8D335F96-0F12-49EB-9D54-4424F810B356"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.63:*:*:*:*:*:*:*", "cpeNameId": "D8EEFA5B-7B50-42BA-8337-E071DB25937D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.64:*:*:*:*:*:*:*", "cpeNameId": "51581C6F-56FC-46E5-AE9D-E414765DD203"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.6.66:*:*:*:*:*:*:*", "cpeNameId": "6F7D9B3C-6DBC-4FBB-977F-FC19E881B352"}]}} \ No newline at end of file diff --git a/cpematch/E2/E26D1325-2A1F-4B34-8487-2A355A5F3E87.json b/cpematch/E2/E26D1325-2A1F-4B34-8487-2A355A5F3E87.json new file mode 100644 index 00000000000..c330b337d17 --- /dev/null +++ b/cpematch/E2/E26D1325-2A1F-4B34-8487-2A355A5F3E87.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "E26D1325-2A1F-4B34-8487-2A355A5F3E87", "criteria": "cpe:2.3:a:themeum:tutor_lms:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "2.7.0", "lastModified": "2025-01-09T18:13:52.243", "cpeLastModified": "2025-01-09T18:13:52.243", "created": "2025-01-09T18:13:52.243", "status": "Active", "matches": [{"cpeName": "cpe:2.3:a:themeum:tutor_lms:-:*:*:*:*:wordpress:*:*", "cpeNameId": "66106D56-2E9A-4098-BB78-2323E704374A"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.0.0:-:*:*:*:wordpress:*:*", "cpeNameId": "2A4520AB-AD86-4B15-A38E-4233190575F5"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.0.0:alpha:*:*:*:wordpress:*:*", "cpeNameId": "3D5E2B43-DCDF-40F6-8686-95D77FE4CC24"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.0.1:*:*:*:*:wordpress:*:*", "cpeNameId": "DF8CC9A0-C426-4F5B-940F-390040A336BF"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.0.2:*:*:*:*:wordpress:*:*", "cpeNameId": "8FB58BD7-FCD7-4F42-A55B-0728CEB96D9D"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.0.3:*:*:*:*:wordpress:*:*", "cpeNameId": "F41959C8-39ED-4C31-8B79-72DCE08CC1E9"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.0.4:*:*:*:*:wordpress:*:*", "cpeNameId": "124468BF-5337-4775-9FE7-259084B57AEB"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.0.5:*:*:*:*:wordpress:*:*", "cpeNameId": "313B4025-6A32-44EF-9695-42E74A348A3C"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.0.6:*:*:*:*:wordpress:*:*", "cpeNameId": "C1C9F2F1-79BE-4CEC-A6A0-45C0BF950234"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.0.7:*:*:*:*:wordpress:*:*", "cpeNameId": "C9D0E76D-6428-47E8-9C0B-187D730E1CA7"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.0.8:*:*:*:*:wordpress:*:*", "cpeNameId": "AAE47948-BB2D-4CC3-B10B-F871C1813E76"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.0.9:*:*:*:*:wordpress:*:*", "cpeNameId": "39E1752C-CD27-4FBE-8E21-4F16F589F344"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.1.0:*:*:*:*:wordpress:*:*", "cpeNameId": "EFAC5EC7-E7D9-4F75-83B1-32C3A67B1FE1"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.1.1:*:*:*:*:wordpress:*:*", "cpeNameId": "F8117047-365D-4562-AA73-071AED631837"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.2.0:*:*:*:*:wordpress:*:*", "cpeNameId": "6EEA8FA2-5F61-433A-983C-AFE575CEFCDA"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.2.1:*:*:*:*:wordpress:*:*", "cpeNameId": "4D84DD6B-7616-4A9A-A117-93EDADD9C2AF"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.2.11:*:*:*:*:wordpress:*:*", "cpeNameId": "39B85ECF-E1B5-4AD6-A57E-33E6EA6A2712"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.2.12:*:*:*:*:wordpress:*:*", "cpeNameId": "40476BA3-4407-4126-AA4F-E9211A34E88D"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.2.13:*:*:*:*:wordpress:*:*", "cpeNameId": "E9100DAF-2352-47CE-B90E-4FB6E8EE173E"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.2.20:*:*:*:*:wordpress:*:*", "cpeNameId": "D8097E51-FD75-4D8E-9CC2-B480407FD964"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.3.0:*:*:*:*:wordpress:*:*", "cpeNameId": "EB685DF7-D2D8-4481-A045-A6BB540E46CC"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.3.1:*:*:*:*:wordpress:*:*", "cpeNameId": "CF71E45C-2056-463C-898B-CE7BF97C3911"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.3.2:*:*:*:*:wordpress:*:*", "cpeNameId": "3C9B2988-299C-4C88-B2DE-0AC994E786E1"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.3.3:*:*:*:*:wordpress:*:*", "cpeNameId": "2CFB0177-5A46-4A23-8017-F8174E5B2488"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.3.4:*:*:*:*:wordpress:*:*", "cpeNameId": "5E72A60B-AC34-4203-8D77-6D23C69AD697"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.3.5:*:*:*:*:wordpress:*:*", "cpeNameId": "9F0DFFC3-1F33-4F43-BC54-4996FA65D431"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.3.6:*:*:*:*:wordpress:*:*", "cpeNameId": "B656CCD3-89C3-4F51-AB3E-F085CFBF705E"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.3.7:*:*:*:*:wordpress:*:*", "cpeNameId": "6ED19FDB-A410-44CD-8FB3-0893A4B9DE16"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.3.8:*:*:*:*:wordpress:*:*", "cpeNameId": "3BACAF25-6023-4BD8-8311-B46481BA21D4"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.3.9:*:*:*:*:wordpress:*:*", "cpeNameId": "106D27FE-CD6B-496A-AB0E-4A4A8FF8CB94"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.4.0:*:*:*:*:wordpress:*:*", "cpeNameId": "0A715E96-6CBC-444A-A0F3-E599474D47A5"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.4.1:*:*:*:*:wordpress:*:*", "cpeNameId": "C16211F3-5594-4B9E-84CC-877D51010C58"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.4.2:*:*:*:*:wordpress:*:*", "cpeNameId": "B4C67C07-3F25-46C9-8675-A14A181E6EB5"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.4.3:*:*:*:*:wordpress:*:*", "cpeNameId": "9AC95724-022C-4B10-BD21-52CB0BDF7547"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.4.4:*:*:*:*:wordpress:*:*", "cpeNameId": "F0C845C7-BB43-4034-9286-BD8433EAF8AE"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.4.5:*:*:*:*:wordpress:*:*", "cpeNameId": "620E1C39-BCDB-4593-931D-062FB75D7F43"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.4.6:*:*:*:*:wordpress:*:*", "cpeNameId": "E1371A46-190B-4484-8F44-FB031C982398"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.4.7:*:*:*:*:wordpress:*:*", "cpeNameId": "71239D7D-06F8-4893-9881-1962FC4FB0E2"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.4.8:*:*:*:*:wordpress:*:*", "cpeNameId": "C0B06F14-EC48-47F7-920F-891B99178A84"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.4.9:*:*:*:*:wordpress:*:*", "cpeNameId": "19C898B9-93AE-42E5-9B48-C84A9312FA56"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.5.0:*:*:*:*:wordpress:*:*", "cpeNameId": "01D12092-AC09-428B-8C60-6CF99A11F047"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.5.1:*:*:*:*:wordpress:*:*", "cpeNameId": "27F1D8A3-D383-486D-935C-4F7BE64D6E97"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.5.2:*:*:*:*:wordpress:*:*", "cpeNameId": "5532154D-25B7-475F-8F87-0CA8478ED1DB"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.5.3:*:*:*:*:wordpress:*:*", "cpeNameId": "9B1C3B7E-537E-4FC9-A775-EF87628AD83A"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.5.4:*:*:*:*:wordpress:*:*", "cpeNameId": "689844AC-493F-4F71-8E6B-4640D5D03ADE"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.5.5:*:*:*:*:wordpress:*:*", "cpeNameId": "98ED1B25-02BB-4D37-B3CF-8364F95988AC"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.5.6:*:*:*:*:wordpress:*:*", "cpeNameId": "F5F311F9-3A25-4759-9564-F175ADDD0F8E"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.5.7:*:*:*:*:wordpress:*:*", "cpeNameId": "646FD159-A87F-44C2-A1DE-4B886192E206"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.5.8:*:*:*:*:wordpress:*:*", "cpeNameId": "4977153F-A0EB-45F0-A1D8-8E2EAFB1D409"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.5.9:*:*:*:*:wordpress:*:*", "cpeNameId": "5B0A0583-F14A-4ACF-9FCF-F2E5B83E6FC1"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.6.0:*:*:*:*:wordpress:*:*", "cpeNameId": "DC646BE6-9427-41D9-A399-9AAF25975B6B"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.6.1:*:*:*:*:wordpress:*:*", "cpeNameId": "797A11B5-82D9-452C-A92E-1B0A4749097C"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.6.2:*:*:*:*:wordpress:*:*", "cpeNameId": "B7166C01-5058-406E-B426-1E28AE73E7A7"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.6.3:*:*:*:*:wordpress:*:*", "cpeNameId": "717A46CC-720F-437E-92F2-C6A511C9D47E"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.6.4:*:*:*:*:wordpress:*:*", "cpeNameId": "254D6D9E-A9D5-4125-A134-DB3179C6CBA7"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.6.5:*:*:*:*:wordpress:*:*", "cpeNameId": "80A6D412-970A-4F49-B212-672FE00C2BF4"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.6.6:*:*:*:*:wordpress:*:*", "cpeNameId": "43F8E4A3-2157-45B2-9951-8FD14E9E5697"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.6.7:*:*:*:*:wordpress:*:*", "cpeNameId": "4EA1D055-A65B-4718-AC6C-EF16826E5C0F"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.6.8:*:*:*:*:wordpress:*:*", "cpeNameId": "355E49F7-615C-474E-9943-02E731EDEFC7"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.6.9:*:*:*:*:wordpress:*:*", "cpeNameId": "D4F4F665-D948-405C-981C-FDD52D61F0E0"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.7.0:*:*:*:*:wordpress:*:*", "cpeNameId": "3628F5A9-0332-417D-B628-D8AA1C63CDCF"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.7.1:*:*:*:*:wordpress:*:*", "cpeNameId": "D3ECC6FE-2F46-49F6-91A2-C4888F49140C"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.7.2:*:*:*:*:wordpress:*:*", "cpeNameId": "4E3FC02A-B028-4451-87F6-51C8259ED7A2"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.7.3:*:*:*:*:wordpress:*:*", "cpeNameId": "11505733-BA9A-4E16-B0BC-A0A94AE93EC8"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.7.4:*:*:*:*:wordpress:*:*", "cpeNameId": "FA9CC4A7-31E0-4C5C-93DB-A355B8933FB4"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.7.5:*:*:*:*:wordpress:*:*", "cpeNameId": "53C521C5-D03E-4CFA-8F0B-D6A392ABDD41"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.7.6:*:*:*:*:wordpress:*:*", "cpeNameId": "96BACAE3-2F87-4865-BC2D-D257C22F73D3"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.7.7:*:*:*:*:wordpress:*:*", "cpeNameId": "39818733-1E11-441E-B7F0-FEF583ED638D"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.7.8:*:*:*:*:wordpress:*:*", "cpeNameId": "313DF337-41C6-416C-9E33-BFC1017B3B5C"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.7.9:*:*:*:*:wordpress:*:*", "cpeNameId": "426B1E32-FB6D-4A82-B32D-FE046227561B"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.8.0:*:*:*:*:wordpress:*:*", "cpeNameId": "C71D7BF3-1477-4AB5-BCF6-281F1C37579F"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.8.1:*:*:*:*:wordpress:*:*", "cpeNameId": "6F7E9493-993C-4A9C-A310-2C26D877C324"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.8.2:*:*:*:*:wordpress:*:*", "cpeNameId": "FB5D1642-BE24-41D5-A9E5-D95D7AB3A72C"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.8.3:*:*:*:*:wordpress:*:*", "cpeNameId": "0149DB16-6B4F-43B0-8F13-2EE8457608F5"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.8.4:*:*:*:*:wordpress:*:*", "cpeNameId": "750DF1D9-3F2F-46A3-A7F6-9FD5BED98147"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.8.5:*:*:*:*:wordpress:*:*", "cpeNameId": "A124FC4D-7240-4DAF-A8EE-909DFA0F75C5"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.8.6:*:*:*:*:wordpress:*:*", "cpeNameId": "E6A5D164-491C-4A8B-9FA0-36580E1149A9"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.8.7:*:*:*:*:wordpress:*:*", "cpeNameId": "14409048-FED3-4D9D-8900-449DD64F43A7"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.8.8:*:*:*:*:wordpress:*:*", "cpeNameId": "EC748A08-9A0F-41A7-A3C0-AAC8F541FFE9"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.8.9:*:*:*:*:wordpress:*:*", "cpeNameId": "DEC7785D-78C8-415B-8BCA-9D49C7217D3C"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.8.10:*:*:*:*:wordpress:*:*", "cpeNameId": "332503DD-5419-409E-9E41-2BEB247C2170"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.0:*:*:*:*:wordpress:*:*", "cpeNameId": "22C482D9-1290-4786-8DD7-8448753D1516"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.1:*:*:*:*:wordpress:*:*", "cpeNameId": "204E384E-EDA0-413E-A36F-7A9A6463E338"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.2:*:*:*:*:wordpress:*:*", "cpeNameId": "EEB25D88-0021-442A-90C7-4117FDE4103B"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.3:*:*:*:*:wordpress:*:*", "cpeNameId": "D1A59E89-91D2-488C-9F5F-8ACECA1388D9"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.4:*:*:*:*:wordpress:*:*", "cpeNameId": "65D23508-ACAE-4271-9483-2A8C3DED0E01"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.5:*:*:*:*:wordpress:*:*", "cpeNameId": "F5133B3E-028F-4896-A4B3-F474F6425C1D"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.6:*:*:*:*:wordpress:*:*", "cpeNameId": "CA8D09A0-6528-4956-A048-CEA3755787A0"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.7:*:*:*:*:wordpress:*:*", "cpeNameId": "FAED1883-A03B-41C4-888E-1090AFD08289"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.8:*:*:*:*:wordpress:*:*", "cpeNameId": "7DECE0C7-084A-47FF-8D22-ABD4649ECE77"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.9:*:*:*:*:wordpress:*:*", "cpeNameId": "A66E75A3-FBE6-4C55-9F9D-395A206DF48B"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.10:*:*:*:*:wordpress:*:*", "cpeNameId": "F2E004CF-D616-444E-80EF-2467F812E0B7"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.11:*:*:*:*:wordpress:*:*", "cpeNameId": "A1F64816-2280-41DA-A49B-575623943494"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.12:*:*:*:*:wordpress:*:*", "cpeNameId": "1DFF5671-0525-4C5D-936F-B436E59B46BD"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.13:*:*:*:*:wordpress:*:*", "cpeNameId": "481C6CFA-CBE4-47C0-B40B-B13B01045976"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.14:*:*:*:*:wordpress:*:*", "cpeNameId": "FEBC3C38-4EA0-490C-9F29-C9B068031DC0"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.15:*:*:*:*:wordpress:*:*", "cpeNameId": "F4FA5322-E757-4896-A8E2-90C196929114"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.16:*:*:*:*:wordpress:*:*", "cpeNameId": "2617AB77-9B94-4053-9283-B17DE789DFEA"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.0.0:*:*:*:*:wordpress:*:*", "cpeNameId": "222466FD-EED9-4F20-916E-DB3BBACFFC58"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.0.1:*:*:*:*:wordpress:*:*", "cpeNameId": "07434B19-2D1F-4C10-92CF-DA80E7CC105A"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.0.2:*:*:*:*:wordpress:*:*", "cpeNameId": "AD23B45A-DAE2-4E90-81B5-0EF98D0C2FEB"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.0.3:*:*:*:*:wordpress:*:*", "cpeNameId": "4DA2B442-4F2C-4870-A20E-E59882CB6963"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.0.4:*:*:*:*:wordpress:*:*", "cpeNameId": "4AB986C5-8373-4229-9C61-6357BC906614"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.0.5:*:*:*:*:wordpress:*:*", "cpeNameId": "BE1C7B70-01D4-4775-8B4E-4A31F63659DE"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.0.6:*:*:*:*:wordpress:*:*", "cpeNameId": "573FEB3F-C2F0-452E-9C2A-939C3C12AE66"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.0.7:*:*:*:*:wordpress:*:*", "cpeNameId": "5113E2D5-73B8-4633-95E2-0976FEE63ED0"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.0.8:*:*:*:*:wordpress:*:*", "cpeNameId": "C2426453-D370-4582-A55E-A8FBB40E3DCB"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.0.9:*:*:*:*:wordpress:*:*", "cpeNameId": "3F042A25-170D-4983-BDC4-6218AB5136AD"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.0.10:*:*:*:*:wordpress:*:*", "cpeNameId": "B893EEB8-B6E4-4D6A-A8C2-3018E03DD614"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.1.0:*:*:*:*:wordpress:*:*", "cpeNameId": "EBEAF2CE-A0D4-4B86-B6A6-5A236AEEDC35"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.1.1:*:*:*:*:wordpress:*:*", "cpeNameId": "7E493E02-C72F-4D84-90A3-900240E17E9F"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.1.2:*:*:*:*:wordpress:*:*", "cpeNameId": "63CA9691-17DA-484C-8E0A-91879FC64F51"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.1.3:*:*:*:*:wordpress:*:*", "cpeNameId": "759CA983-0CDF-48F6-9935-8A7337EC1C22"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.1.4:*:*:*:*:wordpress:*:*", "cpeNameId": "A7FA4467-CD30-44E7-BAC5-FCB9F5FD1FD6"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.1.5:*:*:*:*:wordpress:*:*", "cpeNameId": "4CA1EA76-3897-430E-B32E-D3E1D5FEA3C9"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.1.6:*:*:*:*:wordpress:*:*", "cpeNameId": "6F0505DC-B5F4-4D8E-A6E3-2B9687A6CFA3"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.1.7:*:*:*:*:wordpress:*:*", "cpeNameId": "1C199316-E27F-4374-B3C9-A74A4CF203E8"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.1.8:*:*:*:*:wordpress:*:*", "cpeNameId": "981EC46A-20A3-4186-AF1D-43FE118403D1"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.1.9:*:*:*:*:wordpress:*:*", "cpeNameId": "E83A592F-6768-4597-AA99-EFE3B9E42FEC"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.1.10:*:*:*:*:wordpress:*:*", "cpeNameId": "5F6048F9-DD31-48FE-A0A1-6B10FB6D0B0E"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.2.0:*:*:*:*:wordpress:*:*", "cpeNameId": "74EB8DF6-D9B8-4AE6-AF6F-46CC291985DB"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.2.1:*:*:*:*:wordpress:*:*", "cpeNameId": "9A4D4BE2-F691-4C10-9A8D-C20B4D598C9F"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.2.2:*:*:*:*:wordpress:*:*", "cpeNameId": "8B71AAF1-2CF3-493E-BE57-2B76BCA46166"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.2.3:*:*:*:*:wordpress:*:*", "cpeNameId": "CA42D59F-98F7-429A-93FC-EB9EFAEAA784"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.2.4:*:*:*:*:wordpress:*:*", "cpeNameId": "DA885B8E-4AAE-43BA-826B-205035901A93"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.3.0:*:*:*:*:wordpress:*:*", "cpeNameId": "74C9373D-0449-4B4C-BDBA-BEF6AE3E5C41"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.4.0:*:*:*:*:wordpress:*:*", "cpeNameId": "BFA9D04A-78D8-4139-A0D8-8C782BFF6A53"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.5.0:*:*:*:*:wordpress:*:*", "cpeNameId": "98CCC884-FC38-4399-8454-B6F8BF969A1A"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.6.0:*:*:*:*:wordpress:*:*", "cpeNameId": "BC6E4DD3-F467-49E8-96CA-285E189BC28B"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.6.1:*:*:*:*:wordpress:*:*", "cpeNameId": "D9E306CE-9D7E-4D98-838A-4668F702B0D4"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.6.2:*:*:*:*:wordpress:*:*", "cpeNameId": "293CF1DA-B856-4EF0-87F1-DE2852DA7ED7"}]}} \ No newline at end of file diff --git a/cpematch/F6/F6A7800A-0BC1-4787-9CE1-7283B94BBEE4.json b/cpematch/F6/F6A7800A-0BC1-4787-9CE1-7283B94BBEE4.json new file mode 100644 index 00000000000..d244f270894 --- /dev/null +++ b/cpematch/F6/F6A7800A-0BC1-4787-9CE1-7283B94BBEE4.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "F6A7800A-0BC1-4787-9CE1-7283B94BBEE4", "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.10", "versionEndExcluding": "6.1.122", "lastModified": "2025-01-09T19:19:12.987", "cpeLastModified": "2025-01-09T19:19:12.987", "created": "2025-01-09T19:19:12.987", "status": "Active", "matches": [{"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10:-:*:*:*:*:*:*", "cpeNameId": "2E1F1B79-2711-4459-B972-D3C83C48D2D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10:rc1:*:*:*:*:*:*", "cpeNameId": "4255DBFB-D157-45ED-BA6C-1BACB64A1623"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10:rc2:*:*:*:*:*:*", "cpeNameId": "C7BA0F25-7DD0-427A-A8FF-D5CCD17EA554"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10:rc4:*:*:*:*:*:*", "cpeNameId": "0962C2F4-E79A-4C61-8380-55EAAAD4AE1B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.0:-:*:*:*:*:*:*", "cpeNameId": "6B1D1EAB-0195-4F05-88FF-F862563F89FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.0:rc1:*:*:*:*:*:*", "cpeNameId": "EBBE0FA3-6C50-4C78-83C3-9BE6F9A064E3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.0:rc2:*:*:*:*:*:*", "cpeNameId": "E59C1055-110F-4E68-BB9C-8E3C564F72F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.0:rc3:*:*:*:*:*:*", "cpeNameId": "955307F1-B773-46C3-983A-DEA36FDEBCBD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.0:rc4:*:*:*:*:*:*", "cpeNameId": "4AC5F069-6642-4E36-ACF3-EE93FCEAC751"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.0:rc5:*:*:*:*:*:*", "cpeNameId": "EF537B63-6913-49CD-8CEB-A9B744FE8E4E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.1:*:*:*:*:*:*:*", "cpeNameId": "919C724B-829B-4250-B6F3-66C503930681"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.2:*:*:*:*:*:*:*", "cpeNameId": "7B9D0BBB-79E9-4CA5-81CF-2F8783866A20"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.3:*:*:*:*:*:*:*", "cpeNameId": "6F0C6AC0-1A96-4202-B3A4-42216BDC476C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.4:*:*:*:*:*:*:*", "cpeNameId": "59CCCD55-2025-4BD2-BB41-7FBF6B449783"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.5:*:*:*:*:*:*:*", "cpeNameId": "6BD60207-E9A0-4688-A2D3-3A68CAC97BFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.6:*:*:*:*:*:*:*", "cpeNameId": "54839987-2658-4873-BB81-585C8849EE8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.7:*:*:*:*:*:*:*", "cpeNameId": "FB32ECFD-B8DB-4422-83B4-7F26B1DCC763"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.8:*:*:*:*:*:*:*", "cpeNameId": "0FCF254D-C922-4F67-B85C-7247077BBF63"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.9:*:*:*:*:*:*:*", "cpeNameId": "2313CF18-EB32-4DB8-9B68-B24F46689725"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.10:*:*:*:*:*:*:*", "cpeNameId": "77C0418A-B48F-4E70-B71F-5030B901EC8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.11:*:*:*:*:*:*:*", "cpeNameId": "32769B56-4C74-41FE-A7D3-5D87006BE1B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.12:*:*:*:*:*:*:*", "cpeNameId": "C5244E7D-A816-42FD-80A2-22A1EBD41FA8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.13:*:*:*:*:*:*:*", "cpeNameId": "0E80BF7E-93CE-4658-854B-7EFB6AC17CEB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.14:*:*:*:*:*:*:*", "cpeNameId": "BCB6377E-BAD8-4063-8DB2-A16392D24089"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.15:*:*:*:*:*:*:*", "cpeNameId": "09DAF5C5-3ADF-4BFB-B681-DEFAD2874241"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.16:*:*:*:*:*:*:*", "cpeNameId": "878924C9-1FEA-49D2-BB99-6AE2A8812570"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.17:*:*:*:*:*:*:*", "cpeNameId": "13722F1D-D730-4F7C-AB84-1267068EF08C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.18:*:*:*:*:*:*:*", "cpeNameId": "2A86DC03-D4AC-4EAE-88FE-54D103F5A3D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.19:*:*:*:*:*:*:*", "cpeNameId": "B833D784-AF50-4A28-88B3-B00A2ABA00D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.20:*:*:*:*:*:*:*", "cpeNameId": "EC92790E-8CEB-4EE7-9655-BE16A14BCAC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.21:*:*:*:*:*:*:*", "cpeNameId": "A0D9BB71-2049-4DEA-B438-0EE2AA9A09ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.22:*:*:*:*:*:*:*", "cpeNameId": "4F726530-1114-4DF2-956E-81715A37EE2A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.23:*:*:*:*:*:*:*", "cpeNameId": "6A9B3C74-81DE-4FDA-A058-89DD6494DD5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.24:*:*:*:*:*:*:*", "cpeNameId": "B98E61C1-1F45-4150-B477-FBFF4FAC3ED3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.25:*:*:*:*:*:*:*", "cpeNameId": "AEDF3A34-9D1B-4E78-9BC8-BFC839CBA294"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.26:*:*:*:*:*:*:*", "cpeNameId": "0B823FEF-0461-49A6-A380-1FCA2F2765FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.27:*:*:*:*:*:*:*", "cpeNameId": "494E65F5-4C04-45D6-830F-4EE9103EBB79"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.28:*:*:*:*:*:*:*", "cpeNameId": "83414679-66B4-40C0-B061-FF9FE1B23F95"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.29:*:*:*:*:*:*:*", "cpeNameId": "2EDD7AD5-8E29-4C05-B2B9-690CE6523AE8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.30:*:*:*:*:*:*:*", "cpeNameId": "F4A2F70D-4AEF-4F79-8BD3-2AAA3BED01E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.31:*:*:*:*:*:*:*", "cpeNameId": "6D4C13F5-4DC9-4498-B598-0C72F44C408F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.32:*:*:*:*:*:*:*", "cpeNameId": "0CC82644-C0F1-4FE3-BE00-1AA49A715186"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.33:*:*:*:*:*:*:*", "cpeNameId": "1CE00059-6557-4873-88DC-0D8989EA8352"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.34:*:*:*:*:*:*:*", "cpeNameId": "D681DBE9-23F8-4AB1-A4C6-73075E8753B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.35:*:*:*:*:*:*:*", "cpeNameId": "DA0FCEE1-0A6E-488B-A168-9885CE8A892B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.36:*:*:*:*:*:*:*", "cpeNameId": "8EC26158-07A8-4F5B-AED4-B1B247C7804F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.37:*:*:*:*:*:*:*", "cpeNameId": "AE2694A8-5857-4C19-81BE-E371A011643C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.38:*:*:*:*:*:*:*", "cpeNameId": "ABEB722B-6903-4915-B85C-1D2A05674826"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.39:*:*:*:*:*:*:*", "cpeNameId": "6AD9EBB8-8E60-4501-A44E-057A3BEEDA17"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.40:*:*:*:*:*:*:*", "cpeNameId": "F0D558A0-55C0-460B-BE39-F06AF16FAC31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.41:*:*:*:*:*:*:*", "cpeNameId": "275C969B-FC08-441F-BDBC-F24EC5810A99"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.42:*:*:*:*:*:*:*", "cpeNameId": "731A0F3B-A32B-4345-BE91-ABA294048D2A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.43:*:*:*:*:*:*:*", "cpeNameId": "3FE2BC04-D69F-4239-B3D8-17898AE1EC6E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.44:*:*:*:*:*:*:*", "cpeNameId": "575245F7-0BE3-4A47-A20F-0D1ECF247B3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.45:*:*:*:*:*:*:*", "cpeNameId": "4BC74ACC-355D-41FE-9D78-D50DD08425F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.46:*:*:*:*:*:*:*", "cpeNameId": "E63871AE-A0FC-41E1-B4AE-99FEA83DE6EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.47:*:*:*:*:*:*:*", "cpeNameId": "2D465F1B-9417-4099-9468-09D21B58EFE0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.48:*:*:*:*:*:*:*", "cpeNameId": "78FC9A7F-B877-4B4B-93C7-C5BAEB84BEF1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.49:*:*:*:*:*:*:*", "cpeNameId": "2343BB66-E088-4CAA-9458-F62F5624D1BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.50:*:*:*:*:*:*:*", "cpeNameId": "BED11231-C3C0-4B9A-A667-E96A5EB42728"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.51:*:*:*:*:*:*:*", "cpeNameId": "4BA151A6-3479-4D73-92A0-25D7D74DD76C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.52:*:*:*:*:*:*:*", "cpeNameId": "4CFCF22F-C2C8-46CA-A8C2-A6DB5AAD3670"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.53:*:*:*:*:*:*:*", "cpeNameId": "6326FFB7-116E-4FB8-B2C1-909CC3B6C3C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.54:*:*:*:*:*:*:*", "cpeNameId": "A7FDB1DD-DC8A-4424-A81A-37F8A0B2F1D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.55:*:*:*:*:*:*:*", "cpeNameId": "A9A96456-8676-4108-B958-7A0E3493F315"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.56:*:*:*:*:*:*:*", "cpeNameId": "7444E85B-6F15-4980-8721-5B0A708042E3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.57:*:*:*:*:*:*:*", "cpeNameId": "2D88C78E-CA4C-40A2-BF04-E487DE3D79C3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.58:*:*:*:*:*:*:*", "cpeNameId": "D8167B04-7EDF-4F1B-B967-EFCDC6FB0D63"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.59:*:*:*:*:*:*:*", "cpeNameId": "66E8BCA7-8C84-42E6-A891-0840BE07CE79"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.60:*:*:*:*:*:*:*", "cpeNameId": "3FE27316-DB42-42B3-95E5-EBF8CB7498C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.61:*:*:*:*:*:*:*", "cpeNameId": "47AD2C14-A08F-4D75-960F-1D5C72EB1979"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.62:*:*:*:*:*:*:*", "cpeNameId": "E93FBE71-458B-4F4A-BA1E-153759B14744"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.63:*:*:*:*:*:*:*", "cpeNameId": "7FD84D94-2BA9-4552-9807-F06A66D760BA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.64:*:*:*:*:*:*:*", "cpeNameId": "9424301F-3046-46B4-863C-E887D542C94B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.65:*:*:*:*:*:*:*", "cpeNameId": "70F56D3D-6046-4B8E-961A-C9835F0B9090"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.66:*:*:*:*:*:*:*", "cpeNameId": "C4C18611-ABA7-482D-82FD-8CE9E3CBDB33"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.67:*:*:*:*:*:*:*", "cpeNameId": "0B905626-8718-42FB-9908-7573102CB541"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.68:*:*:*:*:*:*:*", "cpeNameId": "365DA1ED-E1C9-4A4C-9A38-54FDA5832296"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.69:*:*:*:*:*:*:*", "cpeNameId": "27BBA256-9FD8-4A99-A301-31761D2CB794"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.70:*:*:*:*:*:*:*", "cpeNameId": "3B7F8DF6-7523-4D9B-B7B7-10E77A9D132C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.71:*:*:*:*:*:*:*", "cpeNameId": "580454E1-93EE-4311-852E-4B749F7905DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.72:*:*:*:*:*:*:*", "cpeNameId": "1307A5B0-2E1A-48AD-A718-46BF09EA2F52"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.73:*:*:*:*:*:*:*", "cpeNameId": "33F6E183-DDDE-4425-86CB-91EFEA45EB7C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.74:*:*:*:*:*:*:*", "cpeNameId": "861EB0F3-ECA9-4F1B-8842-DB4EFB6A00A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.75:*:*:*:*:*:*:*", "cpeNameId": "2D8BE345-69E8-49AC-A829-8FE9A71E0570"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.76:*:*:*:*:*:*:*", "cpeNameId": "71972DCE-D514-471A-8C19-6F1266FBB229"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.77:*:*:*:*:*:*:*", "cpeNameId": "F8C0EEE1-9B24-411B-ADC9-740859F33B48"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.78:*:*:*:*:*:*:*", "cpeNameId": "A8B37EA6-CA2C-46D6-A181-278E5C31F0DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.79:*:*:*:*:*:*:*", "cpeNameId": "F27C5E99-159C-490C-AF32-50BE9563EB52"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.80:*:*:*:*:*:*:*", "cpeNameId": "17813E0B-D346-4177-8F05-9533B4C60865"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.81:*:*:*:*:*:*:*", "cpeNameId": "8D01EFE4-8A1B-4CCF-95E7-AC5A1539D62E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.82:*:*:*:*:*:*:*", "cpeNameId": "1F0FC27E-9086-4213-9CFE-FD6F1B9A4AF1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.83:*:*:*:*:*:*:*", "cpeNameId": "481F6A95-F56E-4D6D-854C-6F04ECBD66B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.84:*:*:*:*:*:*:*", "cpeNameId": "46CC33A3-5940-4D55-8E84-E73C3BD823F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.85:*:*:*:*:*:*:*", "cpeNameId": "2D2A56E7-26AC-4B25-B518-580C7B57B9AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.86:*:*:*:*:*:*:*", "cpeNameId": "74D61A28-F673-4952-8B5C-02F3C13CB122"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.87:*:*:*:*:*:*:*", "cpeNameId": "339A37D8-F764-445B-8DB3-84A8FAECE0E1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.88:*:*:*:*:*:*:*", "cpeNameId": "D97DAA30-8EFA-4A17-BCF4-1DA94DEA4EDB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.89:*:*:*:*:*:*:*", "cpeNameId": "E27E4623-1A1D-4DFD-82DA-A2C5CC7F7697"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.90:*:*:*:*:*:*:*", "cpeNameId": "E504954E-D296-441C-873E-BB0A99B128A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.91:*:*:*:*:*:*:*", "cpeNameId": "972594C2-DBE3-4358-974A-4F4669143532"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.92:*:*:*:*:*:*:*", "cpeNameId": "844FF0AF-746F-460B-AF09-70F04AEFCF31"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.93:*:*:*:*:*:*:*", "cpeNameId": "0759AD27-6E8F-4FB0-86A0-581270987FC8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.94:*:*:*:*:*:*:*", "cpeNameId": "4762F42E-1EB4-43B9-B4C6-FED6BD72F8F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.95:*:*:*:*:*:*:*", "cpeNameId": "3AB26935-F86A-4944-AB5E-2030498A5150"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.96:*:*:*:*:*:*:*", "cpeNameId": "1F32FA33-C031-4CB3-9FE9-5B8F2AB4F0DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.97:*:*:*:*:*:*:*", "cpeNameId": "EA2A46B2-E9A8-4939-B34C-305DADC1E706"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.98:*:*:*:*:*:*:*", "cpeNameId": "6F40D4DA-5127-4F65-B450-DACBFF729694"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.99:*:*:*:*:*:*:*", "cpeNameId": "4ACCE8A9-B038-41D4-853D-6FFCC67C6B64"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.100:*:*:*:*:*:*:*", "cpeNameId": "7BC07033-922F-4E00-9A7F-A9799C0665BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.101:*:*:*:*:*:*:*", "cpeNameId": "63A5156F-CEE7-4BF7-8421-892C0A117BFF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.102:*:*:*:*:*:*:*", "cpeNameId": "FE32C7D9-7BCC-4896-9D3A-954D3A175242"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.103:*:*:*:*:*:*:*", "cpeNameId": "0E21CE22-A7B8-4F83-BEE7-6672AE3A2C44"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.104:*:*:*:*:*:*:*", "cpeNameId": "A4E75A55-DB3C-43F3-AA43-A04380CB435A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.105:*:*:*:*:*:*:*", "cpeNameId": "217BD320-E966-48FB-A3DA-EAC81FBA3D02"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.106:*:*:*:*:*:*:*", "cpeNameId": "A13D5A45-1F78-4F9D-8932-09FB4963FE2B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.107:*:*:*:*:*:*:*", "cpeNameId": "94B537FB-3FC1-4A2A-90C5-A41C4E757EAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.108:*:*:*:*:*:*:*", "cpeNameId": "A36CC6BB-339C-4928-B79B-7047AD126CAE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.109:*:*:*:*:*:*:*", "cpeNameId": "787AABB6-F55D-41A7-99FA-AE59AD411920"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.110:*:*:*:*:*:*:*", "cpeNameId": "E8453C19-A25E-42BC-AC28-3967873C0502"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.111:*:*:*:*:*:*:*", "cpeNameId": "F25CCCEB-3631-4B9B-852D-A76ED56BA4DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.112:*:*:*:*:*:*:*", "cpeNameId": "5A726FC3-8B4B-4E63-9865-6A5C6BC9451D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.113:*:*:*:*:*:*:*", "cpeNameId": "CD45E388-608F-4BE6-8152-527548FE08DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.114:*:*:*:*:*:*:*", "cpeNameId": "A7BDF880-128D-4D74-8D98-E41C861040C5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.115:*:*:*:*:*:*:*", "cpeNameId": "6692FB97-9395-401A-B1CB-AD484F90B89A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.116:*:*:*:*:*:*:*", "cpeNameId": "9A64BA88-6D08-409E-BFE1-24CFA920C75A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.117:*:*:*:*:*:*:*", "cpeNameId": "2D582BFD-C229-4552-B828-115F83D73F89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.118:*:*:*:*:*:*:*", "cpeNameId": "CA086871-EB47-4699-8451-993791AA05DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.119:*:*:*:*:*:*:*", "cpeNameId": "483BEBC5-E6D4-4ED8-A5E5-DB2DD73986DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.120:*:*:*:*:*:*:*", "cpeNameId": "68EF2A7B-021A-4153-BDB1-A68499185EFB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.121:*:*:*:*:*:*:*", "cpeNameId": "C55B56E4-06A2-43C2-BE53-5681C0687D73"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.122:*:*:*:*:*:*:*", "cpeNameId": "CB7B49F3-DDD7-4A9E-BF7D-89BCA4437C52"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.123:*:*:*:*:*:*:*", "cpeNameId": "4A20AD3E-FA89-4524-8D02-B2728615111C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.124:*:*:*:*:*:*:*", "cpeNameId": "C30938C7-DF69-4F4C-ADF6-BF47C209872E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.125:*:*:*:*:*:*:*", "cpeNameId": "D091A040-31A4-4643-BD08-9D25F02BDDED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.126:*:*:*:*:*:*:*", "cpeNameId": "FF6CD639-C348-4BAA-8C59-8FE73D9966DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.127:*:*:*:*:*:*:*", "cpeNameId": "3F24CE79-3D3D-421A-AC44-E68C17FC5D92"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.128:*:*:*:*:*:*:*", "cpeNameId": "F9E550EF-FFA3-4194-9071-7922680C7E6E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.129:*:*:*:*:*:*:*", "cpeNameId": "987DB34E-E170-4E7E-B08A-CD32A73E9156"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.130:*:*:*:*:*:*:*", "cpeNameId": "A7E67D9A-9FA7-43ED-B536-312C5C01CD6E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.131:*:*:*:*:*:*:*", "cpeNameId": "D9C69A17-571F-45C1-9120-1BE31A33A948"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.132:*:*:*:*:*:*:*", "cpeNameId": "166EDBC5-3C18-4042-8C19-F339F25162FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.133:*:*:*:*:*:*:*", "cpeNameId": "CBA08C9F-0426-4B96-A6E8-7253C152FFBC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.134:*:*:*:*:*:*:*", "cpeNameId": "182AECF8-FAC1-4E1B-BE84-ABB34E11A3F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.135:*:*:*:*:*:*:*", "cpeNameId": "A7249039-E52A-4756-A93F-06A3284AEDEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.136:*:*:*:*:*:*:*", "cpeNameId": "84C67C6F-FA0B-41EE-9D20-11A0BC255F63"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.137:*:*:*:*:*:*:*", "cpeNameId": "00A8D67B-9DFD-4BBE-9A8D-976B22573BC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.138:*:*:*:*:*:*:*", "cpeNameId": "94A225AF-5670-4866-967D-29ECA4887457"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.139:*:*:*:*:*:*:*", "cpeNameId": "579F476A-FED8-4232-ADF1-3889FDC4C86C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.140:*:*:*:*:*:*:*", "cpeNameId": "84F54287-F019-47C9-9CB7-7B6B6CCBA9E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.141:*:*:*:*:*:*:*", "cpeNameId": "3E72C4BF-107C-4C73-AD2D-13564B590074"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.142:*:*:*:*:*:*:*", "cpeNameId": "FC309597-3B6C-4DB1-920B-97C1428824C2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.143:*:*:*:*:*:*:*", "cpeNameId": "0F20169C-AA6F-433A-AB4B-2FB83AFE4CBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.144:*:*:*:*:*:*:*", "cpeNameId": "02E301AD-B083-4D5E-81D5-7C1990FAA3B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.145:*:*:*:*:*:*:*", "cpeNameId": "BAA0E2C0-1BF2-4F95-BBDA-D294FFC56C90"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.146:*:*:*:*:*:*:*", "cpeNameId": "333D6187-DE99-4496-951B-79FC37281B50"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.147:*:*:*:*:*:*:*", "cpeNameId": "5B8EA31C-9846-414C-B164-133B7C72AFAC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.148:*:*:*:*:*:*:*", "cpeNameId": "48B13BAF-B20A-4DEA-9516-565B3030BD3F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.149:*:*:*:*:*:*:*", "cpeNameId": "2BDBBF02-8793-439B-B2B7-F1398DDC5165"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.150:*:*:*:*:*:*:*", "cpeNameId": "845A54DE-9847-4628-81AE-9202E104E5A7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.151:*:*:*:*:*:*:*", "cpeNameId": "429BF264-A007-4AFC-9AC8-17CA5BE8091F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.152:*:*:*:*:*:*:*", "cpeNameId": "A21895BD-17BD-4347-BB11-AC22832B5545"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.153:*:*:*:*:*:*:*", "cpeNameId": "C72F8FFE-0954-4360-ABC2-97FDC0DB5D45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.154:*:*:*:*:*:*:*", "cpeNameId": "76BE03E9-E28F-44A8-9B89-9700CF4E3689"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.155:*:*:*:*:*:*:*", "cpeNameId": "C28104D3-94AE-44FA-9395-B7B19859B677"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.156:*:*:*:*:*:*:*", "cpeNameId": "27FB0DEA-7659-4394-8E83-0EC289A5CAA4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.157:*:*:*:*:*:*:*", "cpeNameId": "D9820BF1-0B1A-432F-889F-F152AAA957DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.158:*:*:*:*:*:*:*", "cpeNameId": "C0BDDEFA-7B1D-4108-BCC9-FFA63A3DDC7E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.159:*:*:*:*:*:*:*", "cpeNameId": "8A23C014-F216-43C3-9D3C-5CEED86EE41D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.160:*:*:*:*:*:*:*", "cpeNameId": "1978465D-F79C-40EB-A6EF-50EFF77BB974"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.161:*:*:*:*:*:*:*", "cpeNameId": "29914586-1720-4AE1-A204-01432051782B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.162:*:*:*:*:*:*:*", "cpeNameId": "FBE6A9B7-94E5-456F-B336-59EE1C9C62E5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.163:*:*:*:*:*:*:*", "cpeNameId": "31DF5109-302D-4C99-BF27-7752453D8B5E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.164:*:*:*:*:*:*:*", "cpeNameId": "3262D873-56B3-449E-A70A-17DA2F4D9382"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.165:*:*:*:*:*:*:*", "cpeNameId": "21C9EF71-018C-41DE-ADCD-FF6A38C77E4C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.166:*:*:*:*:*:*:*", "cpeNameId": "46897616-FAB1-4E27-8F2B-7B59CF5B96D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.167:*:*:*:*:*:*:*", "cpeNameId": "2547AA22-645F-4613-A353-93431C5784F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.168:*:*:*:*:*:*:*", "cpeNameId": "FF6BB8B3-8746-4110-9FFC-C8FA51F8CD8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.169:*:*:*:*:*:*:*", "cpeNameId": "76B2AC55-7FE1-4EB6-B66F-AA2DA71D67CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.170:*:*:*:*:*:*:*", "cpeNameId": "E8A369DE-6CF8-43BF-ACC2-34CCEAAEADEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.171:*:*:*:*:*:*:*", "cpeNameId": "192DCF0D-9152-475F-828E-817AD9C86E8B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.172:*:*:*:*:*:*:*", "cpeNameId": "DF8383A9-7BF3-473B-9EE1-38C0FB296913"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.173:*:*:*:*:*:*:*", "cpeNameId": "7AB9EEF7-D575-4CB3-B57E-173AE0807897"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.174:*:*:*:*:*:*:*", "cpeNameId": "2658DE93-2BC0-4AC0-86D9-0487D4571A3D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.175:*:*:*:*:*:*:*", "cpeNameId": "9C9415F0-7A65-436A-AAD8-31F99B9D7389"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.176:*:*:*:*:*:*:*", "cpeNameId": "1D0378DF-6D92-4307-904F-C66E45A7951E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.177:*:*:*:*:*:*:*", "cpeNameId": "EAE9A661-784D-4767-AF9B-7FBFA7D82738"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.178:*:*:*:*:*:*:*", "cpeNameId": "C17A6F7B-CD4A-49F4-A75B-B67338DDDDD5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.179:*:*:*:*:*:*:*", "cpeNameId": "E79DFC9A-C359-4DD6-990B-2174E5B0024A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.180:*:*:*:*:*:*:*", "cpeNameId": "0A2AFA9A-832F-4C6C-BF9A-7C5A1C0E4FCA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.181:*:*:*:*:*:*:*", "cpeNameId": "4ED76815-B1FF-4FF7-B33D-4CC39C1A3948"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.182:*:*:*:*:*:*:*", "cpeNameId": "094B86B6-B8A4-408E-93F5-7514E0889F80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.183:*:*:*:*:*:*:*", "cpeNameId": "0ECF42BB-D201-4ED6-BA24-8B3A388564DA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.184:*:*:*:*:*:*:*", "cpeNameId": "588AC0CC-AEA3-4230-8820-D46E13AFED1A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.185:*:*:*:*:*:*:*", "cpeNameId": "1B6E85FD-9863-43D4-830D-C46AC7CF8EA5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.186:*:*:*:*:*:*:*", "cpeNameId": "E1320383-8026-48C2-AA55-3D6DD4C91761"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.187:*:*:*:*:*:*:*", "cpeNameId": "78BC22D4-F955-4AC6-A00F-AD4832C1F2FA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.188:*:*:*:*:*:*:*", "cpeNameId": "E562975C-CD47-45F9-815A-F1549043871A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.189:*:*:*:*:*:*:*", "cpeNameId": "9F7D5828-8590-4C04-9BA2-03D8A9265783"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.190:*:*:*:*:*:*:*", "cpeNameId": "052F6967-B479-47A5-B705-66ADF5BAE5B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.191:*:*:*:*:*:*:*", "cpeNameId": "E6E1C494-101F-4F6C-B9F9-453EF9EC7D30"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.192:*:*:*:*:*:*:*", "cpeNameId": "A1A79F09-A517-41C9-81E2-0D1B960AC8E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.193:*:*:*:*:*:*:*", "cpeNameId": "329B75BA-C9CB-4193-A56B-4C175431194D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.194:*:*:*:*:*:*:*", "cpeNameId": "B3CC767E-10C4-4966-8921-50BB6E99E682"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.195:*:*:*:*:*:*:*", "cpeNameId": "BDAF83E0-E596-47CA-9FD5-E310643531AB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.196:*:*:*:*:*:*:*", "cpeNameId": "B52AB3E0-7C8A-4E9B-9AB7-970D110AD689"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.197:*:*:*:*:*:*:*", "cpeNameId": "A98AABF5-2C66-4202-8CC8-7BD6A5BD206C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.198:*:*:*:*:*:*:*", "cpeNameId": "D2FB7CC8-3184-4B7B-8F15-206D478B957B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.199:*:*:*:*:*:*:*", "cpeNameId": "F17EC735-6954-48DE-9B79-129B113894DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.200:*:*:*:*:*:*:*", "cpeNameId": "215BF96E-9953-4137-9343-E664467C544B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.201:*:*:*:*:*:*:*", "cpeNameId": "4F5AA1AE-A206-4735-811F-D278CE94F425"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.202:*:*:*:*:*:*:*", "cpeNameId": "21709E5C-334E-4C9A-93FC-D33A6A234EBE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.203:*:*:*:*:*:*:*", "cpeNameId": "90B8792D-F589-4658-8105-D62452F51118"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.204:*:*:*:*:*:*:*", "cpeNameId": "783138D6-77F2-42BD-B712-64D5E3069478"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.205:*:*:*:*:*:*:*", "cpeNameId": "FDFF6DBF-A75C-45BA-A6EB-7EE625C06625"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.206:*:*:*:*:*:*:*", "cpeNameId": "3AFE0482-4EE2-4916-B1D9-6164C7CE9424"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.207:*:*:*:*:*:*:*", "cpeNameId": "B70FE32B-60B4-491B-BE0C-1709EFA5893C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.208:*:*:*:*:*:*:*", "cpeNameId": "0B61E6D6-2C0A-41BF-A847-2A0989F51690"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.209:*:*:*:*:*:*:*", "cpeNameId": "FAD83EB2-0BC4-4AD0-B7D0-84D486786E11"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.210:*:*:*:*:*:*:*", "cpeNameId": "4F085545-FA13-4D9D-ACC8-F268C0942C68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.211:*:*:*:*:*:*:*", "cpeNameId": "1110C146-0596-4E9A-9D9A-759EEE029BE7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.212:*:*:*:*:*:*:*", "cpeNameId": "C4725039-FE74-42A4-8F28-71890581F507"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.213:*:*:*:*:*:*:*", "cpeNameId": "01623D91-F403-4331-8911-FC3D9F207EEC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.214:*:*:*:*:*:*:*", "cpeNameId": "6E428F60-24AE-403A-918B-A89C96B757C7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.215:*:*:*:*:*:*:*", "cpeNameId": "3800AEF1-ED61-41F4-9D70-EA3E0B77361D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.216:*:*:*:*:*:*:*", "cpeNameId": "0E9E733E-B81F-4112-AD2F-CE938439024B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.217:*:*:*:*:*:*:*", "cpeNameId": "48B7E2F6-5130-443C-8771-BE9DCDFBDD10"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.218:*:*:*:*:*:*:*", "cpeNameId": "3B485A54-4F57-4E7C-B620-A82938273FA7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.219:*:*:*:*:*:*:*", "cpeNameId": "C7F27EB7-A65A-45A2-A904-9F60507D342A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.220:*:*:*:*:*:*:*", "cpeNameId": "447A4E02-26AC-4CA2-B76D-B3508CF9B860"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.221:*:*:*:*:*:*:*", "cpeNameId": "436B2D40-F48C-4162-99D2-30D16807E3B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.222:*:*:*:*:*:*:*", "cpeNameId": "6BF3B63B-B671-44C8-8CBC-9FD21CA0E820"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.223:*:*:*:*:*:*:*", "cpeNameId": "121ACF12-28C3-4E2A-88C5-D5EF13920A90"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.224:*:*:*:*:*:*:*", "cpeNameId": "A67E472A-DC6E-4691-B5F1-225DE7946514"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.225:*:*:*:*:*:*:*", "cpeNameId": "CD10FD8D-0844-48A8-986D-33CA0DB5B3AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.226:*:*:*:*:*:*:*", "cpeNameId": "A11586F3-BA48-43B1-B808-2FD2280550F7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.227:*:*:*:*:*:*:*", "cpeNameId": "D3DD83A4-36EB-4F6B-86DB-524C91470807"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.229:*:*:*:*:*:*:*", "cpeNameId": "B816AFF0-A9B1-4F57-93E1-BB2D2A273A68"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.230:*:*:*:*:*:*:*", "cpeNameId": "A940CCEF-1858-4FB9-BEC7-C2CD5A8DA5C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.10.244:*:*:*:*:*:*:*", "cpeNameId": "CA513596-6180-494F-A47C-4DC449B53BB7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:*:*:*:*:*:*:*", "cpeNameId": "63BC1E47-0228-41F4-989F-B4714260762B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:-:*:*:*:*:*:*", "cpeNameId": "BEEBF8B2-4493-470F-90B7-A9A57717C54C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:rc1:*:*:*:*:*:*", "cpeNameId": "AC145652-F483-4B19-B8C4-624F28E03010"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:rc2:*:*:*:*:*:*", "cpeNameId": "B9AE2C09-C300-4B2D-A5A7-E5D4CE11A0F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:rc3:*:*:*:*:*:*", "cpeNameId": "24855508-8DA6-4CA8-9B38-21B1C4505824"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:rc4:*:*:*:*:*:*", "cpeNameId": "B5E9A0D7-9681-4F6C-BBE8-30403B1C6F83"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:rc5:*:*:*:*:*:*", "cpeNameId": "95BCDE4B-2F7F-4F21-A2F1-A30E9C6370D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:rc6:*:*:*:*:*:*", "cpeNameId": "F455B799-C4F3-4B7A-8B65-0383984C3717"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11:rc7:*:*:*:*:*:*", "cpeNameId": "1F290906-F5FA-45DF-922F-62ECC063EA76"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.1:*:*:*:*:*:*:*", "cpeNameId": "34D4AA87-9172-4704-BEA7-9DDEB516DB84"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.2:*:*:*:*:*:*:*", "cpeNameId": "8BF52BA5-E253-4CDD-A135-1531A86D543E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.3:*:*:*:*:*:*:*", "cpeNameId": "145EB557-D73C-47BB-87A6-B7029FA35A40"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.4:*:*:*:*:*:*:*", "cpeNameId": "7EEB122E-2E7E-4662-8AF2-B5F702EA3A6A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.5:*:*:*:*:*:*:*", "cpeNameId": "A3738040-9287-4A85-AE74-8E90D460C227"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.6:*:*:*:*:*:*:*", "cpeNameId": "C1C5E2C0-BA06-4A09-8063-F0CA9FC0ABFE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.7:*:*:*:*:*:*:*", "cpeNameId": "F2C4DB30-0C29-4A72-ACAD-AC339F102D29"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.8:*:*:*:*:*:*:*", "cpeNameId": "B8F6A213-C6B1-442B-BB9F-2B987BDEA023"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.9:*:*:*:*:*:*:*", "cpeNameId": "54EA37D0-6527-4F8B-A416-2ADF4F749CF8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.10:*:*:*:*:*:*:*", "cpeNameId": "620126E3-8499-4B1E-A182-2E3AF06B336B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.11:*:*:*:*:*:*:*", "cpeNameId": "193D233C-D3F2-4B20-AFFF-7B602948094F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.12:*:*:*:*:*:*:*", "cpeNameId": "90F5A23D-3E38-40C2-B5F8-8F4D6C1FA3E7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.13:*:*:*:*:*:*:*", "cpeNameId": "2B0BFF44-FCAF-4E26-BEB4-6F302ECCC398"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.14:*:*:*:*:*:*:*", "cpeNameId": "6F1AF9D1-837E-4681-A1B5-DBE553BB65DE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.15:*:*:*:*:*:*:*", "cpeNameId": "B9251847-EA27-4EBA-B9F3-1162156DBDFA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.16:*:*:*:*:*:*:*", "cpeNameId": "16A3579F-40D9-4FB0-B7D3-54FC47821FE8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.17:*:*:*:*:*:*:*", "cpeNameId": "BDFD9B25-4336-4D39-8C82-48867CB816ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.18:*:*:*:*:*:*:*", "cpeNameId": "82BF44C5-7264-4478-B8FC-06100D67440C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.19:*:*:*:*:*:*:*", "cpeNameId": "B4AE9BDA-08FC-43E5-B69A-12D179D1F0F2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.20:*:*:*:*:*:*:*", "cpeNameId": "9FA3583C-D6CB-4E2D-8807-AD4BE72A8400"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.21:*:*:*:*:*:*:*", "cpeNameId": "4C39A0D8-85D6-4087-A5C7-E31B4763C30E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.11.22:*:*:*:*:*:*:*", "cpeNameId": "3734E58B-67DE-4CFE-8A0A-E198902F5EF3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12:-:*:*:*:*:*:*", "cpeNameId": "909AE298-650A-40FC-89B6-3C9B84F18D0D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12:rc1:*:*:*:*:*:*", "cpeNameId": "2DF254E6-DCA2-415F-A9CF-A8F8214C70C9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12:rc2:*:*:*:*:*:*", "cpeNameId": "28EA1789-0AA1-4DDF-8A3B-186FAE60250E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12:rc3:*:*:*:*:*:*", "cpeNameId": "18273D65-2C56-44F3-86BB-210E8183A30E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12:rc4:*:*:*:*:*:*", "cpeNameId": "1C698D86-842A-4A52-AC8A-0ACE001B6150"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12:rc5:*:*:*:*:*:*", "cpeNameId": "5DA86DC0-64A9-4E9C-A37C-A4EFB1764A84"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12:rc6:*:*:*:*:*:*", "cpeNameId": "DD2A90B7-FAAF-49E4-A5FE-F6E9ADF6A147"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12:rc7:*:*:*:*:*:*", "cpeNameId": "A990F6D8-E66C-4AD6-9606-71E2B8FB4CFE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.1:*:*:*:*:*:*:*", "cpeNameId": "7497D744-2E4C-45AD-9B58-D9ECD626175B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.2:*:*:*:*:*:*:*", "cpeNameId": "10641D0D-05A7-4B3D-82FB-FFE591B7DBD7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.3:*:*:*:*:*:*:*", "cpeNameId": "5AD0A9F1-5AD4-4ABB-A833-99BA7D351577"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.4:*:*:*:*:*:*:*", "cpeNameId": "4665239B-D45C-4558-9F54-695E98369E8C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.5:*:*:*:*:*:*:*", "cpeNameId": "8E690484-7C22-4011-9B03-9983E23095F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.6:*:*:*:*:*:*:*", "cpeNameId": "F9520114-68E1-4BB9-B088-7C1A27ACE515"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.7:*:*:*:*:*:*:*", "cpeNameId": "AD1AB54E-70EA-4B7E-B7D9-87F45E7F87A9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.8:*:*:*:*:*:*:*", "cpeNameId": "8C5ABC42-12D2-499A-B6CC-C9B1E15AEA71"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.9:*:*:*:*:*:*:*", "cpeNameId": "46196B73-964E-4ABC-B0E5-48B5F5CB7BFF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.10:*:*:*:*:*:*:*", "cpeNameId": "36A6AB9B-68B3-4234-A8E6-74EC108A160C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.11:*:*:*:*:*:*:*", "cpeNameId": "A12D7920-D1CA-44DC-A290-E26C4FE41EEF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.12:*:*:*:*:*:*:*", "cpeNameId": "9794C38E-32C0-4EB8-B4FE-D02D6E4ECFEA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.13:*:*:*:*:*:*:*", "cpeNameId": "B5621156-BE25-4483-A3D0-4DD273245B57"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.14:*:*:*:*:*:*:*", "cpeNameId": "D1BB4FE7-AF71-4FEF-BD81-A88B9E860487"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.15:*:*:*:*:*:*:*", "cpeNameId": "9B349C0E-D91F-485E-A777-06055A4DF1D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.16:*:*:*:*:*:*:*", "cpeNameId": "0101B6BB-6E04-4238-A384-245C8C831FE0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.17:*:*:*:*:*:*:*", "cpeNameId": "B70E75C0-1784-4F2D-9890-72635AD1ABC8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.18:*:*:*:*:*:*:*", "cpeNameId": "FC1C2672-396B-452C-97B1-6C7F0583CB21"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.19:*:*:*:*:*:*:*", "cpeNameId": "6CE0FEDB-F644-4A9C-A88A-8F9D69B58BBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.12.25:*:*:*:*:*:*:*", "cpeNameId": "E9B47122-76AA-45F9-9BA9-9AA7D47E1819"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13:-:*:*:*:*:*:*", "cpeNameId": "760A4977-F4EC-4445-8EED-8F3540557E96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", "cpeNameId": "789E9076-49A9-4149-A146-FFAB80FD6312"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", "cpeNameId": "510FD2D9-571A-4924-B0B5-266204ABEF00"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", "cpeNameId": "B7FC9139-392C-42D9-B092-06ADE363B7C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", "cpeNameId": "78FDEB4A-AC37-4CEB-90F2-69700A1DFCB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*", "cpeNameId": "2B4C5B22-5D8E-46CA-A9A7-D488F2847060"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13:rc6:*:*:*:*:*:*", "cpeNameId": "55D4CFE3-C4CD-4A45-A04A-BFDA91D27503"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13:rc7:*:*:*:*:*:*", "cpeNameId": "DD429168-8AFF-457A-A8A7-8723FDC00949"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.0-52:*:*:*:*:*:*:*", "cpeNameId": "292646CC-C335-4347-87AE-6E1555659B40"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.1:*:*:*:*:*:*:*", "cpeNameId": "30F1E081-ED8A-457C-8465-D9C070DF0721"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.2:*:*:*:*:*:*:*", "cpeNameId": "17573538-60C1-4BBE-8321-EDE2F7F0E1A3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.3:*:*:*:*:*:*:*", "cpeNameId": "E0E67EF3-1AC9-4F29-B215-A82FF3493F6D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.4:*:*:*:*:*:*:*", "cpeNameId": "C6A71459-E60F-4B6A-B838-AE055D002725"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.5:*:*:*:*:*:*:*", "cpeNameId": "2F2A9933-4925-48E1-A572-276C4704E76F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.6:*:*:*:*:*:*:*", "cpeNameId": "9B5FC7E8-F482-43BD-B50D-7371AB3D4692"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.7:*:*:*:*:*:*:*", "cpeNameId": "94B23D33-6B16-475B-BF18-12A4FD5BE981"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.8:*:*:*:*:*:*:*", "cpeNameId": "71FC3F52-9D0F-4FA1-BEC8-7E662B3F0865"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.9:*:*:*:*:*:*:*", "cpeNameId": "5F17B3D4-BEAA-4606-B54B-419BE8532261"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.10:*:*:*:*:*:*:*", "cpeNameId": "73EC9A1A-02F6-4D0A-993F-5F2F9277F242"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.11:*:*:*:*:*:*:*", "cpeNameId": "45FFC97B-0FB5-4F9F-8660-FDCF0FBD5166"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.12:*:*:*:*:*:*:*", "cpeNameId": "2C6FC6E4-806F-4C8F-BC99-E279D18A47F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.13:*:*:*:*:*:*:*", "cpeNameId": "EBA292BE-DC50-49A1-8C5B-284C05E30E80"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.14:*:*:*:*:*:*:*", "cpeNameId": "950E8486-A34F-4B8C-B6B9-213FB5D2B553"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.15:*:*:*:*:*:*:*", "cpeNameId": "DD0ACE31-23BC-46AE-8C24-DDE99C1677FE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.16:*:*:*:*:*:*:*", "cpeNameId": "7D6ABA87-CFF7-4467-B1EB-26F1B2C8CD86"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.17:*:*:*:*:*:*:*", "cpeNameId": "B6F4951C-AB24-43F3-8361-34CD2C0DA81E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.18:*:*:*:*:*:*:*", "cpeNameId": "C7B2B5A1-F367-42EA-BB1B-F03C29AE7228"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.13.19:*:*:*:*:*:*:*", "cpeNameId": "39AC74B5-3F06-44E2-8F03-3C3F552C6111"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14:-:*:*:*:*:*:*", "cpeNameId": "290B9F79-3C87-4725-9517-AF89CC5F87D6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14:rc1:*:*:*:*:*:*", "cpeNameId": "A83E7C0B-A2D1-46BB-A787-DF9B68EA842A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14:rc2:*:*:*:*:*:*", "cpeNameId": "3FC14149-AA1E-48B5-8F75-5B5DD861A257"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14:rc3:*:*:*:*:*:*", "cpeNameId": "FA98B0B7-3C8F-4AC4-96E2-C1ED5869C608"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14:rc4:*:*:*:*:*:*", "cpeNameId": "21FB0B0F-DD53-4505-A841-D56D4C98ADDA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14:rc5:*:*:*:*:*:*", "cpeNameId": "4DDE3D5C-B126-49B9-8255-B97A9F55DC75"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14:rc6:*:*:*:*:*:*", "cpeNameId": "AC770C18-100E-4D5A-8E7C-548B363374D1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.1:*:*:*:*:*:*:*", "cpeNameId": "6ED5E726-F7B4-446F-8B58-8756B5D09D3A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.2:*:*:*:*:*:*:*", "cpeNameId": "EEEEDE36-29F0-45B2-A5AD-AC615F9ECBFE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.3:*:*:*:*:*:*:*", "cpeNameId": "820DBC02-C9B5-4003-84F4-6C88EE2C3161"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.4:*:*:*:*:*:*:*", "cpeNameId": "75EEBB8F-B653-4BE3-8748-7973BB51D982"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.5:*:*:*:*:*:*:*", "cpeNameId": "EB2BAAA7-D118-4EE4-8974-B5E91B2DD088"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.6:*:*:*:*:*:*:*", "cpeNameId": "A90AEBB1-634D-4E4C-9EB4-5A378DA9921E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.7:*:*:*:*:*:*:*", "cpeNameId": "713408CD-13C2-4E22-A7CF-1CFA01082262"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.8:*:*:*:*:*:*:*", "cpeNameId": "AF7173EC-5AA6-4152-ADE2-77F860F5DCBD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.9:*:*:*:*:*:*:*", "cpeNameId": "5C3FF227-DDB0-4ACE-9170-4BE4CDA39239"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.10:*:*:*:*:*:*:*", "cpeNameId": "B9A635C8-CD0F-4897-A6E6-11F42F597CF7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.11:*:*:*:*:*:*:*", "cpeNameId": "D302868E-99BB-4C0C-9EC5-22E0F2F7B58A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.12:*:*:*:*:*:*:*", "cpeNameId": "227CCDD9-0DA9-4E19-A3A0-98182C78A04D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.13:*:*:*:*:*:*:*", "cpeNameId": "BA9F4788-9EAB-4974-B38D-F49FA29FCAB7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.14:*:*:*:*:*:*:*", "cpeNameId": "30A4EDD4-FFDC-46D1-9525-65CE02584D95"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.15:*:*:*:*:*:*:*", "cpeNameId": "253EE3A7-BB19-4AC4-B7F6-9B50D49FE43B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.16:*:*:*:*:*:*:*", "cpeNameId": "CFD0FB79-CC87-491D-8B44-C835289F1FF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.17:*:*:*:*:*:*:*", "cpeNameId": "6D7A8649-F82D-4F46-8B54-B4A42730DC62"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.18:*:*:*:*:*:*:*", "cpeNameId": "F5056E34-3AA2-4E1D-9445-D36A5E9AC2AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.19:*:*:*:*:*:*:*", "cpeNameId": "173C2A8A-1254-4EA0-8FE0-266FB47C42E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.20:*:*:*:*:*:*:*", "cpeNameId": "91634B25-518C-487C-90FC-C295D8AEF303"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.14.21:*:*:*:*:*:*:*", "cpeNameId": "1188704C-1DAC-4A1B-876D-B462547A9A1D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15:-:*:*:*:*:*:*", "cpeNameId": "599716EA-4916-4E30-8C24-4C6384D09138"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*", "cpeNameId": "CC920260-1BAF-4237-9263-2BCB29AE387F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*", "cpeNameId": "E052153B-5861-4C61-8207-1ED350609920"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:*", "cpeNameId": "6DBE44D0-670B-4B11-93BC-5CE160AE79A0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15:rc4:*:*:*:*:*:*", "cpeNameId": "D2702E38-FC04-4035-9742-46E5C2C32FF5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15:rc5:*:*:*:*:*:*", "cpeNameId": "A638E326-4ACA-4CBB-8541-3860AEC16C9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15:rc6:*:*:*:*:*:*", "cpeNameId": "3E354D0D-99D1-4D2E-A42D-66946B7130B3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15:rc7:*:*:*:*:*:*", "cpeNameId": "3FA3424A-B73B-4456-B871-280BBF7DE793"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.0:*:*:*:*:*:*:*", "cpeNameId": "3B152660-5C53-45F1-82AE-702237DAC922"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.0-58:*:*:*:*:*:*:*", "cpeNameId": "06ABD7CB-C7BF-4F85-ABD4-36F90A9114F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.1:*:*:*:*:*:*:*", "cpeNameId": "C92526FC-5702-4551-95C4-5D185E57703A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.2:*:*:*:*:*:*:*", "cpeNameId": "A70688C6-4AA2-4110-BC86-CA9E324DF3EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.3:*:*:*:*:*:*:*", "cpeNameId": "64CD2A28-6AE0-4894-8B00-F5232E3C34A9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.3:-:*:*:*:*:*:*", "cpeNameId": "FE18FBEA-C217-402C-8731-7C387B4B3D7F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.4:*:*:*:*:*:*:*", "cpeNameId": "969BD4C0-B372-451B-9376-0CA5FB3C286F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.5:*:*:*:*:*:*:*", "cpeNameId": "7309FA34-EDC1-41D1-BB4E-09F09900678F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.6:*:*:*:*:*:*:*", "cpeNameId": "DA042DB6-921A-4071-A171-7D0C2BBBC8F8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.7:*:*:*:*:*:*:*", "cpeNameId": "0E69D848-C6AF-45F1-B581-3435108E1E1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.8:*:*:*:*:*:*:*", "cpeNameId": "73679DB9-DB66-4D04-9362-9F7FDE3ED7DD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.9:*:*:*:*:*:*:*", "cpeNameId": "A914D016-CDDA-4F8C-8D11-AD68CA078395"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.10:*:*:*:*:*:*:*", "cpeNameId": "B8732B41-FD4D-4BB5-B500-664C2BA3129F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.11:*:*:*:*:*:*:*", "cpeNameId": "A58F2B5E-D805-40E6-B2EC-38AB78F48EBA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.12:*:*:*:*:*:*:*", "cpeNameId": "C570EA74-0498-4116-8B63-2E08DB9EAF91"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.13:*:*:*:*:*:*:*", "cpeNameId": "D43ECFE8-45FA-41D1-94B9-F6A3601D99C4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.14:*:*:*:*:*:*:*", "cpeNameId": "9B285A1E-C507-4EDB-A79D-7F3A707A00D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.15:*:*:*:*:*:*:*", "cpeNameId": "479523C1-5DFC-4ADF-88A9-60D25E740ECD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.16:*:*:*:*:*:*:*", "cpeNameId": "283D07E0-7CF7-428B-B5E7-F9F389F42621"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.17:*:*:*:*:*:*:*", "cpeNameId": "28209832-3CD5-4EB8-BFF7-94C00921B21A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.18:*:*:*:*:*:*:*", "cpeNameId": "C402A420-3087-4169-B118-B9576726F29A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.19:*:*:*:*:*:*:*", "cpeNameId": "71FF4C04-4676-4339-904C-E431CA842C9A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.20:*:*:*:*:*:*:*", "cpeNameId": "D3AC6061-A8AD-4B32-9631-AAD5AE8AE846"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.21:*:*:*:*:*:*:*", "cpeNameId": "01512FC7-2E77-4185-84AD-233C3850F0C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.22:*:*:*:*:*:*:*", "cpeNameId": "13950585-5CDE-450C-8569-0F629C7EDB2E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.23:*:*:*:*:*:*:*", "cpeNameId": "84D3D456-7CBD-4BB2-940D-07D97BA08C58"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.24:*:*:*:*:*:*:*", "cpeNameId": "4B07A2D0-5A94-41AD-8478-EB93089837BD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.25:*:*:*:*:*:*:*", "cpeNameId": "4B57878E-85D9-4630-81F9-971E521E1D04"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.26:*:*:*:*:*:*:*", "cpeNameId": "10C93845-0531-404A-B632-86FC15D22E78"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.27:*:*:*:*:*:*:*", "cpeNameId": "6B435B64-AB1B-4029-B6A5-01DD5C19206F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.28:*:*:*:*:*:*:*", "cpeNameId": "101F745E-07DD-436D-9573-77D88FEE7DA8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.29:*:*:*:*:*:*:*", "cpeNameId": "2126A535-152D-4C7D-BEEC-5E05EFF76DBF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.30:*:*:*:*:*:*:*", "cpeNameId": "3D5050EC-725E-41E0-A0BB-89C5CC71ACC5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.31:*:*:*:*:*:*:*", "cpeNameId": "CADD5BFF-62AF-44DA-8433-F0221493495C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.32:*:*:*:*:*:*:*", "cpeNameId": "D41546A8-EBED-4F57-BD4A-9E1B2A5C17CC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.33:*:*:*:*:*:*:*", "cpeNameId": "2AD16C2A-38AA-4931-922E-B883B7574C58"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.34:*:*:*:*:*:*:*", "cpeNameId": "99C916A9-866D-4905-9878-8DD27F5E980D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.35:*:*:*:*:*:*:*", "cpeNameId": "5F3D2240-53BA-4C7D-8199-FE7F31339D4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.36:*:*:*:*:*:*:*", "cpeNameId": "FF57011F-9545-414B-B253-52F38B78B77A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.37:*:*:*:*:*:*:*", "cpeNameId": "606225EC-ECF3-4F47-91A8-7F9D17842D62"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.38:*:*:*:*:*:*:*", "cpeNameId": "4DB0EF0E-5BF0-47C3-A2F9-B3522AFF7190"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.39:*:*:*:*:*:*:*", "cpeNameId": "A08CEA1B-91C1-4711-BD80-0F7ADDE94BA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.40:*:*:*:*:*:*:*", "cpeNameId": "89D88D81-DD0E-43FD-B671-78B808D88647"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.41:*:*:*:*:*:*:*", "cpeNameId": "DD7E6E45-BF7C-46DF-958C-735232ECCBED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.42:*:*:*:*:*:*:*", "cpeNameId": "B2520F43-B7D8-4373-8869-07DCFD59FF11"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.43:*:*:*:*:*:*:*", "cpeNameId": "F16FC01A-7763-44B0-B502-4FC46DA358AF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.44:*:*:*:*:*:*:*", "cpeNameId": "030D2A9C-692A-4DB1-9D63-44DBCC0C68F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.45:*:*:*:*:*:*:*", "cpeNameId": "94C51A53-591C-4ED3-BBD6-7549EE1F8068"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.46:*:*:*:*:*:*:*", "cpeNameId": "ACC8D217-A7B0-4C18-9B70-FA0E5262BFB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.47:*:*:*:*:*:*:*", "cpeNameId": "191C3ACC-27A6-438E-9334-742147EFFBFE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.48:*:*:*:*:*:*:*", "cpeNameId": "8B81D3ED-5819-4470-BE97-D8DEA91AFBB3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.49:*:*:*:*:*:*:*", "cpeNameId": "BAF8556B-BB65-4F53-8EB5-059A294DCD67"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.50:*:*:*:*:*:*:*", "cpeNameId": "D99EABCA-D9E3-44D7-AF96-2D5F1474CD15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.51:*:*:*:*:*:*:*", "cpeNameId": "89386483-66E5-4C04-B476-C08F5BD6D0D0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.52:*:*:*:*:*:*:*", "cpeNameId": "076DEA19-48DB-476C-8CFA-06ACE89F67EF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.53:*:*:*:*:*:*:*", "cpeNameId": "E3AAC0BA-7638-428F-9D89-08A94750E9EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.54:*:*:*:*:*:*:*", "cpeNameId": "56A56B25-D086-4413-8692-A5882F02760F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.55:*:*:*:*:*:*:*", "cpeNameId": "4BF52F71-274C-4E09-9D64-84AAC8D6F67E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.56:*:*:*:*:*:*:*", "cpeNameId": "2D041A4C-8395-4B72-B6B7-06ECBA8E8693"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.57:*:*:*:*:*:*:*", "cpeNameId": "6B5C0E6D-8C22-41CE-8CF7-5A85861A47D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.58:*:*:*:*:*:*:*", "cpeNameId": "FCE4E1B8-7046-4626-A6D1-53B7095B20A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.59:*:*:*:*:*:*:*", "cpeNameId": "729B700C-BDB9-4DFB-A795-98DFBE32EEC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.60:*:*:*:*:*:*:*", "cpeNameId": "1D98E598-4BF4-43D6-904C-9290DDF06272"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.61:*:*:*:*:*:*:*", "cpeNameId": "6CCCAF65-435F-482C-BA22-7DDC145109F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.62:*:*:*:*:*:*:*", "cpeNameId": "B90909CA-2810-4537-A85A-4CBA4A6AF37C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.63:*:*:*:*:*:*:*", "cpeNameId": "6F0C3B38-C13C-4A80-9EBD-65AC9FCC8F9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.64:*:*:*:*:*:*:*", "cpeNameId": "F91D8B0C-B2AC-43A8-8D6C-536E4C07BDA3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.65:*:*:*:*:*:*:*", "cpeNameId": "4C75DDA0-056C-4560-B8F6-FD3A28965C0F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.66:*:*:*:*:*:*:*", "cpeNameId": "479D10C6-D8AE-4C6C-95D8-D4935062ACDA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.67:*:*:*:*:*:*:*", "cpeNameId": "ADBEA5B5-A3FF-4667-A57F-EAA8FBC5F51A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.68:*:*:*:*:*:*:*", "cpeNameId": "E5298249-E4F2-40FD-9A02-0FFE62A97655"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.69:*:*:*:*:*:*:*", "cpeNameId": "AF74FFF5-EACB-41FA-9DDE-6E9F7C2D49E9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.70:*:*:*:*:*:*:*", "cpeNameId": "626D6B66-055F-40EF-87D0-BCA1ACB41632"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.71:*:*:*:*:*:*:*", "cpeNameId": "13BB2C1F-A7E8-4FEA-802A-FCB5DB17689E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.72:*:*:*:*:*:*:*", "cpeNameId": "687ACBBC-002B-4A57-B0C5-495C006BF83A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.73:*:*:*:*:*:*:*", "cpeNameId": "2FFC61CE-E920-4907-9237-ADCB03CF57F3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.74:*:*:*:*:*:*:*", "cpeNameId": "21586670-7837-44DE-98F5-E8664ECB39F0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.75:*:*:*:*:*:*:*", "cpeNameId": "257AECB1-0BFD-4F2F-9E1D-8B99451293E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.76:*:*:*:*:*:*:*", "cpeNameId": "4C6C2994-8803-478D-98AD-268D0B994FD2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.77:*:*:*:*:*:*:*", "cpeNameId": "67B26A96-5B92-41D5-A933-110235C90FC2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.78:*:*:*:*:*:*:*", "cpeNameId": "93765A6E-5FF1-428E-B6DD-08E9761E4BC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.79:*:*:*:*:*:*:*", "cpeNameId": "1E46E1F7-EC81-48DB-8D87-615670C42211"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.80:*:*:*:*:*:*:*", "cpeNameId": "403BE072-9172-420B-A0DF-A011387FC467"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.81:*:*:*:*:*:*:*", "cpeNameId": "76501F14-5447-4316-96C1-406CBB85ACEE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.82:*:*:*:*:*:*:*", "cpeNameId": "EC139CB2-1B4C-41BA-B74E-6E21D4C75A65"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.83:*:*:*:*:*:*:*", "cpeNameId": "B82C5952-6221-4637-A4F9-27F26C848140"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.84:*:*:*:*:*:*:*", "cpeNameId": "6D9BBF85-E068-4434-9F1D-FC5E2BCCCE15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.85:*:*:*:*:*:*:*", "cpeNameId": "4DFB6EEB-3B7C-4BBE-9C57-22212F5CF117"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.86:*:*:*:*:*:*:*", "cpeNameId": "54FA7373-2A0F-441F-B2DE-D0026C9E6E2A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.87:*:*:*:*:*:*:*", "cpeNameId": "D2002224-68A5-4CEB-84E8-C68A68A70477"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.88:*:*:*:*:*:*:*", "cpeNameId": "240ADDF1-F9B5-4E8A-BB28-8D25FD6EAFAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.89:*:*:*:*:*:*:*", "cpeNameId": "E8949735-535C-4365-9E77-3F5AFA127F45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.90:*:*:*:*:*:*:*", "cpeNameId": "27480E5A-75A6-4924-AE94-56C368919E20"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.91:*:*:*:*:*:*:*", "cpeNameId": "F1444DEC-505C-4B47-89E1-558CA1FE252D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.92:*:*:*:*:*:*:*", "cpeNameId": "366E992F-2DEB-4B73-8D13-0AAA6CDAB1AA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.93:*:*:*:*:*:*:*", "cpeNameId": "8B194E4D-C302-4781-A3EB-287B9338BB49"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.94:*:*:*:*:*:*:*", "cpeNameId": "8C4F3FDB-C7D3-4FAF-ADC9-F9C48692180C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.95:*:*:*:*:*:*:*", "cpeNameId": "78DB19FE-CDF2-4493-934F-F78BAC1E3525"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.96:*:*:*:*:*:*:*", "cpeNameId": "BD7068CF-1BF4-4836-A365-A1CAA95D8492"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.97:*:*:*:*:*:*:*", "cpeNameId": "8D4F726D-1B15-4756-B043-23B295E50326"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.98:*:*:*:*:*:*:*", "cpeNameId": "26CC4C2E-D776-4C60-9E36-FCAC66C0CA93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.99:*:*:*:*:*:*:*", "cpeNameId": "FB96FD42-EA7B-4EA4-BE27-FB6AE67A19D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.100:*:*:*:*:*:*:*", "cpeNameId": "8D34EF8C-BCA7-4EC8-9C69-559A59897E86"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.101:*:*:*:*:*:*:*", "cpeNameId": "6675EF7C-AACC-4247-A01C-896C9A44CFB9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.102:*:*:*:*:*:*:*", "cpeNameId": "2FEF936B-B116-4F46-8301-200550628240"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.103:*:*:*:*:*:*:*", "cpeNameId": "DE221176-159A-4357-8F12-AC71670703B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.104:*:*:*:*:*:*:*", "cpeNameId": "C1896DF2-E302-460B-9502-CF7063E5DF9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.105:*:*:*:*:*:*:*", "cpeNameId": "9E101463-342E-4486-823F-3BC4BD391306"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.106:*:*:*:*:*:*:*", "cpeNameId": "CA88855E-C837-4947-93E0-B9D7F9B827E7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.107:*:*:*:*:*:*:*", "cpeNameId": "B13F0C93-E3E4-4641-9EAB-3EA2990A1C89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.108:*:*:*:*:*:*:*", "cpeNameId": "130C0395-CE35-4126-A645-AADC5CD80532"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.109:*:*:*:*:*:*:*", "cpeNameId": "45D1D3CB-FD9D-42FB-A1D3-534BC36E80EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.110:*:*:*:*:*:*:*", "cpeNameId": "A931A0BD-98A1-47EB-9A75-0E8789CD2174"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.111:*:*:*:*:*:*:*", "cpeNameId": "CED0554E-DE06-438B-BD20-D55AB97E2137"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.112:*:*:*:*:*:*:*", "cpeNameId": "01469DE3-F508-4F50-B7EF-CFFAF6B0244A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.113:*:*:*:*:*:*:*", "cpeNameId": "EE8A8B31-F5BC-463C-8C3F-F99C8605D124"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.114:*:*:*:*:*:*:*", "cpeNameId": "7555AB4A-AA90-4F9E-AC9A-522F0EBB84B6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.115:*:*:*:*:*:*:*", "cpeNameId": "37780F52-A144-418A-8605-87E836109FA2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.116:*:*:*:*:*:*:*", "cpeNameId": "67C9CBE9-0CF6-4DC1-96C9-8B8D0C572C76"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.117:*:*:*:*:*:*:*", "cpeNameId": "ADB012DE-27D7-4796-A07A-55897A9208B4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.118:*:*:*:*:*:*:*", "cpeNameId": "6CAF3A99-3538-4B78-AB6F-1FD5BC1D3731"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.119:*:*:*:*:*:*:*", "cpeNameId": "F62E2EC5-1929-49E3-8920-4EFC89470EF3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.120:*:*:*:*:*:*:*", "cpeNameId": "1ACD20AE-5810-4832-9596-E0F2B77F6DED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.121:*:*:*:*:*:*:*", "cpeNameId": "0840D171-E172-4AEB-9A04-748165172F57"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.122:*:*:*:*:*:*:*", "cpeNameId": "108F7161-9C83-4AF5-81CE-7210DBE16A3B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.123:*:*:*:*:*:*:*", "cpeNameId": "AFC5B1D0-7550-4CA6-B9D8-7362589804BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.124:*:*:*:*:*:*:*", "cpeNameId": "607A4975-DD27-45FB-8492-B2D610C8CE49"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.125:*:*:*:*:*:*:*", "cpeNameId": "7CFAB9E2-3565-4DBE-A4A3-F420E0E6F1B5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.126:*:*:*:*:*:*:*", "cpeNameId": "934C84D4-9205-4231-918D-52F8653AD03A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.127:*:*:*:*:*:*:*", "cpeNameId": "94F04153-424F-4287-9D87-86D843B8EC6B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.128:*:*:*:*:*:*:*", "cpeNameId": "3A0743EE-08EE-4033-974B-534685606B8D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.129:*:*:*:*:*:*:*", "cpeNameId": "1851B737-51D3-44EC-BAD0-C326CB4B258A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.130:*:*:*:*:*:*:*", "cpeNameId": "5E3B9172-8C12-4171-BE40-947651A6C1D3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.131:*:*:*:*:*:*:*", "cpeNameId": "68CDD386-3C55-4849-BFDD-71A5DF5ECF00"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.132:*:*:*:*:*:*:*", "cpeNameId": "3F25FB70-CBCF-4363-947B-8D0749D054A1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.133:*:*:*:*:*:*:*", "cpeNameId": "183855CE-2982-4596-954A-C8AD340BB217"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.134:*:*:*:*:*:*:*", "cpeNameId": "2C960D3A-EB30-4662-92DE-2F4DCA1B61DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.135:*:*:*:*:*:*:*", "cpeNameId": "795D4E07-5632-4B2F-889E-52121C56C87A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.136:*:*:*:*:*:*:*", "cpeNameId": "39F63867-B3B8-4B11-8568-793FE9BF0657"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.137:*:*:*:*:*:*:*", "cpeNameId": "86AFC96E-5CC1-4C7C-8D07-20BF5FD72F51"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.138:*:*:*:*:*:*:*", "cpeNameId": "6D98B672-ABF1-4E6A-85CA-C98156AD289F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.139:*:*:*:*:*:*:*", "cpeNameId": "60BDBDA5-D58A-4E1E-87FB-110840F829F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.140:*:*:*:*:*:*:*", "cpeNameId": "44DCAB0F-015F-4450-9454-1B281A41F7FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.141:*:*:*:*:*:*:*", "cpeNameId": "3C8C0EA5-6615-4404-9C0E-507EA505E607"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.142:*:*:*:*:*:*:*", "cpeNameId": "AACA090B-6D25-4504-8EEF-02C1DA914B55"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.143:*:*:*:*:*:*:*", "cpeNameId": "04411AB1-68B2-43CF-8AAF-023A00274276"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.144:*:*:*:*:*:*:*", "cpeNameId": "D1A15124-7544-4990-8884-8EC08CBDB231"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.145:*:*:*:*:*:*:*", "cpeNameId": "DBDB8123-C794-42AF-B554-13E794244440"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.146:*:*:*:*:*:*:*", "cpeNameId": "CD3243D1-4C4E-424A-BCFE-7FAF5782049D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.147:*:*:*:*:*:*:*", "cpeNameId": "D14C7C5E-C636-4B9B-941A-1B5D3FE4AF3B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.148:*:*:*:*:*:*:*", "cpeNameId": "43B668A9-8ADC-487B-8857-F8CC74D99990"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.149:*:*:*:*:*:*:*", "cpeNameId": "8C6DF61D-1354-424F-88D4-C76B0044C4BA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.150:*:*:*:*:*:*:*", "cpeNameId": "405263B7-A847-493D-BAC8-67CDC081E8A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.151:*:*:*:*:*:*:*", "cpeNameId": "AFB5460A-5F15-4E58-A1D9-438F22B08C61"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.152:*:*:*:*:*:*:*", "cpeNameId": "6FD5D09F-908B-4EA6-ADDA-D5D4867282C6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.153:*:*:*:*:*:*:*", "cpeNameId": "35BC07C8-138B-48CB-94C8-F4F2DE1CEA73"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.154:*:*:*:*:*:*:*", "cpeNameId": "104BA652-53EA-4BE7-AEF6-1E69DF5BAB94"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.155:*:*:*:*:*:*:*", "cpeNameId": "82D13E0C-C092-4C55-8F8E-A8EC9F7C5B28"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.156:*:*:*:*:*:*:*", "cpeNameId": "0208D826-E36F-43ED-94E2-47B3786BDA8A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.157:*:*:*:*:*:*:*", "cpeNameId": "29BE7FF8-0D66-4613-9FF9-1491805EF6E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.158:*:*:*:*:*:*:*", "cpeNameId": "F0BD86B6-9DA2-4CB5-925F-AED18EA69B7A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.159:*:*:*:*:*:*:*", "cpeNameId": "1967C928-055E-41A6-9452-11327EFD81F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.160:*:*:*:*:*:*:*", "cpeNameId": "39762989-4F30-40E8-9958-8100639F003F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.161:*:*:*:*:*:*:*", "cpeNameId": "93EFCF93-5625-453D-B8C8-D532F2F6B2EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.162:*:*:*:*:*:*:*", "cpeNameId": "AD93992B-560A-4880-AB8E-2B12E1ED9CE6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.163:*:*:*:*:*:*:*", "cpeNameId": "9F1AF162-C909-4161-9860-93F52BA93C11"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.164:*:*:*:*:*:*:*", "cpeNameId": "E82128C3-95AC-4517-8595-90030EB8B1B7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.165:*:*:*:*:*:*:*", "cpeNameId": "DD75A3C4-3B2C-47C3-8249-25430F6326F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.166:*:*:*:*:*:*:*", "cpeNameId": "C4AE610D-F204-40F4-9F0E-A12F96513628"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.167:*:*:*:*:*:*:*", "cpeNameId": "AD2CD499-D496-457D-B206-76DD055935D8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.168:*:*:*:*:*:*:*", "cpeNameId": "D17DDC10-C0C2-4595-99AA-7D081F156E28"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.170:*:*:*:*:*:*:*", "cpeNameId": "68B1E403-BB7E-46D6-93FB-39CCDEC9F903"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.171:*:*:*:*:*:*:*", "cpeNameId": "20D00418-523B-451C-A87C-A7494767A55C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.15.172:*:*:*:*:*:*:*", "cpeNameId": "BF5B290A-52DC-4153-9821-1E04DA80704B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16:-:*:*:*:*:*:*", "cpeNameId": "C83A7E51-CA73-46EC-8635-C725205B637D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*", "cpeNameId": "028A348E-72E2-4B13-9D61-56938AFFB6F1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:*", "cpeNameId": "6495A470-21D2-43F0-B762-C6ECB6134C5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16:rc3:*:*:*:*:*:*", "cpeNameId": "6342FCDA-7AC5-4E1B-A8F7-C4A7CB62F606"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16:rc4:*:*:*:*:*:*", "cpeNameId": "3379676E-35B7-4474-8A99-EF053E0FD968"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16:rc5:*:*:*:*:*:*", "cpeNameId": "AE10DE94-CADF-4B77-B540-4197CCAB49EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16:rc6:*:*:*:*:*:*", "cpeNameId": "EFBAB573-844C-4A77-BC98-353AB1C86E1A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16:rc7:*:*:*:*:*:*", "cpeNameId": "71AEECF0-21D6-492A-999E-8D6687D719A7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.0:*:*:*:*:*:*:*", "cpeNameId": "081E7EC8-3E8E-48D4-8187-1B96F6BE062F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.0:rc1:*:*:*:*:*:*", "cpeNameId": "EB5911C8-9712-4439-99F2-5BCDED060240"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.1:*:*:*:*:*:*:*", "cpeNameId": "2730ED9E-094C-40E1-B3C5-75C02A9E1BBD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.2:*:*:*:*:*:*:*", "cpeNameId": "7A33187A-7AA3-4565-BD7A-EE2304904D3B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.3:*:*:*:*:*:*:*", "cpeNameId": "F0C5525B-4224-4481-9190-16DFA7982F9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.4:*:*:*:*:*:*:*", "cpeNameId": "891F8D0E-202D-4728-9D83-764496E40CB9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.5:*:*:*:*:*:*:*", "cpeNameId": "AFC47178-4013-4A67-BFBE-F2C1D8C43FAD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.6:*:*:*:*:*:*:*", "cpeNameId": "A563BA20-7E45-4F95-97CC-B991BEE12EC2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.7:*:*:*:*:*:*:*", "cpeNameId": "62897C18-4BA0-46BF-A3C6-A2F57B2C400F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.8:*:*:*:*:*:*:*", "cpeNameId": "0D9ED6C5-B404-47B6-BDDA-21FB4E7392DB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.9:*:*:*:*:*:*:*", "cpeNameId": "DBB9E77F-F972-4486-AE16-C40C76D64E87"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.10:*:*:*:*:*:*:*", "cpeNameId": "7D6A655C-B244-446F-8CDC-4D17D47253AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.11:*:*:*:*:*:*:*", "cpeNameId": "B5EB9714-867F-44F9-9AA3-BE8D500D4BC5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.12:*:*:*:*:*:*:*", "cpeNameId": "8BF0B6A9-F5F7-4EF6-A81F-9AA1DEBFBCE3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.13:*:*:*:*:*:*:*", "cpeNameId": "BE8039FF-A2FF-4592-BCF2-FDE1271C80D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.14:*:*:*:*:*:*:*", "cpeNameId": "70857AD4-FC92-4F1B-905E-19EC450C5B11"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.15:*:*:*:*:*:*:*", "cpeNameId": "AC26CE14-E5B3-4159-805B-6EC9D9B37D83"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.16:*:*:*:*:*:*:*", "cpeNameId": "544C971D-5F36-423D-AB36-E217BE202DB8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.17:*:*:*:*:*:*:*", "cpeNameId": "2A58FEF7-CB40-428A-806B-BE0B32BBB723"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.18:*:*:*:*:*:*:*", "cpeNameId": "7FBBF4E8-6F44-4592-8069-C21668D738E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.19:*:*:*:*:*:*:*", "cpeNameId": "CA37F5FB-5C02-45F3-B7B7-1F56F552B120"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.20:*:*:*:*:*:*:*", "cpeNameId": "83FC3AB5-576E-489E-A697-0865FE9D7439"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.16.62:*:*:*:*:*:*:*", "cpeNameId": "AC968C04-563B-44E7-A323-6CF404B73D4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:-:*:*:*:*:*:*", "cpeNameId": "805B659E-0A6A-4EDE-9E81-F83A30B3264A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*", "cpeNameId": "A87C09DD-69B1-4CA9-8AE6-3DBF4DF3F11D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*", "cpeNameId": "8F54EDC5-48AB-4577-8C36-660DC7D71454"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:rc3:*:*:*:*:*:*", "cpeNameId": "BA251D8D-4559-451C-9974-E9C6B8087A08"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:rc4:*:*:*:*:*:*", "cpeNameId": "75F94F87-13C3-44A6-80AF-C0C5C599E2A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:rc5:*:*:*:*:*:*", "cpeNameId": "CB671C15-924A-43CA-91DB-1D9FA9D0CC25"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:rc6:*:*:*:*:*:*", "cpeNameId": "A9B040E0-4FFC-4F00-ADB0-5AC01F8F04ED"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:rc7:*:*:*:*:*:*", "cpeNameId": "EC464421-E417-4360-86C8-511D0221DCF2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17:rc8:*:*:*:*:*:*", "cpeNameId": "B3CC3FB2-843F-4B86-86B3-D72EEFBA33FD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.1:*:*:*:*:*:*:*", "cpeNameId": "E3D26A37-A963-4501-AD97-1E252FA7A48E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.2:*:*:*:*:*:*:*", "cpeNameId": "7B9C1788-8178-4BDD-8547-0B3193B030A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.3:*:*:*:*:*:*:*", "cpeNameId": "C4DE0AAD-9698-4ADE-A59B-3A730D1B10C0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.4:*:*:*:*:*:*:*", "cpeNameId": "EA1887EA-7FF5-4222-B72B-F17A05C0B035"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.5:*:*:*:*:*:*:*", "cpeNameId": "662B2A28-A112-4710-A201-3017CBD3FC8F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.6:*:*:*:*:*:*:*", "cpeNameId": "77EB0841-4431-4A1E-A99F-ACE36FC6FE50"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.7:*:*:*:*:*:*:*", "cpeNameId": "F2EA9343-31D9-42B5-B7DB-D7DDDE92F4F5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.8:*:*:*:*:*:*:*", "cpeNameId": "31AD3C06-0526-4470-BC59-67D196013B43"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.9:*:*:*:*:*:*:*", "cpeNameId": "D3C822DE-EC22-4C9B-9AA7-C084613C6FF9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.10:*:*:*:*:*:*:*", "cpeNameId": "4CE524CA-B05D-4C9E-B81A-1937E7FFE6DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.11:*:*:*:*:*:*:*", "cpeNameId": "234E800C-A082-4960-BA0D-975F256DDD4A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.12:*:*:*:*:*:*:*", "cpeNameId": "878DE0B7-411C-4C58-B753-C6D22E664553"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.13:*:*:*:*:*:*:*", "cpeNameId": "996D982B-11AA-4504-A9CD-8787C813BFBD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.14:*:*:*:*:*:*:*", "cpeNameId": "5E2AEB31-D1FD-4E9D-9CA9-0F9457674EA9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.17.15:*:*:*:*:*:*:*", "cpeNameId": "2C08D207-8B50-400F-9807-FB3072AD4E6A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:-:*:*:*:*:*:*", "cpeNameId": "0FD8602E-5D63-49B5-AB56-CB2948250E45"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:rc1:*:*:*:*:*:*", "cpeNameId": "1DECE9B9-E9A2-4045-BD0B-C6510F69937D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:rc2:*:*:*:*:*:*", "cpeNameId": "EE2606B9-AA8F-4D28-8575-7AD825CAD250"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:rc3:*:*:*:*:*:*", "cpeNameId": "BC668967-571A-466D-8C69-9495260D3BBD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:rc4:*:*:*:*:*:*", "cpeNameId": "FD9CE501-B79F-4899-A816-149019C673E4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:rc5:*:*:*:*:*:*", "cpeNameId": "2E4EE9B2-FC64-4E7E-9757-5109B02E0AAF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:rc6:*:*:*:*:*:*", "cpeNameId": "D5A2141A-53D1-4E5B-B7C7-4FB179F6F219"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:rc7:*:*:*:*:*:*", "cpeNameId": "CF8E007E-9F74-4780-A09E-D101B3076FDF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18:rc9:*:*:*:*:*:*", "cpeNameId": "E38067B2-E041-45F1-8A88-DE716AEDC5A2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.1:*:*:*:*:*:*:*", "cpeNameId": "5EE504EE-64C4-4361-86B4-E5A7BD65776C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.2:*:*:*:*:*:*:*", "cpeNameId": "787215C4-0507-4760-BF1F-2A8491B66E4F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.3:*:*:*:*:*:*:*", "cpeNameId": "D2A628F1-1878-4C0B-87E6-B21A7CE382D5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.4:*:*:*:*:*:*:*", "cpeNameId": "4890EDC3-B4E8-4CD2-AC95-A9DB9CB74FBF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.5:*:*:*:*:*:*:*", "cpeNameId": "BAA68B22-F0BC-45AD-A350-E8774FC53150"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.6:*:*:*:*:*:*:*", "cpeNameId": "C27B6005-D7EB-47DE-B01C-D5BD2B818D3A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.7:*:*:*:*:*:*:*", "cpeNameId": "89AE071D-DFF0-40A5-B7CE-BA33F9FCC5E7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.8:*:*:*:*:*:*:*", "cpeNameId": "F32F879F-B0ED-4F85-B1AD-A45D6DE80D86"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.9:*:*:*:*:*:*:*", "cpeNameId": "AE86A00C-455A-4075-9AC6-714B1F66D934"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.10:*:*:*:*:*:*:*", "cpeNameId": "704396EF-097A-4DFF-8DAE-4B19965C49AF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.11:*:*:*:*:*:*:*", "cpeNameId": "5CFE2D2B-62BD-448C-B0D4-5F7A9B8AB669"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.12:*:*:*:*:*:*:*", "cpeNameId": "F9A857D7-99FC-4761-B4DF-76E758BDE2BB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.13:*:*:*:*:*:*:*", "cpeNameId": "A2A3B308-1BA2-4C79-88AF-861CE6482E28"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.14:*:*:*:*:*:*:*", "cpeNameId": "534CA992-2337-4EA8-B1F7-256574B35175"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.15:*:*:*:*:*:*:*", "cpeNameId": "2074E50B-BBEE-4902-B9F2-24E1B862076E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.16:*:*:*:*:*:*:*", "cpeNameId": "D2A2905E-45CE-4135-8D5D-0FF92766109E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.17:*:*:*:*:*:*:*", "cpeNameId": "4794F12E-3EDA-4619-BBB0-E275E1F06710"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.18:*:*:*:*:*:*:*", "cpeNameId": "17C90012-A0AA-459E-946A-B3C82983B22B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.18.19:*:*:*:*:*:*:*", "cpeNameId": "222B7748-23E3-4A4D-B9D5-4C5A6D5B2AEF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:-:*:*:*:*:*:*", "cpeNameId": "A7C04E0A-EF2B-426E-8AFE-CDFB04C2EE00"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*", "cpeNameId": "91317E86-8C24-4B48-BD6D-8EF732A881D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*", "cpeNameId": "4D6C0AAC-C284-42AB-8F4E-E54D5294D180"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*", "cpeNameId": "08BCB0AD-FBD2-4A2B-B8AE-9733E31BA02A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*", "cpeNameId": "5EC4698A-FD3A-4387-B636-810BCCBE2F15"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*", "cpeNameId": "6FBD2340-901D-4CE1-BA59-55C77404D099"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*", "cpeNameId": "009D67E0-1C71-4212-BE27-834E15E8112B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*", "cpeNameId": "9294C90D-628E-44F8-B196-9ADEF3B72C89"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19:rc8:*:*:*:*:*:*", "cpeNameId": "1EF80A31-F9CD-4870-9F50-F71C1D3F4DC3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.1:*:*:*:*:*:*:*", "cpeNameId": "3409D2C8-FB81-4CE9-9B26-677FAAD94F42"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.2:*:*:*:*:*:*:*", "cpeNameId": "0B80A369-7E22-4E25-8D33-298AD0B23074"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.3:*:*:*:*:*:*:*", "cpeNameId": "9E737761-792A-4225-9385-3EBF3CBBBA81"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.4:*:*:*:*:*:*:*", "cpeNameId": "5435810C-35B3-4401-9434-7EE8DE82604B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.5:*:*:*:*:*:*:*", "cpeNameId": "937FA107-2C1F-4AF8-955A-66F90A3DBB9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.6:*:*:*:*:*:*:*", "cpeNameId": "DD0D3175-C807-4197-BC7D-3737DEB5602D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.7:*:*:*:*:*:*:*", "cpeNameId": "A60E3F91-9293-4B3E-98E9-0D11D1942C1B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.8:*:*:*:*:*:*:*", "cpeNameId": "1A2B6F42-AF1B-473E-8033-83C73609D4E4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.9:*:*:*:*:*:*:*", "cpeNameId": "7664EA3B-7AD2-46EC-92EF-552091071A5F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.10:*:*:*:*:*:*:*", "cpeNameId": "93A56D61-5B65-4D74-ABEF-766372AF7AA0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.11:*:*:*:*:*:*:*", "cpeNameId": "C9534805-84C6-45B9-86BF-7D05E4136C96"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.12:*:*:*:*:*:*:*", "cpeNameId": "DE9B1782-E79B-4EF2-8CDB-3D24CF153AC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.13:*:*:*:*:*:*:*", "cpeNameId": "BC90F145-D85D-4388-A4F8-2151884F1663"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.14:*:*:*:*:*:*:*", "cpeNameId": "C0BCABF8-19C2-4B49-9A49-EF7128C5B8B9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.15:*:*:*:*:*:*:*", "cpeNameId": "88BDA49D-7A90-40EB-B71E-A570891B9EE6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.16:*:*:*:*:*:*:*", "cpeNameId": "9C3D06BA-AF02-4FFD-AE35-347B04643683"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:5.19.17:*:*:*:*:*:*:*", "cpeNameId": "124836C8-7921-4BFE-A64C-AE9F640C9130"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0:-:*:*:*:*:*:*", "cpeNameId": "3A2B23AB-CBA1-42BB-8FA6-C64C95B4FFC7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:*", "cpeNameId": "28304135-D881-4B0E-B7C6-826D7CA6F1CA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0:rc2:*:*:*:*:*:*", "cpeNameId": "80E35649-C2A2-423F-93D6-8DA4F6A8B4E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0:rc3:*:*:*:*:*:*", "cpeNameId": "D7F3713F-F696-4D43-80A5-98433FA9F02D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0:rc4:*:*:*:*:*:*", "cpeNameId": "C16C9B3F-BD8C-4404-B51D-91856734622D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0:rc5:*:*:*:*:*:*", "cpeNameId": "453F7A7A-15F4-4D21-B85B-6C1DE66FF9F4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0:rc6:*:*:*:*:*:*", "cpeNameId": "42BE5475-0D59-4599-AC53-94A247DA277C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0:rc7:*:*:*:*:*:*", "cpeNameId": "9F921345-A999-4E40-9F3F-4F009C78FBAE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.1:*:*:*:*:*:*:*", "cpeNameId": "DA897396-3BC0-4AC4-B42D-98475AAEFDB1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.2:*:*:*:*:*:*:*", "cpeNameId": "EAFB7D30-6006-44B3-9687-77CBE235323A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.3:*:*:*:*:*:*:*", "cpeNameId": "09573A93-AEDE-4BBA-88F3-6F5CC94F2EE1"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.4:*:*:*:*:*:*:*", "cpeNameId": "DA0AA4FE-4C59-448A-88DC-C8A8EAF513E6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.5:*:*:*:*:*:*:*", "cpeNameId": "C8D96C96-4D7D-4FA4-9CEA-660BF39FC1D7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.6:*:*:*:*:*:*:*", "cpeNameId": "C978C4EF-7AF5-4AA8-BD1D-954E9D7476AC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.7:*:*:*:*:*:*:*", "cpeNameId": "70248903-1B6E-43D3-963F-9CCA75253E2A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.8:*:*:*:*:*:*:*", "cpeNameId": "22375451-92E0-4690-B7C4-82B63F7F54AA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.9:*:*:*:*:*:*:*", "cpeNameId": "792202AB-6A0E-491B-87FC-3F98835781A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.10:*:*:*:*:*:*:*", "cpeNameId": "FF48867C-F23F-4340-96AC-8C40D01A93A4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.11:*:*:*:*:*:*:*", "cpeNameId": "E8A33859-F785-4E67-83D6-3304A2AC8F1E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.12:*:*:*:*:*:*:*", "cpeNameId": "BBCB0428-C568-4F4B-8069-BFC5DE18BA66"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.13:*:*:*:*:*:*:*", "cpeNameId": "785980A5-8FCC-4DEB-8C31-6B66B3F2ED06"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.14:*:*:*:*:*:*:*", "cpeNameId": "3D9CF1CA-591F-4D6B-835F-71E494855265"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.15:*:*:*:*:*:*:*", "cpeNameId": "3DB8BB3F-8384-49A3-9B5C-0C812B669916"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.16:*:*:*:*:*:*:*", "cpeNameId": "97B95EF5-6328-416C-A983-BAD4DB8178EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.17:*:*:*:*:*:*:*", "cpeNameId": "5D22785E-D725-46B7-83E8-9AA3F1B1EE61"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.18:*:*:*:*:*:*:*", "cpeNameId": "F5B47278-06DD-4334-BEAA-82D99836E0CD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.0.19:*:*:*:*:*:*:*", "cpeNameId": "2D6FBBDE-1828-44E5-AE5B-0844E49DD7DF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:-:*:*:*:*:*:*", "cpeNameId": "E1B09DBA-878F-4B52-AE09-74B0B8F5D68F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*", "cpeNameId": "30EC2354-B32A-44E9-9861-CEA7D545DFBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*", "cpeNameId": "BFAC13C0-7539-40DF-B674-4ECCA1868626"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*", "cpeNameId": "585AB024-3F59-4BDB-A302-D224DF5D8495"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*", "cpeNameId": "4A21513E-7139-44E5-88E8-9B991661CF3C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*", "cpeNameId": "8D834469-69DF-4937-AFF3-A0B90AB70455"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*", "cpeNameId": "25204659-6277-44F6-B75E-69B25412BE26"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*", "cpeNameId": "79676ADB-9CD8-4734-9FBF-13CA081A2193"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1:rc8:*:*:*:*:*:*", "cpeNameId": "80492410-4FE5-4C8B-897C-243E42C03469"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.1:*:*:*:*:*:*:*", "cpeNameId": "3C595643-58A0-402D-8A1A-E2148719F38F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.2:*:*:*:*:*:*:*", "cpeNameId": "5F145B48-D5DB-4B52-ABDC-41BAACF04213"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.3:*:*:*:*:*:*:*", "cpeNameId": "59A7EC30-0E14-45EE-A5DA-9D98F4793E93"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.4:*:*:*:*:*:*:*", "cpeNameId": "28AD2EF2-9A1F-4C90-A938-33E394A94615"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.5:*:*:*:*:*:*:*", "cpeNameId": "37B29EC5-AB56-4407-871C-6AF5177AE78F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.6:*:*:*:*:*:*:*", "cpeNameId": "76D2F6EA-F7DC-413B-85EC-C8B7916DCD0C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.7:*:*:*:*:*:*:*", "cpeNameId": "3E05D19C-FFAF-44BC-B9CB-D7054765D6D4"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.8:*:*:*:*:*:*:*", "cpeNameId": "9625E836-75C2-4337-BAA1-70F3958C06CF"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.9:*:*:*:*:*:*:*", "cpeNameId": "492A02F0-DBF7-40C0-9CD6-AFADC763E814"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.10:*:*:*:*:*:*:*", "cpeNameId": "9A0A4990-A036-4290-AD79-B7531545BA07"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.11:*:*:*:*:*:*:*", "cpeNameId": "5FDD9C37-5F34-43FE-98FA-3D3D7ED73B6F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.12:*:*:*:*:*:*:*", "cpeNameId": "54D136A5-6D3A-4CF8-8ECD-0A4B3345ED61"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.13:*:*:*:*:*:*:*", "cpeNameId": "A1D987CD-234D-48E5-BC87-D5BDAB19AD8D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.14:*:*:*:*:*:*:*", "cpeNameId": "51407BCD-81B8-4C16-9246-F7AC5E654783"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.15:*:*:*:*:*:*:*", "cpeNameId": "E0851513-6D8C-45D5-AA02-1A897F200C76"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.16:*:*:*:*:*:*:*", "cpeNameId": "FBCFC7A2-8E0C-400E-9903-F88E27BC6692"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.17:*:*:*:*:*:*:*", "cpeNameId": "D83234B0-70C7-49E3-B041-458A4388E5F9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.18:*:*:*:*:*:*:*", "cpeNameId": "7BFD121A-9AAE-4FA4-B4BB-79BCFC945942"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.19:*:*:*:*:*:*:*", "cpeNameId": "5CEF4F40-C180-4D35-BFBE-CE813D0DB03A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.20:*:*:*:*:*:*:*", "cpeNameId": "8629FDD2-5ACC-47D6-A355-161F5C9E9DE2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.21:*:*:*:*:*:*:*", "cpeNameId": "5FAA107F-2A9C-4F4A-ADB6-BDE37B733B3A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.22:*:*:*:*:*:*:*", "cpeNameId": "8425DCE9-412B-439B-BCFA-0296FCF4AC3B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.23:*:*:*:*:*:*:*", "cpeNameId": "2CAA00B8-15FB-49C3-8D03-4EAC237C0C30"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.24:*:*:*:*:*:*:*", "cpeNameId": "55BE846B-6D72-4890-A345-41A221706A91"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.25:*:*:*:*:*:*:*", "cpeNameId": "6E8595D6-1B26-48C0-8BB5-7AA9956DA2EA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.26:*:*:*:*:*:*:*", "cpeNameId": "579C1BAF-C0BD-4A23-8220-878509BD4041"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.27:*:*:*:*:*:*:*", "cpeNameId": "918EEE53-3E32-4088-A31F-7706A0658354"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.28:*:*:*:*:*:*:*", "cpeNameId": "E5894A09-16F4-4390-9756-7B55B730A5C7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.29:*:*:*:*:*:*:*", "cpeNameId": "4A87BD1D-E5CA-4D1E-BC1C-866333AC8B70"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.30:*:*:*:*:*:*:*", "cpeNameId": "EA84BB70-A3D7-488F-B591-6F660E5F72D2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.31:*:*:*:*:*:*:*", "cpeNameId": "099FB693-8DF2-40B8-987C-638A2B85F830"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.32:*:*:*:*:*:*:*", "cpeNameId": "5A2E5E92-E0A5-4B86-979F-C06CBC9AF59E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.33:*:*:*:*:*:*:*", "cpeNameId": "4D00786A-3089-4F53-9833-D854D82A886A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.34:*:*:*:*:*:*:*", "cpeNameId": "394E558D-3CCA-4443-81A4-464D00F1796F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.35:*:*:*:*:*:*:*", "cpeNameId": "244B5E4B-3CCC-469E-BC89-424CC37562E5"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.36:*:*:*:*:*:*:*", "cpeNameId": "A25A0D88-A1D0-44DD-9C59-0EC251F83B79"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.37:*:*:*:*:*:*:*", "cpeNameId": "FFD0F957-52D3-47DB-9B9B-9D40AB55A9E2"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.38:*:*:*:*:*:*:*", "cpeNameId": "A7384483-B54D-422E-BD1C-47B466DF7808"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.39:*:*:*:*:*:*:*", "cpeNameId": "BD0A672F-9FD5-470F-91C8-77E96F4B3741"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.40:*:*:*:*:*:*:*", "cpeNameId": "29E4B4C2-838C-48BD-B509-576D1E26C738"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.41:*:*:*:*:*:*:*", "cpeNameId": "C139FA8B-93DA-4053-B303-A3C1DC1382FB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.42:*:*:*:*:*:*:*", "cpeNameId": "BF0F83BA-BD56-4364-B55F-EE486FFD9897"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.43:*:*:*:*:*:*:*", "cpeNameId": "37F54B64-6DB3-410B-9795-F9468CCD37D9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.44:*:*:*:*:*:*:*", "cpeNameId": "A2813E22-3300-4145-9AF5-091D4FB91EDE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.45:*:*:*:*:*:*:*", "cpeNameId": "E862B1DC-542D-4E20-BEDE-89AC2B3B5D7F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.46:*:*:*:*:*:*:*", "cpeNameId": "940E4409-174B-45E7-B73A-69D72C14D42E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.47:*:*:*:*:*:*:*", "cpeNameId": "2E917523-B369-4B0C-B2FE-330ABAF30D9F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.48:*:*:*:*:*:*:*", "cpeNameId": "7AE6B80A-97F9-46E1-91BF-10C5CFE9F291"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.49:*:*:*:*:*:*:*", "cpeNameId": "6C3E0D45-EDD1-48D6-B60C-99C23C609BB0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.50:*:*:*:*:*:*:*", "cpeNameId": "3DB32BBC-2AFB-4C81-AB59-6F8C3BA243E0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.51:*:*:*:*:*:*:*", "cpeNameId": "5AC8AA4E-C62F-4E70-9E99-6FDC429D2E4E"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.52:*:*:*:*:*:*:*", "cpeNameId": "D833500B-5B7B-4D77-980F-A92A0E26CE6B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.53:*:*:*:*:*:*:*", "cpeNameId": "19E0C2D7-36FA-461C-B763-F0B8DBF346A7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.54:*:*:*:*:*:*:*", "cpeNameId": "CD384F60-5A3F-4B0C-A5A2-3ECEA68BB813"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.55:*:*:*:*:*:*:*", "cpeNameId": "768733C9-E2A4-4C01-8956-5FB868E592E3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.56:*:*:*:*:*:*:*", "cpeNameId": "0FC6F402-E917-4E7F-8D83-3D22EF171CAB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.57:*:*:*:*:*:*:*", "cpeNameId": "E8BCDBFF-F548-45B0-9AF9-3FB4B1E38539"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.58:*:*:*:*:*:*:*", "cpeNameId": "E8B92EC7-BB1E-4A65-A431-3125DA3DF1DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.59:*:*:*:*:*:*:*", "cpeNameId": "5C514FE3-ED8D-4DEA-874A-4B61A7578749"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.60:*:*:*:*:*:*:*", "cpeNameId": "215F5625-C874-4841-82C5-AE4A9E6ED912"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.61:*:*:*:*:*:*:*", "cpeNameId": "764780E0-FF24-42A3-A99B-CE11CB846C95"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.62:*:*:*:*:*:*:*", "cpeNameId": "5C2774B8-AF4C-4A7B-BBF4-9516ABF4B4E9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.63:*:*:*:*:*:*:*", "cpeNameId": "BC276565-052E-41EF-9F0F-7ECD9D9678BE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.64:*:*:*:*:*:*:*", "cpeNameId": "DB256AAF-90E8-463A-8C21-D57CC6368D0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.65:*:*:*:*:*:*:*", "cpeNameId": "C9A9E342-DEBC-44E6-82F3-3CCBCBD1F565"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.66:*:*:*:*:*:*:*", "cpeNameId": "68B83B2F-DA58-4442-A4E4-5EFBD7DA2E64"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.67:*:*:*:*:*:*:*", "cpeNameId": "FBD55969-6EB5-4ED7-AD05-1D03D728B999"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.68:*:*:*:*:*:*:*", "cpeNameId": "5A5B47CF-90B7-4BEF-B5AE-EE4FED51E095"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.69:*:*:*:*:*:*:*", "cpeNameId": "0ADD17CA-B3B5-4F53-B4F4-ED079642A461"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.70:*:*:*:*:*:*:*", "cpeNameId": "6F29E18D-63C6-4544-A0E7-92F17EB3ACFD"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.71:*:*:*:*:*:*:*", "cpeNameId": "A7455D5B-D8E2-4CBE-BF3D-D3CF1A6004FC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.72:*:*:*:*:*:*:*", "cpeNameId": "91A1363B-FA51-4A72-AD5E-3784118C73E8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.73:*:*:*:*:*:*:*", "cpeNameId": "7C1AD665-9759-452D-86AA-C903E4225BA7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.74:*:*:*:*:*:*:*", "cpeNameId": "7058C57F-5141-4FAC-932A-BDDF0F20C78A"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.75:*:*:*:*:*:*:*", "cpeNameId": "2F7FAD3F-6381-42EE-B130-D942FAC1AED0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.76:*:*:*:*:*:*:*", "cpeNameId": "4F7988C5-FA25-4C7C-B0DC-5C084A8CA6DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.77:*:*:*:*:*:*:*", "cpeNameId": "9F7ABB2D-A627-40C5-BC86-9BC9BBBEDBB9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.78:*:*:*:*:*:*:*", "cpeNameId": "71DE43EB-3996-47C3-963A-B93C9E6C6142"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.79:*:*:*:*:*:*:*", "cpeNameId": "191F54D4-44BC-49D5-8FB9-5DFFD648B9F7"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.80:*:*:*:*:*:*:*", "cpeNameId": "14B574EE-69F8-4E87-9017-91CBFDAEC743"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.81:*:*:*:*:*:*:*", "cpeNameId": "94E966D4-1DB0-4695-98DA-A28CB90D32EB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.82:*:*:*:*:*:*:*", "cpeNameId": "8D92799A-0542-4509-923F-6006E116D1BE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.83:*:*:*:*:*:*:*", "cpeNameId": "C2EF5D53-F86A-4D8A-AB79-DD6491B257F6"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.84:*:*:*:*:*:*:*", "cpeNameId": "61BB8657-3718-4355-BAA8-92F84B14D1A8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.85:*:*:*:*:*:*:*", "cpeNameId": "A599E08D-FD19-4E86-A335-C107B0C6CB0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.86:*:*:*:*:*:*:*", "cpeNameId": "324E1D15-3D11-4683-9B0A-D3BA95E6B7C8"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.87:*:*:*:*:*:*:*", "cpeNameId": "D320A094-647B-4DC5-83FB-BC79A60AAE61"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.88:*:*:*:*:*:*:*", "cpeNameId": "407DC4FD-0E42-48C0-8A16-07F5CB7F308F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.89:*:*:*:*:*:*:*", "cpeNameId": "2DCEF9A6-CB07-404E-ADCC-E2BD0F69354D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.90:*:*:*:*:*:*:*", "cpeNameId": "CD2E5E6E-F436-4447-BB45-4CA1EBCC1F0F"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.91:*:*:*:*:*:*:*", "cpeNameId": "D5909F53-54F8-4E30-87B2-E5B74AEEF668"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.92:*:*:*:*:*:*:*", "cpeNameId": "825880D5-240B-4E5E-88D7-9FBE9377D725"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.93:*:*:*:*:*:*:*", "cpeNameId": "C34961F8-366C-44F9-884F-D95ED75D74E9"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.94:*:*:*:*:*:*:*", "cpeNameId": "49338264-F467-4F72-851C-41E72F2E8849"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.95:*:*:*:*:*:*:*", "cpeNameId": "D583DD92-8DB8-4D08-8F84-FEACBF885E5D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.96:*:*:*:*:*:*:*", "cpeNameId": "ABD92EA7-61F0-4324-AD60-18A4A9E0345B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.97:*:*:*:*:*:*:*", "cpeNameId": "9CA68F01-482D-4C81-9FAF-8FCB3F4EB631"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.98:*:*:*:*:*:*:*", "cpeNameId": "DB87B10B-0B00-43E6-9712-B7749C08C5B0"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.99:*:*:*:*:*:*:*", "cpeNameId": "FA3EF181-E416-4607-B59D-A6CEA2D95875"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.100:*:*:*:*:*:*:*", "cpeNameId": "92234FA1-8B41-45EB-BADB-32779B7E4E3C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.101:*:*:*:*:*:*:*", "cpeNameId": "2965F5F4-6322-4A74-BE47-C1E4FF4E4BB3"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.102:*:*:*:*:*:*:*", "cpeNameId": "D936A06E-46B7-44F1-AEA1-6C899F68E2DC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.103:*:*:*:*:*:*:*", "cpeNameId": "C3564FF2-0B2D-42BF-AA29-3AAF57DF9D0B"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.104:*:*:*:*:*:*:*", "cpeNameId": "CEF383F0-D9F1-4948-B102-C491944BECBB"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.105:*:*:*:*:*:*:*", "cpeNameId": "BC26835E-2E39-465E-B48C-E871C740CB06"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.106:*:*:*:*:*:*:*", "cpeNameId": "2142A9D9-E547-4FE9-BDA3-B7B27D3CEF4D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.107:*:*:*:*:*:*:*", "cpeNameId": "9F7EB5C3-3C76-4816-BB64-A0D47A8FF148"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.108:*:*:*:*:*:*:*", "cpeNameId": "A0B4BCED-0919-484E-B64A-2D6F944128BC"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.109:*:*:*:*:*:*:*", "cpeNameId": "14C4B1A8-4457-4620-A2F4-A7BAAB479E01"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.110:*:*:*:*:*:*:*", "cpeNameId": "08F57941-7A99-4F2F-982B-54B72CA90ECA"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.111:*:*:*:*:*:*:*", "cpeNameId": "F75C660D-8C20-4B05-BAB3-2D3BEF6EBC9D"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.112:*:*:*:*:*:*:*", "cpeNameId": "82BF8B3E-D66C-40EF-B175-1E5A2466D997"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.113:*:*:*:*:*:*:*", "cpeNameId": "CF72EDAE-B29A-4A22-BF70-8FD89123C957"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.114:*:*:*:*:*:*:*", "cpeNameId": "86E6F51B-573A-4DB5-99FA-BB89A65DD613"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.115:*:*:*:*:*:*:*", "cpeNameId": "63567DC6-8639-44B7-BDBC-C600977ECD7C"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.116:*:*:*:*:*:*:*", "cpeNameId": "7A6E8D0B-1EF6-4080-A3AD-45CD2B6C35AE"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.117:*:*:*:*:*:*:*", "cpeNameId": "AD8652AE-1F37-43B4-BC34-39F852FD3301"}, {"cpeName": "cpe:2.3:o:linux:linux_kernel:6.1.119:*:*:*:*:*:*:*", "cpeNameId": "3E564E16-38CA-428F-98CC-5F14B13A30CB"}]}} \ No newline at end of file diff --git a/cpematch/F6/F6D02936-81CB-45D8-A594-B5D9A2731936.json b/cpematch/F6/F6D02936-81CB-45D8-A594-B5D9A2731936.json new file mode 100644 index 00000000000..11059cedfb3 --- /dev/null +++ b/cpematch/F6/F6D02936-81CB-45D8-A594-B5D9A2731936.json @@ -0,0 +1 @@ +{"matchString": {"matchCriteriaId": "F6D02936-81CB-45D8-A594-B5D9A2731936", "criteria": "cpe:2.3:a:themeum:tutor_lms:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "2.7.1", "lastModified": "2025-01-09T18:48:40.327", "cpeLastModified": "2025-01-09T18:48:40.327", "created": "2025-01-09T18:48:40.327", "status": "Active", "matches": [{"cpeName": "cpe:2.3:a:themeum:tutor_lms:-:*:*:*:*:wordpress:*:*", "cpeNameId": "66106D56-2E9A-4098-BB78-2323E704374A"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.0.0:-:*:*:*:wordpress:*:*", "cpeNameId": "2A4520AB-AD86-4B15-A38E-4233190575F5"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.0.0:alpha:*:*:*:wordpress:*:*", "cpeNameId": "3D5E2B43-DCDF-40F6-8686-95D77FE4CC24"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.0.1:*:*:*:*:wordpress:*:*", "cpeNameId": "DF8CC9A0-C426-4F5B-940F-390040A336BF"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.0.2:*:*:*:*:wordpress:*:*", "cpeNameId": "8FB58BD7-FCD7-4F42-A55B-0728CEB96D9D"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.0.3:*:*:*:*:wordpress:*:*", "cpeNameId": "F41959C8-39ED-4C31-8B79-72DCE08CC1E9"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.0.4:*:*:*:*:wordpress:*:*", "cpeNameId": "124468BF-5337-4775-9FE7-259084B57AEB"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.0.5:*:*:*:*:wordpress:*:*", "cpeNameId": "313B4025-6A32-44EF-9695-42E74A348A3C"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.0.6:*:*:*:*:wordpress:*:*", "cpeNameId": "C1C9F2F1-79BE-4CEC-A6A0-45C0BF950234"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.0.7:*:*:*:*:wordpress:*:*", "cpeNameId": "C9D0E76D-6428-47E8-9C0B-187D730E1CA7"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.0.8:*:*:*:*:wordpress:*:*", "cpeNameId": "AAE47948-BB2D-4CC3-B10B-F871C1813E76"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.0.9:*:*:*:*:wordpress:*:*", "cpeNameId": "39E1752C-CD27-4FBE-8E21-4F16F589F344"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.1.0:*:*:*:*:wordpress:*:*", "cpeNameId": "EFAC5EC7-E7D9-4F75-83B1-32C3A67B1FE1"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.1.1:*:*:*:*:wordpress:*:*", "cpeNameId": "F8117047-365D-4562-AA73-071AED631837"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.2.0:*:*:*:*:wordpress:*:*", "cpeNameId": "6EEA8FA2-5F61-433A-983C-AFE575CEFCDA"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.2.1:*:*:*:*:wordpress:*:*", "cpeNameId": "4D84DD6B-7616-4A9A-A117-93EDADD9C2AF"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.2.11:*:*:*:*:wordpress:*:*", "cpeNameId": "39B85ECF-E1B5-4AD6-A57E-33E6EA6A2712"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.2.12:*:*:*:*:wordpress:*:*", "cpeNameId": "40476BA3-4407-4126-AA4F-E9211A34E88D"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.2.13:*:*:*:*:wordpress:*:*", "cpeNameId": "E9100DAF-2352-47CE-B90E-4FB6E8EE173E"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.2.20:*:*:*:*:wordpress:*:*", "cpeNameId": "D8097E51-FD75-4D8E-9CC2-B480407FD964"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.3.0:*:*:*:*:wordpress:*:*", "cpeNameId": "EB685DF7-D2D8-4481-A045-A6BB540E46CC"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.3.1:*:*:*:*:wordpress:*:*", "cpeNameId": "CF71E45C-2056-463C-898B-CE7BF97C3911"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.3.2:*:*:*:*:wordpress:*:*", "cpeNameId": "3C9B2988-299C-4C88-B2DE-0AC994E786E1"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.3.3:*:*:*:*:wordpress:*:*", "cpeNameId": "2CFB0177-5A46-4A23-8017-F8174E5B2488"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.3.4:*:*:*:*:wordpress:*:*", "cpeNameId": "5E72A60B-AC34-4203-8D77-6D23C69AD697"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.3.5:*:*:*:*:wordpress:*:*", "cpeNameId": "9F0DFFC3-1F33-4F43-BC54-4996FA65D431"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.3.6:*:*:*:*:wordpress:*:*", "cpeNameId": "B656CCD3-89C3-4F51-AB3E-F085CFBF705E"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.3.7:*:*:*:*:wordpress:*:*", "cpeNameId": "6ED19FDB-A410-44CD-8FB3-0893A4B9DE16"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.3.8:*:*:*:*:wordpress:*:*", "cpeNameId": "3BACAF25-6023-4BD8-8311-B46481BA21D4"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.3.9:*:*:*:*:wordpress:*:*", "cpeNameId": "106D27FE-CD6B-496A-AB0E-4A4A8FF8CB94"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.4.0:*:*:*:*:wordpress:*:*", "cpeNameId": "0A715E96-6CBC-444A-A0F3-E599474D47A5"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.4.1:*:*:*:*:wordpress:*:*", "cpeNameId": "C16211F3-5594-4B9E-84CC-877D51010C58"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.4.2:*:*:*:*:wordpress:*:*", "cpeNameId": "B4C67C07-3F25-46C9-8675-A14A181E6EB5"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.4.3:*:*:*:*:wordpress:*:*", "cpeNameId": "9AC95724-022C-4B10-BD21-52CB0BDF7547"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.4.4:*:*:*:*:wordpress:*:*", "cpeNameId": "F0C845C7-BB43-4034-9286-BD8433EAF8AE"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.4.5:*:*:*:*:wordpress:*:*", "cpeNameId": "620E1C39-BCDB-4593-931D-062FB75D7F43"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.4.6:*:*:*:*:wordpress:*:*", "cpeNameId": "E1371A46-190B-4484-8F44-FB031C982398"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.4.7:*:*:*:*:wordpress:*:*", "cpeNameId": "71239D7D-06F8-4893-9881-1962FC4FB0E2"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.4.8:*:*:*:*:wordpress:*:*", "cpeNameId": "C0B06F14-EC48-47F7-920F-891B99178A84"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.4.9:*:*:*:*:wordpress:*:*", "cpeNameId": "19C898B9-93AE-42E5-9B48-C84A9312FA56"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.5.0:*:*:*:*:wordpress:*:*", "cpeNameId": "01D12092-AC09-428B-8C60-6CF99A11F047"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.5.1:*:*:*:*:wordpress:*:*", "cpeNameId": "27F1D8A3-D383-486D-935C-4F7BE64D6E97"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.5.2:*:*:*:*:wordpress:*:*", "cpeNameId": "5532154D-25B7-475F-8F87-0CA8478ED1DB"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.5.3:*:*:*:*:wordpress:*:*", "cpeNameId": "9B1C3B7E-537E-4FC9-A775-EF87628AD83A"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.5.4:*:*:*:*:wordpress:*:*", "cpeNameId": "689844AC-493F-4F71-8E6B-4640D5D03ADE"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.5.5:*:*:*:*:wordpress:*:*", "cpeNameId": "98ED1B25-02BB-4D37-B3CF-8364F95988AC"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.5.6:*:*:*:*:wordpress:*:*", "cpeNameId": "F5F311F9-3A25-4759-9564-F175ADDD0F8E"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.5.7:*:*:*:*:wordpress:*:*", "cpeNameId": "646FD159-A87F-44C2-A1DE-4B886192E206"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.5.8:*:*:*:*:wordpress:*:*", "cpeNameId": "4977153F-A0EB-45F0-A1D8-8E2EAFB1D409"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.5.9:*:*:*:*:wordpress:*:*", "cpeNameId": "5B0A0583-F14A-4ACF-9FCF-F2E5B83E6FC1"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.6.0:*:*:*:*:wordpress:*:*", "cpeNameId": "DC646BE6-9427-41D9-A399-9AAF25975B6B"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.6.1:*:*:*:*:wordpress:*:*", "cpeNameId": "797A11B5-82D9-452C-A92E-1B0A4749097C"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.6.2:*:*:*:*:wordpress:*:*", "cpeNameId": "B7166C01-5058-406E-B426-1E28AE73E7A7"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.6.3:*:*:*:*:wordpress:*:*", "cpeNameId": "717A46CC-720F-437E-92F2-C6A511C9D47E"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.6.4:*:*:*:*:wordpress:*:*", "cpeNameId": "254D6D9E-A9D5-4125-A134-DB3179C6CBA7"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.6.5:*:*:*:*:wordpress:*:*", "cpeNameId": "80A6D412-970A-4F49-B212-672FE00C2BF4"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.6.6:*:*:*:*:wordpress:*:*", "cpeNameId": "43F8E4A3-2157-45B2-9951-8FD14E9E5697"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.6.7:*:*:*:*:wordpress:*:*", "cpeNameId": "4EA1D055-A65B-4718-AC6C-EF16826E5C0F"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.6.8:*:*:*:*:wordpress:*:*", "cpeNameId": "355E49F7-615C-474E-9943-02E731EDEFC7"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.6.9:*:*:*:*:wordpress:*:*", "cpeNameId": "D4F4F665-D948-405C-981C-FDD52D61F0E0"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.7.0:*:*:*:*:wordpress:*:*", "cpeNameId": "3628F5A9-0332-417D-B628-D8AA1C63CDCF"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.7.1:*:*:*:*:wordpress:*:*", "cpeNameId": "D3ECC6FE-2F46-49F6-91A2-C4888F49140C"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.7.2:*:*:*:*:wordpress:*:*", "cpeNameId": "4E3FC02A-B028-4451-87F6-51C8259ED7A2"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.7.3:*:*:*:*:wordpress:*:*", "cpeNameId": "11505733-BA9A-4E16-B0BC-A0A94AE93EC8"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.7.4:*:*:*:*:wordpress:*:*", "cpeNameId": "FA9CC4A7-31E0-4C5C-93DB-A355B8933FB4"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.7.5:*:*:*:*:wordpress:*:*", "cpeNameId": "53C521C5-D03E-4CFA-8F0B-D6A392ABDD41"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.7.6:*:*:*:*:wordpress:*:*", "cpeNameId": "96BACAE3-2F87-4865-BC2D-D257C22F73D3"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.7.7:*:*:*:*:wordpress:*:*", "cpeNameId": "39818733-1E11-441E-B7F0-FEF583ED638D"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.7.8:*:*:*:*:wordpress:*:*", "cpeNameId": "313DF337-41C6-416C-9E33-BFC1017B3B5C"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.7.9:*:*:*:*:wordpress:*:*", "cpeNameId": "426B1E32-FB6D-4A82-B32D-FE046227561B"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.8.0:*:*:*:*:wordpress:*:*", "cpeNameId": "C71D7BF3-1477-4AB5-BCF6-281F1C37579F"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.8.1:*:*:*:*:wordpress:*:*", "cpeNameId": "6F7E9493-993C-4A9C-A310-2C26D877C324"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.8.2:*:*:*:*:wordpress:*:*", "cpeNameId": "FB5D1642-BE24-41D5-A9E5-D95D7AB3A72C"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.8.3:*:*:*:*:wordpress:*:*", "cpeNameId": "0149DB16-6B4F-43B0-8F13-2EE8457608F5"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.8.4:*:*:*:*:wordpress:*:*", "cpeNameId": "750DF1D9-3F2F-46A3-A7F6-9FD5BED98147"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.8.5:*:*:*:*:wordpress:*:*", "cpeNameId": "A124FC4D-7240-4DAF-A8EE-909DFA0F75C5"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.8.6:*:*:*:*:wordpress:*:*", "cpeNameId": "E6A5D164-491C-4A8B-9FA0-36580E1149A9"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.8.7:*:*:*:*:wordpress:*:*", "cpeNameId": "14409048-FED3-4D9D-8900-449DD64F43A7"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.8.8:*:*:*:*:wordpress:*:*", "cpeNameId": "EC748A08-9A0F-41A7-A3C0-AAC8F541FFE9"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.8.9:*:*:*:*:wordpress:*:*", "cpeNameId": "DEC7785D-78C8-415B-8BCA-9D49C7217D3C"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.8.10:*:*:*:*:wordpress:*:*", "cpeNameId": "332503DD-5419-409E-9E41-2BEB247C2170"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.0:*:*:*:*:wordpress:*:*", "cpeNameId": "22C482D9-1290-4786-8DD7-8448753D1516"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.1:*:*:*:*:wordpress:*:*", "cpeNameId": "204E384E-EDA0-413E-A36F-7A9A6463E338"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.2:*:*:*:*:wordpress:*:*", "cpeNameId": "EEB25D88-0021-442A-90C7-4117FDE4103B"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.3:*:*:*:*:wordpress:*:*", "cpeNameId": "D1A59E89-91D2-488C-9F5F-8ACECA1388D9"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.4:*:*:*:*:wordpress:*:*", "cpeNameId": "65D23508-ACAE-4271-9483-2A8C3DED0E01"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.5:*:*:*:*:wordpress:*:*", "cpeNameId": "F5133B3E-028F-4896-A4B3-F474F6425C1D"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.6:*:*:*:*:wordpress:*:*", "cpeNameId": "CA8D09A0-6528-4956-A048-CEA3755787A0"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.7:*:*:*:*:wordpress:*:*", "cpeNameId": "FAED1883-A03B-41C4-888E-1090AFD08289"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.8:*:*:*:*:wordpress:*:*", "cpeNameId": "7DECE0C7-084A-47FF-8D22-ABD4649ECE77"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.9:*:*:*:*:wordpress:*:*", "cpeNameId": "A66E75A3-FBE6-4C55-9F9D-395A206DF48B"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.10:*:*:*:*:wordpress:*:*", "cpeNameId": "F2E004CF-D616-444E-80EF-2467F812E0B7"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.11:*:*:*:*:wordpress:*:*", "cpeNameId": "A1F64816-2280-41DA-A49B-575623943494"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.12:*:*:*:*:wordpress:*:*", "cpeNameId": "1DFF5671-0525-4C5D-936F-B436E59B46BD"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.13:*:*:*:*:wordpress:*:*", "cpeNameId": "481C6CFA-CBE4-47C0-B40B-B13B01045976"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.14:*:*:*:*:wordpress:*:*", "cpeNameId": "FEBC3C38-4EA0-490C-9F29-C9B068031DC0"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.15:*:*:*:*:wordpress:*:*", "cpeNameId": "F4FA5322-E757-4896-A8E2-90C196929114"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:1.9.16:*:*:*:*:wordpress:*:*", "cpeNameId": "2617AB77-9B94-4053-9283-B17DE789DFEA"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.0.0:*:*:*:*:wordpress:*:*", "cpeNameId": "222466FD-EED9-4F20-916E-DB3BBACFFC58"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.0.1:*:*:*:*:wordpress:*:*", "cpeNameId": "07434B19-2D1F-4C10-92CF-DA80E7CC105A"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.0.2:*:*:*:*:wordpress:*:*", "cpeNameId": "AD23B45A-DAE2-4E90-81B5-0EF98D0C2FEB"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.0.3:*:*:*:*:wordpress:*:*", "cpeNameId": "4DA2B442-4F2C-4870-A20E-E59882CB6963"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.0.4:*:*:*:*:wordpress:*:*", "cpeNameId": "4AB986C5-8373-4229-9C61-6357BC906614"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.0.5:*:*:*:*:wordpress:*:*", "cpeNameId": "BE1C7B70-01D4-4775-8B4E-4A31F63659DE"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.0.6:*:*:*:*:wordpress:*:*", "cpeNameId": "573FEB3F-C2F0-452E-9C2A-939C3C12AE66"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.0.7:*:*:*:*:wordpress:*:*", "cpeNameId": "5113E2D5-73B8-4633-95E2-0976FEE63ED0"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.0.8:*:*:*:*:wordpress:*:*", "cpeNameId": "C2426453-D370-4582-A55E-A8FBB40E3DCB"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.0.9:*:*:*:*:wordpress:*:*", "cpeNameId": "3F042A25-170D-4983-BDC4-6218AB5136AD"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.0.10:*:*:*:*:wordpress:*:*", "cpeNameId": "B893EEB8-B6E4-4D6A-A8C2-3018E03DD614"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.1.0:*:*:*:*:wordpress:*:*", "cpeNameId": "EBEAF2CE-A0D4-4B86-B6A6-5A236AEEDC35"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.1.1:*:*:*:*:wordpress:*:*", "cpeNameId": "7E493E02-C72F-4D84-90A3-900240E17E9F"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.1.2:*:*:*:*:wordpress:*:*", "cpeNameId": "63CA9691-17DA-484C-8E0A-91879FC64F51"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.1.3:*:*:*:*:wordpress:*:*", "cpeNameId": "759CA983-0CDF-48F6-9935-8A7337EC1C22"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.1.4:*:*:*:*:wordpress:*:*", "cpeNameId": "A7FA4467-CD30-44E7-BAC5-FCB9F5FD1FD6"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.1.5:*:*:*:*:wordpress:*:*", "cpeNameId": "4CA1EA76-3897-430E-B32E-D3E1D5FEA3C9"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.1.6:*:*:*:*:wordpress:*:*", "cpeNameId": "6F0505DC-B5F4-4D8E-A6E3-2B9687A6CFA3"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.1.7:*:*:*:*:wordpress:*:*", "cpeNameId": "1C199316-E27F-4374-B3C9-A74A4CF203E8"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.1.8:*:*:*:*:wordpress:*:*", "cpeNameId": "981EC46A-20A3-4186-AF1D-43FE118403D1"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.1.9:*:*:*:*:wordpress:*:*", "cpeNameId": "E83A592F-6768-4597-AA99-EFE3B9E42FEC"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.1.10:*:*:*:*:wordpress:*:*", "cpeNameId": "5F6048F9-DD31-48FE-A0A1-6B10FB6D0B0E"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.2.0:*:*:*:*:wordpress:*:*", "cpeNameId": "74EB8DF6-D9B8-4AE6-AF6F-46CC291985DB"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.2.1:*:*:*:*:wordpress:*:*", "cpeNameId": "9A4D4BE2-F691-4C10-9A8D-C20B4D598C9F"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.2.2:*:*:*:*:wordpress:*:*", "cpeNameId": "8B71AAF1-2CF3-493E-BE57-2B76BCA46166"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.2.3:*:*:*:*:wordpress:*:*", "cpeNameId": "CA42D59F-98F7-429A-93FC-EB9EFAEAA784"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.2.4:*:*:*:*:wordpress:*:*", "cpeNameId": "DA885B8E-4AAE-43BA-826B-205035901A93"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.3.0:*:*:*:*:wordpress:*:*", "cpeNameId": "74C9373D-0449-4B4C-BDBA-BEF6AE3E5C41"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.4.0:*:*:*:*:wordpress:*:*", "cpeNameId": "BFA9D04A-78D8-4139-A0D8-8C782BFF6A53"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.5.0:*:*:*:*:wordpress:*:*", "cpeNameId": "98CCC884-FC38-4399-8454-B6F8BF969A1A"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.6.0:*:*:*:*:wordpress:*:*", "cpeNameId": "BC6E4DD3-F467-49E8-96CA-285E189BC28B"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.6.1:*:*:*:*:wordpress:*:*", "cpeNameId": "D9E306CE-9D7E-4D98-838A-4668F702B0D4"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.6.2:*:*:*:*:wordpress:*:*", "cpeNameId": "293CF1DA-B856-4EF0-87F1-DE2852DA7ED7"}, {"cpeName": "cpe:2.3:a:themeum:tutor_lms:2.7.0:*:*:*:*:wordpress:*:*", "cpeNameId": "21A7E4D6-3C01-4D94-A2A9-0FD2D2930D80"}]}} \ No newline at end of file diff --git a/cve/2018/CVE-2018-5852.json b/cve/2018/CVE-2018-5852.json index cca0e05b729..bc14fcc0dd6 100644 --- a/cve/2018/CVE-2018-5852.json +++ b/cve/2018/CVE-2018-5852.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2018-5852", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-11-26T14:15:17.970", "lastModified": "2024-11-26T14:15:17.970", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "An unsigned integer underflow vulnerability in IPA driver result into a buffer over-read while reading NAT entry using debugfs command 'cat /sys/kernel/debug/ipa/ip4_nat'"}, {"lang": "es", "value": "Una vulnerabilidad de desbordamiento de enteros sin signo en el controlador IPA da como resultado una sobrelectura del b\u00fafer al leer una entrada NAT utilizando el comando debugfs 'cat /sys/kernel/debug/ipa/ip4_nat'"}], "metrics": {"cvssMetricV31": [{"source": "product-security@qualcomm.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 8.4, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.5, "impactScore": 5.9}]}, "weaknesses": [{"source": "product-security@qualcomm.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-126"}]}], "references": [{"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2018-bulletin.html", "source": "product-security@qualcomm.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2018-5852", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-11-26T14:15:17.970", "lastModified": "2025-01-09T19:53:39.003", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "An unsigned integer underflow vulnerability in IPA driver result into a buffer over-read while reading NAT entry using debugfs command 'cat /sys/kernel/debug/ipa/ip4_nat'"}, {"lang": "es", "value": "Una vulnerabilidad de desbordamiento de enteros sin signo en el controlador IPA da como resultado una sobrelectura del b\u00fafer al leer una entrada NAT utilizando el comando debugfs 'cat /sys/kernel/debug/ipa/ip4_nat'"}], "metrics": {"cvssMetricV31": [{"source": "product-security@qualcomm.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 8.4, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.5, "impactScore": 5.9}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.8, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "product-security@qualcomm.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-126"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-191"}]}], "configurations": [{"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A960B86A-C397-4ACB-AEE6-55F316D32949"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*", "matchCriteriaId": "D79B8959-3D1E-4B48-9181-D75FE90AAF98"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A35FECFB-60AE-42A8-BCBB-FEA7D5826D49"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9765187-8653-4D66-B230-B2CE862AC5C0"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FD1C359-C79B-4CE8-A192-5AA34D0BF05B"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*", "matchCriteriaId": "716B747E-672C-4B95-9D8E-1262338E67EA"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "35B7E25E-FA92-4C36-883C-CFF36F4B3507"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECD99C6F-2444-4A5E-A517-0C8023DDF23D"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE28A59C-7AA6-4B85-84E8-07852B96108E"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DEE828B-09A7-4AC1-8134-491A7C87C118"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0FA80D57-3191-47CF-AD3F-9F2D64E443FE"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2AFB212-F01A-4CEB-8DB4-2E0CC2308CB6"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0986EF1-0974-488E-84C4-6880F876CE55"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C08BA58-2EBC-4A22-85A4-2ECD54693B9B"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "27110478-4C08-49E6-BD53-8BAAD9D5BD65"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*", "matchCriteriaId": "3664D302-D22A-4B25-B534-3097AE2F8573"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C56BC939-2FE8-4AB4-B638-35C83B224005"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*", "matchCriteriaId": "E36C12E2-7064-41E6-B357-3F0E6E6D0A0F"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE5C66CC-B00C-4581-B8FB-0632232E480D"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*", "matchCriteriaId": "87F57247-08CD-473E-A517-F9E85BFC7BEA"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E07C621F-0BC0-40C1-9678-1AF6498AC487"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C621A62-E346-406B-9D20-8FF6C2B0851F"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sd_615_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "549E6F7E-A54F-423F-BD4A-A8FB97DBD39E"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sd_615:-:*:*:*:*:*:*:*", "matchCriteriaId": "992C3835-7183-4D96-8647-DD9916880323"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sd_616_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7B95CCC-37F1-4768-8D64-CA2028E93E03"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sd_616:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1426161-4F7C-44B1-AA9E-EA661AA68947"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sd_415_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECF81213-DE2D-4C4B-99E8-71AFD87E92CD"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sd_415:-:*:*:*:*:*:*:*", "matchCriteriaId": "95E826EF-343B-47FA-AB54-F13E868CE6A7"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sd_617_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D27A1760-8D1B-4172-B6CE-65C72332F103"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sd_617:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC5F96F1-D3FB-482B-A3C8-57BA4DE86D5E"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "06E0CC35-AC20-42D7-8FEA-CA4685E33E72"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A2C4DED-2367-4736-A0AF-C8356F1271AD"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC1650DB-FDF8-4BE5-9437-8ADA11A07116"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*", "matchCriteriaId": "B51DD51F-4BDE-497B-89E5-551D10CF3442"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0752054B-2C29-4490-ADC8-29F82BAA17E6"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*", "matchCriteriaId": "005038B5-BCB7-4A23-8562-ACEF6E156C1F"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sd_810_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "95B4B4D4-0357-4E1D-9B72-635106D632CF"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sd_810:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F992088-5E31-4625-8C3B-CE7F946C61F2"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E077FC03-F86F-417A-A3E6-BC88CB85C6F0"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*", "matchCriteriaId": "E016356C-94ED-4CDD-8351-97D265FE036E"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sd_820a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E08016A2-E4FE-4E9C-A915-C66BE157AFB5"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sd_820a:-:*:*:*:*:*:*:*", "matchCriteriaId": "018452D0-007C-4740-B2AF-E5C8BBAC310F"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CFF35A3-1472-4665-9DAB-1ABC45C0D5B4"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*", "matchCriteriaId": "F930E9BF-C502-49C6-8BE8-9A711B89FA1B"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A2D2B3B-CB28-46AA-9117-A7FA371FDE80"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE18BF66-B0DB-48BB-B43A-56F01821F5A3"}]}]}], "references": [{"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2018-bulletin.html", "source": "product-security@qualcomm.com", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2019/CVE-2019-10891.json b/cve/2019/CVE-2019-10891.json index c706814f9c8..f6de935f004 100644 --- a/cve/2019/CVE-2019-10891.json +++ b/cve/2019/CVE-2019-10891.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2019-10891", "sourceIdentifier": "cve@mitre.org", "published": "2019-09-06T20:15:11.003", "lastModified": "2025-01-06T15:15:09.593", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "An issue was discovered in D-Link DIR-806 devices. There is a command injection in function hnap_main, which calls system() without checking the parameter that can be controlled by user, and finally allows remote attackers to execute arbitrary shell commands with a special HTTP header."}, {"lang": "es", "value": "Se detect\u00f3 un problema en los dispositivos D-Link DIR-806. Hay una inyecci\u00f3n de comando en la funci\u00f3n hnap_main, que llama al sistema () sin verificar el par\u00e1metro que puede ser controlado por el usuario, y finalmente permite a los atacantes remotos ejecutar comandos de shell arbitrarios con un encabezado HTTP especial."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 5.9}], "cvssMetricV2": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "availabilityImpact": "COMPLETE"}, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 10.0, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "cve@mitre.org", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-78"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-78"}]}], "configurations": [{"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:dlink:dir-806_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "02AF529B-19FB-414C-AED4-D35A5FB6458B"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:dlink:dir-806:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E87253-0A09-40DC-BC77-8DECE8939684"}]}]}], "references": [{"url": "https://github.com/Kirin-say/Vulnerabilities/blob/master/DIR-806_Code_Injection.md", "source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"]}, {"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10282", "source": "cve@mitre.org"}, {"url": "https://github.com/Kirin-say/Vulnerabilities/blob/master/DIR-806_Code_Injection.md", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2019-10891", "sourceIdentifier": "cve@mitre.org", "published": "2019-09-06T20:15:11.003", "lastModified": "2025-01-09T18:15:23.760", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "An issue was discovered in D-Link DIR-806 devices. There is a command injection in function hnap_main, which calls system() without checking the parameter that can be controlled by user, and finally allows remote attackers to execute arbitrary shell commands with a special HTTP header."}, {"lang": "es", "value": "Se detect\u00f3 un problema en los dispositivos D-Link DIR-806. Hay una inyecci\u00f3n de comando en la funci\u00f3n hnap_main, que llama al sistema () sin verificar el par\u00e1metro que puede ser controlado por el usuario, y finalmente permite a los atacantes remotos ejecutar comandos de shell arbitrarios con un encabezado HTTP especial."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 5.9}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 5.9}], "cvssMetricV2": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "availabilityImpact": "COMPLETE"}, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 10.0, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "weaknesses": [{"source": "cve@mitre.org", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-78"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-78"}]}], "configurations": [{"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:dlink:dir-806_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "02AF529B-19FB-414C-AED4-D35A5FB6458B"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:dlink:dir-806:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E87253-0A09-40DC-BC77-8DECE8939684"}]}]}], "references": [{"url": "https://github.com/Kirin-say/Vulnerabilities/blob/master/DIR-806_Code_Injection.md", "source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"]}, {"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10282", "source": "cve@mitre.org"}, {"url": "https://github.com/Kirin-say/Vulnerabilities/blob/master/DIR-806_Code_Injection.md", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"]}]}} \ No newline at end of file diff --git a/cve/2021/CVE-2021-47016.json b/cve/2021/CVE-2021-47016.json index d525d618dcb..cfb2335ef8f 100644 --- a/cve/2021/CVE-2021-47016.json +++ b/cve/2021/CVE-2021-47016.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2021-47016", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-29T23:15:07.307", "lastModified": "2024-11-21T06:35:11.787", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nm68k: mvme147,mvme16x: Don't wipe PCC timer config bits\n\nDon't clear the timer 1 configuration bits when clearing the interrupt flag\nand counter overflow. As Michael reported, \"This results in no timer\ninterrupts being delivered after the first. Initialization then hangs\nin calibrate_delay as the jiffies counter is not updated.\"\n\nOn mvme16x, enable the timer after requesting the irq, consistent with\nmvme147."}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: m68k: mvme147,mvme16x: No borre los bits de configuraci\u00f3n del temporizador PCC. No borre los bits de configuraci\u00f3n del temporizador 1 al borrar el indicador de interrupci\u00f3n y el desbordamiento del contador. Como inform\u00f3 Michael, \"Esto da como resultado que no se entreguen interrupciones del temporizador despu\u00e9s de la primera. Luego, la inicializaci\u00f3n se bloquea en calibrate_delay porque el contador de santiam\u00e9n no se actualiza\". En mvme16x, habilite el temporizador despu\u00e9s de solicitar irq, de acuerdo con mvme147."}], "metrics": {}, "references": [{"url": "https://git.kernel.org/stable/c/1dfb26df15fc7036a74221d43de7427f74293dae", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/43262178c043032e7c42d00de44c818ba05f9967", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/5d34225169346cab5145978d153b9ce90e9ace21", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/73fdeb612d25b5e105c219e05434285a45d23576", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/f6a90818a32058fca62cda3a2027a6a2364e1878", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/1dfb26df15fc7036a74221d43de7427f74293dae", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://git.kernel.org/stable/c/43262178c043032e7c42d00de44c818ba05f9967", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://git.kernel.org/stable/c/5d34225169346cab5145978d153b9ce90e9ace21", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://git.kernel.org/stable/c/73fdeb612d25b5e105c219e05434285a45d23576", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://git.kernel.org/stable/c/f6a90818a32058fca62cda3a2027a6a2364e1878", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2021-47016", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-29T23:15:07.307", "lastModified": "2025-01-09T19:52:27.117", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nm68k: mvme147,mvme16x: Don't wipe PCC timer config bits\n\nDon't clear the timer 1 configuration bits when clearing the interrupt flag\nand counter overflow. As Michael reported, \"This results in no timer\ninterrupts being delivered after the first. Initialization then hangs\nin calibrate_delay as the jiffies counter is not updated.\"\n\nOn mvme16x, enable the timer after requesting the irq, consistent with\nmvme147."}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: m68k: mvme147,mvme16x: No borre los bits de configuraci\u00f3n del temporizador PCC. No borre los bits de configuraci\u00f3n del temporizador 1 al borrar el indicador de interrupci\u00f3n y el desbordamiento del contador. Como inform\u00f3 Michael, \"Esto da como resultado que no se entreguen interrupciones del temporizador despu\u00e9s de la primera. Luego, la inicializaci\u00f3n se bloquea en calibrate_delay porque el contador de santiam\u00e9n no se actualiza\". En mvme16x, habilite el temporizador despu\u00e9s de solicitar irq, de acuerdo con mvme147."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "baseScore": 5.5, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.2", "versionEndExcluding": "5.4.119", "matchCriteriaId": "459F61B2-E7E5-43BE-8A31-15469C31F827"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.5", "versionEndExcluding": "5.10.37", "matchCriteriaId": "7A4CF5D6-ACBA-4980-ABFD-3D7A53B5BB4E"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.11", "versionEndExcluding": "5.11.21", "matchCriteriaId": "8CBB94EC-EC33-4464-99C5-03E5542715F0"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.12", "versionEndExcluding": "5.12.4", "matchCriteriaId": "D8C7052F-1B7B-4327-9C2B-84EBF3243838"}]}]}], "references": [{"url": "https://git.kernel.org/stable/c/1dfb26df15fc7036a74221d43de7427f74293dae", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/43262178c043032e7c42d00de44c818ba05f9967", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/5d34225169346cab5145978d153b9ce90e9ace21", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/73fdeb612d25b5e105c219e05434285a45d23576", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/f6a90818a32058fca62cda3a2027a6a2364e1878", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/1dfb26df15fc7036a74221d43de7427f74293dae", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/43262178c043032e7c42d00de44c818ba05f9967", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/5d34225169346cab5145978d153b9ce90e9ace21", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/73fdeb612d25b5e105c219e05434285a45d23576", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/f6a90818a32058fca62cda3a2027a6a2364e1878", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}]}} \ No newline at end of file diff --git a/cve/2021/CVE-2021-47037.json b/cve/2021/CVE-2021-47037.json index 8d3ba5369c2..d484d36500f 100644 --- a/cve/2021/CVE-2021-47037.json +++ b/cve/2021/CVE-2021-47037.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2021-47037", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-28T09:15:39.847", "lastModified": "2024-11-21T06:35:14.347", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: q6afe-clocks: fix reprobing of the driver\n\nQ6afe-clocks driver can get reprobed. For example if the APR services\nare restarted after the firmware crash. However currently Q6afe-clocks\ndriver will oops because hw.init will get cleared during first _probe\ncall. Rewrite the driver to fill the clock data at runtime rather than\nusing big static array of clocks."}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ASoC: q6afe-clocks: correcci\u00f3n de reprobaci\u00f3n del controlador El controlador Q6afe-clocks puede ser reprobado. Por ejemplo, si los servicios APR se reinician despu\u00e9s de la falla del firmware. Sin embargo, actualmente el controlador Q6afe-clocks fallar\u00e1 porque hw.init se borrar\u00e1 durante la primera llamada a _probe. Vuelva a escribir el controlador para completar los datos del reloj en tiempo de ejecuci\u00f3n en lugar de utilizar una gran variedad de relojes est\u00e1ticos."}], "metrics": {}, "references": [{"url": "https://git.kernel.org/stable/c/62413972f5266568848a36fd15160397b211fa74", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/6893df3753beafa5f7351228a9dd8157a57d7492", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/96fadf7e8ff49fdb74754801228942b67c3eeebd", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/62413972f5266568848a36fd15160397b211fa74", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://git.kernel.org/stable/c/6893df3753beafa5f7351228a9dd8157a57d7492", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://git.kernel.org/stable/c/96fadf7e8ff49fdb74754801228942b67c3eeebd", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2021-47037", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-28T09:15:39.847", "lastModified": "2025-01-09T19:47:04.127", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: q6afe-clocks: fix reprobing of the driver\n\nQ6afe-clocks driver can get reprobed. For example if the APR services\nare restarted after the firmware crash. However currently Q6afe-clocks\ndriver will oops because hw.init will get cleared during first _probe\ncall. Rewrite the driver to fill the clock data at runtime rather than\nusing big static array of clocks."}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ASoC: q6afe-clocks: correcci\u00f3n de reprobaci\u00f3n del controlador El controlador Q6afe-clocks puede ser reprobado. Por ejemplo, si los servicios APR se reinician despu\u00e9s de la falla del firmware. Sin embargo, actualmente el controlador Q6afe-clocks fallar\u00e1 porque hw.init se borrar\u00e1 durante la primera llamada a _probe. Vuelva a escribir el controlador para completar los datos del reloj en tiempo de ejecuci\u00f3n en lugar de utilizar una gran variedad de relojes est\u00e1ticos."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "baseScore": 5.5, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.10", "versionEndExcluding": "5.11.21", "matchCriteriaId": "3EB79796-821C-45D2-8CF3-E0C6CF51F586"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.12", "versionEndExcluding": "5.12.4", "matchCriteriaId": "D8C7052F-1B7B-4327-9C2B-84EBF3243838"}]}]}], "references": [{"url": "https://git.kernel.org/stable/c/62413972f5266568848a36fd15160397b211fa74", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/6893df3753beafa5f7351228a9dd8157a57d7492", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/96fadf7e8ff49fdb74754801228942b67c3eeebd", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/62413972f5266568848a36fd15160397b211fa74", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/6893df3753beafa5f7351228a9dd8157a57d7492", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/96fadf7e8ff49fdb74754801228942b67c3eeebd", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}]}} \ No newline at end of file diff --git a/cve/2021/CVE-2021-47056.json b/cve/2021/CVE-2021-47056.json index 6649ad2f307..39c40a3b727 100644 --- a/cve/2021/CVE-2021-47056.json +++ b/cve/2021/CVE-2021-47056.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2021-47056", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-29T23:15:07.530", "lastModified": "2024-11-21T06:35:16.687", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init\n\nADF_STATUS_PF_RUNNING is (only) used and checked by adf_vf2pf_shutdown()\nbefore calling adf_iov_putmsg()->mutex_lock(vf2pf_lock), however the\nvf2pf_lock is initialized in adf_dev_init(), which can fail and when it\nfail, the vf2pf_lock is either not initialized or destroyed, a subsequent\nuse of vf2pf_lock will cause issue.\nTo fix this issue, only set this flag if adf_dev_init() returns 0.\n\n[ 7.178404] BUG: KASAN: user-memory-access in __mutex_lock.isra.0+0x1ac/0x7c0\n[ 7.180345] Call Trace:\n[ 7.182576] mutex_lock+0xc9/0xd0\n[ 7.183257] adf_iov_putmsg+0x118/0x1a0 [intel_qat]\n[ 7.183541] adf_vf2pf_shutdown+0x4d/0x7b [intel_qat]\n[ 7.183834] adf_dev_shutdown+0x172/0x2b0 [intel_qat]\n[ 7.184127] adf_probe+0x5e9/0x600 [qat_dh895xccvf]"}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: crypto: qat - ADF_STATUS_PF_RUNNING debe configurarse despu\u00e9s de adf_dev_init ADF_STATUS_PF_RUNNING es (solo) usado y verificado por adf_vf2pf_shutdown() antes de llamar a adf_iov_putmsg()->mutex_lock(vf2pf_lock), sin embargo, vf2pf_lock es inicializado en adf_dev_init(), que puede fallar y cuando falla, vf2pf_lock no se inicializa o se destruye, un uso posterior de vf2pf_lock causar\u00e1 problemas. Para solucionar este problema, establezca este indicador solo si adf_dev_init() devuelve 0. [7.178404] ERROR: KASAN: acceso a memoria de usuario en __mutex_lock.isra.0+0x1ac/0x7c0 [7.180345] Seguimiento de llamadas: [7.182576] mutex_lock+0xc9 /0xd0 [ 7.183257] adf_iov_putmsg+0x118/0x1a0 [intel_qat] [ 7.183541] adf_vf2pf_shutdown+0x4d/0x7b [intel_qat] [ 7.183834] adf_dev_shutdown+0x172/0x2b0 [intel_qat] [7.184127] adf_probe+0x5e9/0x600 [qat_dh895xccvf]"}], "metrics": {}, "references": [{"url": "https://git.kernel.org/stable/c/05ec8192ee4bfdf2a8894a68350dac9f1a155fa6", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/09d16cee6285d37cc76311c29add6d97a7e4acda", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/1ea500ce6f7c9106e4a561d28e69215f3d451818", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/1f50392650ae794a1aea41c213c6a3e1c824413c", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/20fd40fc6f2c2b41dc6f637f88d494b14e9c21f1", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/446045cf682af12d9294765f6c46084b374b5654", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/8609f5cfdc872fc3a462efa6a3eca5cb1e2f6446", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/f4c4e07140687f42bfa40e091bb4a55d7960ce4d", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/05ec8192ee4bfdf2a8894a68350dac9f1a155fa6", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://git.kernel.org/stable/c/09d16cee6285d37cc76311c29add6d97a7e4acda", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://git.kernel.org/stable/c/1ea500ce6f7c9106e4a561d28e69215f3d451818", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://git.kernel.org/stable/c/1f50392650ae794a1aea41c213c6a3e1c824413c", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://git.kernel.org/stable/c/20fd40fc6f2c2b41dc6f637f88d494b14e9c21f1", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://git.kernel.org/stable/c/446045cf682af12d9294765f6c46084b374b5654", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://git.kernel.org/stable/c/8609f5cfdc872fc3a462efa6a3eca5cb1e2f6446", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://git.kernel.org/stable/c/f4c4e07140687f42bfa40e091bb4a55d7960ce4d", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2021-47056", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-29T23:15:07.530", "lastModified": "2025-01-09T19:45:48.107", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init\n\nADF_STATUS_PF_RUNNING is (only) used and checked by adf_vf2pf_shutdown()\nbefore calling adf_iov_putmsg()->mutex_lock(vf2pf_lock), however the\nvf2pf_lock is initialized in adf_dev_init(), which can fail and when it\nfail, the vf2pf_lock is either not initialized or destroyed, a subsequent\nuse of vf2pf_lock will cause issue.\nTo fix this issue, only set this flag if adf_dev_init() returns 0.\n\n[ 7.178404] BUG: KASAN: user-memory-access in __mutex_lock.isra.0+0x1ac/0x7c0\n[ 7.180345] Call Trace:\n[ 7.182576] mutex_lock+0xc9/0xd0\n[ 7.183257] adf_iov_putmsg+0x118/0x1a0 [intel_qat]\n[ 7.183541] adf_vf2pf_shutdown+0x4d/0x7b [intel_qat]\n[ 7.183834] adf_dev_shutdown+0x172/0x2b0 [intel_qat]\n[ 7.184127] adf_probe+0x5e9/0x600 [qat_dh895xccvf]"}, {"lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: crypto: qat - ADF_STATUS_PF_RUNNING debe configurarse despu\u00e9s de adf_dev_init ADF_STATUS_PF_RUNNING es (solo) usado y verificado por adf_vf2pf_shutdown() antes de llamar a adf_iov_putmsg()->mutex_lock(vf2pf_lock), sin embargo, vf2pf_lock es inicializado en adf_dev_init(), que puede fallar y cuando falla, vf2pf_lock no se inicializa o se destruye, un uso posterior de vf2pf_lock causar\u00e1 problemas. Para solucionar este problema, establezca este indicador solo si adf_dev_init() devuelve 0. [7.178404] ERROR: KASAN: acceso a memoria de usuario en __mutex_lock.isra.0+0x1ac/0x7c0 [7.180345] Seguimiento de llamadas: [7.182576] mutex_lock+0xc9 /0xd0 [ 7.183257] adf_iov_putmsg+0x118/0x1a0 [intel_qat] [ 7.183541] adf_vf2pf_shutdown+0x4d/0x7b [intel_qat] [ 7.183834] adf_dev_shutdown+0x172/0x2b0 [intel_qat] [7.184127] adf_probe+0x5e9/0x600 [qat_dh895xccvf]"}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "baseScore": 5.5, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-908"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.7", "versionEndExcluding": "4.9.269", "matchCriteriaId": "BE2A530A-768D-4D74-B4DB-C76E09C2042F"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.10", "versionEndExcluding": "4.14.233", "matchCriteriaId": "4836AF17-022D-49D0-9A8A-AF66FE8DCEB8"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.15", "versionEndExcluding": "4.19.191", "matchCriteriaId": "5B6E6817-19A8-4C0A-8807-71DA48CF9191"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.20", "versionEndExcluding": "5.4.119", "matchCriteriaId": "E07BA880-1043-4674-AC45-266B3B4A44C7"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.5", "versionEndExcluding": "5.10.37", "matchCriteriaId": "7A4CF5D6-ACBA-4980-ABFD-3D7A53B5BB4E"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.11", "versionEndExcluding": "5.11.21", "matchCriteriaId": "8CBB94EC-EC33-4464-99C5-03E5542715F0"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.12", "versionEndExcluding": "5.12.4", "matchCriteriaId": "D8C7052F-1B7B-4327-9C2B-84EBF3243838"}]}]}], "references": [{"url": "https://git.kernel.org/stable/c/05ec8192ee4bfdf2a8894a68350dac9f1a155fa6", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/09d16cee6285d37cc76311c29add6d97a7e4acda", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/1ea500ce6f7c9106e4a561d28e69215f3d451818", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/1f50392650ae794a1aea41c213c6a3e1c824413c", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/20fd40fc6f2c2b41dc6f637f88d494b14e9c21f1", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/446045cf682af12d9294765f6c46084b374b5654", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/8609f5cfdc872fc3a462efa6a3eca5cb1e2f6446", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/f4c4e07140687f42bfa40e091bb4a55d7960ce4d", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/05ec8192ee4bfdf2a8894a68350dac9f1a155fa6", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/09d16cee6285d37cc76311c29add6d97a7e4acda", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/1ea500ce6f7c9106e4a561d28e69215f3d451818", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/1f50392650ae794a1aea41c213c6a3e1c824413c", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/20fd40fc6f2c2b41dc6f637f88d494b14e9c21f1", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/446045cf682af12d9294765f6c46084b374b5654", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/8609f5cfdc872fc3a462efa6a3eca5cb1e2f6446", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/f4c4e07140687f42bfa40e091bb4a55d7960ce4d", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}]}} \ No newline at end of file diff --git a/cve/2021/CVE-2021-47066.json b/cve/2021/CVE-2021-47066.json index bf925e47def..8b68464b5a1 100644 --- a/cve/2021/CVE-2021-47066.json +++ b/cve/2021/CVE-2021-47066.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2021-47066", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-29T23:15:08.057", "lastModified": "2024-11-21T06:35:18.120", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nasync_xor: increase src_offs when dropping destination page\n\nNow we support sharing one page if PAGE_SIZE is not equal stripe size. To\nsupport this, it needs to support calculating xor value with different\noffsets for each r5dev. One offset array is used to record those offsets.\n\nIn RMW mode, parity page is used as a source page. It sets\nASYNC_TX_XOR_DROP_DST before calculating xor value in ops_run_prexor5.\nSo it needs to add src_list and src_offs at the same time. Now it only\nneeds src_list. So the xor value which is calculated is wrong. It can\ncause data corruption problem.\n\nI can reproduce this problem 100% on a POWER8 machine. The steps are:\n\n mdadm -CR /dev/md0 -l5 -n3 /dev/sdb1 /dev/sdc1 /dev/sdd1 --size=3G\n mkfs.xfs /dev/md0\n mount /dev/md0 /mnt/test\n mount: /mnt/test: mount(2) system call failed: Structure needs cleaning."}, {"lang": "es", "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: async_xor: aumenta src_offs al eliminar la p\u00e1gina de destino. Ahora admitimos compartir una p\u00e1gina si PAGE_SIZE no tiene el mismo tama\u00f1o de banda. Para respaldar esto, debe admitir el c\u00e1lculo del valor xor con diferentes compensaciones para cada r5dev. Se utiliza una matriz de desplazamiento para registrar esos desplazamientos. En el modo RMW, la p\u00e1gina de paridad se utiliza como p\u00e1gina de origen. Establece ASYNC_TX_XOR_DROP_DST antes de calcular el valor xor en ops_run_prexor5. Por lo tanto, es necesario agregar src_list y src_offs al mismo tiempo. Ahora s\u00f3lo necesita src_list. Entonces el valor xor que se calcula es incorrecto. Puede causar problemas de corrupci\u00f3n de datos. Puedo reproducir este problema al 100% en una m\u00e1quina POWER8. Los pasos son: mdadm -CR /dev/md0 -l5 -n3 /dev/sdb1 /dev/sdc1 /dev/sdd1 --size=3G mkfs.xfs /dev/md0 mount /dev/md0 /mnt/test mount: /mnt/test: la llamada al sistema mount(2) fall\u00f3: la estructura necesita limpieza."}], "metrics": {}, "references": [{"url": "https://git.kernel.org/stable/c/29ffa50f33de824b5491f8239c88c4a0efdd03af", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/53f8208e11abd6dde9480dfcb97fecdb1bc2ac18", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/cab2e8e5997b592fdb7d02cf2387b4b8e3057174", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/ceaf2966ab082bbc4d26516f97b3ca8a676e2af8", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/29ffa50f33de824b5491f8239c88c4a0efdd03af", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://git.kernel.org/stable/c/53f8208e11abd6dde9480dfcb97fecdb1bc2ac18", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://git.kernel.org/stable/c/cab2e8e5997b592fdb7d02cf2387b4b8e3057174", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://git.kernel.org/stable/c/ceaf2966ab082bbc4d26516f97b3ca8a676e2af8", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2021-47066", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-29T23:15:08.057", "lastModified": "2025-01-09T19:44:50.610", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nasync_xor: increase src_offs when dropping destination page\n\nNow we support sharing one page if PAGE_SIZE is not equal stripe size. To\nsupport this, it needs to support calculating xor value with different\noffsets for each r5dev. One offset array is used to record those offsets.\n\nIn RMW mode, parity page is used as a source page. It sets\nASYNC_TX_XOR_DROP_DST before calculating xor value in ops_run_prexor5.\nSo it needs to add src_list and src_offs at the same time. Now it only\nneeds src_list. So the xor value which is calculated is wrong. It can\ncause data corruption problem.\n\nI can reproduce this problem 100% on a POWER8 machine. The steps are:\n\n mdadm -CR /dev/md0 -l5 -n3 /dev/sdb1 /dev/sdc1 /dev/sdd1 --size=3G\n mkfs.xfs /dev/md0\n mount /dev/md0 /mnt/test\n mount: /mnt/test: mount(2) system call failed: Structure needs cleaning."}, {"lang": "es", "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: async_xor: aumenta src_offs al eliminar la p\u00e1gina de destino. Ahora admitimos compartir una p\u00e1gina si PAGE_SIZE no tiene el mismo tama\u00f1o de banda. Para respaldar esto, debe admitir el c\u00e1lculo del valor xor con diferentes compensaciones para cada r5dev. Se utiliza una matriz de desplazamiento para registrar esos desplazamientos. En el modo RMW, la p\u00e1gina de paridad se utiliza como p\u00e1gina de origen. Establece ASYNC_TX_XOR_DROP_DST antes de calcular el valor xor en ops_run_prexor5. Por lo tanto, es necesario agregar src_list y src_offs al mismo tiempo. Ahora s\u00f3lo necesita src_list. Entonces el valor xor que se calcula es incorrecto. Puede causar problemas de corrupci\u00f3n de datos. Puedo reproducir este problema al 100% en una m\u00e1quina POWER8. Los pasos son: mdadm -CR /dev/md0 -l5 -n3 /dev/sdb1 /dev/sdc1 /dev/sdd1 --size=3G mkfs.xfs /dev/md0 mount /dev/md0 /mnt/test mount: /mnt/test: la llamada al sistema mount(2) fall\u00f3: la estructura necesita limpieza."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "baseScore": 5.5, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.10", "versionEndExcluding": "5.10.37", "matchCriteriaId": "4E433B72-3E3A-435E-9A66-80D28868BDF2"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.11", "versionEndExcluding": "5.11.21", "matchCriteriaId": "8CBB94EC-EC33-4464-99C5-03E5542715F0"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.12", "versionEndExcluding": "5.12.4", "matchCriteriaId": "D8C7052F-1B7B-4327-9C2B-84EBF3243838"}]}]}], "references": [{"url": "https://git.kernel.org/stable/c/29ffa50f33de824b5491f8239c88c4a0efdd03af", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/53f8208e11abd6dde9480dfcb97fecdb1bc2ac18", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/cab2e8e5997b592fdb7d02cf2387b4b8e3057174", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/ceaf2966ab082bbc4d26516f97b3ca8a676e2af8", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/29ffa50f33de824b5491f8239c88c4a0efdd03af", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/53f8208e11abd6dde9480dfcb97fecdb1bc2ac18", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/cab2e8e5997b592fdb7d02cf2387b4b8e3057174", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/ceaf2966ab082bbc4d26516f97b3ca8a676e2af8", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}]}} \ No newline at end of file diff --git a/cve/2021/CVE-2021-47069.json b/cve/2021/CVE-2021-47069.json index 9a99968d589..e1e1e60b7ad 100644 --- a/cve/2021/CVE-2021-47069.json +++ b/cve/2021/CVE-2021-47069.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2021-47069", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-01T22:15:46.857", "lastModified": "2024-11-21T06:35:18.510", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry\n\ndo_mq_timedreceive calls wq_sleep with a stack local address. The\nsender (do_mq_timedsend) uses this address to later call pipelined_send.\n\nThis leads to a very hard to trigger race where a do_mq_timedreceive\ncall might return and leave do_mq_timedsend to rely on an invalid\naddress, causing the following crash:\n\n RIP: 0010:wake_q_add_safe+0x13/0x60\n Call Trace:\n __x64_sys_mq_timedsend+0x2a9/0x490\n do_syscall_64+0x80/0x680\n entry_SYSCALL_64_after_hwframe+0x44/0xa9\n RIP: 0033:0x7f5928e40343\n\nThe race occurs as:\n\n1. do_mq_timedreceive calls wq_sleep with the address of `struct\n ext_wait_queue` on function stack (aliased as `ewq_addr` here) - it\n holds a valid `struct ext_wait_queue *` as long as the stack has not\n been overwritten.\n\n2. `ewq_addr` gets added to info->e_wait_q[RECV].list in wq_add, and\n do_mq_timedsend receives it via wq_get_first_waiter(info, RECV) to call\n __pipelined_op.\n\n3. Sender calls __pipelined_op::smp_store_release(&this->state,\n STATE_READY). Here is where the race window begins. (`this` is\n `ewq_addr`.)\n\n4. If the receiver wakes up now in do_mq_timedreceive::wq_sleep, it\n will see `state == STATE_READY` and break.\n\n5. do_mq_timedreceive returns, and `ewq_addr` is no longer guaranteed\n to be a `struct ext_wait_queue *` since it was on do_mq_timedreceive's\n stack. (Although the address may not get overwritten until another\n function happens to touch it, which means it can persist around for an\n indefinite time.)\n\n6. do_mq_timedsend::__pipelined_op() still believes `ewq_addr` is a\n `struct ext_wait_queue *`, and uses it to find a task_struct to pass to\n the wake_q_add_safe call. In the lucky case where nothing has\n overwritten `ewq_addr` yet, `ewq_addr->task` is the right task_struct.\n In the unlucky case, __pipelined_op::wake_q_add_safe gets handed a\n bogus address as the receiver's task_struct causing the crash.\n\ndo_mq_timedsend::__pipelined_op() should not dereference `this` after\nsetting STATE_READY, as the receiver counterpart is now free to return.\nChange __pipelined_op to call wake_q_add_safe on the receiver's\ntask_struct returned by get_task_struct, instead of dereferencing `this`\nwhich sits on the receiver's stack.\n\nAs Manfred pointed out, the race potentially also exists in\nipc/msg.c::expunge_all and ipc/sem.c::wake_up_sem_queue_prepare. Fix\nthose in the same way."}, {"lang": "es", "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: ipc/mqueue, msg, sem: evite confiar en una referencia de pila despu\u00e9s de su vencimiento do_mq_timedreceive llama a wq_sleep con una direcci\u00f3n local de pila. El remitente (do_mq_timedsend) usa esta direcci\u00f3n para luego llamar a pipelined_send. Esto conduce a una ejecuci\u00f3n muy dif\u00edcil de desencadenar en la que una llamada do_mq_timedreceive puede regresar y dejar que do_mq_timedsend dependa de una direcci\u00f3n no v\u00e1lida, lo que provoca el siguiente bloqueo: RIP: 0010:wake_q_add_safe+0x13/0x60 Seguimiento de llamadas: __x64_sys_mq_timedsend+0x2a9/0x490 do_syscall_64+0x80 /0x680 Entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x7f5928e40343 La ejecuci\u00f3n ocurre como: 1. do_mq_timedreceive llama a wq_sleep con la direcci\u00f3n de `struct ext_wait_queue` en la pila de funciones (alias `ewq_addr` aqu\u00ed): contiene una `struct ext_wait_queue * v\u00e1lida ` siempre y cuando la pila no haya sido sobrescrita. 2. `ewq_addr` se agrega a info->e_wait_q[RECV].list en wq_add, y do_mq_timedsend lo recibe a trav\u00e9s de wq_get_first_waiter(info, RECV) para llamar a __pipelined_op. 3. El remitente llama a __pipelined_op::smp_store_release(&this->state, STATE_READY). Aqu\u00ed es donde comienza la ventana de ejecuci\u00f3n. (`esto` es `ewq_addr`.) 4. Si el receptor se activa ahora en do_mq_timedreceive::wq_sleep, ver\u00e1 `state == STATE_READY` y se interrumpir\u00e1. 5. do_mq_timedreceive regresa y ya no se garantiza que `ewq_addr` sea una `struct ext_wait_queue *` ya que estaba en la pila de do_mq_timedreceive. (Aunque es posible que la direcci\u00f3n no se sobrescriba hasta que otra funci\u00f3n la toque, lo que significa que puede persistir por un tiempo indefinido). 6. do_mq_timedsend::__pipelined_op() todav\u00eda cree que `ewq_addr` es una `struct ext_wait_queue *`, y lo usa para encontrar una task_struct para pasar a la llamada wake_q_add_safe. En el afortunado caso de que nada haya sobrescrito `ewq_addr` todav\u00eda, `ewq_addr->task` es la estructura de tarea correcta. En el desafortunado caso, __pipelined_op::wake_q_add_safe recibe una direcci\u00f3n falsa como la task_struct del receptor que causa el bloqueo. do_mq_timedsend::__pipelined_op() no debe eliminar la referencia a \"esto\" despu\u00e9s de configurar STATE_READY, ya que la contraparte del receptor ahora puede regresar. Cambie __pipelined_op para llamar a wake_q_add_safe en el task_struct del receptor devuelto por get_task_struct, en lugar de desreferenciar \"this\" que se encuentra en la pila del receptor. Como se\u00f1al\u00f3 Manfred, la ejecuci\u00f3n tambi\u00e9n existe potencialmente en ipc/msg.c::expunge_all e ipc/sem.c::wake_up_sem_queue_prepare. Arr\u00e9glelos de la misma manera."}], "metrics": {}, "references": [{"url": "https://git.kernel.org/stable/c/4528c0c323085e645b8765913b4a7fd42cf49b65", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/807fa14536b26803b858da878b643be72952a097", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/a11ddb37bf367e6b5239b95ca759e5389bb46048", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/4528c0c323085e645b8765913b4a7fd42cf49b65", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://git.kernel.org/stable/c/807fa14536b26803b858da878b643be72952a097", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://git.kernel.org/stable/c/a11ddb37bf367e6b5239b95ca759e5389bb46048", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2021-47069", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-01T22:15:46.857", "lastModified": "2025-01-09T18:21:01.560", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry\n\ndo_mq_timedreceive calls wq_sleep with a stack local address. The\nsender (do_mq_timedsend) uses this address to later call pipelined_send.\n\nThis leads to a very hard to trigger race where a do_mq_timedreceive\ncall might return and leave do_mq_timedsend to rely on an invalid\naddress, causing the following crash:\n\n RIP: 0010:wake_q_add_safe+0x13/0x60\n Call Trace:\n __x64_sys_mq_timedsend+0x2a9/0x490\n do_syscall_64+0x80/0x680\n entry_SYSCALL_64_after_hwframe+0x44/0xa9\n RIP: 0033:0x7f5928e40343\n\nThe race occurs as:\n\n1. do_mq_timedreceive calls wq_sleep with the address of `struct\n ext_wait_queue` on function stack (aliased as `ewq_addr` here) - it\n holds a valid `struct ext_wait_queue *` as long as the stack has not\n been overwritten.\n\n2. `ewq_addr` gets added to info->e_wait_q[RECV].list in wq_add, and\n do_mq_timedsend receives it via wq_get_first_waiter(info, RECV) to call\n __pipelined_op.\n\n3. Sender calls __pipelined_op::smp_store_release(&this->state,\n STATE_READY). Here is where the race window begins. (`this` is\n `ewq_addr`.)\n\n4. If the receiver wakes up now in do_mq_timedreceive::wq_sleep, it\n will see `state == STATE_READY` and break.\n\n5. do_mq_timedreceive returns, and `ewq_addr` is no longer guaranteed\n to be a `struct ext_wait_queue *` since it was on do_mq_timedreceive's\n stack. (Although the address may not get overwritten until another\n function happens to touch it, which means it can persist around for an\n indefinite time.)\n\n6. do_mq_timedsend::__pipelined_op() still believes `ewq_addr` is a\n `struct ext_wait_queue *`, and uses it to find a task_struct to pass to\n the wake_q_add_safe call. In the lucky case where nothing has\n overwritten `ewq_addr` yet, `ewq_addr->task` is the right task_struct.\n In the unlucky case, __pipelined_op::wake_q_add_safe gets handed a\n bogus address as the receiver's task_struct causing the crash.\n\ndo_mq_timedsend::__pipelined_op() should not dereference `this` after\nsetting STATE_READY, as the receiver counterpart is now free to return.\nChange __pipelined_op to call wake_q_add_safe on the receiver's\ntask_struct returned by get_task_struct, instead of dereferencing `this`\nwhich sits on the receiver's stack.\n\nAs Manfred pointed out, the race potentially also exists in\nipc/msg.c::expunge_all and ipc/sem.c::wake_up_sem_queue_prepare. Fix\nthose in the same way."}, {"lang": "es", "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: ipc/mqueue, msg, sem: evite confiar en una referencia de pila despu\u00e9s de su vencimiento do_mq_timedreceive llama a wq_sleep con una direcci\u00f3n local de pila. El remitente (do_mq_timedsend) usa esta direcci\u00f3n para luego llamar a pipelined_send. Esto conduce a una ejecuci\u00f3n muy dif\u00edcil de desencadenar en la que una llamada do_mq_timedreceive puede regresar y dejar que do_mq_timedsend dependa de una direcci\u00f3n no v\u00e1lida, lo que provoca el siguiente bloqueo: RIP: 0010:wake_q_add_safe+0x13/0x60 Seguimiento de llamadas: __x64_sys_mq_timedsend+0x2a9/0x490 do_syscall_64+0x80 /0x680 Entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x7f5928e40343 La ejecuci\u00f3n ocurre como: 1. do_mq_timedreceive llama a wq_sleep con la direcci\u00f3n de `struct ext_wait_queue` en la pila de funciones (alias `ewq_addr` aqu\u00ed): contiene una `struct ext_wait_queue * v\u00e1lida ` siempre y cuando la pila no haya sido sobrescrita. 2. `ewq_addr` se agrega a info->e_wait_q[RECV].list en wq_add, y do_mq_timedsend lo recibe a trav\u00e9s de wq_get_first_waiter(info, RECV) para llamar a __pipelined_op. 3. El remitente llama a __pipelined_op::smp_store_release(&this->state, STATE_READY). Aqu\u00ed es donde comienza la ventana de ejecuci\u00f3n. (`esto` es `ewq_addr`.) 4. Si el receptor se activa ahora en do_mq_timedreceive::wq_sleep, ver\u00e1 `state == STATE_READY` y se interrumpir\u00e1. 5. do_mq_timedreceive regresa y ya no se garantiza que `ewq_addr` sea una `struct ext_wait_queue *` ya que estaba en la pila de do_mq_timedreceive. (Aunque es posible que la direcci\u00f3n no se sobrescriba hasta que otra funci\u00f3n la toque, lo que significa que puede persistir por un tiempo indefinido). 6. do_mq_timedsend::__pipelined_op() todav\u00eda cree que `ewq_addr` es una `struct ext_wait_queue *`, y lo usa para encontrar una task_struct para pasar a la llamada wake_q_add_safe. En el afortunado caso de que nada haya sobrescrito `ewq_addr` todav\u00eda, `ewq_addr->task` es la estructura de tarea correcta. En el desafortunado caso, __pipelined_op::wake_q_add_safe recibe una direcci\u00f3n falsa como la task_struct del receptor que causa el bloqueo. do_mq_timedsend::__pipelined_op() no debe eliminar la referencia a \"esto\" despu\u00e9s de configurar STATE_READY, ya que la contraparte del receptor ahora puede regresar. Cambie __pipelined_op para llamar a wake_q_add_safe en el task_struct del receptor devuelto por get_task_struct, en lugar de desreferenciar \"this\" que se encuentra en la pila del receptor. Como se\u00f1al\u00f3 Manfred, la ejecuci\u00f3n tambi\u00e9n existe potencialmente en ipc/msg.c::expunge_all e ipc/sem.c::wake_up_sem_queue_prepare. Arr\u00e9glelos de la misma manera."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.0, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.0, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-672"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.6", "versionEndExcluding": "5.10.40", "matchCriteriaId": "CC04C860-B3F3-4630-B20D-99BEA8F2A42A"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.11", "versionEndExcluding": "5.12.7", "matchCriteriaId": "E8F2CE30-38B0-4716-B12B-A139B0F9C5C9"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532"}]}]}], "references": [{"url": "https://git.kernel.org/stable/c/4528c0c323085e645b8765913b4a7fd42cf49b65", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/807fa14536b26803b858da878b643be72952a097", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/a11ddb37bf367e6b5239b95ca759e5389bb46048", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/4528c0c323085e645b8765913b4a7fd42cf49b65", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/807fa14536b26803b858da878b643be72952a097", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/a11ddb37bf367e6b5239b95ca759e5389bb46048", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}]}} \ No newline at end of file diff --git a/cve/2021/CVE-2021-47072.json b/cve/2021/CVE-2021-47072.json index db8cc0d6787..dade6c5d89b 100644 --- a/cve/2021/CVE-2021-47072.json +++ b/cve/2021/CVE-2021-47072.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2021-47072", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-01T22:15:47.010", "lastModified": "2024-11-21T06:35:20.567", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix removed dentries still existing after log is synced\n\nWhen we move one inode from one directory to another and both the inode\nand its previous parent directory were logged before, we are not supposed\nto have the dentry for the old parent if we have a power failure after the\nlog is synced. Only the new dentry is supposed to exist.\n\nGenerally this works correctly, however there is a scenario where this is\nnot currently working, because the old parent of the file/directory that\nwas moved is not authoritative for a range that includes the dir index and\ndir item keys of the old dentry. This case is better explained with the\nfollowing example and reproducer:\n\n # The test requires a very specific layout of keys and items in the\n # fs/subvolume btree to trigger the bug. So we want to make sure that\n # on whatever platform we are, we have the same leaf/node size.\n #\n # Currently in btrfs the node/leaf size can not be smaller than the page\n # size (but it can be greater than the page size). So use the largest\n # supported node/leaf size (64K).\n\n $ mkfs.btrfs -f -n 65536 /dev/sdc\n $ mount /dev/sdc /mnt\n\n # \"testdir\" is inode 257.\n $ mkdir /mnt/testdir\n $ chmod 755 /mnt/testdir\n\n # Create several empty files to have the directory \"testdir\" with its\n # items spread over several leaves (7 in this case).\n $ for ((i = 1; i <= 1200; i++)); do\n echo -n > /mnt/testdir/file$i\n done\n\n # Create our test directory \"dira\", inode number 1458, which gets all\n # its items in leaf 7.\n #\n # The BTRFS_DIR_ITEM_KEY item for inode 257 (\"testdir\") that points to\n # the entry named \"dira\" is in leaf 2, while the BTRFS_DIR_INDEX_KEY\n # item that points to that entry is in leaf 3.\n #\n # For this particular filesystem node size (64K), file count and file\n # names, we endup with the directory entry items from inode 257 in\n # leaves 2 and 3, as previously mentioned - what matters for triggering\n # the bug exercised by this test case is that those items are not placed\n # in leaf 1, they must be placed in a leaf different from the one\n # containing the inode item for inode 257.\n #\n # The corresponding BTRFS_DIR_ITEM_KEY and BTRFS_DIR_INDEX_KEY items for\n # the parent inode (257) are the following:\n #\n # item 460 key (257 DIR_ITEM 3724298081) itemoff 48344 itemsize 34\n # location key (1458 INODE_ITEM 0) type DIR\n # transid 6 data_len 0 name_len 4\n # name: dira\n #\n # and:\n #\n # item 771 key (257 DIR_INDEX 1202) itemoff 36673 itemsize 34\n # location key (1458 INODE_ITEM 0) type DIR\n # transid 6 data_len 0 name_len 4\n # name: dira\n\n $ mkdir /mnt/testdir/dira\n\n # Make sure everything done so far is durably persisted.\n $ sync\n\n # Now do a change to inode 257 (\"testdir\") that does not result in\n # COWing leaves 2 and 3 - the leaves that contain the directory items\n # pointing to inode 1458 (directory \"dira\").\n #\n # Changing permissions, the owner/group, updating or adding a xattr,\n # etc, will not change (COW) leaves 2 and 3. So for the sake of\n # simplicity change the permissions of inode 257, which results in\n # updating its inode item and therefore change (COW) only leaf 1.\n\n $ chmod 700 /mnt/testdir\n\n # Now fsync directory inode 257.\n #\n # Since only the first leaf was changed/COWed, we log the inode item of\n # inode 257 and only the dentries found in the first leaf, all have a\n # key type of BTRFS_DIR_ITEM_KEY, and no keys of type\n # BTRFS_DIR_INDEX_KEY, because they sort after the former type and none\n # exist in the first leaf.\n #\n # We also log 3 items that represent ranges for dir items and dir\n # indexes for which the log is authoritative:\n #\n # 1) a key of type BTRFS_DIR_LOG_ITEM_KEY, which indicates the log is\n # authoritative for all BTRFS_DIR_ITEM_KEY keys that have an offset\n # in the range [0, 2285968570] (the offset here is th\n---truncated---"}, {"lang": "es", "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: btrfs: corrige las dentries eliminadas que a\u00fan existen despu\u00e9s de sincronizar el registro. Cuando movemos un inodo de un directorio a otro y tanto el inodo como su directorio principal anterior se registraron antes, se supone que no tener la dentry del padre anterior si tenemos un corte de energ\u00eda despu\u00e9s de sincronizar el registro. Se supone que s\u00f3lo existe el nuevo dentry. En general, esto funciona correctamente, sin embargo, hay un escenario en el que esto no funciona actualmente, porque el padre antiguo del archivo/directorio que se movi\u00f3 no tiene autoridad para un rango que incluye el \u00edndice de directorio y las claves de elemento de directorio del dentry anterior. Este caso se explica mejor con el siguiente ejemplo y reproductor: # La prueba requiere un dise\u00f1o muy espec\u00edfico de claves y elementos en el \u00e1rbol # fs/subvolume para activar el error. Por eso queremos asegurarnos de que # en cualquier plataforma en la que estemos, tengamos el mismo tama\u00f1o de hoja/nodo. # # Actualmente en btrfs el tama\u00f1o del nodo/hoja no puede ser menor que el tama\u00f1o de la p\u00e1gina # (pero puede ser mayor que el tama\u00f1o de la p\u00e1gina). Por lo tanto, utilice el mayor tama\u00f1o de nodo/hoja admitido (64K). $ mkfs.btrfs -f -n 65536 /dev/sdc $ mount /dev/sdc /mnt # \"testdir\" is inode 257. $ mkdir /mnt/testdir $ chmod 755 /mnt/testdir # Create several empty files to have the directory \"testdir\" with its # items spread over several leaves (7 in this case). $ for ((i = 1; i <= 1200; i++)); do echo -n > /mnt/testdir/file$i done # Create our test directory \"dira\", inode number 1458, which gets all # its items in leaf 7. # # The BTRFS_DIR_ITEM_KEY item for inode 257 (\"testdir\") that points to # the entry named \"dira\" is in leaf 2, while the BTRFS_DIR_INDEX_KEY # item that points to that entry is in leaf 3. # # For this particular filesystem node size (64K), file count and file # names, we endup with the directory entry items from inode 257 in # leaves 2 and 3, as previously mentioned - what matters for triggering # the bug exercised by this test case is that those items are not placed # in leaf 1, they must be placed in a leaf different from the one # containing the inode item for inode 257. # # The corresponding BTRFS_DIR_ITEM_KEY and BTRFS_DIR_INDEX_KEY items for # the parent inode (257) are the following: # # item 460 key (257 DIR_ITEM 3724298081) itemoff 48344 itemsize 34 # location key (1458 INODE_ITEM 0) type DIR # transid 6 data_len 0 name_len 4 # name: dira # # and: # # item 771 key (257 DIR_INDEX 1202) itemoff 36673 itemsize 34 # location key (1458 INODE_ITEM 0) type DIR # transid 6 data_len 0 name_len 4 # name: dira $ mkdir /mnt/testdir/dira # Make sure everything done so far is durably persisted. $ sync # Now do a change to inode 257 (\"testdir\") that does not result in # COWing leaves 2 and 3 - the leaves that contain the directory items # pointing to inode 1458 (directory \"dira\"). # # Changing permissions, the owner/group, updating or adding a xattr, # etc, will not change (COW) leaves 2 and 3. So for the sake of # simplicity change the permissions of inode 257, which results in # updating its inode item and therefore change (COW) only leaf 1. $ chmod 700 /mnt/testdir # Now fsync directory inode 257. # # Since only the first leaf was changed/COWed, we log the inode item of # inode 257 and only the dentries found in the first leaf, all have a # key type of BTRFS_DIR_ITEM_KEY, and no keys of type # BTRFS_DIR_INDEX_KEY, because they sort after the former type and none # exist in the first leaf. # # We also log 3 items that represent ranges for dir items and dir # indexes for which the log is authoritative: # # 1) a key of type BTRFS_DIR_LOG_ITEM_KEY, which indicates the log is # authoritative for all BTRFS_DIR_ITEM_KEY keys that have an offset # in the range [0, 2285968570] (the offset here is th ---truncated--- "}], "metrics": {}, "references": [{"url": "https://git.kernel.org/stable/c/54a40fc3a1da21b52dbf19f72fdc27a2ec740760", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/6d0924c5b742036b4f20a0ffdf2b6cf3f963f5f6", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"}, {"url": "https://git.kernel.org/stable/c/54a40fc3a1da21b52dbf19f72fdc27a2ec740760", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://git.kernel.org/stable/c/6d0924c5b742036b4f20a0ffdf2b6cf3f963f5f6", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2021-47072", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-01T22:15:47.010", "lastModified": "2025-01-09T19:42:34.897", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix removed dentries still existing after log is synced\n\nWhen we move one inode from one directory to another and both the inode\nand its previous parent directory were logged before, we are not supposed\nto have the dentry for the old parent if we have a power failure after the\nlog is synced. Only the new dentry is supposed to exist.\n\nGenerally this works correctly, however there is a scenario where this is\nnot currently working, because the old parent of the file/directory that\nwas moved is not authoritative for a range that includes the dir index and\ndir item keys of the old dentry. This case is better explained with the\nfollowing example and reproducer:\n\n # The test requires a very specific layout of keys and items in the\n # fs/subvolume btree to trigger the bug. So we want to make sure that\n # on whatever platform we are, we have the same leaf/node size.\n #\n # Currently in btrfs the node/leaf size can not be smaller than the page\n # size (but it can be greater than the page size). So use the largest\n # supported node/leaf size (64K).\n\n $ mkfs.btrfs -f -n 65536 /dev/sdc\n $ mount /dev/sdc /mnt\n\n # \"testdir\" is inode 257.\n $ mkdir /mnt/testdir\n $ chmod 755 /mnt/testdir\n\n # Create several empty files to have the directory \"testdir\" with its\n # items spread over several leaves (7 in this case).\n $ for ((i = 1; i <= 1200; i++)); do\n echo -n > /mnt/testdir/file$i\n done\n\n # Create our test directory \"dira\", inode number 1458, which gets all\n # its items in leaf 7.\n #\n # The BTRFS_DIR_ITEM_KEY item for inode 257 (\"testdir\") that points to\n # the entry named \"dira\" is in leaf 2, while the BTRFS_DIR_INDEX_KEY\n # item that points to that entry is in leaf 3.\n #\n # For this particular filesystem node size (64K), file count and file\n # names, we endup with the directory entry items from inode 257 in\n # leaves 2 and 3, as previously mentioned - what matters for triggering\n # the bug exercised by this test case is that those items are not placed\n # in leaf 1, they must be placed in a leaf different from the one\n # containing the inode item for inode 257.\n #\n # The corresponding BTRFS_DIR_ITEM_KEY and BTRFS_DIR_INDEX_KEY items for\n # the parent inode (257) are the following:\n #\n # item 460 key (257 DIR_ITEM 3724298081) itemoff 48344 itemsize 34\n # location key (1458 INODE_ITEM 0) type DIR\n # transid 6 data_len 0 name_len 4\n # name: dira\n #\n # and:\n #\n # item 771 key (257 DIR_INDEX 1202) itemoff 36673 itemsize 34\n # location key (1458 INODE_ITEM 0) type DIR\n # transid 6 data_len 0 name_len 4\n # name: dira\n\n $ mkdir /mnt/testdir/dira\n\n # Make sure everything done so far is durably persisted.\n $ sync\n\n # Now do a change to inode 257 (\"testdir\") that does not result in\n # COWing leaves 2 and 3 - the leaves that contain the directory items\n # pointing to inode 1458 (directory \"dira\").\n #\n # Changing permissions, the owner/group, updating or adding a xattr,\n # etc, will not change (COW) leaves 2 and 3. So for the sake of\n # simplicity change the permissions of inode 257, which results in\n # updating its inode item and therefore change (COW) only leaf 1.\n\n $ chmod 700 /mnt/testdir\n\n # Now fsync directory inode 257.\n #\n # Since only the first leaf was changed/COWed, we log the inode item of\n # inode 257 and only the dentries found in the first leaf, all have a\n # key type of BTRFS_DIR_ITEM_KEY, and no keys of type\n # BTRFS_DIR_INDEX_KEY, because they sort after the former type and none\n # exist in the first leaf.\n #\n # We also log 3 items that represent ranges for dir items and dir\n # indexes for which the log is authoritative:\n #\n # 1) a key of type BTRFS_DIR_LOG_ITEM_KEY, which indicates the log is\n # authoritative for all BTRFS_DIR_ITEM_KEY keys that have an offset\n # in the range [0, 2285968570] (the offset here is th\n---truncated---"}, {"lang": "es", "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: btrfs: corrige las dentries eliminadas que a\u00fan existen despu\u00e9s de sincronizar el registro. Cuando movemos un inodo de un directorio a otro y tanto el inodo como su directorio principal anterior se registraron antes, se supone que no tener la dentry del padre anterior si tenemos un corte de energ\u00eda despu\u00e9s de sincronizar el registro. Se supone que s\u00f3lo existe el nuevo dentry. En general, esto funciona correctamente, sin embargo, hay un escenario en el que esto no funciona actualmente, porque el padre antiguo del archivo/directorio que se movi\u00f3 no tiene autoridad para un rango que incluye el \u00edndice de directorio y las claves de elemento de directorio del dentry anterior. Este caso se explica mejor con el siguiente ejemplo y reproductor: # La prueba requiere un dise\u00f1o muy espec\u00edfico de claves y elementos en el \u00e1rbol # fs/subvolume para activar el error. Por eso queremos asegurarnos de que # en cualquier plataforma en la que estemos, tengamos el mismo tama\u00f1o de hoja/nodo. # # Actualmente en btrfs el tama\u00f1o del nodo/hoja no puede ser menor que el tama\u00f1o de la p\u00e1gina # (pero puede ser mayor que el tama\u00f1o de la p\u00e1gina). Por lo tanto, utilice el mayor tama\u00f1o de nodo/hoja admitido (64K). $ mkfs.btrfs -f -n 65536 /dev/sdc $ mount /dev/sdc /mnt # \"testdir\" is inode 257. $ mkdir /mnt/testdir $ chmod 755 /mnt/testdir # Create several empty files to have the directory \"testdir\" with its # items spread over several leaves (7 in this case). $ for ((i = 1; i <= 1200; i++)); do echo -n > /mnt/testdir/file$i done # Create our test directory \"dira\", inode number 1458, which gets all # its items in leaf 7. # # The BTRFS_DIR_ITEM_KEY item for inode 257 (\"testdir\") that points to # the entry named \"dira\" is in leaf 2, while the BTRFS_DIR_INDEX_KEY # item that points to that entry is in leaf 3. # # For this particular filesystem node size (64K), file count and file # names, we endup with the directory entry items from inode 257 in # leaves 2 and 3, as previously mentioned - what matters for triggering # the bug exercised by this test case is that those items are not placed # in leaf 1, they must be placed in a leaf different from the one # containing the inode item for inode 257. # # The corresponding BTRFS_DIR_ITEM_KEY and BTRFS_DIR_INDEX_KEY items for # the parent inode (257) are the following: # # item 460 key (257 DIR_ITEM 3724298081) itemoff 48344 itemsize 34 # location key (1458 INODE_ITEM 0) type DIR # transid 6 data_len 0 name_len 4 # name: dira # # and: # # item 771 key (257 DIR_INDEX 1202) itemoff 36673 itemsize 34 # location key (1458 INODE_ITEM 0) type DIR # transid 6 data_len 0 name_len 4 # name: dira $ mkdir /mnt/testdir/dira # Make sure everything done so far is durably persisted. $ sync # Now do a change to inode 257 (\"testdir\") that does not result in # COWing leaves 2 and 3 - the leaves that contain the directory items # pointing to inode 1458 (directory \"dira\"). # # Changing permissions, the owner/group, updating or adding a xattr, # etc, will not change (COW) leaves 2 and 3. So for the sake of # simplicity change the permissions of inode 257, which results in # updating its inode item and therefore change (COW) only leaf 1. $ chmod 700 /mnt/testdir # Now fsync directory inode 257. # # Since only the first leaf was changed/COWed, we log the inode item of # inode 257 and only the dentries found in the first leaf, all have a # key type of BTRFS_DIR_ITEM_KEY, and no keys of type # BTRFS_DIR_INDEX_KEY, because they sort after the former type and none # exist in the first leaf. # # We also log 3 items that represent ranges for dir items and dir # indexes for which the log is authoritative: # # 1) a key of type BTRFS_DIR_LOG_ITEM_KEY, which indicates the log is # authoritative for all BTRFS_DIR_ITEM_KEY keys that have an offset # in the range [0, 2285968570] (the offset here is th ---truncated--- "}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "baseScore": 5.5, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.12", "versionEndExcluding": "5.12.7", "matchCriteriaId": "13460FFE-8AA9-4F1C-963C-30982D8858D1"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532"}]}]}], "references": [{"url": "https://git.kernel.org/stable/c/54a40fc3a1da21b52dbf19f72fdc27a2ec740760", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/6d0924c5b742036b4f20a0ffdf2b6cf3f963f5f6", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/54a40fc3a1da21b52dbf19f72fdc27a2ec740760", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://git.kernel.org/stable/c/6d0924c5b742036b4f20a0ffdf2b6cf3f963f5f6", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}]}} \ No newline at end of file diff --git a/cve/2022/CVE-2022-37056.json b/cve/2022/CVE-2022-37056.json index 852dbf9f921..5d2c4bb4ebb 100644 --- a/cve/2022/CVE-2022-37056.json +++ b/cve/2022/CVE-2022-37056.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2022-37056", "sourceIdentifier": "cve@mitre.org", "published": "2022-08-28T17:15:08.413", "lastModified": "2025-01-06T15:15:09.993", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "D-Link GO-RT-AC750 GORTAC750_revA_v101b03 and GO-RT-AC750_revB_FWv200b02 is vulnerable to Command Injection via /cgibin, hnap_main,"}, {"lang": "es", "value": "D-Link GO-RT-AC750 versiones GORTAC750_revA_v101b03 y GO-RT-AC750_revB_FWv200b02, son vulnerables a una inyecci\u00f3n de comandos por medio de /cgibin, hnap_main,"}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 5.9}]}, "weaknesses": [{"source": "cve@mitre.org", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-78"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-78"}]}], "configurations": [{"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:dlink:go-rt-ac750_firmware:reva_1.01b03:*:*:*:*:*:*:*", "matchCriteriaId": "1B975BD2-5567-4B7A-BC8D-633B5D446556"}, {"vulnerable": true, "criteria": "cpe:2.3:o:dlink:go-rt-ac750_firmware:revb_2.00b02:*:*:*:*:*:*:*", "matchCriteriaId": "26C39776-31C6-498B-91C4-2CAB0EEFFEBF"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:dlink:go-rt-ac750:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE067003-B0B5-4419-8BB3-A31C015276D0"}]}]}], "references": [{"url": "https://drive.google.com/file/d/127tqMUvAxQ4OlycoSNtcP0x2282Y75GJ/view?usp=sharing", "source": "cve@mitre.org", "tags": ["Exploit", "Patch", "Third Party Advisory"]}, {"url": "https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10308", "source": "cve@mitre.org"}, {"url": "https://www.dlink.com/en/security-bulletin/", "source": "cve@mitre.org", "tags": ["Vendor Advisory"]}, {"url": "https://drive.google.com/file/d/127tqMUvAxQ4OlycoSNtcP0x2282Y75GJ/view?usp=sharing", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Patch", "Third Party Advisory"]}, {"url": "https://www.dlink.com/en/security-bulletin/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2022-37056", "sourceIdentifier": "cve@mitre.org", "published": "2022-08-28T17:15:08.413", "lastModified": "2025-01-09T18:15:24.797", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "D-Link GO-RT-AC750 GORTAC750_revA_v101b03 and GO-RT-AC750_revB_FWv200b02 is vulnerable to Command Injection via /cgibin, hnap_main,"}, {"lang": "es", "value": "D-Link GO-RT-AC750 versiones GORTAC750_revA_v101b03 y GO-RT-AC750_revB_FWv200b02, son vulnerables a una inyecci\u00f3n de comandos por medio de /cgibin, hnap_main,"}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 5.9}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 5.9}]}, "weaknesses": [{"source": "cve@mitre.org", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-78"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-78"}]}], "configurations": [{"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:dlink:go-rt-ac750_firmware:reva_1.01b03:*:*:*:*:*:*:*", "matchCriteriaId": "1B975BD2-5567-4B7A-BC8D-633B5D446556"}, {"vulnerable": true, "criteria": "cpe:2.3:o:dlink:go-rt-ac750_firmware:revb_2.00b02:*:*:*:*:*:*:*", "matchCriteriaId": "26C39776-31C6-498B-91C4-2CAB0EEFFEBF"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:dlink:go-rt-ac750:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE067003-B0B5-4419-8BB3-A31C015276D0"}]}]}], "references": [{"url": "https://drive.google.com/file/d/127tqMUvAxQ4OlycoSNtcP0x2282Y75GJ/view?usp=sharing", "source": "cve@mitre.org", "tags": ["Exploit", "Patch", "Third Party Advisory"]}, {"url": "https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10308", "source": "cve@mitre.org"}, {"url": "https://www.dlink.com/en/security-bulletin/", "source": "cve@mitre.org", "tags": ["Vendor Advisory"]}, {"url": "https://drive.google.com/file/d/127tqMUvAxQ4OlycoSNtcP0x2282Y75GJ/view?usp=sharing", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Patch", "Third Party Advisory"]}, {"url": "https://www.dlink.com/en/security-bulletin/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-2023.json b/cve/2023/CVE-2023-2023.json index 07ecb46540a..bad54feedc9 100644 --- a/cve/2023/CVE-2023-2023.json +++ b/cve/2023/CVE-2023-2023.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-2023", "sourceIdentifier": "contact@wpscan.com", "published": "2023-05-30T08:15:09.787", "lastModified": "2024-11-21T07:57:46.780", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "The Custom 404 Pro WordPress plugin before 3.7.3 does not escape some URLs before outputting them in attributes, leading to Reflected Cross-Site Scripting."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "baseScore": 6.1, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 2.7}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:kunalnagar:custom_404_pro:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "3.7.3", "matchCriteriaId": "AF278AD3-9EEC-4F36-8FAE-0020186F5CE9"}]}]}], "references": [{"url": "https://wpscan.com/vulnerability/8859843a-a8c2-4f7a-8372-67049d6ea317", "source": "contact@wpscan.com", "tags": ["Exploit"]}, {"url": "https://wpscan.com/vulnerability/8859843a-a8c2-4f7a-8372-67049d6ea317", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-2023", "sourceIdentifier": "contact@wpscan.com", "published": "2023-05-30T08:15:09.787", "lastModified": "2025-01-09T19:15:16.547", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "The Custom 404 Pro WordPress plugin before 3.7.3 does not escape some URLs before outputting them in attributes, leading to Reflected Cross-Site Scripting."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "baseScore": 6.1, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 2.7}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "baseScore": 6.1, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 2.7}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:kunalnagar:custom_404_pro:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "3.7.3", "matchCriteriaId": "AF278AD3-9EEC-4F36-8FAE-0020186F5CE9"}]}]}], "references": [{"url": "https://wpscan.com/vulnerability/8859843a-a8c2-4f7a-8372-67049d6ea317", "source": "contact@wpscan.com", "tags": ["Exploit"]}, {"url": "https://wpscan.com/vulnerability/8859843a-a8c2-4f7a-8372-67049d6ea317", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit"]}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-23913.json b/cve/2023/CVE-2023-23913.json index 8e5eedc8d75..94a2da92663 100644 --- a/cve/2023/CVE-2023-23913.json +++ b/cve/2023/CVE-2023-23913.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-23913", "sourceIdentifier": "support@hackerone.com", "published": "2025-01-09T01:15:07.257", "lastModified": "2025-01-09T01:15:07.257", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "There is a potential DOM based cross-site scripting issue in rails-ujs which leverages the Clipboard API to target HTML elements that are assigned the contenteditable attribute. This has the potential to occur when pasting malicious HTML content from the clipboard that includes a data-method, data-remote or data-disable-with attribute."}], "metrics": {}, "references": [{"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033263", "source": "support@hackerone.com"}, {"url": "https://discuss.rubyonrails.org/t/cve-2023-23913-dom-based-cross-site-scripting-in-rails-ujs-for-contenteditable-html-elements/82468", "source": "support@hackerone.com"}, {"url": "https://github.com/rails/rails/commit/5037a13614d71727af8a175063bcf6ba1a74bdbd", "source": "support@hackerone.com"}, {"url": "https://security.netapp.com/advisory/ntap-20240605-0007/", "source": "support@hackerone.com"}, {"url": "https://www.debian.org/security/2023/dsa-5389", "source": "support@hackerone.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-23913", "sourceIdentifier": "support@hackerone.com", "published": "2025-01-09T01:15:07.257", "lastModified": "2025-01-09T18:15:24.993", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "There is a potential DOM based cross-site scripting issue in rails-ujs which leverages the Clipboard API to target HTML elements that are assigned the contenteditable attribute. This has the potential to occur when pasting malicious HTML content from the clipboard that includes a data-method, data-remote or data-disable-with attribute."}, {"lang": "es", "value": "Existe un problema potencial de Cross-Site Scripting basado en DOM en rails-ujs que aprovecha la API del portapapeles para apuntar a elementos HTML a los que se les asigna el atributo contenteditable. Esto puede ocurrir al pegar contenido HTML malicioso desde el portapapeles que incluye un atributo data-method, data-remote o data-disable-with."}], "metrics": {"cvssMetricV31": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "baseScore": 6.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.8, "impactScore": 3.4}]}, "weaknesses": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033263", "source": "support@hackerone.com"}, {"url": "https://discuss.rubyonrails.org/t/cve-2023-23913-dom-based-cross-site-scripting-in-rails-ujs-for-contenteditable-html-elements/82468", "source": "support@hackerone.com"}, {"url": "https://github.com/rails/rails/commit/5037a13614d71727af8a175063bcf6ba1a74bdbd", "source": "support@hackerone.com"}, {"url": "https://security.netapp.com/advisory/ntap-20240605-0007/", "source": "support@hackerone.com"}, {"url": "https://www.debian.org/security/2023/dsa-5389", "source": "support@hackerone.com"}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-25748.json b/cve/2023/CVE-2023-25748.json index fe2cb765722..7445a0c055f 100644 --- a/cve/2023/CVE-2023-25748.json +++ b/cve/2023/CVE-2023-25748.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-25748", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-02T17:15:11.817", "lastModified": "2024-11-21T07:50:04.250", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "By displaying a prompt with a long description, the fullscreen notification could have been hidden, resulting in potential user confusion or spoofing attacks.
*This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 111."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "baseScore": 4.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 1.4}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:android:*:*", "versionEndExcluding": "111.0", "matchCriteriaId": "15D61809-2D26-4664-9034-0504D0183F60"}]}]}], "references": [{"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1798798", "source": "security@mozilla.org", "tags": ["Issue Tracking", "Permissions Required", "Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-09/", "source": "security@mozilla.org", "tags": ["Vendor Advisory"]}, {"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1798798", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Issue Tracking", "Permissions Required", "Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-09/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-25748", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-02T17:15:11.817", "lastModified": "2025-01-09T19:15:14.810", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "By displaying a prompt with a long description, the fullscreen notification could have been hidden, resulting in potential user confusion or spoofing attacks.
*This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 111."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "baseScore": 4.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 1.4}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "baseScore": 4.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 1.4}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-1021"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:android:*:*", "versionEndExcluding": "111.0", "matchCriteriaId": "15D61809-2D26-4664-9034-0504D0183F60"}]}]}], "references": [{"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1798798", "source": "security@mozilla.org", "tags": ["Issue Tracking", "Permissions Required", "Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-09/", "source": "security@mozilla.org", "tags": ["Vendor Advisory"]}, {"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1798798", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Issue Tracking", "Permissions Required", "Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-09/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}, {"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1798798", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "tags": ["Issue Tracking", "Permissions Required", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-25749.json b/cve/2023/CVE-2023-25749.json index 7cf0372a293..c7b8b4c4a7a 100644 --- a/cve/2023/CVE-2023-25749.json +++ b/cve/2023/CVE-2023-25749.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-25749", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-02T17:15:11.860", "lastModified": "2024-11-21T07:50:04.370", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "Android applications with unpatched vulnerabilities can be launched from a browser using Intents, exposing users to these vulnerabilities. Firefox will now confirm with users that they want to launch an external application before doing so.
*This bug only affects Firefox for Android. Other versions of Firefox are unaffected.*. This vulnerability affects Firefox < 111."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "baseScore": 4.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 1.4}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:android:*:*", "versionEndExcluding": "111.0", "matchCriteriaId": "15D61809-2D26-4664-9034-0504D0183F60"}]}]}], "references": [{"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1810705", "source": "security@mozilla.org", "tags": ["Issue Tracking", "Permissions Required", "Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-09/", "source": "security@mozilla.org", "tags": ["Vendor Advisory"]}, {"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1810705", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Issue Tracking", "Permissions Required", "Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-09/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-25749", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-02T17:15:11.860", "lastModified": "2025-01-09T19:15:15.763", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "Android applications with unpatched vulnerabilities can be launched from a browser using Intents, exposing users to these vulnerabilities. Firefox will now confirm with users that they want to launch an external application before doing so.
*This bug only affects Firefox for Android. Other versions of Firefox are unaffected.*. This vulnerability affects Firefox < 111."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "baseScore": 4.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 1.4}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "baseScore": 4.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 1.4}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-863"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:android:*:*", "versionEndExcluding": "111.0", "matchCriteriaId": "15D61809-2D26-4664-9034-0504D0183F60"}]}]}], "references": [{"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1810705", "source": "security@mozilla.org", "tags": ["Issue Tracking", "Permissions Required", "Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-09/", "source": "security@mozilla.org", "tags": ["Vendor Advisory"]}, {"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1810705", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Issue Tracking", "Permissions Required", "Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-09/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-25750.json b/cve/2023/CVE-2023-25750.json index 7a80aa58d29..9c20f69d7f0 100644 --- a/cve/2023/CVE-2023-25750.json +++ b/cve/2023/CVE-2023-25750.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-25750", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-02T17:15:11.903", "lastModified": "2024-11-21T07:50:04.483", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "Under certain circumstances, a ServiceWorker's offline cache may have leaked to the file system when using private browsing mode. This vulnerability affects Firefox < 111."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "baseScore": 4.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 1.4}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-668"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionEndExcluding": "111.0", "matchCriteriaId": "4C92D5DB-CF3B-4C0C-918A-D2DE67B898F8"}]}]}], "references": [{"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1814733", "source": "security@mozilla.org", "tags": ["Issue Tracking", "Permissions Required", "Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-09/", "source": "security@mozilla.org", "tags": ["Vendor Advisory"]}, {"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1814733", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Issue Tracking", "Permissions Required", "Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-09/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-25750", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-02T17:15:11.903", "lastModified": "2025-01-09T19:15:15.930", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "Under certain circumstances, a ServiceWorker's offline cache may have leaked to the file system when using private browsing mode. This vulnerability affects Firefox < 111."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "baseScore": 4.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 1.4}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "baseScore": 4.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 1.4}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-668"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-22"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionEndExcluding": "111.0", "matchCriteriaId": "4C92D5DB-CF3B-4C0C-918A-D2DE67B898F8"}]}]}], "references": [{"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1814733", "source": "security@mozilla.org", "tags": ["Issue Tracking", "Permissions Required", "Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-09/", "source": "security@mozilla.org", "tags": ["Vendor Advisory"]}, {"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1814733", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Issue Tracking", "Permissions Required", "Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2023-09/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}, {"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1814733", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "tags": ["Issue Tracking", "Permissions Required", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-27744.json b/cve/2023/CVE-2023-27744.json index b71b07b3c85..639683f8616 100644 --- a/cve/2023/CVE-2023-27744.json +++ b/cve/2023/CVE-2023-27744.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-27744", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-02T04:15:49.577", "lastModified": "2024-11-21T07:53:24.807", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "An issue was discovered in South River Technologies TitanFTP NextGen server that allows for a vertical privilege escalation leading to remote code execution."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.8, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:southrivertech:titan_ftp_server_nextgen:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.1.0.2174", "matchCriteriaId": "218B5AAF-40ED-4C52-9C16-E7622E8303AB"}]}]}], "references": [{"url": "https://www.southrivertech.com/software/nextgen/titanftp/en/relnotes.pdf", "source": "cve@mitre.org", "tags": ["Release Notes"]}, {"url": "https://www.whiteoaksecurity.com/blog/titanftp-vulnerability-disclosure/", "source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"]}, {"url": "https://www.southrivertech.com/software/nextgen/titanftp/en/relnotes.pdf", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Release Notes"]}, {"url": "https://www.whiteoaksecurity.com/blog/titanftp-vulnerability-disclosure/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-27744", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-02T04:15:49.577", "lastModified": "2025-01-09T19:15:16.110", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "An issue was discovered in South River Technologies TitanFTP NextGen server that allows for a vertical privilege escalation leading to remote code execution."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.8, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.8, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-94"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:southrivertech:titan_ftp_server_nextgen:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.1.0.2174", "matchCriteriaId": "218B5AAF-40ED-4C52-9C16-E7622E8303AB"}]}]}], "references": [{"url": "https://www.southrivertech.com/software/nextgen/titanftp/en/relnotes.pdf", "source": "cve@mitre.org", "tags": ["Release Notes"]}, {"url": "https://www.whiteoaksecurity.com/blog/titanftp-vulnerability-disclosure/", "source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"]}, {"url": "https://www.southrivertech.com/software/nextgen/titanftp/en/relnotes.pdf", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Release Notes"]}, {"url": "https://www.whiteoaksecurity.com/blog/titanftp-vulnerability-disclosure/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"]}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-27745.json b/cve/2023/CVE-2023-27745.json index 228d7c0f6a2..2d682edd9ec 100644 --- a/cve/2023/CVE-2023-27745.json +++ b/cve/2023/CVE-2023-27745.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-27745", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-02T04:15:49.687", "lastModified": "2024-11-21T07:53:24.970", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "An issue in South River Technologies TitanFTP Before v2.0.1.2102 allows attackers with low-level privileges to perform Administrative actions by sending requests to the user server."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 8.8, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:southrivertech:titan_ftp_server_nextgen:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.0.1.2102", "matchCriteriaId": "B3F30ACD-E0B6-4C4D-B090-B75B73E65A84"}]}]}], "references": [{"url": "https://www.southrivertech.com/software/nextgen/titanftp/en/relnotes.pdf", "source": "cve@mitre.org", "tags": ["Release Notes"]}, {"url": "https://www.whiteoaksecurity.com/blog/titanftp-vulnerability-disclosure/", "source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"]}, {"url": "https://www.southrivertech.com/software/nextgen/titanftp/en/relnotes.pdf", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Release Notes"]}, {"url": "https://www.whiteoaksecurity.com/blog/titanftp-vulnerability-disclosure/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-27745", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-02T04:15:49.687", "lastModified": "2025-01-09T19:15:16.340", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "An issue in South River Technologies TitanFTP Before v2.0.1.2102 allows attackers with low-level privileges to perform Administrative actions by sending requests to the user server."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 8.8, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 5.9}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 8.8, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-346"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:southrivertech:titan_ftp_server_nextgen:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.0.1.2102", "matchCriteriaId": "B3F30ACD-E0B6-4C4D-B090-B75B73E65A84"}]}]}], "references": [{"url": "https://www.southrivertech.com/software/nextgen/titanftp/en/relnotes.pdf", "source": "cve@mitre.org", "tags": ["Release Notes"]}, {"url": "https://www.whiteoaksecurity.com/blog/titanftp-vulnerability-disclosure/", "source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"]}, {"url": "https://www.southrivertech.com/software/nextgen/titanftp/en/relnotes.pdf", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Release Notes"]}, {"url": "https://www.whiteoaksecurity.com/blog/titanftp-vulnerability-disclosure/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"]}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-29722.json b/cve/2023/CVE-2023-29722.json index 2ae7adfe7bd..db4a457b57c 100644 --- a/cve/2023/CVE-2023-29722.json +++ b/cve/2023/CVE-2023-29722.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-29722", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-01T21:15:09.360", "lastModified": "2024-11-21T07:57:25.073", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "The Glitter Unicorn Wallpaper app for Android 7.0 thru 8.0 allows unauthorized apps to actively request permission to modify data in the database that records information about a user's personal preferences and will be loaded into memory to be read and used when the app is opened. An attacker could tamper with this data to cause an escalation of privilege attack."}, {"lang": "es", "value": "La aplicaci\u00f3n Glitter Unicorn Wallpaper para Android 7.0 a 8.0 permite a aplicaciones no autorizadas solicitar activamente permiso para modificar datos en la base de datos que registra informaci\u00f3n sobre las preferencias personales de un usuario y que se cargar\u00e1 en la memoria para ser le\u00edda y utilizada cuando se abra la aplicaci\u00f3n. Un atacante podr\u00eda manipular estos datos para provocar un ataque de escalada de privilegios. "}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "baseScore": 9.1, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "NONE"}, "exploitabilityScore": 3.9, "impactScore": 5.2}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:glitter_unicorn_wallpaper_project:glitter_unicorn_wallpaper:*:*:*:*:*:android:*:*", "versionStartIncluding": "7.0", "versionEndIncluding": "8.0", "matchCriteriaId": "FC799109-5C8E-47F4-94E4-F2F26DC99AD7"}]}]}], "references": [{"url": "https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29722/CVE%20detail.md", "source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"]}, {"url": "https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29722/CVE%20detail.md", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-29722", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-01T21:15:09.360", "lastModified": "2025-01-09T18:15:25.153", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "The Glitter Unicorn Wallpaper app for Android 7.0 thru 8.0 allows unauthorized apps to actively request permission to modify data in the database that records information about a user's personal preferences and will be loaded into memory to be read and used when the app is opened. An attacker could tamper with this data to cause an escalation of privilege attack."}, {"lang": "es", "value": "La aplicaci\u00f3n Glitter Unicorn Wallpaper para Android 7.0 a 8.0 permite a aplicaciones no autorizadas solicitar activamente permiso para modificar datos en la base de datos que registra informaci\u00f3n sobre las preferencias personales de un usuario y que se cargar\u00e1 en la memoria para ser le\u00edda y utilizada cuando se abra la aplicaci\u00f3n. Un atacante podr\u00eda manipular estos datos para provocar un ataque de escalada de privilegios. "}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "baseScore": 9.1, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "NONE"}, "exploitabilityScore": 3.9, "impactScore": 5.2}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "baseScore": 9.1, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "NONE"}, "exploitabilityScore": 3.9, "impactScore": 5.2}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:glitter_unicorn_wallpaper_project:glitter_unicorn_wallpaper:*:*:*:*:*:android:*:*", "versionStartIncluding": "7.0", "versionEndIncluding": "8.0", "matchCriteriaId": "FC799109-5C8E-47F4-94E4-F2F26DC99AD7"}]}]}], "references": [{"url": "https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29722/CVE%20detail.md", "source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"]}, {"url": "https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29722/CVE%20detail.md", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"]}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-29723.json b/cve/2023/CVE-2023-29723.json index 5e653363f08..9c2d891f186 100644 --- a/cve/2023/CVE-2023-29723.json +++ b/cve/2023/CVE-2023-29723.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-29723", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-01T21:15:09.407", "lastModified": "2024-11-21T07:57:25.203", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "The Glitter Unicorn Wallpaper app for Android 7.0 thru 8.0 allows unauthorized applications to actively request permission to insert data into the database that records information about a user's personal preferences and will be loaded into memory to be read and used when the application is opened. By injecting data, the attacker can force the application to load malicious image URLs and display them in the UI. As the amount of data increases, it will eventually cause the application to trigger an OOM error and crash, resulting in a persistent denial of service attack."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:glitter_unicorn_wallpaper_project:glitter_unicorn_wallpaper:*:*:*:*:*:android:*:*", "versionStartIncluding": "7.0", "versionEndIncluding": "8.0", "matchCriteriaId": "FC799109-5C8E-47F4-94E4-F2F26DC99AD7"}]}]}], "references": [{"url": "https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29723/CVE%20detail.md", "source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"]}, {"url": "https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29723/CVE%20detail.md", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-29723", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-01T21:15:09.407", "lastModified": "2025-01-09T18:15:25.333", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "The Glitter Unicorn Wallpaper app for Android 7.0 thru 8.0 allows unauthorized applications to actively request permission to insert data into the database that records information about a user's personal preferences and will be loaded into memory to be read and used when the application is opened. By injecting data, the attacker can force the application to load malicious image URLs and display them in the UI. As the amount of data increases, it will eventually cause the application to trigger an OOM error and crash, resulting in a persistent denial of service attack."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.6}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:glitter_unicorn_wallpaper_project:glitter_unicorn_wallpaper:*:*:*:*:*:android:*:*", "versionStartIncluding": "7.0", "versionEndIncluding": "8.0", "matchCriteriaId": "FC799109-5C8E-47F4-94E4-F2F26DC99AD7"}]}]}], "references": [{"url": "https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29723/CVE%20detail.md", "source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"]}, {"url": "https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29723/CVE%20detail.md", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"]}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-29736.json b/cve/2023/CVE-2023-29736.json index f5d72cc419d..1cd5f417959 100644 --- a/cve/2023/CVE-2023-29736.json +++ b/cve/2023/CVE-2023-29736.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-29736", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-01T21:15:09.450", "lastModified": "2024-11-21T07:57:26.743", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "Keyboard Themes 1.275.1.164 for Android contains a dictionary traversal vulnerability that allows unauthorized apps to overwrite arbitrary files in its internal storage and achieve arbitrary code execution."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-22"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:timmystudios:keyboard_themes:1.275.1.164:*:*:*:*:android:*:*", "matchCriteriaId": "CE446ED1-FF28-4071-8C60-70FF461A789A"}]}]}], "references": [{"url": "https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29736/CVE%20detail.md", "source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"]}, {"url": "https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29736/CVE%20detail.md", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-29736", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-01T21:15:09.450", "lastModified": "2025-01-09T18:15:25.493", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "Keyboard Themes 1.275.1.164 for Android contains a dictionary traversal vulnerability that allows unauthorized apps to overwrite arbitrary files in its internal storage and achieve arbitrary code execution."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 5.9}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-22"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-22"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:timmystudios:keyboard_themes:1.275.1.164:*:*:*:*:android:*:*", "matchCriteriaId": "CE446ED1-FF28-4071-8C60-70FF461A789A"}]}]}], "references": [{"url": "https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29736/CVE%20detail.md", "source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"]}, {"url": "https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29736/CVE%20detail.md", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"]}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-29748.json b/cve/2023/CVE-2023-29748.json index c792b0d556d..f6145d1bdab 100644 --- a/cve/2023/CVE-2023-29748.json +++ b/cve/2023/CVE-2023-29748.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-29748", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-01T03:15:20.500", "lastModified": "2024-11-21T07:57:28.317", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "Story Saver for Instragram - Video Downloader 1.0.6 for Android has an exposed component that provides a method to modify the SharedPreference file. An attacker can leverage this method to inject a large amount of data into any SharedPreference file, which will be loaded into memory when the application is opened. When an attacker injects too much data, the application will trigger an OOM error and crash at startup, resulting in a persistent denial of service."}, {"lang": "es", "value": "Story Saver para Instagram - V\u00eddeo Downloader v1.0.6 para Android tiene un componente expuesto que proporciona un m\u00e9todo para modificar el archivo \"SharedPreference\". Un atacante puede aprovechar este m\u00e9todo para inyectar una gran cantidad de datos en cualquier archivo \"SharedPreference\", que se cargar\u00e1 en la memoria cuando se abra la aplicaci\u00f3n. Cuando un atacante inyecta demasiados datos, la aplicaci\u00f3n desencadenar\u00e1 un error \"OOM\" y se bloquear\u00e1 al iniciarse, lo que provocar\u00e1 una denegaci\u00f3n de servicio persistente."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:story_saver_for_instagram_-_video_downloader_project:story_saver_for_instagram_-_video_downloader:1.0.6:*:*:*:*:android:*:*", "matchCriteriaId": "348BBEC0-3036-4545-8724-CB46795AD49D"}]}]}], "references": [{"url": "https://apksos.com/app/story.saver.downloader.photo.video.repost.byrk", "source": "cve@mitre.org", "tags": ["Product"]}, {"url": "https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29748/CVE%20detail.md", "source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"]}, {"url": "https://play.google.com/store/apps/details?id=ru.yandex.yandexnavi", "source": "cve@mitre.org", "tags": ["Not Applicable"]}, {"url": "https://www.instagram.com/nihans_macrame/", "source": "cve@mitre.org", "tags": ["Not Applicable"]}, {"url": "https://apksos.com/app/story.saver.downloader.photo.video.repost.byrk", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Product"]}, {"url": "https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29748/CVE%20detail.md", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"]}, {"url": "https://play.google.com/store/apps/details?id=ru.yandex.yandexnavi", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Not Applicable"]}, {"url": "https://www.instagram.com/nihans_macrame/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Not Applicable"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-29748", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-01T03:15:20.500", "lastModified": "2025-01-09T18:15:25.667", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "Story Saver for Instragram - Video Downloader 1.0.6 for Android has an exposed component that provides a method to modify the SharedPreference file. An attacker can leverage this method to inject a large amount of data into any SharedPreference file, which will be loaded into memory when the application is opened. When an attacker injects too much data, the application will trigger an OOM error and crash at startup, resulting in a persistent denial of service."}, {"lang": "es", "value": "Story Saver para Instagram - V\u00eddeo Downloader v1.0.6 para Android tiene un componente expuesto que proporciona un m\u00e9todo para modificar el archivo \"SharedPreference\". Un atacante puede aprovechar este m\u00e9todo para inyectar una gran cantidad de datos en cualquier archivo \"SharedPreference\", que se cargar\u00e1 en la memoria cuando se abra la aplicaci\u00f3n. Cuando un atacante inyecta demasiados datos, la aplicaci\u00f3n desencadenar\u00e1 un error \"OOM\" y se bloquear\u00e1 al iniciarse, lo que provocar\u00e1 una denegaci\u00f3n de servicio persistente."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.6}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:story_saver_for_instagram_-_video_downloader_project:story_saver_for_instagram_-_video_downloader:1.0.6:*:*:*:*:android:*:*", "matchCriteriaId": "348BBEC0-3036-4545-8724-CB46795AD49D"}]}]}], "references": [{"url": "https://apksos.com/app/story.saver.downloader.photo.video.repost.byrk", "source": "cve@mitre.org", "tags": ["Product"]}, {"url": "https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29748/CVE%20detail.md", "source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"]}, {"url": "https://play.google.com/store/apps/details?id=ru.yandex.yandexnavi", "source": "cve@mitre.org", "tags": ["Not Applicable"]}, {"url": "https://www.instagram.com/nihans_macrame/", "source": "cve@mitre.org", "tags": ["Not Applicable"]}, {"url": "https://apksos.com/app/story.saver.downloader.photo.video.repost.byrk", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Product"]}, {"url": "https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29748/CVE%20detail.md", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"]}, {"url": "https://play.google.com/store/apps/details?id=ru.yandex.yandexnavi", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Not Applicable"]}, {"url": "https://www.instagram.com/nihans_macrame/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Not Applicable"]}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-2977.json b/cve/2023/CVE-2023-2977.json index db30b46fcfe..d27359e5000 100644 --- a/cve/2023/CVE-2023-2977.json +++ b/cve/2023/CVE-2023-2977.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-2977", "sourceIdentifier": "secalert@redhat.com", "published": "2023-06-01T01:15:17.917", "lastModified": "2024-11-21T07:59:40.960", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "A vulnerbility was found in OpenSC. This security flaw cause a buffer overrun vulnerability in pkcs15 cardos_have_verifyrc_package. The attacker can supply a smart card package with malformed ASN1 context. The cardos_have_verifyrc_package function scans the ASN1 buffer for 2 tags, where remaining length is wrongly caculated due to moved starting pointer. This leads to possible heap-based buffer oob read. In cases where ASAN is enabled while compiling this causes a crash. Further info leak or more damage is possible."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "baseScore": 7.1, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.2}]}, "weaknesses": [{"source": "secalert@redhat.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-119"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-125"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:opensc_project:opensc:0.23.0:-:*:*:*:*:*:*", "matchCriteriaId": "5359CB94-DE52-425E-AA8D-2792F953364F"}]}]}, {"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943"}, {"vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D"}]}]}], "references": [{"url": "https://access.redhat.com/security/cve/CVE-2023-2977", "source": "secalert@redhat.com", "tags": ["Third Party Advisory"]}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2211088", "source": "secalert@redhat.com", "tags": ["Issue Tracking", "Third Party Advisory"]}, {"url": "https://github.com/OpenSC/OpenSC/issues/2785", "source": "secalert@redhat.com", "tags": ["Issue Tracking", "Patch"]}, {"url": "https://github.com/OpenSC/OpenSC/pull/2787", "source": "secalert@redhat.com", "tags": ["Patch"]}, {"url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00025.html", "source": "secalert@redhat.com"}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FJD4Q4AJSGE5UIJI7OUYZY4HGGCVYQNI/", "source": "secalert@redhat.com"}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LAR54OV6EHA56B4XJF6RNPQ4HJ2ITU66/", "source": "secalert@redhat.com"}, {"url": "https://access.redhat.com/security/cve/CVE-2023-2977", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"]}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2211088", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Issue Tracking", "Third Party Advisory"]}, {"url": "https://github.com/OpenSC/OpenSC/issues/2785", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Issue Tracking", "Patch"]}, {"url": "https://github.com/OpenSC/OpenSC/pull/2787", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00025.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FJD4Q4AJSGE5UIJI7OUYZY4HGGCVYQNI/", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LAR54OV6EHA56B4XJF6RNPQ4HJ2ITU66/", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-2977", "sourceIdentifier": "secalert@redhat.com", "published": "2023-06-01T01:15:17.917", "lastModified": "2025-01-09T18:15:25.850", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "A vulnerbility was found in OpenSC. This security flaw cause a buffer overrun vulnerability in pkcs15 cardos_have_verifyrc_package. The attacker can supply a smart card package with malformed ASN1 context. The cardos_have_verifyrc_package function scans the ASN1 buffer for 2 tags, where remaining length is wrongly caculated due to moved starting pointer. This leads to possible heap-based buffer oob read. In cases where ASAN is enabled while compiling this causes a crash. Further info leak or more damage is possible."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "baseScore": 7.1, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.2}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "baseScore": 7.1, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.2}]}, "weaknesses": [{"source": "secalert@redhat.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-119"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-125"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:opensc_project:opensc:0.23.0:-:*:*:*:*:*:*", "matchCriteriaId": "5359CB94-DE52-425E-AA8D-2792F953364F"}]}]}, {"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943"}, {"vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D"}]}]}], "references": [{"url": "https://access.redhat.com/security/cve/CVE-2023-2977", "source": "secalert@redhat.com", "tags": ["Third Party Advisory"]}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2211088", "source": "secalert@redhat.com", "tags": ["Issue Tracking", "Third Party Advisory"]}, {"url": "https://github.com/OpenSC/OpenSC/issues/2785", "source": "secalert@redhat.com", "tags": ["Issue Tracking", "Patch"]}, {"url": "https://github.com/OpenSC/OpenSC/pull/2787", "source": "secalert@redhat.com", "tags": ["Patch"]}, {"url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00025.html", "source": "secalert@redhat.com"}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FJD4Q4AJSGE5UIJI7OUYZY4HGGCVYQNI/", "source": "secalert@redhat.com"}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LAR54OV6EHA56B4XJF6RNPQ4HJ2ITU66/", "source": "secalert@redhat.com"}, {"url": "https://access.redhat.com/security/cve/CVE-2023-2977", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"]}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2211088", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Issue Tracking", "Third Party Advisory"]}, {"url": "https://github.com/OpenSC/OpenSC/issues/2785", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Issue Tracking", "Patch"]}, {"url": "https://github.com/OpenSC/OpenSC/pull/2787", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00025.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FJD4Q4AJSGE5UIJI7OUYZY4HGGCVYQNI/", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LAR54OV6EHA56B4XJF6RNPQ4HJ2ITU66/", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-30758.json b/cve/2023/CVE-2023-30758.json index bc8e8e16570..f30b370f7e1 100644 --- a/cve/2023/CVE-2023-30758.json +++ b/cve/2023/CVE-2023-30758.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-30758", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-06-01T02:15:09.847", "lastModified": "2024-11-21T08:00:50.750", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "Cross-site scripting vulnerability in Pleasanter 1.3.38.1 and earlier allows a remote authenticated attacker to inject an arbitrary script."}, {"lang": "es", "value": "Se ha descubierto una vulnerabilidad de Cross-Site Scripting (XSS) en Pleasanter v1.3.38.1 y anteriores que permite a un atacante remoto autenticado inyectar un script arbitrario. "}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "baseScore": 5.4, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.3, "impactScore": 2.7}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:pleasanter:pleasanter:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.3.38.1", "matchCriteriaId": "97B48747-5C48-4C0E-9584-3584E801DCB4"}]}]}], "references": [{"url": "https://github.com/Implem/Implem.Pleasanter/issues/474", "source": "vultures@jpcert.or.jp", "tags": ["Exploit", "Issue Tracking", "Patch", "Third Party Advisory"]}, {"url": "https://jvn.jp/en/jp/JVN62111727/", "source": "vultures@jpcert.or.jp", "tags": ["Third Party Advisory"]}, {"url": "https://pleasanter.org/archives/vulnerability-update-202305", "source": "vultures@jpcert.or.jp", "tags": ["Patch", "Vendor Advisory"]}, {"url": "https://github.com/Implem/Implem.Pleasanter/issues/474", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Issue Tracking", "Patch", "Third Party Advisory"]}, {"url": "https://jvn.jp/en/jp/JVN62111727/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"]}, {"url": "https://pleasanter.org/archives/vulnerability-update-202305", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-30758", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-06-01T02:15:09.847", "lastModified": "2025-01-09T18:15:26.083", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "Cross-site scripting vulnerability in Pleasanter 1.3.38.1 and earlier allows a remote authenticated attacker to inject an arbitrary script."}, {"lang": "es", "value": "Se ha descubierto una vulnerabilidad de Cross-Site Scripting (XSS) en Pleasanter v1.3.38.1 y anteriores que permite a un atacante remoto autenticado inyectar un script arbitrario. "}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "baseScore": 5.4, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.3, "impactScore": 2.7}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "baseScore": 5.4, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.3, "impactScore": 2.7}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-79"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:pleasanter:pleasanter:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.3.38.1", "matchCriteriaId": "97B48747-5C48-4C0E-9584-3584E801DCB4"}]}]}], "references": [{"url": "https://github.com/Implem/Implem.Pleasanter/issues/474", "source": "vultures@jpcert.or.jp", "tags": ["Exploit", "Issue Tracking", "Patch", "Third Party Advisory"]}, {"url": "https://jvn.jp/en/jp/JVN62111727/", "source": "vultures@jpcert.or.jp", "tags": ["Third Party Advisory"]}, {"url": "https://pleasanter.org/archives/vulnerability-update-202305", "source": "vultures@jpcert.or.jp", "tags": ["Patch", "Vendor Advisory"]}, {"url": "https://github.com/Implem/Implem.Pleasanter/issues/474", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Issue Tracking", "Patch", "Third Party Advisory"]}, {"url": "https://jvn.jp/en/jp/JVN62111727/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"]}, {"url": "https://pleasanter.org/archives/vulnerability-update-202305", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-33486.json b/cve/2023/CVE-2023-33486.json index ea782aa3973..7a5acae318d 100644 --- a/cve/2023/CVE-2023-33486.json +++ b/cve/2023/CVE-2023-33486.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-33486", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-31T13:15:09.697", "lastModified": "2024-11-21T08:05:38.160", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "TOTOLINK X5000R V9.1.0u.6118_B20201102 and V9.1.0u.6369_B20230113 contain a command insertion vulnerability in setOpModeCfg. This vulnerability allows an attacker to execute arbitrary commands through the \"hostName\" parameter."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-77"}]}], "configurations": [{"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:totolink:x5000r_firmware:9.1.0u.6118_b20201102:*:*:*:*:*:*:*", "matchCriteriaId": "AFCC3B52-0985-4F61-BBCC-16A271E15CD4"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:totolink:x5000r:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC45BFB0-0CF0-4F9E-B19D-D274B17F1591"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:totolink:x5000r_firmware:9.1.0u.6369_b20230113:*:*:*:*:*:*:*", "matchCriteriaId": "FAA27C60-0FFD-45E3-91B1-0C2F8EBF2442"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:totolink:x5000r:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC45BFB0-0CF0-4F9E-B19D-D274B17F1591"}]}]}], "references": [{"url": "https://github.com/Kazamayc/vuln/tree/main/TOTOLINK/X5000R/3", "source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"]}, {"url": "https://github.com/Kazamayc/vuln/tree/main/TOTOLINK/X5000R/3", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-33486", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-31T13:15:09.697", "lastModified": "2025-01-09T19:15:16.783", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "TOTOLINK X5000R V9.1.0u.6118_B20201102 and V9.1.0u.6369_B20230113 contain a command insertion vulnerability in setOpModeCfg. This vulnerability allows an attacker to execute arbitrary commands through the \"hostName\" parameter."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 5.9}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-77"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-77"}]}], "configurations": [{"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:totolink:x5000r_firmware:9.1.0u.6118_b20201102:*:*:*:*:*:*:*", "matchCriteriaId": "AFCC3B52-0985-4F61-BBCC-16A271E15CD4"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:totolink:x5000r:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC45BFB0-0CF0-4F9E-B19D-D274B17F1591"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:totolink:x5000r_firmware:9.1.0u.6369_b20230113:*:*:*:*:*:*:*", "matchCriteriaId": "FAA27C60-0FFD-45E3-91B1-0C2F8EBF2442"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:totolink:x5000r:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC45BFB0-0CF0-4F9E-B19D-D274B17F1591"}]}]}], "references": [{"url": "https://github.com/Kazamayc/vuln/tree/main/TOTOLINK/X5000R/3", "source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"]}, {"url": "https://github.com/Kazamayc/vuln/tree/main/TOTOLINK/X5000R/3", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"]}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-33551.json b/cve/2023/CVE-2023-33551.json index 988d705d043..ce1168a04b4 100644 --- a/cve/2023/CVE-2023-33551.json +++ b/cve/2023/CVE-2023-33551.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-33551", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-01T15:15:09.050", "lastModified": "2024-11-21T08:05:42.157", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "Heap Buffer Overflow in the erofsfsck_dirent_iter function in fsck/main.c in erofs-utils v1.6 allows remote attackers to execute arbitrary code via a crafted erofs filesystem image."}, {"lang": "es", "value": "Desbordamiento de B\u00fafer en la funci\u00f3n erofsfsck_dirent_iter en fsck/main.c en erofs-utils v1.6 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de una imagen del sistema de archivos erofs manipulada."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "baseScore": 7.8, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-787"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:erofs-utils_project:erofs-utils:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "C8CA601C-DA3C-45D8-AD44-6927478FC63D"}]}]}], "references": [{"url": "https://github.com/lometsj/blog_repo/issues/2", "source": "cve@mitre.org", "tags": ["Exploit", "Patch", "Third Party Advisory"]}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHOIRL6XH5NYR3LYI3KP5DE4SDSQWR7W/", "source": "cve@mitre.org"}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGGIYW7PHYQM2NPYCJPSPSLULLD2P2PE/", "source": "cve@mitre.org"}, {"url": "https://github.com/lometsj/blog_repo/issues/2", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Patch", "Third Party Advisory"]}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHOIRL6XH5NYR3LYI3KP5DE4SDSQWR7W/", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGGIYW7PHYQM2NPYCJPSPSLULLD2P2PE/", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-33551", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-01T15:15:09.050", "lastModified": "2025-01-09T19:15:16.993", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "Heap Buffer Overflow in the erofsfsck_dirent_iter function in fsck/main.c in erofs-utils v1.6 allows remote attackers to execute arbitrary code via a crafted erofs filesystem image."}, {"lang": "es", "value": "Desbordamiento de B\u00fafer en la funci\u00f3n erofsfsck_dirent_iter en fsck/main.c en erofs-utils v1.6 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de una imagen del sistema de archivos erofs manipulada."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "baseScore": 7.8, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "baseScore": 7.8, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-787"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-787"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:erofs-utils_project:erofs-utils:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "C8CA601C-DA3C-45D8-AD44-6927478FC63D"}]}]}], "references": [{"url": "https://github.com/lometsj/blog_repo/issues/2", "source": "cve@mitre.org", "tags": ["Exploit", "Patch", "Third Party Advisory"]}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHOIRL6XH5NYR3LYI3KP5DE4SDSQWR7W/", "source": "cve@mitre.org"}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGGIYW7PHYQM2NPYCJPSPSLULLD2P2PE/", "source": "cve@mitre.org"}, {"url": "https://github.com/lometsj/blog_repo/issues/2", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Patch", "Third Party Advisory"]}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHOIRL6XH5NYR3LYI3KP5DE4SDSQWR7W/", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGGIYW7PHYQM2NPYCJPSPSLULLD2P2PE/", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-33716.json b/cve/2023/CVE-2023-33716.json index 82ca10d3fbe..0791d19b272 100644 --- a/cve/2023/CVE-2023-33716.json +++ b/cve/2023/CVE-2023-33716.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-33716", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-01T03:15:20.590", "lastModified": "2024-11-21T08:05:53.460", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "mp4v2 v2.1.3 was discovered to contain a memory leak via the class MP4StringProperty at mp4property.cpp."}, {"lang": "es", "value": "Se ha descubierto que MP4v2 v2.1.3 contiene una fuga de memoria a trav\u00e9s de la clase \"MP4StringProperty\" en \"mp4property.cpp\"."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "baseScore": 5.5, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-401"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:mp4v2:mp4v2:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "F5EA933F-A645-4970-9C1F-AE890537E1C5"}]}]}], "references": [{"url": "https://github.com/enzo1982/mp4v2/issues/36", "source": "cve@mitre.org", "tags": ["Vendor Advisory"]}, {"url": "https://github.com/enzo1982/mp4v2/issues/36", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-33716", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-01T03:15:20.590", "lastModified": "2025-01-09T18:15:26.273", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "mp4v2 v2.1.3 was discovered to contain a memory leak via the class MP4StringProperty at mp4property.cpp."}, {"lang": "es", "value": "Se ha descubierto que MP4v2 v2.1.3 contiene una fuga de memoria a trav\u00e9s de la clase \"MP4StringProperty\" en \"mp4property.cpp\"."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "baseScore": 5.5, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 3.6}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "baseScore": 5.5, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-401"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-401"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:mp4v2:mp4v2:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "F5EA933F-A645-4970-9C1F-AE890537E1C5"}]}]}], "references": [{"url": "https://github.com/enzo1982/mp4v2/issues/36", "source": "cve@mitre.org", "tags": ["Vendor Advisory"]}, {"url": "https://github.com/enzo1982/mp4v2/issues/36", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-33719.json b/cve/2023/CVE-2023-33719.json index 5905bb72fdc..58354c9c261 100644 --- a/cve/2023/CVE-2023-33719.json +++ b/cve/2023/CVE-2023-33719.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-33719", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-01T03:15:20.630", "lastModified": "2024-11-21T08:05:53.927", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "mp4v2 v2.1.3 was discovered to contain a memory leak via MP4SdpAtom::Read() at atom_sdp.cpp"}, {"lang": "es", "value": "Se ha descubierto que MP4v2 v2.1.3 contiene una fuga de memoria a trav\u00e9s de \"MP4SdpAtom::Read()\" en \"atom_sdp.cpp\"."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "baseScore": 5.5, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-401"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:mp4v2:mp4v2:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "F5EA933F-A645-4970-9C1F-AE890537E1C5"}]}]}], "references": [{"url": "https://github.com/enzo1982/mp4v2/", "source": "cve@mitre.org", "tags": ["Product"]}, {"url": "https://github.com/enzo1982/mp4v2/issues/37", "source": "cve@mitre.org", "tags": ["Exploit", "Vendor Advisory"]}, {"url": "https://github.com/enzo1982/mp4v2/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Product"]}, {"url": "https://github.com/enzo1982/mp4v2/issues/37", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Vendor Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-33719", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-01T03:15:20.630", "lastModified": "2025-01-09T18:15:26.460", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "mp4v2 v2.1.3 was discovered to contain a memory leak via MP4SdpAtom::Read() at atom_sdp.cpp"}, {"lang": "es", "value": "Se ha descubierto que MP4v2 v2.1.3 contiene una fuga de memoria a trav\u00e9s de \"MP4SdpAtom::Read()\" en \"atom_sdp.cpp\"."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "baseScore": 5.5, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 3.6}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "baseScore": 5.5, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-401"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-401"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:mp4v2:mp4v2:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "F5EA933F-A645-4970-9C1F-AE890537E1C5"}]}]}], "references": [{"url": "https://github.com/enzo1982/mp4v2/", "source": "cve@mitre.org", "tags": ["Product"]}, {"url": "https://github.com/enzo1982/mp4v2/issues/37", "source": "cve@mitre.org", "tags": ["Exploit", "Vendor Advisory"]}, {"url": "https://github.com/enzo1982/mp4v2/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Product"]}, {"url": "https://github.com/enzo1982/mp4v2/issues/37", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-33764.json b/cve/2023/CVE-2023-33764.json index 7d641f0dfb1..8ac4d2fa03f 100644 --- a/cve/2023/CVE-2023-33764.json +++ b/cve/2023/CVE-2023-33764.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-33764", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-01T20:15:09.523", "lastModified": "2024-11-21T08:05:58.363", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "eMedia Consulting simpleRedak up to v2.47.23.05 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the component #/de/casting/show/detail/."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "baseScore": 5.4, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.3, "impactScore": 2.7}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:simpleredak:simpleredak:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.47.23.06", "matchCriteriaId": "64661A8F-7CEC-40B5-81D8-2E29A2C96810"}]}]}], "references": [{"url": "https://github.com/rauschecker/CVEs/tree/main/CVE-2023-33764", "source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"]}, {"url": "https://github.com/rauschecker/CVEs/tree/main/CVE-2023-33764", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-33764", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-01T20:15:09.523", "lastModified": "2025-01-09T18:15:26.620", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "eMedia Consulting simpleRedak up to v2.47.23.05 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the component #/de/casting/show/detail/."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "baseScore": 5.4, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.3, "impactScore": 2.7}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "baseScore": 5.4, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.3, "impactScore": 2.7}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-79"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:simpleredak:simpleredak:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.47.23.06", "matchCriteriaId": "64661A8F-7CEC-40B5-81D8-2E29A2C96810"}]}]}], "references": [{"url": "https://github.com/rauschecker/CVEs/tree/main/CVE-2023-33764", "source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"]}, {"url": "https://github.com/rauschecker/CVEs/tree/main/CVE-2023-33764", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"]}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-33778.json b/cve/2023/CVE-2023-33778.json index 2de41c068d7..649f1b86950 100644 --- a/cve/2023/CVE-2023-33778.json +++ b/cve/2023/CVE-2023-33778.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-33778", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-01T04:15:10.313", "lastModified": "2024-11-21T08:05:58.853", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "Draytek Vigor Routers firmware versions below 3.9.6/4.2.4, Access Points firmware versions below v1.4.0, Switches firmware versions below 2.6.7, and Myvigor firmware versions below 2.3.2 were discovered to use hardcoded encryption keys which allows attackers to bind any affected device to their own account. Attackers are then able to create WCF and DrayDDNS licenses and synchronize them from the website."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-798"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:draytek:myvigor:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.3.2", "matchCriteriaId": "FB9A5891-1058-42FE-8D36-987E967D5481"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigorswitch_pq2200xb_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.6.7", "matchCriteriaId": "BCB0DEE3-60C3-49F8-9A6C-47826AFF388D"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigorswitch_pq2200xb:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A822A86-C784-4AED-B367-4D39609D93E7"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigorswitch_pq2121x_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.6.7", "matchCriteriaId": "35B88F62-BC7C-47AA-80F3-3BEDB0D5E5EA"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigorswitch_pq2121x:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB7AFBE0-9E98-4B46-9517-B73509F5944D"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigorswitch_p2540xs_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.6.7", "matchCriteriaId": "0FA6D7E6-EAD4-45E6-A1CB-4E5CF2543564"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigorswitch_p2540xs:-:*:*:*:*:*:*:*", "matchCriteriaId": "77DCACA0-BA44-4691-BAAD-828C54898FBB"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigorswitch_p2280x_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.6.7", "matchCriteriaId": "6D6F173D-4339-4842-AC62-5E4C488D6067"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigorswitch_p2280x:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE6602CA-744E-4543-9818-75FC57E83280"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigorswitch_p2100_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.6.7", "matchCriteriaId": "DAB8B117-8605-4C4E-990E-7DE09DF79738"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigorswitch_p2100:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DE4BB0C-0419-4A24-9C79-4642DBF22A9F"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigorswitch_q2200x_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.6.7", "matchCriteriaId": "F0604938-0253-466F-914D-300590C82AB1"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigorswitch_q2200x:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC2E8256-45B6-4CDC-A2A8-60303773F149"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigorswitch_q2121x_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.6.7", "matchCriteriaId": "1BABC689-A27B-43C3-B402-2CFF1AFF0012"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigorswitch_q2121x:-:*:*:*:*:*:*:*", "matchCriteriaId": "19676250-FC97-4476-9A26-304DC8E4B872"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigorswitch_g2540xs_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.6.7", "matchCriteriaId": "0FF46332-4269-48FE-8D27-F0642FD08A75"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigorswitch_g2540xs:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBFCBF8D-3FCA-4B17-9337-4BD621372F23"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigorswitch_g2280x_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.6.7", "matchCriteriaId": "A90A385E-F817-42D4-BB1B-AF37DE3C9491"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigorswitch_g2280x:-:*:*:*:*:*:*:*", "matchCriteriaId": "3586D962-114E-4CD4-B6D2-8B031BBB01B1"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigorswitch_g2121_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.6.7", "matchCriteriaId": "1C04F98D-5668-4398-8D8B-4CE9340F20A1"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigorswitch_g2121:-:*:*:*:*:*:*:*", "matchCriteriaId": "25451714-5AE6-43C7-B1CC-A2ED2486E402"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigorswitch_g2100_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.6.7", "matchCriteriaId": "F86A2C16-44BF-4C7F-A8C5-B03CEBC88CE8"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigorswitch_g2100:-:*:*:*:*:*:*:*", "matchCriteriaId": "8724DACC-85AC-4047-8960-27FCF58C5BF9"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigorswitch_fx2120_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.6.7", "matchCriteriaId": "D70A4480-2C9E-4662-8612-23F66A649BA7"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigorswitch_fx2120:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F9B1A57-A45D-4EA3-B76B-C0F6FEB92316"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigorswitch_p1282_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.6.7", "matchCriteriaId": "0983154F-C4BC-413F-B020-085E83D5BB44"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigorswitch_p1282:-:*:*:*:*:*:*:*", "matchCriteriaId": "65373D8B-0DA8-4539-9E63-DBBDF493508E"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigorswitch_g1282_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.6.7", "matchCriteriaId": "632A1555-3550-456B-8ED8-49E5929CE38E"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigorswitch_g1282:-:*:*:*:*:*:*:*", "matchCriteriaId": "8110E6A8-E30A-4D4B-9210-0FE5F9C0F27C"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigorswitch_g1085_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.6.7", "matchCriteriaId": "D3F580E9-2A0E-47E9-9C4B-2B971376C7EC"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigorswitch_g1085:-:*:*:*:*:*:*:*", "matchCriteriaId": "B61C56D2-6A25-4AF5-95E3-2AFE3E4A33F0"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigorswitch_g1080_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.6.7", "matchCriteriaId": "0B400A32-0E46-4AAC-930F-D73A639C85DA"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigorswitch_g1080:-:*:*:*:*:*:*:*", "matchCriteriaId": "2498876A-CDF4-423A-93C1-7337231D25E2"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigorap_903_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.4.0", "matchCriteriaId": "0C9BD0C4-5E5F-4E86-89F8-15821EC9618F"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigorap_903:-:*:*:*:*:*:*:*", "matchCriteriaId": "D793F78F-1A6C-47AC-9F17-877DA0C6DD7D"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigorap_912c_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.4.0", "matchCriteriaId": "13FEC077-B0A0-4F87-A113-D0131946C358"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigorap_912c:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2052075-C2C4-4462-96B7-E3C448B81AD7"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigorap_918r_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.4.0", "matchCriteriaId": "05A02352-B3C3-4A92-822B-9B458CB03EAC"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigorap_918r:-:*:*:*:*:*:*:*", "matchCriteriaId": "257B6270-8551-4E08-8A04-E8D575407EE0"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigorap_1060c_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.4.0", "matchCriteriaId": "C5783487-C7E1-4E14-B37F-EB4E5A68669B"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigorap_1060c:-:*:*:*:*:*:*:*", "matchCriteriaId": "E73D31F1-2CAA-4837-BC3D-FD4160873334"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigorap_906_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.4.0", "matchCriteriaId": "5873909E-F741-4139-A29A-DF8D79CA330D"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigorap_906:-:*:*:*:*:*:*:*", "matchCriteriaId": "8015A1DA-A1B4-4EBC-98AC-941583EF8E37"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigorap_960c_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.4.0", "matchCriteriaId": "79C369C7-16EA-42CC-9E96-9D868977B632"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigorap_960c:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D0A4172-5FC4-4925-8BDD-A903FC31AFA6"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigorap_1000c_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.4.0", "matchCriteriaId": "E379F3EF-6789-4897-9B33-EAB954114571"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigorap_1000c:-:*:*:*:*:*:*:*", "matchCriteriaId": "E93E754E-F8F5-4E77-8ED1-BFA34C26C2F1"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2766ac_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "11182C9F-B2A1-4AE2-9983-6AC3DB8DE372"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2766ac_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "10586770-1426-435D-8137-2486A2843219"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2766ac:-:*:*:*:*:*:*:*", "matchCriteriaId": "787134FE-0549-427D-A9CE-32B1C58BC954"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2766ax_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "8919EE4B-349B-435A-8E9C-A4C24504AF02"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2766ax_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "C23468E0-F84F-4FAD-8CA0-0A66E0C3D5C0"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2766ax:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B3D0E87-A5A2-4828-A79D-DB10FE6BC4D2"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2766vac_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "7DF64120-5611-41D1-ADC0-2C8F4522A205"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2766vac_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "AFC418D6-76FF-4208-B649-9650E572B750"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2766vac:-:*:*:*:*:*:*:*", "matchCriteriaId": "228DC583-B6BC-4948-A167-53C49B6D04B2"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2765ax_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "68D1D724-D590-49FE-A301-C493FA4E50C3"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2765ax_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "01E3E66C-815B-4DAE-9A38-DD8C583A4DF5"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2765ax:-:*:*:*:*:*:*:*", "matchCriteriaId": "F653097B-9197-43A9-A9B4-8AA6EAFC5666"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2765vac_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "99D00C6D-2DCA-4737-9652-D576585ED712"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2765vac_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "E8B0DC03-200A-4DE1-93C8-F46698E3C4B0"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2765vac:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A582D29-85D9-4FC3-B88A-42B947B9D18C"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2765ac_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "47866545-C9BF-4FCA-ADCA-ED2E44FC4097"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2765ac_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "076A3429-8E00-419F-96D0-40917CEDC328"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2765ac:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1B9AF22-089B-41FB-8E30-BED3E4CE32ED"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2763ac_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "CFF9F139-1975-4EE2-93E5-A22A1C9DEEA7"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2763ac_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "37B22541-27CF-488D-A35B-6E8EB3FD1958"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2763ac:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC9BF014-B8EA-4DD9-8320-627C3D276596"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2620l_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "BADF0105-D4FF-4F9C-A45F-86A1D29F0AF0"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2620l_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "F4290ACF-3E73-4C09-9001-6A2AC31BF719"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2620l:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DD1E5ED-6A96-4C4A-87D4-692988479D01"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2620ln_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "83DA643A-7804-4058-963B-D4F9EF48D368"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2620ln_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "6DCA1285-F9C7-4F21-BA80-09EE9FD2BC61"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2620ln:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4B71980-6D7A-4B7B-9863-E85CC849ED90"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigorlte_200n_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "67ABDDAF-CFA5-4185-B51C-8694FCF5ECAE"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigorlte_200n_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "743D7983-774E-43A2-8D9E-FD7ECFF49208"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigorlte_200n:-:*:*:*:*:*:*:*", "matchCriteriaId": "00DC816E-1840-46F0-97C4-2BA00F5B9E64"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2915ac_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "8FD7B44A-0421-471B-B777-2E1E4B6BC9E6"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2915ac_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "05E71AD2-9353-48A0-8C5E-8CB0501E6CDF"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2915ac:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4318B8A-B94C-4207-9731-76D35DE85034"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2135ac_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "A7C5B846-1076-498A-9B18-E3AB9CA71664"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2135ac_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "D23AC0A0-B4D4-4405-BA85-D3CEDC99254C"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2135ac:-:*:*:*:*:*:*:*", "matchCriteriaId": "77D227B7-1121-4657-A621-AF0C0E766D90"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2135ax_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "D054B8D0-4B1E-4A04-A268-B9F5B2494E2A"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2135ax_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "5FBDE83D-0DC2-4265-8C13-6D67B8E551FB"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2135ax:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C37EA55-2526-4130-A57C-65950A5DFE57"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2135fvac_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "6678CEE9-D55E-4BEB-9684-9E6A1275D7DA"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2135fvac_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "2933150F-1ACD-4CBB-AF76-52B0EF30D314"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2135fvac:-:*:*:*:*:*:*:*", "matchCriteriaId": "625DE418-F506-4579-9C25-04DCD0FBC7ED"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2135vac_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "626A6BF5-0EA2-4B69-9FF9-95963A7BDC2E"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2135vac_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "C24391FB-6E97-485C-A09E-BDEB991554A8"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2135vac:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAC1C9BE-31B5-47DD-BE09-0984EE29A957"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2866ax_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "EE309C25-7405-43CA-84D9-D026995A2C1B"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2866ax_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "5A4727DF-9C6B-451F-B0D8-97771723DB79"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2866ax:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F84DE3D-5FFD-4D6F-877A-A656287BDD7B"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2866ac_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "F7BC57D4-992C-4A15-9E0B-4A92DAB0E8FF"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2866ac_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "E09C70BB-0404-44D2-BCA5-1A1ACF96DC81"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2866ac:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E82803D-B1DE-4541-913C-9128B313AC0E"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2866vac_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "43F53028-CD42-4B00-8E47-6E04ECCD7DB9"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2866vac_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "1726990C-A56E-4FA3-A274-0059796DBD5D"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2866vac:-:*:*:*:*:*:*:*", "matchCriteriaId": "5295B4DF-DE6C-4725-A22B-1186D5AB1325"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2866l_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "37EF7FFF-27D8-493F-AC08-CA08D8C68B9B"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2866l_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "45D29250-F220-473C-B50D-CBEBCFF2FACC"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2866l:-:*:*:*:*:*:*:*", "matchCriteriaId": "315CA850-DA5C-46E8-90A1-457320A52AA3"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2866lac_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "CE4D0323-BBDE-4770-956C-343C44C0963B"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2866lac_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "6C7A64C0-9FEF-4B90-B938-80B23AE31172"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2866lac:-:*:*:*:*:*:*:*", "matchCriteriaId": "4504923B-C903-432D-B4D2-287BD0145F3B"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2865ac_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "27BC97E5-6000-4BB0-990A-63CC9EB7B464"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2865ac_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "52037B3F-4CAA-4FF2-894F-D4C4F6F6EF34"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2865ac:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2D62A63-1E53-469C-B06C-DB6D05C7BE2F"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2865ax_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "0ECC2E3B-9D0A-4599-B183-A8D13486A07E"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2865ax_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "662A9E6F-8D9E-4332-B3D2-5B364A7AEAB4"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2865ax:-:*:*:*:*:*:*:*", "matchCriteriaId": "699735FA-D33E-4F32-9584-B15938FB954E"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2865vac_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "CA84174C-4735-41D7-AED6-4628A00506CD"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2865vac_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "451A5CEC-8FE1-49AB-B196-BA644E6C6052"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2865vac:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C40B478-C28F-430A-A690-5EF9FFB4812E"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2865l_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "70A64A15-79FD-4C33-B0A2-6B5AB22E0A10"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2865l_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "D0F60FE9-4C8C-4987-BA4D-A013565C0276"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2865l:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4F462E8-6427-4E42-902B-07E8A9366423"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2865lac_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "D930CFA9-2991-42D9-B34F-A33ECD1EB5A6"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2865lac_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "9DCDD22F-A2FE-4A33-B577-E54434BCA715"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2865lac:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B87FA44-4931-4DC4-89BE-72A591C7C355"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2862n_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "4000DB83-9F7E-4CF2-8BE4-620518BAE9B5"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2862n_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "B2F06ECA-134C-4C77-B347-17FCACB23AF1"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2862n:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DF8ECCA-405E-4D60-92ED-7F29F36A985F"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2862ac_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "04D0B7F9-91E5-4C11-9E60-BEEFFA94A04A"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2862ac_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "409F0831-39FC-406B-9F40-1A819D94E638"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2862ac:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB77A5C7-026C-4172-970A-28E0D1A6F2D1"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2862vac_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "60C59833-B82E-411B-8538-EABFE4F14E3A"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2862vac_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "45BFE7A0-2AFE-47E9-B383-E4A46DEF8418"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2862vac:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CB96DDC-9961-47D4-81DF-4117A1B9C8F1"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2862b_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "81CF6DA5-1686-46B9-910D-A94DD63F08DC"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2862b_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "BE5F7C2B-C1BC-4E9A-99D0-F89F47EC597B"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2862b:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC7469CB-2CDE-4D2D-988A-13A482A59B28"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2862bn_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "29C38D34-5902-469F-BA3D-2C4F8D8A3CC6"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2862bn_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "153F7DFA-1B02-4DFB-8E1E-B651BD09F900"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2862bn:-:*:*:*:*:*:*:*", "matchCriteriaId": "60F97B4A-B323-4354-9CAC-60BCB02A44DE"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2862l_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "D42814F5-C33D-43DF-A1B9-A993F7D65881"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2862l_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "36C33DCB-487D-4CB4-A4C0-2C4B510AF422"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2862l:-:*:*:*:*:*:*:*", "matchCriteriaId": "96B57263-4900-4F2E-AA5C-554B5163F489"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2862lac_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "650DC374-F23A-4FE1-9AA4-CC55DD5B88A0"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2862lac_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "04F1AD94-F4F4-467A-A48F-AA4FD46D0191"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2862lac:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A89BEEB-3F13-4C41-9133-788232DD229B"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2862ln_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "05478558-3571-47B6-865A-51C382710FFA"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2862ln_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "78546B3A-97EB-4700-85EB-04CBED086A1C"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2862ln:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D1ADB5D-D2CF-464B-9F1C-45F31A032953"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2832n_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "6B44F218-4547-4011-B6DB-575CF501A872"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2832n_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "7F85CD06-04CC-4A4E-A279-D110D966FAAF"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2832n:-:*:*:*:*:*:*:*", "matchCriteriaId": "B22E55C6-F71F-4EA7-B679-895A012B7020"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2927ax_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "1330489C-DFC4-4403-B656-E4CFFF0101E8"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2927ax_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "534F07F3-622A-4756-9C51-5403C12AA0D6"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2927ax:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C188F12-157F-4B8C-9A66-678B933E20F0"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2927ac_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "A22DC676-E8C6-4422-942E-55EB3535DB68"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2927ac_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "D40DA2AE-0AAF-4DEB-8A07-91D7D15F90A4"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2927ac:-:*:*:*:*:*:*:*", "matchCriteriaId": "B846175B-4DC0-4268-AAF2-F266BFD7646E"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2927vac_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "6F5DC1B3-BB98-4178-AD67-FE3D3481D2CD"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2927vac_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "34386461-6500-4653-BF1B-5E5299D0E662"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2927vac:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD217200-9848-425F-B113-E624C027BC9C"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2927f_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "150F7911-3FB3-429B-8974-7CD3D08A2109"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2927f_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "23A09F00-EBA9-4D82-8CC6-99C36095EFB4"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2927f:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD5CF335-A5C0-46CC-A56C-0DBE15D01F0B"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2927l_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "C2D036F0-BF3A-43D1-AAF0-1F88F51FD58D"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2927l_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "ADE56943-366C-4D0E-8367-1E63C104F1D7"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2927l:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC9D70E8-080B-4F0E-BA3A-ACFE8F61475B"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2927lac_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "B635143B-5C87-4A26-8E99-80D1061586C2"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2927lac_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "9217655B-2A6A-457B-A72A-240DABD72ED8"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2927lac:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB5ABFF7-F5DA-485F-976B-5C858B85E994"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2926_plus_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "E9AA22E6-35C2-4D7D-8521-315F1CF617E6"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2926_plus_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "1513AAB7-E518-4E71-A2C8-D677677F7284"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2926_plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAC3E2A0-797D-4512-98A5-4ACE48EF4225"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "523910EF-FEFF-410B-8256-C7C0CE39649F"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "56E46B5A-D2B2-4ACA-B959-87B24CEAF5CA"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2962:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD0C9A21-7CFE-452F-8505-834AB8579D9B"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "5E7F61CB-714A-4855-AB07-7281E05D7F72"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "FDE33FDF-EABE-4A61-97B1-B12F5A2D0F1A"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor1000b:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FF86645-253A-4BA3-BA2A-2725575C390D"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "26E65A66-EEC8-42B7-9787-F55339B70EBE"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "E971141F-469A-499D-8F2A-20F8999240DC"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*", "matchCriteriaId": "894E4DDA-D9BE-441D-B447-B1CE52959347"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor165_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "58FF72CC-49AB-4D1F-A972-FC98DCDDCF2B"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor165_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "C66404FA-6FCE-43B7-8F3C-177FB740C39E"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor165:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E644893-0457-43A9-98AB-9DB37A5C415C"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor166_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "334E4F8A-B695-46A1-8362-4B97FE5CD424"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor166_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "4B649FFA-6D64-42A1-80A9-9B590EA8F5E3"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor166:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E33E647-5883-44FA-9915-34B89090D4E4"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor130_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "1F167623-480E-49F3-869C-4CFD897AF696"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor130_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "0BB13341-7544-4459-B29F-D0F9BEE3001E"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor130:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7194998-2D96-43DE-85B6-35A8E474C695"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor167_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "23AEEDBE-5556-4358-A955-C4F30D969642"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor167_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "FA97EBDF-8908-462A-807A-CDBA15AD5952"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor167:-:*:*:*:*:*:*:*", "matchCriteriaId": "71A66A89-CF31-4C63-9562-707C03117104"}]}]}], "references": [{"url": "https://gist.github.com/Ji4n1ng/6d028709d39458f5ab95b3ea211225ef", "source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"]}, {"url": "https://gist.github.com/Ji4n1ng/6d028709d39458f5ab95b3ea211225ef", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-33778", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-01T04:15:10.313", "lastModified": "2025-01-09T18:15:26.790", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "Draytek Vigor Routers firmware versions below 3.9.6/4.2.4, Access Points firmware versions below v1.4.0, Switches firmware versions below 2.6.7, and Myvigor firmware versions below 2.3.2 were discovered to use hardcoded encryption keys which allows attackers to bind any affected device to their own account. Attackers are then able to create WCF and DrayDDNS licenses and synchronize them from the website."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 5.9}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 5.9}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-798"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-798"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:draytek:myvigor:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.3.2", "matchCriteriaId": "FB9A5891-1058-42FE-8D36-987E967D5481"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigorswitch_pq2200xb_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.6.7", "matchCriteriaId": "BCB0DEE3-60C3-49F8-9A6C-47826AFF388D"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigorswitch_pq2200xb:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A822A86-C784-4AED-B367-4D39609D93E7"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigorswitch_pq2121x_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.6.7", "matchCriteriaId": "35B88F62-BC7C-47AA-80F3-3BEDB0D5E5EA"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigorswitch_pq2121x:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB7AFBE0-9E98-4B46-9517-B73509F5944D"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigorswitch_p2540xs_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.6.7", "matchCriteriaId": "0FA6D7E6-EAD4-45E6-A1CB-4E5CF2543564"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigorswitch_p2540xs:-:*:*:*:*:*:*:*", "matchCriteriaId": "77DCACA0-BA44-4691-BAAD-828C54898FBB"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigorswitch_p2280x_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.6.7", "matchCriteriaId": "6D6F173D-4339-4842-AC62-5E4C488D6067"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigorswitch_p2280x:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE6602CA-744E-4543-9818-75FC57E83280"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigorswitch_p2100_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.6.7", "matchCriteriaId": "DAB8B117-8605-4C4E-990E-7DE09DF79738"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigorswitch_p2100:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DE4BB0C-0419-4A24-9C79-4642DBF22A9F"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigorswitch_q2200x_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.6.7", "matchCriteriaId": "F0604938-0253-466F-914D-300590C82AB1"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigorswitch_q2200x:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC2E8256-45B6-4CDC-A2A8-60303773F149"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigorswitch_q2121x_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.6.7", "matchCriteriaId": "1BABC689-A27B-43C3-B402-2CFF1AFF0012"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigorswitch_q2121x:-:*:*:*:*:*:*:*", "matchCriteriaId": "19676250-FC97-4476-9A26-304DC8E4B872"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigorswitch_g2540xs_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.6.7", "matchCriteriaId": "0FF46332-4269-48FE-8D27-F0642FD08A75"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigorswitch_g2540xs:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBFCBF8D-3FCA-4B17-9337-4BD621372F23"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigorswitch_g2280x_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.6.7", "matchCriteriaId": "A90A385E-F817-42D4-BB1B-AF37DE3C9491"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigorswitch_g2280x:-:*:*:*:*:*:*:*", "matchCriteriaId": "3586D962-114E-4CD4-B6D2-8B031BBB01B1"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigorswitch_g2121_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.6.7", "matchCriteriaId": "1C04F98D-5668-4398-8D8B-4CE9340F20A1"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigorswitch_g2121:-:*:*:*:*:*:*:*", "matchCriteriaId": "25451714-5AE6-43C7-B1CC-A2ED2486E402"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigorswitch_g2100_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.6.7", "matchCriteriaId": "F86A2C16-44BF-4C7F-A8C5-B03CEBC88CE8"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigorswitch_g2100:-:*:*:*:*:*:*:*", "matchCriteriaId": "8724DACC-85AC-4047-8960-27FCF58C5BF9"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigorswitch_fx2120_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.6.7", "matchCriteriaId": "D70A4480-2C9E-4662-8612-23F66A649BA7"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigorswitch_fx2120:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F9B1A57-A45D-4EA3-B76B-C0F6FEB92316"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigorswitch_p1282_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.6.7", "matchCriteriaId": "0983154F-C4BC-413F-B020-085E83D5BB44"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigorswitch_p1282:-:*:*:*:*:*:*:*", "matchCriteriaId": "65373D8B-0DA8-4539-9E63-DBBDF493508E"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigorswitch_g1282_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.6.7", "matchCriteriaId": "632A1555-3550-456B-8ED8-49E5929CE38E"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigorswitch_g1282:-:*:*:*:*:*:*:*", "matchCriteriaId": "8110E6A8-E30A-4D4B-9210-0FE5F9C0F27C"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigorswitch_g1085_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.6.7", "matchCriteriaId": "D3F580E9-2A0E-47E9-9C4B-2B971376C7EC"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigorswitch_g1085:-:*:*:*:*:*:*:*", "matchCriteriaId": "B61C56D2-6A25-4AF5-95E3-2AFE3E4A33F0"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigorswitch_g1080_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.6.7", "matchCriteriaId": "0B400A32-0E46-4AAC-930F-D73A639C85DA"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigorswitch_g1080:-:*:*:*:*:*:*:*", "matchCriteriaId": "2498876A-CDF4-423A-93C1-7337231D25E2"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigorap_903_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.4.0", "matchCriteriaId": "0C9BD0C4-5E5F-4E86-89F8-15821EC9618F"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigorap_903:-:*:*:*:*:*:*:*", "matchCriteriaId": "D793F78F-1A6C-47AC-9F17-877DA0C6DD7D"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigorap_912c_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.4.0", "matchCriteriaId": "13FEC077-B0A0-4F87-A113-D0131946C358"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigorap_912c:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2052075-C2C4-4462-96B7-E3C448B81AD7"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigorap_918r_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.4.0", "matchCriteriaId": "05A02352-B3C3-4A92-822B-9B458CB03EAC"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigorap_918r:-:*:*:*:*:*:*:*", "matchCriteriaId": "257B6270-8551-4E08-8A04-E8D575407EE0"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigorap_1060c_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.4.0", "matchCriteriaId": "C5783487-C7E1-4E14-B37F-EB4E5A68669B"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigorap_1060c:-:*:*:*:*:*:*:*", "matchCriteriaId": "E73D31F1-2CAA-4837-BC3D-FD4160873334"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigorap_906_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.4.0", "matchCriteriaId": "5873909E-F741-4139-A29A-DF8D79CA330D"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigorap_906:-:*:*:*:*:*:*:*", "matchCriteriaId": "8015A1DA-A1B4-4EBC-98AC-941583EF8E37"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigorap_960c_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.4.0", "matchCriteriaId": "79C369C7-16EA-42CC-9E96-9D868977B632"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigorap_960c:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D0A4172-5FC4-4925-8BDD-A903FC31AFA6"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigorap_1000c_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.4.0", "matchCriteriaId": "E379F3EF-6789-4897-9B33-EAB954114571"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigorap_1000c:-:*:*:*:*:*:*:*", "matchCriteriaId": "E93E754E-F8F5-4E77-8ED1-BFA34C26C2F1"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2766ac_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "11182C9F-B2A1-4AE2-9983-6AC3DB8DE372"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2766ac_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "10586770-1426-435D-8137-2486A2843219"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2766ac:-:*:*:*:*:*:*:*", "matchCriteriaId": "787134FE-0549-427D-A9CE-32B1C58BC954"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2766ax_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "8919EE4B-349B-435A-8E9C-A4C24504AF02"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2766ax_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "C23468E0-F84F-4FAD-8CA0-0A66E0C3D5C0"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2766ax:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B3D0E87-A5A2-4828-A79D-DB10FE6BC4D2"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2766vac_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "7DF64120-5611-41D1-ADC0-2C8F4522A205"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2766vac_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "AFC418D6-76FF-4208-B649-9650E572B750"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2766vac:-:*:*:*:*:*:*:*", "matchCriteriaId": "228DC583-B6BC-4948-A167-53C49B6D04B2"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2765ax_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "68D1D724-D590-49FE-A301-C493FA4E50C3"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2765ax_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "01E3E66C-815B-4DAE-9A38-DD8C583A4DF5"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2765ax:-:*:*:*:*:*:*:*", "matchCriteriaId": "F653097B-9197-43A9-A9B4-8AA6EAFC5666"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2765vac_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "99D00C6D-2DCA-4737-9652-D576585ED712"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2765vac_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "E8B0DC03-200A-4DE1-93C8-F46698E3C4B0"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2765vac:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A582D29-85D9-4FC3-B88A-42B947B9D18C"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2765ac_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "47866545-C9BF-4FCA-ADCA-ED2E44FC4097"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2765ac_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "076A3429-8E00-419F-96D0-40917CEDC328"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2765ac:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1B9AF22-089B-41FB-8E30-BED3E4CE32ED"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2763ac_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "CFF9F139-1975-4EE2-93E5-A22A1C9DEEA7"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2763ac_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "37B22541-27CF-488D-A35B-6E8EB3FD1958"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2763ac:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC9BF014-B8EA-4DD9-8320-627C3D276596"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2620l_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "BADF0105-D4FF-4F9C-A45F-86A1D29F0AF0"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2620l_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "F4290ACF-3E73-4C09-9001-6A2AC31BF719"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2620l:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DD1E5ED-6A96-4C4A-87D4-692988479D01"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2620ln_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "83DA643A-7804-4058-963B-D4F9EF48D368"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2620ln_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "6DCA1285-F9C7-4F21-BA80-09EE9FD2BC61"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2620ln:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4B71980-6D7A-4B7B-9863-E85CC849ED90"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigorlte_200n_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "67ABDDAF-CFA5-4185-B51C-8694FCF5ECAE"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigorlte_200n_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "743D7983-774E-43A2-8D9E-FD7ECFF49208"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigorlte_200n:-:*:*:*:*:*:*:*", "matchCriteriaId": "00DC816E-1840-46F0-97C4-2BA00F5B9E64"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2915ac_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "8FD7B44A-0421-471B-B777-2E1E4B6BC9E6"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2915ac_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "05E71AD2-9353-48A0-8C5E-8CB0501E6CDF"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2915ac:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4318B8A-B94C-4207-9731-76D35DE85034"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2135ac_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "A7C5B846-1076-498A-9B18-E3AB9CA71664"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2135ac_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "D23AC0A0-B4D4-4405-BA85-D3CEDC99254C"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2135ac:-:*:*:*:*:*:*:*", "matchCriteriaId": "77D227B7-1121-4657-A621-AF0C0E766D90"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2135ax_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "D054B8D0-4B1E-4A04-A268-B9F5B2494E2A"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2135ax_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "5FBDE83D-0DC2-4265-8C13-6D67B8E551FB"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2135ax:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C37EA55-2526-4130-A57C-65950A5DFE57"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2135fvac_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "6678CEE9-D55E-4BEB-9684-9E6A1275D7DA"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2135fvac_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "2933150F-1ACD-4CBB-AF76-52B0EF30D314"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2135fvac:-:*:*:*:*:*:*:*", "matchCriteriaId": "625DE418-F506-4579-9C25-04DCD0FBC7ED"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2135vac_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "626A6BF5-0EA2-4B69-9FF9-95963A7BDC2E"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2135vac_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "C24391FB-6E97-485C-A09E-BDEB991554A8"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2135vac:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAC1C9BE-31B5-47DD-BE09-0984EE29A957"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2866ax_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "EE309C25-7405-43CA-84D9-D026995A2C1B"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2866ax_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "5A4727DF-9C6B-451F-B0D8-97771723DB79"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2866ax:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F84DE3D-5FFD-4D6F-877A-A656287BDD7B"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2866ac_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "F7BC57D4-992C-4A15-9E0B-4A92DAB0E8FF"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2866ac_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "E09C70BB-0404-44D2-BCA5-1A1ACF96DC81"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2866ac:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E82803D-B1DE-4541-913C-9128B313AC0E"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2866vac_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "43F53028-CD42-4B00-8E47-6E04ECCD7DB9"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2866vac_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "1726990C-A56E-4FA3-A274-0059796DBD5D"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2866vac:-:*:*:*:*:*:*:*", "matchCriteriaId": "5295B4DF-DE6C-4725-A22B-1186D5AB1325"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2866l_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "37EF7FFF-27D8-493F-AC08-CA08D8C68B9B"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2866l_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "45D29250-F220-473C-B50D-CBEBCFF2FACC"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2866l:-:*:*:*:*:*:*:*", "matchCriteriaId": "315CA850-DA5C-46E8-90A1-457320A52AA3"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2866lac_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "CE4D0323-BBDE-4770-956C-343C44C0963B"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2866lac_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "6C7A64C0-9FEF-4B90-B938-80B23AE31172"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2866lac:-:*:*:*:*:*:*:*", "matchCriteriaId": "4504923B-C903-432D-B4D2-287BD0145F3B"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2865ac_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "27BC97E5-6000-4BB0-990A-63CC9EB7B464"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2865ac_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "52037B3F-4CAA-4FF2-894F-D4C4F6F6EF34"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2865ac:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2D62A63-1E53-469C-B06C-DB6D05C7BE2F"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2865ax_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "0ECC2E3B-9D0A-4599-B183-A8D13486A07E"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2865ax_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "662A9E6F-8D9E-4332-B3D2-5B364A7AEAB4"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2865ax:-:*:*:*:*:*:*:*", "matchCriteriaId": "699735FA-D33E-4F32-9584-B15938FB954E"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2865vac_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "CA84174C-4735-41D7-AED6-4628A00506CD"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2865vac_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "451A5CEC-8FE1-49AB-B196-BA644E6C6052"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2865vac:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C40B478-C28F-430A-A690-5EF9FFB4812E"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2865l_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "70A64A15-79FD-4C33-B0A2-6B5AB22E0A10"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2865l_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "D0F60FE9-4C8C-4987-BA4D-A013565C0276"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2865l:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4F462E8-6427-4E42-902B-07E8A9366423"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2865lac_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "D930CFA9-2991-42D9-B34F-A33ECD1EB5A6"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2865lac_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "9DCDD22F-A2FE-4A33-B577-E54434BCA715"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2865lac:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B87FA44-4931-4DC4-89BE-72A591C7C355"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2862n_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "4000DB83-9F7E-4CF2-8BE4-620518BAE9B5"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2862n_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "B2F06ECA-134C-4C77-B347-17FCACB23AF1"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2862n:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DF8ECCA-405E-4D60-92ED-7F29F36A985F"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2862ac_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "04D0B7F9-91E5-4C11-9E60-BEEFFA94A04A"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2862ac_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "409F0831-39FC-406B-9F40-1A819D94E638"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2862ac:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB77A5C7-026C-4172-970A-28E0D1A6F2D1"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2862vac_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "60C59833-B82E-411B-8538-EABFE4F14E3A"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2862vac_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "45BFE7A0-2AFE-47E9-B383-E4A46DEF8418"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2862vac:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CB96DDC-9961-47D4-81DF-4117A1B9C8F1"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2862b_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "81CF6DA5-1686-46B9-910D-A94DD63F08DC"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2862b_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "BE5F7C2B-C1BC-4E9A-99D0-F89F47EC597B"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2862b:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC7469CB-2CDE-4D2D-988A-13A482A59B28"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2862bn_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "29C38D34-5902-469F-BA3D-2C4F8D8A3CC6"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2862bn_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "153F7DFA-1B02-4DFB-8E1E-B651BD09F900"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2862bn:-:*:*:*:*:*:*:*", "matchCriteriaId": "60F97B4A-B323-4354-9CAC-60BCB02A44DE"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2862l_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "D42814F5-C33D-43DF-A1B9-A993F7D65881"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2862l_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "36C33DCB-487D-4CB4-A4C0-2C4B510AF422"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2862l:-:*:*:*:*:*:*:*", "matchCriteriaId": "96B57263-4900-4F2E-AA5C-554B5163F489"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2862lac_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "650DC374-F23A-4FE1-9AA4-CC55DD5B88A0"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2862lac_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "04F1AD94-F4F4-467A-A48F-AA4FD46D0191"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2862lac:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A89BEEB-3F13-4C41-9133-788232DD229B"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2862ln_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "05478558-3571-47B6-865A-51C382710FFA"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2862ln_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "78546B3A-97EB-4700-85EB-04CBED086A1C"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2862ln:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D1ADB5D-D2CF-464B-9F1C-45F31A032953"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2832n_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "6B44F218-4547-4011-B6DB-575CF501A872"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2832n_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "7F85CD06-04CC-4A4E-A279-D110D966FAAF"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2832n:-:*:*:*:*:*:*:*", "matchCriteriaId": "B22E55C6-F71F-4EA7-B679-895A012B7020"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2927ax_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "1330489C-DFC4-4403-B656-E4CFFF0101E8"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2927ax_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "534F07F3-622A-4756-9C51-5403C12AA0D6"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2927ax:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C188F12-157F-4B8C-9A66-678B933E20F0"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2927ac_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "A22DC676-E8C6-4422-942E-55EB3535DB68"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2927ac_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "D40DA2AE-0AAF-4DEB-8A07-91D7D15F90A4"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2927ac:-:*:*:*:*:*:*:*", "matchCriteriaId": "B846175B-4DC0-4268-AAF2-F266BFD7646E"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2927vac_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "6F5DC1B3-BB98-4178-AD67-FE3D3481D2CD"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2927vac_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "34386461-6500-4653-BF1B-5E5299D0E662"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2927vac:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD217200-9848-425F-B113-E624C027BC9C"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2927f_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "150F7911-3FB3-429B-8974-7CD3D08A2109"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2927f_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "23A09F00-EBA9-4D82-8CC6-99C36095EFB4"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2927f:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD5CF335-A5C0-46CC-A56C-0DBE15D01F0B"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2927l_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "C2D036F0-BF3A-43D1-AAF0-1F88F51FD58D"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2927l_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "ADE56943-366C-4D0E-8367-1E63C104F1D7"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2927l:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC9D70E8-080B-4F0E-BA3A-ACFE8F61475B"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2927lac_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "B635143B-5C87-4A26-8E99-80D1061586C2"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2927lac_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "9217655B-2A6A-457B-A72A-240DABD72ED8"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2927lac:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB5ABFF7-F5DA-485F-976B-5C858B85E994"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2926_plus_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "E9AA22E6-35C2-4D7D-8521-315F1CF617E6"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2926_plus_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "1513AAB7-E518-4E71-A2C8-D677677F7284"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2926_plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAC3E2A0-797D-4512-98A5-4ACE48EF4225"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "523910EF-FEFF-410B-8256-C7C0CE39649F"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "56E46B5A-D2B2-4ACA-B959-87B24CEAF5CA"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor2962:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD0C9A21-7CFE-452F-8505-834AB8579D9B"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "5E7F61CB-714A-4855-AB07-7281E05D7F72"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "FDE33FDF-EABE-4A61-97B1-B12F5A2D0F1A"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor1000b:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FF86645-253A-4BA3-BA2A-2725575C390D"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "26E65A66-EEC8-42B7-9787-F55339B70EBE"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "E971141F-469A-499D-8F2A-20F8999240DC"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*", "matchCriteriaId": "894E4DDA-D9BE-441D-B447-B1CE52959347"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor165_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "58FF72CC-49AB-4D1F-A972-FC98DCDDCF2B"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor165_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "C66404FA-6FCE-43B7-8F3C-177FB740C39E"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor165:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E644893-0457-43A9-98AB-9DB37A5C415C"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor166_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "334E4F8A-B695-46A1-8362-4B97FE5CD424"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor166_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "4B649FFA-6D64-42A1-80A9-9B590EA8F5E3"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor166:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E33E647-5883-44FA-9915-34B89090D4E4"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor130_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "1F167623-480E-49F3-869C-4CFD897AF696"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor130_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "0BB13341-7544-4459-B29F-D0F9BEE3001E"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor130:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7194998-2D96-43DE-85B6-35A8E474C695"}]}]}, {"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor167_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.9.6", "matchCriteriaId": "23AEEDBE-5556-4358-A955-C4F30D969642"}, {"vulnerable": true, "criteria": "cpe:2.3:o:draytek:vigor167_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.2.4", "matchCriteriaId": "FA97EBDF-8908-462A-807A-CDBA15AD5952"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:draytek:vigor167:-:*:*:*:*:*:*:*", "matchCriteriaId": "71A66A89-CF31-4C63-9562-707C03117104"}]}]}], "references": [{"url": "https://gist.github.com/Ji4n1ng/6d028709d39458f5ab95b3ea211225ef", "source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"]}, {"url": "https://gist.github.com/Ji4n1ng/6d028709d39458f5ab95b3ea211225ef", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"]}]}} \ No newline at end of file diff --git a/cve/2023/CVE-2023-48082.json b/cve/2023/CVE-2023-48082.json index dd1f9ceddb1..7ce174e2e87 100644 --- a/cve/2023/CVE-2023-48082.json +++ b/cve/2023/CVE-2023-48082.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2023-48082", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-14T19:15:10.780", "lastModified": "2024-10-25T17:15:03.903", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Nagios XI before 2024R1 was discovered to improperly handle API keys generation (randomly-generated), allowing attackers to possibly generate the same set of API keys for all users and utilize them to authenticate."}, {"lang": "es", "value": "Se descubri\u00f3 que Nagios XI anterior a 5.11.3 2024R1 manejaba incorrectamente la generaci\u00f3n de claves API (generadas aleatoriamente), lo que permit\u00eda a los atacantes generar posiblemente el mismo conjunto de claves API para todos los usuarios y utilizarlas para autenticarse."}], "metrics": {"cvssMetricV31": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "baseScore": 9.1, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "NONE"}, "exploitabilityScore": 3.9, "impactScore": 5.2}]}, "references": [{"url": "https://www.nagios.com/change-log/", "source": "cve@mitre.org"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2023-48082", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-14T19:15:10.780", "lastModified": "2025-01-09T18:15:27.130", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Nagios XI before 2024R1 was discovered to improperly handle API keys generation (randomly-generated), allowing attackers to possibly generate the same set of API keys for all users and utilize them to authenticate."}, {"lang": "es", "value": "Se descubri\u00f3 que Nagios XI anterior a 5.11.3 2024R1 manejaba incorrectamente la generaci\u00f3n de claves API (generadas aleatoriamente), lo que permit\u00eda a los atacantes generar posiblemente el mismo conjunto de claves API para todos los usuarios y utilizarlas para autenticarse."}], "metrics": {}, "references": [{"url": "https://www.nagios.com/change-log/", "source": "cve@mitre.org"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-10466.json b/cve/2024/CVE-2024-10466.json index de5d1ae050e..bfeacdd579c 100644 --- a/cve/2024/CVE-2024-10466.json +++ b/cve/2024/CVE-2024-10466.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-10466", "sourceIdentifier": "security@mozilla.org", "published": "2024-10-29T13:15:04.273", "lastModified": "2024-11-04T13:29:51.947", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "By sending a specially crafted push message, a remote server could have hung the parent process, causing the browser to become unresponsive. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Thunderbird < 128.4, and Thunderbird < 132."}, {"lang": "es", "value": "Al enviar un mensaje push especialmente manipulado, un servidor remoto podr\u00eda haber bloqueado el proceso principal, lo que provocar\u00eda que el navegador dejara de responder. Esta vulnerabilidad afecta a Firefox < 132, Firefox ESR < 128.4, Thunderbird < 128.4 y Thunderbird < 132."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.6}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-89"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", "versionEndExcluding": "128.4.0", "matchCriteriaId": "2E3F4DEC-8BEF-4DDD-BE8E-306B973FB76E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*", "versionEndExcluding": "132.0", "matchCriteriaId": "12C78A13-6A39-4F36-8534-D8ECE46E0042"}, {"vulnerable": true, "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "versionEndExcluding": "128.4.0", "matchCriteriaId": "D120292A-201C-4965-A05E-850214B0376A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "versionStartIncluding": "129.0", "versionEndExcluding": "132.0", "matchCriteriaId": "F2C6BA33-28F1-4F1F-ADFE-B5F9A04E6657"}]}]}], "references": [{"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1924154", "source": "security@mozilla.org", "tags": ["Issue Tracking", "Permissions Required"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2024-55/", "source": "security@mozilla.org", "tags": ["Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2024-56/", "source": "security@mozilla.org", "tags": ["Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2024-58/", "source": "security@mozilla.org", "tags": ["Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2024-59/", "source": "security@mozilla.org", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-10466", "sourceIdentifier": "security@mozilla.org", "published": "2024-10-29T13:15:04.273", "lastModified": "2025-01-09T18:15:27.253", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "By sending a specially crafted push message, a remote server could have hung the parent process, causing the browser to become unresponsive. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Thunderbird < 128.4, and Thunderbird < 132."}, {"lang": "es", "value": "Al enviar un mensaje push especialmente manipulado, un servidor remoto podr\u00eda haber bloqueado el proceso principal, lo que provocar\u00eda que el navegador dejara de responder. Esta vulnerabilidad afecta a Firefox < 132, Firefox ESR < 128.4, Thunderbird < 128.4 y Thunderbird < 132."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.6}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", "versionEndExcluding": "128.4.0", "matchCriteriaId": "2E3F4DEC-8BEF-4DDD-BE8E-306B973FB76E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*", "versionEndExcluding": "132.0", "matchCriteriaId": "12C78A13-6A39-4F36-8534-D8ECE46E0042"}, {"vulnerable": true, "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "versionEndExcluding": "128.4.0", "matchCriteriaId": "D120292A-201C-4965-A05E-850214B0376A"}, {"vulnerable": true, "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "versionStartIncluding": "129.0", "versionEndExcluding": "132.0", "matchCriteriaId": "F2C6BA33-28F1-4F1F-ADFE-B5F9A04E6657"}]}]}], "references": [{"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1924154", "source": "security@mozilla.org", "tags": ["Issue Tracking", "Permissions Required"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2024-55/", "source": "security@mozilla.org", "tags": ["Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2024-56/", "source": "security@mozilla.org", "tags": ["Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2024-58/", "source": "security@mozilla.org", "tags": ["Vendor Advisory"]}, {"url": "https://www.mozilla.org/security/advisories/mfsa2024-59/", "source": "security@mozilla.org", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-10525.json b/cve/2024/CVE-2024-10525.json index d870268a539..6832c761ce9 100644 --- a/cve/2024/CVE-2024-10525.json +++ b/cve/2024/CVE-2024-10525.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-10525", "sourceIdentifier": "emo@eclipse.org", "published": "2024-10-30T12:15:02.787", "lastModified": "2024-11-01T12:57:03.417", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "In Eclipse Mosquitto, from version 1.3.2 through 2.0.18, if a malicious broker sends a crafted SUBACK packet with no reason codes, a client using libmosquitto may make out of bounds memory access when acting in its on_subscribe callback. This affects the mosquitto_sub and mosquitto_rr clients."}, {"lang": "es", "value": "En Eclipse Mosquitto, desde la versi\u00f3n 1.3.2 hasta la 2.0.18, si un agente malintencionado env\u00eda un paquete SUBACK manipulado sin c\u00f3digos de motivo, un cliente que utilice libmosquitto puede realizar un acceso a la memoria fuera de los l\u00edmites cuando act\u00fae en su devoluci\u00f3n de llamada on_subscribe. Esto afecta a los clientes mosquitto_sub y mosquitto_rr."}], "metrics": {"cvssMetricV40": [{"source": "emo@eclipse.org", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "baseScore": 7.2, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "LOW", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "LOW", "vulnerableSystemIntegrity": "HIGH", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED"}}], "cvssMetricV31": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "baseScore": 9.1, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 5.2}]}, "weaknesses": [{"source": "emo@eclipse.org", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-122"}]}], "references": [{"url": "https://github.com/eclipse-mosquitto/mosquitto/commit/8ab20b4ba4204fdcdec78cb4d9f03c944a6e0e1c", "source": "emo@eclipse.org"}, {"url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/190", "source": "emo@eclipse.org"}, {"url": "https://mosquitto.org/blog/2024/10/version-2-0-19-released/", "source": "emo@eclipse.org"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-10525", "sourceIdentifier": "emo@eclipse.org", "published": "2024-10-30T12:15:02.787", "lastModified": "2025-01-09T18:15:27.403", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "In Eclipse Mosquitto, from version 1.3.2 through 2.0.18, if a malicious broker sends a crafted SUBACK packet with no reason codes, a client using libmosquitto may make out of bounds memory access when acting in its on_subscribe callback. This affects the mosquitto_sub and mosquitto_rr clients."}, {"lang": "es", "value": "En Eclipse Mosquitto, desde la versi\u00f3n 1.3.2 hasta la 2.0.18, si un agente malintencionado env\u00eda un paquete SUBACK manipulado sin c\u00f3digos de motivo, un cliente que utilice libmosquitto puede realizar un acceso a la memoria fuera de los l\u00edmites cuando act\u00fae en su devoluci\u00f3n de llamada on_subscribe. Esto afecta a los clientes mosquitto_sub y mosquitto_rr."}], "metrics": {"cvssMetricV40": [{"source": "emo@eclipse.org", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "baseScore": 7.2, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "LOW", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "LOW", "vulnerableSystemIntegrity": "HIGH", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED"}}]}, "weaknesses": [{"source": "emo@eclipse.org", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-122"}]}], "references": [{"url": "https://github.com/eclipse-mosquitto/mosquitto/commit/8ab20b4ba4204fdcdec78cb4d9f03c944a6e0e1c", "source": "emo@eclipse.org"}, {"url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/190", "source": "emo@eclipse.org"}, {"url": "https://mosquitto.org/blog/2024/10/version-2-0-19-released/", "source": "emo@eclipse.org"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-10917.json b/cve/2024/CVE-2024-10917.json index 2e2fff1c45e..0c49ea64b51 100644 --- a/cve/2024/CVE-2024-10917.json +++ b/cve/2024/CVE-2024-10917.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-10917", "sourceIdentifier": "emo@eclipse.org", "published": "2024-11-11T17:15:04.203", "lastModified": "2024-11-12T13:55:21.227", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "In Eclipse OpenJ9 versions up to 0.47, the JNI function GetStringUTFLength may return an incorrect value which has wrapped around. From 0.48 the value is correct but may be truncated to include a smaller number of characters."}, {"lang": "es", "value": "En las versiones de Eclipse OpenJ9 hasta la 0.47, la funci\u00f3n JNI GetStringUTFLength puede devolver un valor incorrecto que se ha repetido una y otra vez. A partir de la 0.48, el valor es correcto, pero puede estar truncado para incluir una cantidad menor de caracteres."}], "metrics": {"cvssMetricV31": [{"source": "emo@eclipse.org", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "baseScore": 3.7, "baseSeverity": "LOW", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.2, "impactScore": 1.4}]}, "weaknesses": [{"source": "emo@eclipse.org", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-190"}]}], "references": [{"url": "https://github.com/eclipse-openj9/openj9/pull/20362", "source": "emo@eclipse.org"}, {"url": "https://github.com/eclipse-openj9/openj9/releases/tag/openj9-0.48.0", "source": "emo@eclipse.org"}, {"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/47", "source": "emo@eclipse.org"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-10917", "sourceIdentifier": "emo@eclipse.org", "published": "2024-11-11T17:15:04.203", "lastModified": "2025-01-09T18:08:16.097", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "In Eclipse OpenJ9 versions up to 0.47, the JNI function GetStringUTFLength may return an incorrect value which has wrapped around. From 0.48 the value is correct but may be truncated to include a smaller number of characters."}, {"lang": "es", "value": "En las versiones de Eclipse OpenJ9 hasta la 0.47, la funci\u00f3n JNI GetStringUTFLength puede devolver un valor incorrecto que se ha repetido una y otra vez. A partir de la 0.48, el valor es correcto, pero puede estar truncado para incluir una cantidad menor de caracteres."}], "metrics": {"cvssMetricV31": [{"source": "emo@eclipse.org", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "baseScore": 3.7, "baseSeverity": "LOW", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.2, "impactScore": 1.4}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "baseScore": 5.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 3.9, "impactScore": 1.4}]}, "weaknesses": [{"source": "emo@eclipse.org", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-190"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-190"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:eclipse:openj9:*:*:*:*:*:*:*:*", "versionStartIncluding": "0.8.0", "versionEndExcluding": "0.48.0", "matchCriteriaId": "FCC7DE02-3642-44C5-BBA7-81914AB315E6"}]}]}], "references": [{"url": "https://github.com/eclipse-openj9/openj9/pull/20362", "source": "emo@eclipse.org", "tags": ["Issue Tracking", "Patch"]}, {"url": "https://github.com/eclipse-openj9/openj9/releases/tag/openj9-0.48.0", "source": "emo@eclipse.org", "tags": ["Release Notes"]}, {"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/47", "source": "emo@eclipse.org", "tags": ["Issue Tracking", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-11614.json b/cve/2024/CVE-2024-11614.json index e03bc9a4453..6f535811f6e 100644 --- a/cve/2024/CVE-2024-11614.json +++ b/cve/2024/CVE-2024-11614.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-11614", "sourceIdentifier": "secalert@redhat.com", "published": "2024-12-18T09:15:06.660", "lastModified": "2025-01-09T17:15:10.980", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "An out-of-bounds read vulnerability was found in DPDK's Vhost library checksum offload feature. This issue enables an untrusted or compromised guest to crash the hypervisor's vSwitch by forging Virtio descriptors to cause out-of-bounds reads. This flaw allows an attacker with a malicious VM using a virtio driver to cause the vhost-user side to crash by sending a packet with a Tx checksum offload request and an invalid csum_start offset."}, {"lang": "es", "value": "Se encontr\u00f3 una vulnerabilidad de lectura fuera de los l\u00edmites en la funci\u00f3n de descarga de suma de comprobaci\u00f3n de la librer\u00eda DPDK's Vhost. Este problema permite que un invitado no confiable o comprometido bloquee el vSwitch del hipervisor falsificando descriptores Virtio para provocar lecturas fuera de los l\u00edmites. Esta falla permite que un atacante con una m\u00e1quina virtual maliciosa que utilice un controlador Virtio haga que el lado del usuario vhost se bloquee enviando un paquete con una solicitud de descarga de suma de comprobaci\u00f3n Tx y un desplazamiento csum_start no v\u00e1lido."}], "metrics": {"cvssMetricV30": [{"source": "secalert@redhat.com", "type": "Secondary", "cvssData": {"version": "3.0", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "baseScore": 7.4, "baseSeverity": "HIGH", "attackVector": "ADJACENT_NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 4.0}]}, "weaknesses": [{"source": "secalert@redhat.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-125"}]}], "references": [{"url": "https://access.redhat.com/errata/RHSA-2025:0208", "source": "secalert@redhat.com"}, {"url": "https://access.redhat.com/errata/RHSA-2025:0209", "source": "secalert@redhat.com"}, {"url": "https://access.redhat.com/errata/RHSA-2025:0210", "source": "secalert@redhat.com"}, {"url": "https://access.redhat.com/errata/RHSA-2025:0220", "source": "secalert@redhat.com"}, {"url": "https://access.redhat.com/errata/RHSA-2025:0221", "source": "secalert@redhat.com"}, {"url": "https://access.redhat.com/errata/RHSA-2025:0222", "source": "secalert@redhat.com"}, {"url": "https://access.redhat.com/security/cve/CVE-2024-11614", "source": "secalert@redhat.com"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2327955", "source": "secalert@redhat.com"}, {"url": "http://www.openwall.com/lists/oss-security/2024/12/17/3", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-11614", "sourceIdentifier": "secalert@redhat.com", "published": "2024-12-18T09:15:06.660", "lastModified": "2025-01-09T19:15:17.283", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "An out-of-bounds read vulnerability was found in DPDK's Vhost library checksum offload feature. This issue enables an untrusted or compromised guest to crash the hypervisor's vSwitch by forging Virtio descriptors to cause out-of-bounds reads. This flaw allows an attacker with a malicious VM using a virtio driver to cause the vhost-user side to crash by sending a packet with a Tx checksum offload request and an invalid csum_start offset."}, {"lang": "es", "value": "Se encontr\u00f3 una vulnerabilidad de lectura fuera de los l\u00edmites en la funci\u00f3n de descarga de suma de comprobaci\u00f3n de la librer\u00eda DPDK's Vhost. Este problema permite que un invitado no confiable o comprometido bloquee el vSwitch del hipervisor falsificando descriptores Virtio para provocar lecturas fuera de los l\u00edmites. Esta falla permite que un atacante con una m\u00e1quina virtual maliciosa que utilice un controlador Virtio haga que el lado del usuario vhost se bloquee enviando un paquete con una solicitud de descarga de suma de comprobaci\u00f3n Tx y un desplazamiento csum_start no v\u00e1lido."}], "metrics": {"cvssMetricV30": [{"source": "secalert@redhat.com", "type": "Secondary", "cvssData": {"version": "3.0", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "baseScore": 7.4, "baseSeverity": "HIGH", "attackVector": "ADJACENT_NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 4.0}]}, "weaknesses": [{"source": "secalert@redhat.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-125"}]}], "references": [{"url": "https://access.redhat.com/errata/RHSA-2025:0208", "source": "secalert@redhat.com"}, {"url": "https://access.redhat.com/errata/RHSA-2025:0209", "source": "secalert@redhat.com"}, {"url": "https://access.redhat.com/errata/RHSA-2025:0210", "source": "secalert@redhat.com"}, {"url": "https://access.redhat.com/errata/RHSA-2025:0211", "source": "secalert@redhat.com"}, {"url": "https://access.redhat.com/errata/RHSA-2025:0220", "source": "secalert@redhat.com"}, {"url": "https://access.redhat.com/errata/RHSA-2025:0221", "source": "secalert@redhat.com"}, {"url": "https://access.redhat.com/errata/RHSA-2025:0222", "source": "secalert@redhat.com"}, {"url": "https://access.redhat.com/security/cve/CVE-2024-11614", "source": "secalert@redhat.com"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2327955", "source": "secalert@redhat.com"}, {"url": "http://www.openwall.com/lists/oss-security/2024/12/17/3", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-13237.json b/cve/2024/CVE-2024-13237.json new file mode 100644 index 00000000000..b7203929bb8 --- /dev/null +++ b/cve/2024/CVE-2024-13237.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-13237", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T19:15:17.437", "lastModified": "2025-01-09T19:15:17.437", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal File Entity (fieldable files) allows Cross-Site Scripting (XSS).This issue affects File Entity (fieldable files): from 7.X-* before 7.X-2.38."}], "metrics": {}, "weaknesses": [{"source": "mlhess@drupal.org", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://www.drupal.org/sa-contrib-2024-001", "source": "mlhess@drupal.org"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-13238.json b/cve/2024/CVE-2024-13238.json new file mode 100644 index 00000000000..6b13c24f8aa --- /dev/null +++ b/cve/2024/CVE-2024-13238.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-13238", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T19:15:17.557", "lastModified": "2025-01-09T19:15:17.557", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Typogrify allows Cross-Site Scripting (XSS).This issue affects Typogrify: from 0.0.0 before 1.3.0."}], "metrics": {}, "weaknesses": [{"source": "mlhess@drupal.org", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://www.drupal.org/sa-contrib-2024-002", "source": "mlhess@drupal.org"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-13239.json b/cve/2024/CVE-2024-13239.json new file mode 100644 index 00000000000..3fad8c36e24 --- /dev/null +++ b/cve/2024/CVE-2024-13239.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-13239", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T19:15:17.663", "lastModified": "2025-01-09T19:15:17.663", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Weak Authentication vulnerability in Drupal Two-factor Authentication (TFA) allows Authentication Abuse.This issue affects Two-factor Authentication (TFA): from 0.0.0 before 1.5.0."}], "metrics": {}, "weaknesses": [{"source": "mlhess@drupal.org", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-1390"}]}], "references": [{"url": "https://www.drupal.org/sa-contrib-2024-003", "source": "mlhess@drupal.org"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-13240.json b/cve/2024/CVE-2024-13240.json new file mode 100644 index 00000000000..f4170e0a3d2 --- /dev/null +++ b/cve/2024/CVE-2024-13240.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-13240", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T19:15:17.780", "lastModified": "2025-01-09T19:15:17.780", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper Access Control vulnerability in Drupal Open Social allows Collect Data from Common Resource Locations.This issue affects Open Social: from 0.0.0 before 12.05."}], "metrics": {}, "weaknesses": [{"source": "mlhess@drupal.org", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-284"}]}], "references": [{"url": "https://www.drupal.org/sa-contrib-2024-004", "source": "mlhess@drupal.org"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-13241.json b/cve/2024/CVE-2024-13241.json new file mode 100644 index 00000000000..4f4dacbecfe --- /dev/null +++ b/cve/2024/CVE-2024-13241.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-13241", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T19:15:17.910", "lastModified": "2025-01-09T19:15:17.910", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper Authorization vulnerability in Drupal Open Social allows Collect Data from Common Resource Locations.This issue affects Open Social: from 0.0.0 before 12.0.5."}], "metrics": {}, "weaknesses": [{"source": "mlhess@drupal.org", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-285"}]}], "references": [{"url": "https://www.drupal.org/sa-contrib-2024-005", "source": "mlhess@drupal.org"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-13242.json b/cve/2024/CVE-2024-13242.json new file mode 100644 index 00000000000..06e34e45819 --- /dev/null +++ b/cve/2024/CVE-2024-13242.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-13242", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T19:15:18.033", "lastModified": "2025-01-09T19:15:18.033", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Exposed Dangerous Method or Function vulnerability in Drupal Swift Mailer allows Resource Location Spoofing.This issue affects Swift Mailer: *.*."}], "metrics": {}, "weaknesses": [{"source": "mlhess@drupal.org", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-749"}]}], "references": [{"url": "https://www.drupal.org/sa-contrib-2024-006", "source": "mlhess@drupal.org"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-13243.json b/cve/2024/CVE-2024-13243.json new file mode 100644 index 00000000000..5752497fa9a --- /dev/null +++ b/cve/2024/CVE-2024-13243.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-13243", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T19:15:18.140", "lastModified": "2025-01-09T19:15:18.140", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Missing Authorization vulnerability in Drupal Entity Delete Log allows Forceful Browsing.This issue affects Entity Delete Log: from 0.0.0 before 1.1.1."}], "metrics": {}, "weaknesses": [{"source": "mlhess@drupal.org", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-862"}]}], "references": [{"url": "https://www.drupal.org/sa-contrib-2024-007", "source": "mlhess@drupal.org"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-13244.json b/cve/2024/CVE-2024-13244.json new file mode 100644 index 00000000000..fad73eef006 --- /dev/null +++ b/cve/2024/CVE-2024-13244.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-13244", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T19:15:18.250", "lastModified": "2025-01-09T19:15:18.250", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Drupal Migrate Tools allows Cross Site Request Forgery.This issue affects Migrate Tools: from 0.0.0 before 6.0.3."}], "metrics": {}, "weaknesses": [{"source": "mlhess@drupal.org", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-352"}]}], "references": [{"url": "https://www.drupal.org/sa-contrib-2024-008", "source": "mlhess@drupal.org"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-13245.json b/cve/2024/CVE-2024-13245.json new file mode 100644 index 00000000000..1cf00d34620 --- /dev/null +++ b/cve/2024/CVE-2024-13245.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-13245", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T19:15:18.370", "lastModified": "2025-01-09T19:15:18.370", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal CKEditor 4 LTS - WYSIWYG HTML editor allows Cross-Site Scripting (XSS).This issue affects CKEditor 4 LTS - WYSIWYG HTML editor: from 1.0.0 before 1.0.1."}], "metrics": {}, "weaknesses": [{"source": "mlhess@drupal.org", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://www.drupal.org/sa-contrib-2024-009", "source": "mlhess@drupal.org"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-13246.json b/cve/2024/CVE-2024-13246.json new file mode 100644 index 00000000000..54c4baa1547 --- /dev/null +++ b/cve/2024/CVE-2024-13246.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-13246", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T19:15:18.497", "lastModified": "2025-01-09T19:15:18.497", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper Ownership Management vulnerability in Drupal Node Access Rebuild Progressive allows Target Influence via Framing.This issue affects Node Access Rebuild Progressive: from 0.0.0 before 2.0.2."}], "metrics": {}, "weaknesses": [{"source": "mlhess@drupal.org", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-282"}]}], "references": [{"url": "https://www.drupal.org/sa-contrib-2024-010", "source": "mlhess@drupal.org"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-13247.json b/cve/2024/CVE-2024-13247.json new file mode 100644 index 00000000000..736f738a7b0 --- /dev/null +++ b/cve/2024/CVE-2024-13247.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-13247", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T19:15:18.610", "lastModified": "2025-01-09T19:15:18.610", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Coffee allows Cross-Site Scripting (XSS).This issue affects Coffee: from 0.0.0 before 1.4.0."}], "metrics": {}, "weaknesses": [{"source": "mlhess@drupal.org", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://www.drupal.org/sa-contrib-2024-011", "source": "mlhess@drupal.org"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-13248.json b/cve/2024/CVE-2024-13248.json new file mode 100644 index 00000000000..c7cffc99e46 --- /dev/null +++ b/cve/2024/CVE-2024-13248.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-13248", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T19:15:18.730", "lastModified": "2025-01-09T19:15:18.730", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Incorrect Privilege Assignment vulnerability in Drupal Private content allows Target Influence via Framing.This issue affects Private content: from 0.0.0 before 2.1.0."}], "metrics": {}, "weaknesses": [{"source": "mlhess@drupal.org", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-266"}]}], "references": [{"url": "https://www.drupal.org/sa-contrib-2024-012", "source": "mlhess@drupal.org"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-13249.json b/cve/2024/CVE-2024-13249.json new file mode 100644 index 00000000000..cad1965f10e --- /dev/null +++ b/cve/2024/CVE-2024-13249.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-13249", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T19:15:18.857", "lastModified": "2025-01-09T19:15:18.857", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper Ownership Management vulnerability in Drupal Node Access Rebuild Progressive allows Target Influence via Framing.This issue affects Node Access Rebuild Progressive: from 7.X-1.0 before 7.X-1.2."}], "metrics": {}, "weaknesses": [{"source": "mlhess@drupal.org", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-282"}]}], "references": [{"url": "https://www.drupal.org/sa-contrib-2024-013", "source": "mlhess@drupal.org"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-13250.json b/cve/2024/CVE-2024-13250.json new file mode 100644 index 00000000000..85e8cc8b841 --- /dev/null +++ b/cve/2024/CVE-2024-13250.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-13250", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T19:15:18.980", "lastModified": "2025-01-09T19:15:18.980", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Drupal Drupal Symfony Mailer Lite allows Cross Site Request Forgery.This issue affects Drupal Symfony Mailer Lite: from 0.0.0 before 1.0.6."}], "metrics": {}, "weaknesses": [{"source": "mlhess@drupal.org", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-352"}]}], "references": [{"url": "https://www.drupal.org/sa-contrib-2024-014", "source": "mlhess@drupal.org"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-13251.json b/cve/2024/CVE-2024-13251.json new file mode 100644 index 00000000000..5da6af92fdf --- /dev/null +++ b/cve/2024/CVE-2024-13251.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-13251", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T19:15:19.093", "lastModified": "2025-01-09T19:15:19.093", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Incorrect Privilege Assignment vulnerability in Drupal Registration role allows Privilege Escalation.This issue affects Registration role: from 0.0.0 before 2.0.1."}], "metrics": {}, "weaknesses": [{"source": "mlhess@drupal.org", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-266"}]}], "references": [{"url": "https://www.drupal.org/sa-contrib-2024-015", "source": "mlhess@drupal.org"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-13252.json b/cve/2024/CVE-2024-13252.json new file mode 100644 index 00000000000..dc543912c0e --- /dev/null +++ b/cve/2024/CVE-2024-13252.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-13252", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T19:15:19.207", "lastModified": "2025-01-09T19:15:19.207", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal TacJS allows Cross-Site Scripting (XSS).This issue affects TacJS: from 0.0.0 before 6.5.0."}], "metrics": {}, "weaknesses": [{"source": "mlhess@drupal.org", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://www.drupal.org/sa-contrib-2024-016", "source": "mlhess@drupal.org"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-13253.json b/cve/2024/CVE-2024-13253.json new file mode 100644 index 00000000000..d954b32b619 --- /dev/null +++ b/cve/2024/CVE-2024-13253.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-13253", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T19:15:19.317", "lastModified": "2025-01-09T19:15:19.317", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Incorrect Authorization vulnerability in Drupal Advanced PWA inc Push Notifications allows Forceful Browsing.This issue affects Advanced PWA inc Push Notifications: from 0.0.0 before 1.5.0."}], "metrics": {}, "weaknesses": [{"source": "mlhess@drupal.org", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-863"}]}], "references": [{"url": "https://www.drupal.org/sa-contrib-2024-017", "source": "mlhess@drupal.org"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-13254.json b/cve/2024/CVE-2024-13254.json new file mode 100644 index 00000000000..869bdf4d736 --- /dev/null +++ b/cve/2024/CVE-2024-13254.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-13254", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T19:15:19.437", "lastModified": "2025-01-09T19:15:19.437", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Insertion of Sensitive Information Into Sent Data vulnerability in Drupal REST Views allows Forceful Browsing.This issue affects REST Views: from 0.0.0 before 3.0.1."}], "metrics": {}, "weaknesses": [{"source": "mlhess@drupal.org", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-201"}]}], "references": [{"url": "https://www.drupal.org/sa-contrib-2024-018", "source": "mlhess@drupal.org"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-13255.json b/cve/2024/CVE-2024-13255.json new file mode 100644 index 00000000000..ac8647ecdba --- /dev/null +++ b/cve/2024/CVE-2024-13255.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-13255", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T19:15:19.540", "lastModified": "2025-01-09T19:15:19.540", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Exposure of Sensitive Information Through Data Queries vulnerability in Drupal RESTful Web Services allows Forceful Browsing.This issue affects RESTful Web Services: from 7.X-2.0 before 7.X-2.10."}], "metrics": {}, "weaknesses": [{"source": "mlhess@drupal.org", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-202"}]}], "references": [{"url": "https://www.drupal.org/sa-contrib-2024-019", "source": "mlhess@drupal.org"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-13256.json b/cve/2024/CVE-2024-13256.json new file mode 100644 index 00000000000..655058f6f5f --- /dev/null +++ b/cve/2024/CVE-2024-13256.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-13256", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T19:15:19.660", "lastModified": "2025-01-09T19:15:19.660", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Insufficient Granularity of Access Control vulnerability in Drupal Email Contact allows Forceful Browsing.This issue affects Email Contact: from 0.0.0 before 2.0.4."}], "metrics": {}, "weaknesses": [{"source": "mlhess@drupal.org", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-1220"}]}], "references": [{"url": "https://www.drupal.org/sa-contrib-2024-020", "source": "mlhess@drupal.org"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-13257.json b/cve/2024/CVE-2024-13257.json new file mode 100644 index 00000000000..cbfd7079a05 --- /dev/null +++ b/cve/2024/CVE-2024-13257.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-13257", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T19:15:19.773", "lastModified": "2025-01-09T19:15:19.773", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Incorrect Authorization vulnerability in Drupal Commerce View Receipt allows Forceful Browsing.This issue affects Commerce View Receipt: from 0.0.0 before 1.0.3."}], "metrics": {}, "weaknesses": [{"source": "mlhess@drupal.org", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-863"}]}], "references": [{"url": "https://www.drupal.org/sa-contrib-2024-021", "source": "mlhess@drupal.org"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-13258.json b/cve/2024/CVE-2024-13258.json new file mode 100644 index 00000000000..a6be68afa00 --- /dev/null +++ b/cve/2024/CVE-2024-13258.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-13258", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T19:15:19.887", "lastModified": "2025-01-09T19:15:19.887", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Incorrect Authorization vulnerability in Drupal Drupal REST & JSON API Authentication allows Forceful Browsing.This issue affects Drupal REST & JSON API Authentication: from 0.0.0 before 2.0.13."}], "metrics": {}, "weaknesses": [{"source": "mlhess@drupal.org", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-863"}]}], "references": [{"url": "https://www.drupal.org/sa-contrib-2024-022", "source": "mlhess@drupal.org"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-13259.json b/cve/2024/CVE-2024-13259.json new file mode 100644 index 00000000000..711b65d084a --- /dev/null +++ b/cve/2024/CVE-2024-13259.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-13259", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T19:15:19.997", "lastModified": "2025-01-09T19:15:19.997", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Insertion of Sensitive Information Into Sent Data vulnerability in Drupal Image Sizes allows Forceful Browsing.This issue affects Image Sizes: from 0.0.0 before 3.0.2."}], "metrics": {}, "weaknesses": [{"source": "mlhess@drupal.org", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-201"}]}], "references": [{"url": "https://www.drupal.org/sa-contrib-2024-023", "source": "mlhess@drupal.org"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-31988.json b/cve/2024/CVE-2024-31988.json index e5f4a372515..3fb7133245b 100644 --- a/cve/2024/CVE-2024-31988.json +++ b/cve/2024/CVE-2024-31988.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-31988", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-10T21:15:07.297", "lastModified": "2024-11-21T09:14:17.400", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "XWiki Platform is a generic wiki platform. Starting in version 13.9-rc-1 and prior to versions 4.10.19, 15.5.4, and 15.10-rc-1, when the realtime editor is installed in XWiki, it allows arbitrary remote code execution with the interaction of an admin user with programming right. More precisely, by getting an admin user to either visit a crafted URL or to view an image with this URL that could be in a comment, the attacker can get the admin to execute arbitrary XWiki syntax including scripting macros with Groovy or Python code. This compromises the confidentiality, integrity and availability of the whole XWiki installation. This vulnerability has been patched in XWiki 14.10.19, 15.5.4 and 15.9. As a workaround, one may update `RTFrontend.ConvertHTML` manually with the patch. This will, however, break some synchronization processes in the realtime editor, so upgrading should be the preferred way on installations where this editor is used."}, {"lang": "es", "value": "XWiki Platform es una plataforma wiki gen\u00e9rica. A partir de la versi\u00f3n 13.9-rc-1 y anteriores a las versiones 4.10.19, 15.5.4 y 15.10-rc-1, cuando el editor en tiempo real est\u00e1 instalado en XWiki, permite la ejecuci\u00f3n remota de c\u00f3digo arbitrario con la interacci\u00f3n de un usuario administrador con programaci\u00f3n correcta. M\u00e1s precisamente, al lograr que un usuario administrador visite una URL manipulada o vea una imagen con esta URL que podr\u00eda estar en un comentario, el atacante puede lograr que el administrador ejecute sintaxis XWiki arbitraria, incluidas macros de scripts con c\u00f3digo Groovy o Python. Esto compromete la confidencialidad, integridad y disponibilidad de toda la instalaci\u00f3n de XWiki. Esta vulnerabilidad ha sido parcheada en XWiki 14.10.19, 15.5.4 y 15.9. Como workaround, se puede actualizar `RTFrontend.ConvertHTML` manualmente con el parche. Sin embargo, esto interrumpir\u00e1 algunos procesos de sincronizaci\u00f3n en el editor en tiempo real, por lo que la actualizaci\u00f3n deber\u00eda ser la forma preferida en instalaciones donde se utiliza este editor."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "baseScore": 9.6, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 6.0}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-352"}]}], "references": [{"url": "https://github.com/xwiki/xwiki-platform/commit/4896712ee6483da623f131be2e618f1f2b79cb8d", "source": "security-advisories@github.com"}, {"url": "https://github.com/xwiki/xwiki-platform/commit/9f8cc88497418750b09ce9fde5d67d840f038fbf", "source": "security-advisories@github.com"}, {"url": "https://github.com/xwiki/xwiki-platform/commit/d88da4572fb7d4f95e1f54bb0cce33fce3df08d9", "source": "security-advisories@github.com"}, {"url": "https://github.com/xwiki/xwiki-platform/commit/d9f5043da289ff106f08e23576746fd8baf98794", "source": "security-advisories@github.com"}, {"url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-r5vh-gc3r-r24w", "source": "security-advisories@github.com"}, {"url": "https://jira.xwiki.org/browse/XWIKI-21424", "source": "security-advisories@github.com"}, {"url": "https://github.com/xwiki/xwiki-platform/commit/4896712ee6483da623f131be2e618f1f2b79cb8d", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/xwiki/xwiki-platform/commit/9f8cc88497418750b09ce9fde5d67d840f038fbf", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/xwiki/xwiki-platform/commit/d88da4572fb7d4f95e1f54bb0cce33fce3df08d9", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/xwiki/xwiki-platform/commit/d9f5043da289ff106f08e23576746fd8baf98794", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-r5vh-gc3r-r24w", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://jira.xwiki.org/browse/XWIKI-21424", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-31988", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-10T21:15:07.297", "lastModified": "2025-01-09T18:54:53.390", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "XWiki Platform is a generic wiki platform. Starting in version 13.9-rc-1 and prior to versions 4.10.19, 15.5.4, and 15.10-rc-1, when the realtime editor is installed in XWiki, it allows arbitrary remote code execution with the interaction of an admin user with programming right. More precisely, by getting an admin user to either visit a crafted URL or to view an image with this URL that could be in a comment, the attacker can get the admin to execute arbitrary XWiki syntax including scripting macros with Groovy or Python code. This compromises the confidentiality, integrity and availability of the whole XWiki installation. This vulnerability has been patched in XWiki 14.10.19, 15.5.4 and 15.9. As a workaround, one may update `RTFrontend.ConvertHTML` manually with the patch. This will, however, break some synchronization processes in the realtime editor, so upgrading should be the preferred way on installations where this editor is used."}, {"lang": "es", "value": "XWiki Platform es una plataforma wiki gen\u00e9rica. A partir de la versi\u00f3n 13.9-rc-1 y anteriores a las versiones 4.10.19, 15.5.4 y 15.10-rc-1, cuando el editor en tiempo real est\u00e1 instalado en XWiki, permite la ejecuci\u00f3n remota de c\u00f3digo arbitrario con la interacci\u00f3n de un usuario administrador con programaci\u00f3n correcta. M\u00e1s precisamente, al lograr que un usuario administrador visite una URL manipulada o vea una imagen con esta URL que podr\u00eda estar en un comentario, el atacante puede lograr que el administrador ejecute sintaxis XWiki arbitraria, incluidas macros de scripts con c\u00f3digo Groovy o Python. Esto compromete la confidencialidad, integridad y disponibilidad de toda la instalaci\u00f3n de XWiki. Esta vulnerabilidad ha sido parcheada en XWiki 14.10.19, 15.5.4 y 15.9. Como workaround, se puede actualizar `RTFrontend.ConvertHTML` manualmente con el parche. Sin embargo, esto interrumpir\u00e1 algunos procesos de sincronizaci\u00f3n en el editor en tiempo real, por lo que la actualizaci\u00f3n deber\u00eda ser la forma preferida en instalaciones donde se utiliza este editor."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "baseScore": 9.6, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 6.0}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "baseScore": 8.8, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-352"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-352"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*", "versionStartIncluding": "13.9", "versionEndExcluding": "14.10.19", "matchCriteriaId": "C98B05F5-893C-40C4-A707-4230DF901C0B"}, {"vulnerable": true, "criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*", "versionStartIncluding": "15.0", "versionEndExcluding": "15.5.4", "matchCriteriaId": "C15AC764-BCCE-4AF3-98F5-28EC637500A4"}, {"vulnerable": true, "criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*", "versionStartIncluding": "15.6", "versionEndExcluding": "15.9", "matchCriteriaId": "3E8A87CB-01A7-4C55-99FF-93FAAC70532B"}]}]}], "references": [{"url": "https://github.com/xwiki/xwiki-platform/commit/4896712ee6483da623f131be2e618f1f2b79cb8d", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/xwiki/xwiki-platform/commit/9f8cc88497418750b09ce9fde5d67d840f038fbf", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/xwiki/xwiki-platform/commit/d88da4572fb7d4f95e1f54bb0cce33fce3df08d9", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/xwiki/xwiki-platform/commit/d9f5043da289ff106f08e23576746fd8baf98794", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-r5vh-gc3r-r24w", "source": "security-advisories@github.com", "tags": ["Vendor Advisory"]}, {"url": "https://jira.xwiki.org/browse/XWIKI-21424", "source": "security-advisories@github.com", "tags": ["Exploit", "Vendor Advisory"]}, {"url": "https://github.com/xwiki/xwiki-platform/commit/4896712ee6483da623f131be2e618f1f2b79cb8d", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/xwiki/xwiki-platform/commit/9f8cc88497418750b09ce9fde5d67d840f038fbf", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/xwiki/xwiki-platform/commit/d88da4572fb7d4f95e1f54bb0cce33fce3df08d9", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/xwiki/xwiki-platform/commit/d9f5043da289ff106f08e23576746fd8baf98794", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-r5vh-gc3r-r24w", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}, {"url": "https://jira.xwiki.org/browse/XWIKI-21424", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-31996.json b/cve/2024/CVE-2024-31996.json index 2833861530a..e52b34a5086 100644 --- a/cve/2024/CVE-2024-31996.json +++ b/cve/2024/CVE-2024-31996.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-31996", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-10T21:15:07.510", "lastModified": "2024-11-21T09:14:18.477", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "XWiki Platform is a generic wiki platform. Starting in version 3.0.1 and prior to versions 4.10.19, 15.5.4, and 15.10-rc-1, the HTML escaping of escaping tool that is used in XWiki doesn't escape `{`, which, when used in certain places, allows XWiki syntax injection and thereby remote code execution. The vulnerability has been fixed in XWiki 14.10.19, 15.5.5, and 15.9 RC1. Apart from upgrading, there is no generic workaround. However, replacing `$escapetool.html` by `$escapetool.xml` in XWiki documents fixes the vulnerability. In a standard XWiki installation, the maintainers are only aware of the document `Panels.PanelLayoutUpdate` that exposes this vulnerability, patching this document is thus a workaround. Any extension could expose this vulnerability and might thus require patching, too."}, {"lang": "es", "value": "XWiki Platform es una plataforma wiki gen\u00e9rica. A partir de la versi\u00f3n 3.0.1 y anteriores a las versiones 4.10.19, 15.5.4 y 15.10-rc-1, la herramienta de escape HTML que se usa en XWiki no escapa a `{`, que, cuando se usa en ciertos lugares, permite la inyecci\u00f3n de sintaxis XWiki y, por lo tanto, la ejecuci\u00f3n remota de c\u00f3digo. La vulnerabilidad se solucion\u00f3 en XWiki 14.10.19, 15.5.5 y 15.9 RC1. Aparte de la actualizaci\u00f3n, no existe una workaround gen\u00e9rica. Sin embargo, reemplazar `$escapetool.html` por `$escapetool.xml` en los documentos XWiki soluciona la vulnerabilidad. En una instalaci\u00f3n est\u00e1ndar de XWiki, los mantenedores s\u00f3lo conocen el documento `Panels.PanelLayoutUpdate` que expone esta vulnerabilidad, por lo que parchear este documento es una workaround. Cualquier extensi\u00f3n podr\u00eda exponer esta vulnerabilidad y, por lo tanto, tambi\u00e9n podr\u00eda requerir parches."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "baseScore": 10.0, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 6.0}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-95"}]}], "references": [{"url": "https://github.com/xwiki/xwiki-commons/commit/b0805160ec7b01ee12417e79cb384e60ae4817aa", "source": "security-advisories@github.com"}, {"url": "https://github.com/xwiki/xwiki-commons/commit/b94142e2a66ec32e89eacab67c3da8d91f5ef93a", "source": "security-advisories@github.com"}, {"url": "https://github.com/xwiki/xwiki-commons/commit/ed7ff515a2436a1c6dcbd0c6ca0c41e434d58915", "source": "security-advisories@github.com"}, {"url": "https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-hf43-47q4-fhq5", "source": "security-advisories@github.com"}, {"url": "https://jira.xwiki.org/browse/XCOMMONS-2828", "source": "security-advisories@github.com"}, {"url": "https://jira.xwiki.org/browse/XWIKI-21438", "source": "security-advisories@github.com"}, {"url": "https://github.com/xwiki/xwiki-commons/commit/b0805160ec7b01ee12417e79cb384e60ae4817aa", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/xwiki/xwiki-commons/commit/b94142e2a66ec32e89eacab67c3da8d91f5ef93a", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/xwiki/xwiki-commons/commit/ed7ff515a2436a1c6dcbd0c6ca0c41e434d58915", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-hf43-47q4-fhq5", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://jira.xwiki.org/browse/XCOMMONS-2828", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://jira.xwiki.org/browse/XWIKI-21438", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-31996", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-10T21:15:07.510", "lastModified": "2025-01-09T18:50:19.793", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "XWiki Platform is a generic wiki platform. Starting in version 3.0.1 and prior to versions 4.10.19, 15.5.4, and 15.10-rc-1, the HTML escaping of escaping tool that is used in XWiki doesn't escape `{`, which, when used in certain places, allows XWiki syntax injection and thereby remote code execution. The vulnerability has been fixed in XWiki 14.10.19, 15.5.5, and 15.9 RC1. Apart from upgrading, there is no generic workaround. However, replacing `$escapetool.html` by `$escapetool.xml` in XWiki documents fixes the vulnerability. In a standard XWiki installation, the maintainers are only aware of the document `Panels.PanelLayoutUpdate` that exposes this vulnerability, patching this document is thus a workaround. Any extension could expose this vulnerability and might thus require patching, too."}, {"lang": "es", "value": "XWiki Platform es una plataforma wiki gen\u00e9rica. A partir de la versi\u00f3n 3.0.1 y anteriores a las versiones 4.10.19, 15.5.4 y 15.10-rc-1, la herramienta de escape HTML que se usa en XWiki no escapa a `{`, que, cuando se usa en ciertos lugares, permite la inyecci\u00f3n de sintaxis XWiki y, por lo tanto, la ejecuci\u00f3n remota de c\u00f3digo. La vulnerabilidad se solucion\u00f3 en XWiki 14.10.19, 15.5.5 y 15.9 RC1. Aparte de la actualizaci\u00f3n, no existe una workaround gen\u00e9rica. Sin embargo, reemplazar `$escapetool.html` por `$escapetool.xml` en los documentos XWiki soluciona la vulnerabilidad. En una instalaci\u00f3n est\u00e1ndar de XWiki, los mantenedores s\u00f3lo conocen el documento `Panels.PanelLayoutUpdate` que expone esta vulnerabilidad, por lo que parchear este documento es una workaround. Cualquier extensi\u00f3n podr\u00eda exponer esta vulnerabilidad y, por lo tanto, tambi\u00e9n podr\u00eda requerir parches."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "baseScore": 10.0, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 6.0}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 5.9}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-95"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-94"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.0.1", "versionEndExcluding": "14.10.19", "matchCriteriaId": "7385D8A9-93D4-4B6D-8030-67F9E3F3CB83"}, {"vulnerable": true, "criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*", "versionStartIncluding": "15.0", "versionEndExcluding": "15.5.4", "matchCriteriaId": "C15AC764-BCCE-4AF3-98F5-28EC637500A4"}, {"vulnerable": true, "criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*", "versionStartIncluding": "15.6", "versionEndExcluding": "15.9", "matchCriteriaId": "3E8A87CB-01A7-4C55-99FF-93FAAC70532B"}]}]}], "references": [{"url": "https://github.com/xwiki/xwiki-commons/commit/b0805160ec7b01ee12417e79cb384e60ae4817aa", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/xwiki/xwiki-commons/commit/b94142e2a66ec32e89eacab67c3da8d91f5ef93a", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/xwiki/xwiki-commons/commit/ed7ff515a2436a1c6dcbd0c6ca0c41e434d58915", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-hf43-47q4-fhq5", "source": "security-advisories@github.com", "tags": ["Vendor Advisory"]}, {"url": "https://jira.xwiki.org/browse/XCOMMONS-2828", "source": "security-advisories@github.com", "tags": ["Exploit", "Vendor Advisory"]}, {"url": "https://jira.xwiki.org/browse/XWIKI-21438", "source": "security-advisories@github.com", "tags": ["Exploit", "Vendor Advisory"]}, {"url": "https://github.com/xwiki/xwiki-commons/commit/b0805160ec7b01ee12417e79cb384e60ae4817aa", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/xwiki/xwiki-commons/commit/b94142e2a66ec32e89eacab67c3da8d91f5ef93a", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/xwiki/xwiki-commons/commit/ed7ff515a2436a1c6dcbd0c6ca0c41e434d58915", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-hf43-47q4-fhq5", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}, {"url": "https://jira.xwiki.org/browse/XCOMMONS-2828", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Vendor Advisory"]}, {"url": "https://jira.xwiki.org/browse/XWIKI-21438", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-31997.json b/cve/2024/CVE-2024-31997.json index 3c67a583bc7..ea02f8f2524 100644 --- a/cve/2024/CVE-2024-31997.json +++ b/cve/2024/CVE-2024-31997.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-31997", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-10T22:15:07.527", "lastModified": "2024-11-21T09:14:18.613", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "XWiki Platform is a generic wiki platform. Prior to versions 4.10.19, 15.5.4, and 15.10-rc-1, parameters of UI extensions are always interpreted as Velocity code and executed with programming rights. Any user with edit right on any document like the user's own profile can create UI extensions. This allows remote code execution and thereby impacts the confidentiality, integrity and availability of the whole XWiki installation. This vulnerability has been patched in XWiki 14.10.19, 15.5.4 and 15.9-RC1. No known workarounds are available."}, {"lang": "es", "value": "XWiki Platform es una plataforma wiki gen\u00e9rica. Antes de las versiones 4.10.19, 15.5.4 y 15.10-rc-1, los par\u00e1metros de las extensiones de UI siempre se interpretan como c\u00f3digo Velocity y se ejecutan con derechos de programaci\u00f3n. Cualquier usuario con derecho de edici\u00f3n en cualquier documento, como el propio perfil del usuario, puede crear extensiones de interfaz de usuario. Esto permite la ejecuci\u00f3n remota de c\u00f3digo y, por lo tanto, afecta la confidencialidad, integridad y disponibilidad de toda la instalaci\u00f3n de XWiki. Esta vulnerabilidad ha sido parcheada en XWiki 14.10.19, 15.5.4 y 15.9-RC1. No hay workarounds disponibles."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "baseScore": 9.9, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.1, "impactScore": 6.0}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-862"}]}], "references": [{"url": "https://github.com/xwiki/xwiki-platform/commit/171e7c7d0e56deaa7b3678657ae26ef95379b1ea", "source": "security-advisories@github.com"}, {"url": "https://github.com/xwiki/xwiki-platform/commit/1b2574eb966457ca4ef34e557376b8751d1be90d", "source": "security-advisories@github.com"}, {"url": "https://github.com/xwiki/xwiki-platform/commit/56748e154a9011f0d6239bec0823eaaeab6ec3f7", "source": "security-advisories@github.com"}, {"url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-c2gg-4gq4-jv5j", "source": "security-advisories@github.com"}, {"url": "https://jira.xwiki.org/browse/XWIKI-21335", "source": "security-advisories@github.com"}, {"url": "https://github.com/xwiki/xwiki-platform/commit/171e7c7d0e56deaa7b3678657ae26ef95379b1ea", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/xwiki/xwiki-platform/commit/1b2574eb966457ca4ef34e557376b8751d1be90d", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/xwiki/xwiki-platform/commit/56748e154a9011f0d6239bec0823eaaeab6ec3f7", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-c2gg-4gq4-jv5j", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://jira.xwiki.org/browse/XWIKI-21335", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-31997", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-10T22:15:07.527", "lastModified": "2025-01-09T19:02:51.310", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "XWiki Platform is a generic wiki platform. Prior to versions 4.10.19, 15.5.4, and 15.10-rc-1, parameters of UI extensions are always interpreted as Velocity code and executed with programming rights. Any user with edit right on any document like the user's own profile can create UI extensions. This allows remote code execution and thereby impacts the confidentiality, integrity and availability of the whole XWiki installation. This vulnerability has been patched in XWiki 14.10.19, 15.5.4 and 15.9-RC1. No known workarounds are available."}, {"lang": "es", "value": "XWiki Platform es una plataforma wiki gen\u00e9rica. Antes de las versiones 4.10.19, 15.5.4 y 15.10-rc-1, los par\u00e1metros de las extensiones de UI siempre se interpretan como c\u00f3digo Velocity y se ejecutan con derechos de programaci\u00f3n. Cualquier usuario con derecho de edici\u00f3n en cualquier documento, como el propio perfil del usuario, puede crear extensiones de interfaz de usuario. Esto permite la ejecuci\u00f3n remota de c\u00f3digo y, por lo tanto, afecta la confidencialidad, integridad y disponibilidad de toda la instalaci\u00f3n de XWiki. Esta vulnerabilidad ha sido parcheada en XWiki 14.10.19, 15.5.4 y 15.9-RC1. No hay workarounds disponibles."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "baseScore": 9.9, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.1, "impactScore": 6.0}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 8.8, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-862"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-862"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*", "versionEndExcluding": "14.10.19", "matchCriteriaId": "77F7026A-AE0D-4962-A75D-57E86DDFBD0E"}, {"vulnerable": true, "criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*", "versionStartIncluding": "15.0", "versionEndExcluding": "15.5.4", "matchCriteriaId": "C15AC764-BCCE-4AF3-98F5-28EC637500A4"}, {"vulnerable": true, "criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*", "versionStartIncluding": "15.6", "versionEndExcluding": "15.9", "matchCriteriaId": "3E8A87CB-01A7-4C55-99FF-93FAAC70532B"}]}]}], "references": [{"url": "https://github.com/xwiki/xwiki-platform/commit/171e7c7d0e56deaa7b3678657ae26ef95379b1ea", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/xwiki/xwiki-platform/commit/1b2574eb966457ca4ef34e557376b8751d1be90d", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/xwiki/xwiki-platform/commit/56748e154a9011f0d6239bec0823eaaeab6ec3f7", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-c2gg-4gq4-jv5j", "source": "security-advisories@github.com", "tags": ["Exploit", "Vendor Advisory"]}, {"url": "https://jira.xwiki.org/browse/XWIKI-21335", "source": "security-advisories@github.com", "tags": ["Exploit", "Vendor Advisory"]}, {"url": "https://github.com/xwiki/xwiki-platform/commit/171e7c7d0e56deaa7b3678657ae26ef95379b1ea", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/xwiki/xwiki-platform/commit/1b2574eb966457ca4ef34e557376b8751d1be90d", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/xwiki/xwiki-platform/commit/56748e154a9011f0d6239bec0823eaaeab6ec3f7", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-c2gg-4gq4-jv5j", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Vendor Advisory"]}, {"url": "https://jira.xwiki.org/browse/XWIKI-21335", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-32035.json b/cve/2024/CVE-2024-32035.json index 7927a897b91..7cb6f1b24f9 100644 --- a/cve/2024/CVE-2024-32035.json +++ b/cve/2024/CVE-2024-32035.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-32035", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-15T20:15:11.323", "lastModified": "2024-11-21T09:14:21.920", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "ImageSharp is a 2D graphics API. A vulnerability discovered in the ImageSharp library, where the processing of specially crafted files can lead to excessive memory usage in image decoders. The vulnerability is triggered when ImageSharp attempts to process image files that are designed to exploit this flaw. This flaw can be exploited to cause a denial of service (DoS) by depleting process memory, thereby affecting applications and services that rely on ImageSharp for image processing tasks. Users and administrators are advised to update to the latest version of ImageSharp that addresses this vulnerability to mitigate the risk of exploitation. The problem has been patched in v3.1.4 and v2.1.8."}, {"lang": "es", "value": "ImageSharp es una API de gr\u00e1ficos 2D. Una vulnerabilidad descubierta en la librer\u00eda ImageSharp, donde el procesamiento de archivos especialmente manipulados puede provocar un uso excesivo de memoria en los decodificadores de im\u00e1genes. La vulnerabilidad se activa cuando ImageSharp intenta procesar archivos de imagen manipulados para explotar esta falla. Esta falla puede explotarse para provocar una denegaci\u00f3n de servicio (DoS) al agotar la memoria del proceso, afectando as\u00ed a las aplicaciones y servicios que dependen de ImageSharp para las tareas de procesamiento de im\u00e1genes. Se recomienda a los usuarios y administradores que actualicen a la \u00faltima versi\u00f3n de ImageSharp que solucione esta vulnerabilidad para mitigar el riesgo de explotaci\u00f3n. El problema se solucion\u00f3 en v3.1.4 y v2.1.8."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "baseScore": 5.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "LOW"}, "exploitabilityScore": 3.9, "impactScore": 1.4}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-789"}]}], "references": [{"url": "https://docs.sixlabors.com/articles/imagesharp.web/processingcommands.html#securing-processing-commands", "source": "security-advisories@github.com"}, {"url": "https://docs.sixlabors.com/articles/imagesharp/security.html", "source": "security-advisories@github.com"}, {"url": "https://github.com/SixLabors/ImageSharp/commit/b6b08ac3e7cea8da5ac1e90f7c0b67dd254535c3", "source": "security-advisories@github.com"}, {"url": "https://github.com/SixLabors/ImageSharp/commit/f21d64188e59ae9464ff462056a5e29d8e618b27", "source": "security-advisories@github.com"}, {"url": "https://github.com/SixLabors/ImageSharp/security/advisories/GHSA-g85r-6x2q-45w7", "source": "security-advisories@github.com"}, {"url": "https://docs.sixlabors.com/articles/imagesharp.web/processingcommands.html#securing-processing-commands", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://docs.sixlabors.com/articles/imagesharp/security.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/SixLabors/ImageSharp/commit/b6b08ac3e7cea8da5ac1e90f7c0b67dd254535c3", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/SixLabors/ImageSharp/commit/f21d64188e59ae9464ff462056a5e29d8e618b27", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/SixLabors/ImageSharp/security/advisories/GHSA-g85r-6x2q-45w7", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-32035", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-15T20:15:11.323", "lastModified": "2025-01-09T18:35:14.097", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "ImageSharp is a 2D graphics API. A vulnerability discovered in the ImageSharp library, where the processing of specially crafted files can lead to excessive memory usage in image decoders. The vulnerability is triggered when ImageSharp attempts to process image files that are designed to exploit this flaw. This flaw can be exploited to cause a denial of service (DoS) by depleting process memory, thereby affecting applications and services that rely on ImageSharp for image processing tasks. Users and administrators are advised to update to the latest version of ImageSharp that addresses this vulnerability to mitigate the risk of exploitation. The problem has been patched in v3.1.4 and v2.1.8."}, {"lang": "es", "value": "ImageSharp es una API de gr\u00e1ficos 2D. Una vulnerabilidad descubierta en la librer\u00eda ImageSharp, donde el procesamiento de archivos especialmente manipulados puede provocar un uso excesivo de memoria en los decodificadores de im\u00e1genes. La vulnerabilidad se activa cuando ImageSharp intenta procesar archivos de imagen manipulados para explotar esta falla. Esta falla puede explotarse para provocar una denegaci\u00f3n de servicio (DoS) al agotar la memoria del proceso, afectando as\u00ed a las aplicaciones y servicios que dependen de ImageSharp para las tareas de procesamiento de im\u00e1genes. Se recomienda a los usuarios y administradores que actualicen a la \u00faltima versi\u00f3n de ImageSharp que solucione esta vulnerabilidad para mitigar el riesgo de explotaci\u00f3n. El problema se solucion\u00f3 en v3.1.4 y v2.1.8."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "baseScore": 5.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "LOW"}, "exploitabilityScore": 3.9, "impactScore": 1.4}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-789"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-770"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:sixlabors:imagesharp:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.1.8", "matchCriteriaId": "A06E81B0-6C7F-43A9-B154-E5BF07241973"}, {"vulnerable": true, "criteria": "cpe:2.3:a:sixlabors:imagesharp:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.0.0", "versionEndExcluding": "3.1.4", "matchCriteriaId": "CDB61675-C17E-41D0-AFBF-24E39F753A0A"}]}]}], "references": [{"url": "https://docs.sixlabors.com/articles/imagesharp.web/processingcommands.html#securing-processing-commands", "source": "security-advisories@github.com", "tags": ["Product"]}, {"url": "https://docs.sixlabors.com/articles/imagesharp/security.html", "source": "security-advisories@github.com", "tags": ["Product"]}, {"url": "https://github.com/SixLabors/ImageSharp/commit/b6b08ac3e7cea8da5ac1e90f7c0b67dd254535c3", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/SixLabors/ImageSharp/commit/f21d64188e59ae9464ff462056a5e29d8e618b27", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/SixLabors/ImageSharp/security/advisories/GHSA-g85r-6x2q-45w7", "source": "security-advisories@github.com", "tags": ["Vendor Advisory"]}, {"url": "https://docs.sixlabors.com/articles/imagesharp.web/processingcommands.html#securing-processing-commands", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Product"]}, {"url": "https://docs.sixlabors.com/articles/imagesharp/security.html", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Product"]}, {"url": "https://github.com/SixLabors/ImageSharp/commit/b6b08ac3e7cea8da5ac1e90f7c0b67dd254535c3", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/SixLabors/ImageSharp/commit/f21d64188e59ae9464ff462056a5e29d8e618b27", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/SixLabors/ImageSharp/security/advisories/GHSA-g85r-6x2q-45w7", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-32036.json b/cve/2024/CVE-2024-32036.json index 7fca975e690..639958fda87 100644 --- a/cve/2024/CVE-2024-32036.json +++ b/cve/2024/CVE-2024-32036.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-32036", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-15T20:15:11.543", "lastModified": "2024-11-21T09:14:22.033", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "ImageSharp is a 2D graphics API. A data leakage flaw was found in ImageSharp's JPEG and TGA decoders. This vulnerability is triggered when an attacker passes a specially crafted JPEG or TGA image file to a software using ImageSharp, potentially disclosing sensitive information from other parts of the software in the resulting image buffer. The problem has been patched in v3.1.4 and v2.1.8."}, {"lang": "es", "value": "ImageSharp es una API de gr\u00e1ficos 2D. Se encontr\u00f3 una falla de heap-use-after-free en los decodificadores JPEG y TGA de ImageSharp. Esta vulnerabilidad se activa cuando un atacante pasa un archivo de imagen JPEG o TGA especialmente manipulado a ImageSharp para su conversi\u00f3n, lo que podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n. El problema se solucion\u00f3 en v3.1.4 y v2.1.8."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", "baseScore": 5.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE"}, "exploitabilityScore": 1.6, "impactScore": 3.6}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-226"}]}], "references": [{"url": "https://github.com/SixLabors/ImageSharp/commit/8f0b4d3e680e78d479a88e7b1472bccd8f096d68", "source": "security-advisories@github.com"}, {"url": "https://github.com/SixLabors/ImageSharp/commit/da5f09a42513489fe359578d81cec2f15ba588ba", "source": "security-advisories@github.com"}, {"url": "https://github.com/SixLabors/ImageSharp/security/advisories/GHSA-5x7m-6737-26cr", "source": "security-advisories@github.com"}, {"url": "https://github.com/SixLabors/ImageSharp/commit/8f0b4d3e680e78d479a88e7b1472bccd8f096d68", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/SixLabors/ImageSharp/commit/da5f09a42513489fe359578d81cec2f15ba588ba", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/SixLabors/ImageSharp/security/advisories/GHSA-5x7m-6737-26cr", "source": "af854a3a-2127-422b-91ae-364da2661108"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-32036", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-15T20:15:11.543", "lastModified": "2025-01-09T18:14:46.097", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "ImageSharp is a 2D graphics API. A data leakage flaw was found in ImageSharp's JPEG and TGA decoders. This vulnerability is triggered when an attacker passes a specially crafted JPEG or TGA image file to a software using ImageSharp, potentially disclosing sensitive information from other parts of the software in the resulting image buffer. The problem has been patched in v3.1.4 and v2.1.8."}, {"lang": "es", "value": "ImageSharp es una API de gr\u00e1ficos 2D. Se encontr\u00f3 una falla de heap-use-after-free en los decodificadores JPEG y TGA de ImageSharp. Esta vulnerabilidad se activa cuando un atacante pasa un archivo de imagen JPEG o TGA especialmente manipulado a ImageSharp para su conversi\u00f3n, lo que podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n. El problema se solucion\u00f3 en v3.1.4 y v2.1.8."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", "baseScore": 5.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE"}, "exploitabilityScore": 1.6, "impactScore": 3.6}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-226"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-212"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:sixlabors:imagesharp:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.1.8", "matchCriteriaId": "A06E81B0-6C7F-43A9-B154-E5BF07241973"}, {"vulnerable": true, "criteria": "cpe:2.3:a:sixlabors:imagesharp:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.0.0", "versionEndExcluding": "3.1.4", "matchCriteriaId": "CDB61675-C17E-41D0-AFBF-24E39F753A0A"}]}]}], "references": [{"url": "https://github.com/SixLabors/ImageSharp/commit/8f0b4d3e680e78d479a88e7b1472bccd8f096d68", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/SixLabors/ImageSharp/commit/da5f09a42513489fe359578d81cec2f15ba588ba", "source": "security-advisories@github.com", "tags": ["Patch"]}, {"url": "https://github.com/SixLabors/ImageSharp/security/advisories/GHSA-5x7m-6737-26cr", "source": "security-advisories@github.com", "tags": ["Vendor Advisory"]}, {"url": "https://github.com/SixLabors/ImageSharp/commit/8f0b4d3e680e78d479a88e7b1472bccd8f096d68", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/SixLabors/ImageSharp/commit/da5f09a42513489fe359578d81cec2f15ba588ba", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"]}, {"url": "https://github.com/SixLabors/ImageSharp/security/advisories/GHSA-5x7m-6737-26cr", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-35314.json b/cve/2024/CVE-2024-35314.json index a707d889c0e..3fca7331197 100644 --- a/cve/2024/CVE-2024-35314.json +++ b/cve/2024/CVE-2024-35314.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-35314", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-21T21:15:05.533", "lastModified": "2024-11-08T18:15:16.867", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "A vulnerability in the Desktop Client of Mitel MiCollab through 9.7.1.110, and MiVoice Business Solution Virtual Instance (MiVB SVI) 1.0.0.25, could allow an unauthenticated attacker to conduct a command injection attack due to insufficient parameter sanitization. A successful exploit requires user interaction and could allow an attacker to execute arbitrary scripts."}, {"lang": "es", "value": "Una vulnerabilidad en el cliente de escritorio de Mitel MiCollab hasta la versi\u00f3n 9.7.1.110 y en MiVoice Business Solution Virtual Instance (MiVB SVI) 1.0.0.25 podr\u00eda permitir que un atacante no autenticado realice un ataque de inyecci\u00f3n de comandos debido a una desinfecci\u00f3n insuficiente de los par\u00e1metros. Una explotaci\u00f3n exitosa podr\u00eda permitir que un atacante ejecute scripts arbitrarios."}], "metrics": {"cvssMetricV31": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 5.9}]}, "weaknesses": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-94"}]}], "references": [{"url": "https://www.mitel.com/-/media/mitel/file/pdf/support/security-advisories/security-bulletin_24-0015-001-v3.pdf", "source": "cve@mitre.org"}, {"url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-24-0015", "source": "cve@mitre.org"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-35314", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-21T21:15:05.533", "lastModified": "2025-01-09T18:15:27.657", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "A vulnerability in the Desktop Client of Mitel MiCollab through 9.7.1.110, and MiVoice Business Solution Virtual Instance (MiVB SVI) 1.0.0.25, could allow an unauthenticated attacker to conduct a command injection attack due to insufficient parameter sanitization. A successful exploit requires user interaction and could allow an attacker to execute arbitrary scripts."}, {"lang": "es", "value": "Una vulnerabilidad en el cliente de escritorio de Mitel MiCollab hasta la versi\u00f3n 9.7.1.110 y en MiVoice Business Solution Virtual Instance (MiVB SVI) 1.0.0.25 podr\u00eda permitir que un atacante no autenticado realice un ataque de inyecci\u00f3n de comandos debido a una desinfecci\u00f3n insuficiente de los par\u00e1metros. Una explotaci\u00f3n exitosa podr\u00eda permitir que un atacante ejecute scripts arbitrarios."}], "metrics": {}, "references": [{"url": "https://www.mitel.com/-/media/mitel/file/pdf/support/security-advisories/security-bulletin_24-0015-001-v3.pdf", "source": "cve@mitre.org"}, {"url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-24-0015", "source": "cve@mitre.org"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-37392.json b/cve/2024/CVE-2024-37392.json index 4da3dc0d07f..e2587cb9007 100644 --- a/cve/2024/CVE-2024-37392.json +++ b/cve/2024/CVE-2024-37392.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-37392", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-23T21:15:07.253", "lastModified": "2024-12-03T18:15:13.410", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "A stored Cross-Site Scripting (XSS) vulnerability has been identified in SMSEagle software version < 6.0. The vulnerability arises because the application did not properly sanitize user input in the SMS messages in the inbox. This could allow an attacker to inject malicious JavaScript code into an SMS message, which gets executed when the SMS is viewed and specially interacted in web-GUI."}, {"lang": "es", "value": "Se ha identificado una vulnerabilidad de Cross-Site Scripting (XSS) almacenado en la versi\u00f3n del software SMSEagle < 6.0. La vulnerabilidad surge porque la aplicaci\u00f3n no desinfect\u00f3 adecuadamente la entrada del usuario en los mensajes SMS en la bandeja de entrada. Esto podr\u00eda permitir a un atacante inyectar c\u00f3digo JavaScript malicioso en un mensaje SMS, que se ejecuta cuando el SMS se ve y se interact\u00faa especialmente en la GUI web."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "baseScore": 6.1, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 2.7}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "baseScore": 6.1, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 2.7}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-79"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:smseagle:smseagle:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.0", "matchCriteriaId": "81C8A1F4-B480-4AC9-93F1-047DE326D2AF"}]}]}], "references": [{"url": "https://www.smseagle.eu/security-advisory/resolved-xss-in-smseagle-software-cve-2024-37392/", "source": "cve@mitre.org"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-37392", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-23T21:15:07.253", "lastModified": "2025-01-09T18:15:27.790", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "A stored Cross-Site Scripting (XSS) vulnerability has been identified in SMSEagle software version < 6.0. The vulnerability arises because the application did not properly sanitize user input in the SMS messages in the inbox. This could allow an attacker to inject malicious JavaScript code into an SMS message, which gets executed when the SMS is viewed and specially interacted in web-GUI."}, {"lang": "es", "value": "Se ha identificado una vulnerabilidad de Cross-Site Scripting (XSS) almacenado en la versi\u00f3n del software SMSEagle < 6.0. La vulnerabilidad surge porque la aplicaci\u00f3n no desinfect\u00f3 adecuadamente la entrada del usuario en los mensajes SMS en la bandeja de entrada. Esto podr\u00eda permitir a un atacante inyectar c\u00f3digo JavaScript malicioso en un mensaje SMS, que se ejecuta cuando el SMS se ve y se interact\u00faa especialmente en la GUI web."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "baseScore": 6.1, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 2.7}]}, "weaknesses": [{"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:smseagle:smseagle:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.0", "matchCriteriaId": "81C8A1F4-B480-4AC9-93F1-047DE326D2AF"}]}]}], "references": [{"url": "https://www.smseagle.eu/security-advisory/resolved-xss-in-smseagle-software-cve-2024-37392/", "source": "cve@mitre.org"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-3935.json b/cve/2024/CVE-2024-3935.json index b1a2d28d274..3481eef9964 100644 --- a/cve/2024/CVE-2024-3935.json +++ b/cve/2024/CVE-2024-3935.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-3935", "sourceIdentifier": "emo@eclipse.org", "published": "2024-10-30T12:15:03.090", "lastModified": "2024-11-01T12:57:03.417", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "In Eclipse Mosquito, versions from 2.0.0 through 2.0.18, if a Mosquitto broker is configured to create an outgoing bridge connection, and that bridge connection has an incoming topic configured that makes use of topic remapping, then if the remote connection sends a crafted PUBLISH packet to the broker a double free will occur with a subsequent crash of the broker."}, {"lang": "es", "value": "En Eclipse Mosquito, versiones desde 2.0.0 hasta 2.0.18, si un agente Mosquitto est\u00e1 configurado para crear una conexi\u00f3n de puente saliente y esa conexi\u00f3n de puente tiene un tema entrante configurado que hace uso de reasignaci\u00f3n de temas, entonces si la conexi\u00f3n remota env\u00eda un paquete PUBLISH manipulado al agente, se producir\u00e1 una doble liberaci\u00f3n con un bloqueo posterior del agente."}], "metrics": {"cvssMetricV40": [{"source": "emo@eclipse.org", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "baseScore": 6.0, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "PRESENT", "privilegesRequired": "LOW", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "LOW", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED"}}], "cvssMetricV31": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.6}]}, "weaknesses": [{"source": "emo@eclipse.org", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-415"}]}], "references": [{"url": "https://github.com/eclipse-mosquitto/mosquitto/commit/ae7a804dadac8f2aaedb24336df8496a9680fda9", "source": "emo@eclipse.org"}, {"url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/197", "source": "emo@eclipse.org"}, {"url": "https://mosquitto.org/blog/2024/10/version-2-0-19-released/", "source": "emo@eclipse.org"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-3935", "sourceIdentifier": "emo@eclipse.org", "published": "2024-10-30T12:15:03.090", "lastModified": "2025-01-09T18:15:28.337", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "In Eclipse Mosquito, versions from 2.0.0 through 2.0.18, if a Mosquitto broker is configured to create an outgoing bridge connection, and that bridge connection has an incoming topic configured that makes use of topic remapping, then if the remote connection sends a crafted PUBLISH packet to the broker a double free will occur with a subsequent crash of the broker."}, {"lang": "es", "value": "En Eclipse Mosquito, versiones desde 2.0.0 hasta 2.0.18, si un agente Mosquitto est\u00e1 configurado para crear una conexi\u00f3n de puente saliente y esa conexi\u00f3n de puente tiene un tema entrante configurado que hace uso de reasignaci\u00f3n de temas, entonces si la conexi\u00f3n remota env\u00eda un paquete PUBLISH manipulado al agente, se producir\u00e1 una doble liberaci\u00f3n con un bloqueo posterior del agente."}], "metrics": {"cvssMetricV40": [{"source": "emo@eclipse.org", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "baseScore": 6.0, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "PRESENT", "privilegesRequired": "LOW", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "LOW", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED"}}]}, "weaknesses": [{"source": "emo@eclipse.org", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-415"}]}], "references": [{"url": "https://github.com/eclipse-mosquitto/mosquitto/commit/ae7a804dadac8f2aaedb24336df8496a9680fda9", "source": "emo@eclipse.org"}, {"url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/197", "source": "emo@eclipse.org"}, {"url": "https://mosquitto.org/blog/2024/10/version-2-0-19-released/", "source": "emo@eclipse.org"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-39924.json b/cve/2024/CVE-2024-39924.json index 27b1464b3cc..46964436507 100644 --- a/cve/2024/CVE-2024-39924.json +++ b/cve/2024/CVE-2024-39924.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-39924", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-13T18:15:03.810", "lastModified": "2024-11-11T21:15:06.150", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "An issue was discovered in Vaultwarden (formerly Bitwarden_RS) 1.30.3. A vulnerability has been identified in the authentication and authorization process of the endpoint responsible for altering the metadata of an emergency access. It permits an attacker with granted emergency access to escalate their privileges by changing the access level and modifying the wait time. Consequently, the attacker can gain full control over the vault (when only intended to have read access) while bypassing the necessary wait period."}, {"lang": "es", "value": "Se descubri\u00f3 un problema en Vaultwarden (anteriormente Bitwarden_RS) 1.30.3. Se identific\u00f3 una vulnerabilidad en el proceso de autenticaci\u00f3n y autorizaci\u00f3n del endpoint responsable de alterar los metadatos de un acceso de emergencia. Permite que un atacante con acceso de emergencia concedido escale sus privilegios cambiando el nivel de acceso y modificando el tiempo de espera. En consecuencia, el atacante puede obtener control total sobre la b\u00f3veda (cuando solo se pretende que tenga acceso de lectura) mientras se salta el per\u00edodo de espera necesario."}], "metrics": {"cvssMetricV31": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "availabilityImpact": "NONE"}, "exploitabilityScore": 3.9, "impactScore": 3.6}]}, "weaknesses": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-269"}]}], "references": [{"url": "https://github.com/dani-garcia/vaultwarden/blob/1.30.3/src/api/core/emergency_access.rs#L115-L148", "source": "cve@mitre.org"}, {"url": "https://github.com/dani-garcia/vaultwarden/releases/tag/1.32.0", "source": "cve@mitre.org"}, {"url": "https://www.mgm-sp.com/cve/missing-authentication-check-for-emergency-access", "source": "cve@mitre.org"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-39924", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-13T18:15:03.810", "lastModified": "2025-01-09T18:15:27.987", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "An issue was discovered in Vaultwarden (formerly Bitwarden_RS) 1.30.3. A vulnerability has been identified in the authentication and authorization process of the endpoint responsible for altering the metadata of an emergency access. It permits an attacker with granted emergency access to escalate their privileges by changing the access level and modifying the wait time. Consequently, the attacker can gain full control over the vault (when only intended to have read access) while bypassing the necessary wait period."}, {"lang": "es", "value": "Se descubri\u00f3 un problema en Vaultwarden (anteriormente Bitwarden_RS) 1.30.3. Se identific\u00f3 una vulnerabilidad en el proceso de autenticaci\u00f3n y autorizaci\u00f3n del endpoint responsable de alterar los metadatos de un acceso de emergencia. Permite que un atacante con acceso de emergencia concedido escale sus privilegios cambiando el nivel de acceso y modificando el tiempo de espera. En consecuencia, el atacante puede obtener control total sobre la b\u00f3veda (cuando solo se pretende que tenga acceso de lectura) mientras se salta el per\u00edodo de espera necesario."}], "metrics": {}, "references": [{"url": "https://github.com/dani-garcia/vaultwarden/blob/1.30.3/src/api/core/emergency_access.rs#L115-L148", "source": "cve@mitre.org"}, {"url": "https://github.com/dani-garcia/vaultwarden/releases/tag/1.32.0", "source": "cve@mitre.org"}, {"url": "https://www.mgm-sp.com/cve/missing-authentication-check-for-emergency-access", "source": "cve@mitre.org"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-39925.json b/cve/2024/CVE-2024-39925.json index 978ec725de0..18999633476 100644 --- a/cve/2024/CVE-2024-39925.json +++ b/cve/2024/CVE-2024-39925.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-39925", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-13T18:15:03.927", "lastModified": "2024-11-11T21:15:06.237", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "An issue was discovered in Vaultwarden (formerly Bitwarden_RS) 1.30.3. It lacks an offboarding process for members who leave an organization. As a result, the shared organization key is not rotated when a member departs. Consequently, the departing member, whose access should be revoked, retains a copy of the organization key. Additionally, the application fails to adequately protect some encrypted data stored on the server. Consequently, an authenticated user could gain unauthorized access to encrypted data of any organization, even if the user is not a member of the targeted organization. However, the user would need to know the corresponding organizationId. Hence, if a user (whose access to an organization has been revoked) already possesses the organization key, that user could use the key to decrypt the leaked data."}, {"lang": "es", "value": "Se descubri\u00f3 un problema en Vaultwarden (anteriormente Bitwarden_RS) 1.30.3. Carece de un proceso de desvinculaci\u00f3n para los miembros que abandonan una organizaci\u00f3n. Como resultado, la clave de organizaci\u00f3n compartida no se rota cuando un miembro se va. En consecuencia, el miembro que se va, cuyo acceso debe revocarse, conserva una copia de la clave de la organizaci\u00f3n. Adem\u00e1s, la aplicaci\u00f3n no protege adecuadamente algunos datos cifrados almacenados en el servidor. En consecuencia, un usuario autenticado podr\u00eda obtener acceso no autorizado a los datos cifrados de cualquier organizaci\u00f3n, incluso si el usuario no es miembro de la organizaci\u00f3n en cuesti\u00f3n. Sin embargo, el usuario necesitar\u00eda saber el ID de organizaci\u00f3n correspondiente. Por lo tanto, si un usuario (cuyo acceso a una organizaci\u00f3n ha sido revocado) ya posee la clave de la organizaci\u00f3n, ese usuario podr\u00eda usar la clave para descifrar los datos filtrados."}], "metrics": {"cvssMetricV31": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "availabilityImpact": "NONE"}, "exploitabilityScore": 3.9, "impactScore": 3.6}]}, "weaknesses": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-269"}]}], "references": [{"url": "https://github.com/dani-garcia/vaultwarden/releases", "source": "cve@mitre.org"}, {"url": "https://github.com/dani-garcia/vaultwarden/releases/tag/1.32.0", "source": "cve@mitre.org"}, {"url": "https://www.mgm-sp.com/cve/missing-rotation-of-the-organization-key", "source": "cve@mitre.org"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-39925", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-13T18:15:03.927", "lastModified": "2025-01-09T18:15:28.117", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "An issue was discovered in Vaultwarden (formerly Bitwarden_RS) 1.30.3. It lacks an offboarding process for members who leave an organization. As a result, the shared organization key is not rotated when a member departs. Consequently, the departing member, whose access should be revoked, retains a copy of the organization key. Additionally, the application fails to adequately protect some encrypted data stored on the server. Consequently, an authenticated user could gain unauthorized access to encrypted data of any organization, even if the user is not a member of the targeted organization. However, the user would need to know the corresponding organizationId. Hence, if a user (whose access to an organization has been revoked) already possesses the organization key, that user could use the key to decrypt the leaked data."}, {"lang": "es", "value": "Se descubri\u00f3 un problema en Vaultwarden (anteriormente Bitwarden_RS) 1.30.3. Carece de un proceso de desvinculaci\u00f3n para los miembros que abandonan una organizaci\u00f3n. Como resultado, la clave de organizaci\u00f3n compartida no se rota cuando un miembro se va. En consecuencia, el miembro que se va, cuyo acceso debe revocarse, conserva una copia de la clave de la organizaci\u00f3n. Adem\u00e1s, la aplicaci\u00f3n no protege adecuadamente algunos datos cifrados almacenados en el servidor. En consecuencia, un usuario autenticado podr\u00eda obtener acceso no autorizado a los datos cifrados de cualquier organizaci\u00f3n, incluso si el usuario no es miembro de la organizaci\u00f3n en cuesti\u00f3n. Sin embargo, el usuario necesitar\u00eda saber el ID de organizaci\u00f3n correspondiente. Por lo tanto, si un usuario (cuyo acceso a una organizaci\u00f3n ha sido revocado) ya posee la clave de la organizaci\u00f3n, ese usuario podr\u00eda usar la clave para descifrar los datos filtrados."}], "metrics": {}, "references": [{"url": "https://github.com/dani-garcia/vaultwarden/releases", "source": "cve@mitre.org"}, {"url": "https://github.com/dani-garcia/vaultwarden/releases/tag/1.32.0", "source": "cve@mitre.org"}, {"url": "https://www.mgm-sp.com/cve/missing-rotation-of-the-organization-key", "source": "cve@mitre.org"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-39926.json b/cve/2024/CVE-2024-39926.json index 292a3a1676b..b7d8116f0ee 100644 --- a/cve/2024/CVE-2024-39926.json +++ b/cve/2024/CVE-2024-39926.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-39926", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-13T18:15:04.013", "lastModified": "2024-11-11T21:15:06.297", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "An issue was discovered in Vaultwarden (formerly Bitwarden_RS) 1.30.3. A stored cross-site scripting (XSS) or, due to the default CSP, HTML injection vulnerability has been discovered in the admin dashboard. This potentially allows an authenticated attacker to inject malicious code into the dashboard, which is then executed or rendered in the context of an administrator's browser when viewing the injected content. However, it is important to note that the default Content Security Policy (CSP) of the application blocks most exploitation paths, significantly mitigating the potential impact."}, {"lang": "es", "value": "Se descubri\u00f3 un problema en Vaultwarden (anteriormente Bitwarden_RS) 1.30.3. Se descubri\u00f3 una vulnerabilidad de inyecci\u00f3n de HTML o de Cross-site Scripting (XSS) almacenado, debido a la CSP predeterminada, en el panel de control del administrador. Esto potencialmente permite que un atacante autenticado inyecte c\u00f3digo malicioso en el panel de control, que luego se ejecuta o se muestra en el contexto del navegador de un administrador al visualizar el contenido inyectado. Sin embargo, es importante tener en cuenta que la Pol\u00edtica de seguridad de contenido (CSP) predeterminada de la aplicaci\u00f3n bloquea la mayor\u00eda de las rutas de explotaci\u00f3n, lo que mitiga significativamente el impacto potencial."}], "metrics": {"cvssMetricV31": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "availabilityImpact": "NONE"}, "exploitabilityScore": 3.9, "impactScore": 3.6}]}, "weaknesses": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://github.com/dani-garcia/vaultwarden/blob/1.30.3/src/static/scripts/admin_users.js#L201", "source": "cve@mitre.org"}, {"url": "https://github.com/dani-garcia/vaultwarden/releases/tag/1.32.0", "source": "cve@mitre.org"}, {"url": "https://www.mgm-sp.com/cve/html-injection-in-vaultwarden", "source": "cve@mitre.org"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-39926", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-13T18:15:04.013", "lastModified": "2025-01-09T18:15:28.220", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "An issue was discovered in Vaultwarden (formerly Bitwarden_RS) 1.30.3. A stored cross-site scripting (XSS) or, due to the default CSP, HTML injection vulnerability has been discovered in the admin dashboard. This potentially allows an authenticated attacker to inject malicious code into the dashboard, which is then executed or rendered in the context of an administrator's browser when viewing the injected content. However, it is important to note that the default Content Security Policy (CSP) of the application blocks most exploitation paths, significantly mitigating the potential impact."}, {"lang": "es", "value": "Se descubri\u00f3 un problema en Vaultwarden (anteriormente Bitwarden_RS) 1.30.3. Se descubri\u00f3 una vulnerabilidad de inyecci\u00f3n de HTML o de Cross-site Scripting (XSS) almacenado, debido a la CSP predeterminada, en el panel de control del administrador. Esto potencialmente permite que un atacante autenticado inyecte c\u00f3digo malicioso en el panel de control, que luego se ejecuta o se muestra en el contexto del navegador de un administrador al visualizar el contenido inyectado. Sin embargo, es importante tener en cuenta que la Pol\u00edtica de seguridad de contenido (CSP) predeterminada de la aplicaci\u00f3n bloquea la mayor\u00eda de las rutas de explotaci\u00f3n, lo que mitiga significativamente el impacto potencial."}], "metrics": {}, "references": [{"url": "https://github.com/dani-garcia/vaultwarden/blob/1.30.3/src/static/scripts/admin_users.js#L201", "source": "cve@mitre.org"}, {"url": "https://github.com/dani-garcia/vaultwarden/releases/tag/1.32.0", "source": "cve@mitre.org"}, {"url": "https://www.mgm-sp.com/cve/html-injection-in-vaultwarden", "source": "cve@mitre.org"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-45346.json b/cve/2024/CVE-2024-45346.json index 55e680d91e4..a3e5d67847f 100644 --- a/cve/2024/CVE-2024-45346.json +++ b/cve/2024/CVE-2024-45346.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-45346", "sourceIdentifier": "security@xiaomi.com", "published": "2024-08-28T07:15:08.823", "lastModified": "2024-08-29T03:15:05.247", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "A code execution vulnerability exists in the XiaomiGetApps application product. This vulnerability is caused by the verification logic being bypassed, and an attacker can exploit this vulnerability to execute malicious code."}, {"lang": "es", "value": "Existe una vulnerabilidad de ejecuci\u00f3n de c\u00f3digo en el producto de aplicaci\u00f3n XiaomiGetApps. Esta vulnerabilidad se debe a que se omite la l\u00f3gica de verificaci\u00f3n y un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo malicioso."}], "metrics": {"cvssMetricV31": [{"source": "security@xiaomi.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "baseScore": 8.8, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-94"}]}], "references": [{"url": "https://trust.mi.com/misrc/bulletins/advisory?cveId=545", "source": "security@xiaomi.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-45346", "sourceIdentifier": "security@xiaomi.com", "published": "2024-08-28T07:15:08.823", "lastModified": "2025-01-09T18:15:28.703", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "A code execution vulnerability exists in the XiaomiGetApps application product. This vulnerability is caused by the verification logic being bypassed, and an attacker can exploit this vulnerability to execute malicious code."}, {"lang": "es", "value": "Existe una vulnerabilidad de ejecuci\u00f3n de c\u00f3digo en el producto de aplicaci\u00f3n XiaomiGetApps. Esta vulnerabilidad se debe a que se omite la l\u00f3gica de verificaci\u00f3n y un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo malicioso."}], "metrics": {"cvssMetricV31": [{"source": "security@xiaomi.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "baseScore": 8.8, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 5.9}]}, "references": [{"url": "https://trust.mi.com/misrc/bulletins/advisory?cveId=545", "source": "security@xiaomi.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-47220.json b/cve/2024/CVE-2024-47220.json index 998a0c8ab6a..17ef60bc235 100644 --- a/cve/2024/CVE-2024-47220.json +++ b/cve/2024/CVE-2024-47220.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-47220", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-22T01:15:11.950", "lastModified": "2024-09-26T13:32:55.343", "vulnStatus": "Awaiting Analysis", "cveTags": [{"sourceIdentifier": "cve@mitre.org", "tags": ["disputed"]}], "descriptions": [{"lang": "en", "value": "An issue was discovered in the WEBrick toolkit through 1.8.1 for Ruby. It allows HTTP request smuggling by providing both a Content-Length header and a Transfer-Encoding header, e.g., \"GET /admin HTTP/1.1\\r\\n\" inside of a \"POST /user HTTP/1.1\\r\\n\" request. NOTE: the supplier's position is \"Webrick should not be used in production.\""}, {"lang": "es", "value": "Se descubri\u00f3 un problema en el kit de herramientas WEBrick a trav\u00e9s de la versi\u00f3n 1.8.1 para Ruby. Permite el contrabando de solicitudes HTTP al proporcionar un encabezado Content-Length y un encabezado Transfer-Encoding, por ejemplo, \"GET /admin HTTP/1.1\\r\\n\" dentro de una solicitud \"POST /user HTTP/1.1\\r\\n\". NOTA: la posici\u00f3n del proveedor es \"Webrick no debe usarse en producci\u00f3n\"."}], "metrics": {"cvssMetricV31": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "availabilityImpact": "NONE"}, "exploitabilityScore": 3.9, "impactScore": 3.6}]}, "weaknesses": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-444"}]}], "references": [{"url": "https://github.com/ruby/webrick/issues/145", "source": "cve@mitre.org"}, {"url": "https://github.com/ruby/webrick/issues/145#issuecomment-2369994610", "source": "cve@mitre.org"}, {"url": "https://github.com/ruby/webrick/issues/145#issuecomment-2372838285", "source": "cve@mitre.org"}, {"url": "https://github.com/ruby/webrick/pull/146/commits/d88321da45dcd230ac2b4585cad4833d6d5e8841", "source": "cve@mitre.org"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-47220", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-22T01:15:11.950", "lastModified": "2025-01-09T18:15:28.837", "vulnStatus": "Awaiting Analysis", "cveTags": [{"sourceIdentifier": "cve@mitre.org", "tags": ["disputed"]}], "descriptions": [{"lang": "en", "value": "An issue was discovered in the WEBrick toolkit through 1.8.1 for Ruby. It allows HTTP request smuggling by providing both a Content-Length header and a Transfer-Encoding header, e.g., \"GET /admin HTTP/1.1\\r\\n\" inside of a \"POST /user HTTP/1.1\\r\\n\" request. NOTE: the supplier's position is \"Webrick should not be used in production.\""}, {"lang": "es", "value": "Se descubri\u00f3 un problema en el kit de herramientas WEBrick a trav\u00e9s de la versi\u00f3n 1.8.1 para Ruby. Permite el contrabando de solicitudes HTTP al proporcionar un encabezado Content-Length y un encabezado Transfer-Encoding, por ejemplo, \"GET /admin HTTP/1.1\\r\\n\" dentro de una solicitud \"POST /user HTTP/1.1\\r\\n\". NOTA: la posici\u00f3n del proveedor es \"Webrick no debe usarse en producci\u00f3n\"."}], "metrics": {}, "references": [{"url": "https://github.com/ruby/webrick/issues/145", "source": "cve@mitre.org"}, {"url": "https://github.com/ruby/webrick/issues/145#issuecomment-2369994610", "source": "cve@mitre.org"}, {"url": "https://github.com/ruby/webrick/issues/145#issuecomment-2372838285", "source": "cve@mitre.org"}, {"url": "https://github.com/ruby/webrick/pull/146/commits/d88321da45dcd230ac2b4585cad4833d6d5e8841", "source": "cve@mitre.org"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-48063.json b/cve/2024/CVE-2024-48063.json index bdee5c0e393..4a24d7f987b 100644 --- a/cve/2024/CVE-2024-48063.json +++ b/cve/2024/CVE-2024-48063.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-48063", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-29T21:15:04.080", "lastModified": "2024-11-01T13:15:12.020", "vulnStatus": "Awaiting Analysis", "cveTags": [{"sourceIdentifier": "cve@mitre.org", "tags": ["disputed"]}], "descriptions": [{"lang": "en", "value": "In PyTorch <=2.4.1, the RemoteModule has Deserialization RCE. NOTE: this is disputed by multiple parties because this is intended behavior in PyTorch distributed computing."}, {"lang": "es", "value": " En PyTorch <=2.4.1, RemoteModule tiene RCE de deserializaci\u00f3n."}], "metrics": {"cvssMetricV31": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 5.9}]}, "weaknesses": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-502"}]}], "references": [{"url": "https://gist.github.com/hexian2001/c046c066895a963ecc0a2cf9e1180065", "source": "cve@mitre.org"}, {"url": "https://github.com/pytorch/pytorch/issues/129228", "source": "cve@mitre.org"}, {"url": "https://github.com/pytorch/pytorch/security/policy#using-distributed-features", "source": "cve@mitre.org"}, {"url": "https://rumbling-slice-eb0.notion.site/Distributed-RPC-Framework-RemoteModule-has-Deserialization-RCE-in-pytorch-pytorch-111e3cda9e8c8021a7d3cbc61ee1a20c", "source": "cve@mitre.org"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-48063", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-29T21:15:04.080", "lastModified": "2025-01-09T18:15:29.013", "vulnStatus": "Awaiting Analysis", "cveTags": [{"sourceIdentifier": "cve@mitre.org", "tags": ["disputed"]}], "descriptions": [{"lang": "en", "value": "In PyTorch <=2.4.1, the RemoteModule has Deserialization RCE. NOTE: this is disputed by multiple parties because this is intended behavior in PyTorch distributed computing."}, {"lang": "es", "value": " En PyTorch <=2.4.1, RemoteModule tiene RCE de deserializaci\u00f3n."}], "metrics": {}, "references": [{"url": "https://gist.github.com/hexian2001/c046c066895a963ecc0a2cf9e1180065", "source": "cve@mitre.org"}, {"url": "https://github.com/pytorch/pytorch/issues/129228", "source": "cve@mitre.org"}, {"url": "https://github.com/pytorch/pytorch/security/policy#using-distributed-features", "source": "cve@mitre.org"}, {"url": "https://rumbling-slice-eb0.notion.site/Distributed-RPC-Framework-RemoteModule-has-Deserialization-RCE-in-pytorch-pytorch-111e3cda9e8c8021a7d3cbc61ee1a20c", "source": "cve@mitre.org"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-48955.json b/cve/2024/CVE-2024-48955.json index dd7700ade9d..641550cce76 100644 --- a/cve/2024/CVE-2024-48955.json +++ b/cve/2024/CVE-2024-48955.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-48955", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-29T18:15:05.690", "lastModified": "2024-11-01T12:57:35.843", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Broken access control in NetAdmin 4.030319 returns data with functionalities on the endpoint that \"assembles\" the functionalities menus, the return of this call is not encrypted and as the system does not validate the session authorization, an attacker can copy the content of the browser of a user with greater privileges having access to the functionalities of the user that the code was copied."}, {"lang": "es", "value": " En NetAdmin 4.0.30319, un atacante puede robar una cookie de sesi\u00f3n v\u00e1lida e inyectarla en otro dispositivo, lo que le otorga acceso no autorizado. Este tipo de ataque se conoce com\u00fanmente como secuestro de sesi\u00f3n."}], "metrics": {"cvssMetricV31": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "baseScore": 8.1, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 5.2}]}, "weaknesses": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-384"}]}], "references": [{"url": "https://github.com/BrotherOfJhonny/CVE-2024-48955_Overview", "source": "cve@mitre.org"}, {"url": "https://netadmin.software/gestao-de-identidade-e-acesso/", "source": "cve@mitre.org"}, {"url": "https://vulmon.com/vulnerabilitydetails?qid=CVE-2024-48955&sortby=bydate", "source": "cve@mitre.org"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-48955", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-29T18:15:05.690", "lastModified": "2025-01-09T18:15:29.147", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Broken access control in NetAdmin 4.030319 returns data with functionalities on the endpoint that \"assembles\" the functionalities menus, the return of this call is not encrypted and as the system does not validate the session authorization, an attacker can copy the content of the browser of a user with greater privileges having access to the functionalities of the user that the code was copied."}, {"lang": "es", "value": " En NetAdmin 4.0.30319, un atacante puede robar una cookie de sesi\u00f3n v\u00e1lida e inyectarla en otro dispositivo, lo que le otorga acceso no autorizado. Este tipo de ataque se conoce com\u00fanmente como secuestro de sesi\u00f3n."}], "metrics": {}, "references": [{"url": "https://github.com/BrotherOfJhonny/CVE-2024-48955_Overview", "source": "cve@mitre.org"}, {"url": "https://netadmin.software/gestao-de-identidade-e-acesso/", "source": "cve@mitre.org"}, {"url": "https://vulmon.com/vulnerabilitydetails?qid=CVE-2024-48955&sortby=bydate", "source": "cve@mitre.org"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-49035.json b/cve/2024/CVE-2024-49035.json index 4b0e2ee686a..f4fb9b7f63c 100644 --- a/cve/2024/CVE-2024-49035.json +++ b/cve/2024/CVE-2024-49035.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-49035", "sourceIdentifier": "secure@microsoft.com", "published": "2024-11-26T20:15:31.763", "lastModified": "2024-11-26T20:15:31.763", "vulnStatus": "Awaiting Analysis", "cveTags": [{"sourceIdentifier": "secure@microsoft.com", "tags": ["exclusively-hosted-service"]}], "descriptions": [{"lang": "en", "value": "An improper access control vulnerability in Partner.Microsoft.com allows an a unauthenticated attacker to elevate privileges over a network."}, {"lang": "es", "value": "Una vulnerabilidad de control de acceso inadecuado en Partner.Microsoft.com permite a un atacante no autenticado elevar privilegios en una red."}], "metrics": {"cvssMetricV31": [{"source": "secure@microsoft.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N", "baseScore": 8.7, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.3, "impactScore": 5.8}]}, "weaknesses": [{"source": "secure@microsoft.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-269"}]}], "references": [{"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49035", "source": "secure@microsoft.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-49035", "sourceIdentifier": "secure@microsoft.com", "published": "2024-11-26T20:15:31.763", "lastModified": "2025-01-09T19:33:26.117", "vulnStatus": "Analyzed", "cveTags": [{"sourceIdentifier": "secure@microsoft.com", "tags": ["exclusively-hosted-service"]}], "descriptions": [{"lang": "en", "value": "An improper access control vulnerability in Partner.Microsoft.com allows an a unauthenticated attacker to elevate privileges over a network."}, {"lang": "es", "value": "Una vulnerabilidad de control de acceso inadecuado en Partner.Microsoft.com permite a un atacante no autenticado elevar privilegios en una red."}], "metrics": {"cvssMetricV31": [{"source": "secure@microsoft.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N", "baseScore": 8.7, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.3, "impactScore": 5.8}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 5.9}]}, "weaknesses": [{"source": "secure@microsoft.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-269"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:microsoft:partner_center:-:*:*:*:*:*:*:*", "matchCriteriaId": "A400A527-15CD-4F9D-A42D-A453ABE04769"}]}]}], "references": [{"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49035", "source": "secure@microsoft.com", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-49038.json b/cve/2024/CVE-2024-49038.json index 67f86387e00..bbb96195a69 100644 --- a/cve/2024/CVE-2024-49038.json +++ b/cve/2024/CVE-2024-49038.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-49038", "sourceIdentifier": "secure@microsoft.com", "published": "2024-11-26T20:15:31.943", "lastModified": "2024-11-26T20:15:31.943", "vulnStatus": "Awaiting Analysis", "cveTags": [{"sourceIdentifier": "secure@microsoft.com", "tags": ["exclusively-hosted-service"]}], "descriptions": [{"lang": "en", "value": "Improper neutralization of input during web page generation ('Cross-site Scripting') in Copilot Studio by an unauthorized attacker leads to elevation of privilege over a network."}, {"lang": "es", "value": "La neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Copilot Studio por parte de un atacante no autorizado conduce a la elevaci\u00f3n de privilegios en una red."}], "metrics": {"cvssMetricV31": [{"source": "secure@microsoft.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", "baseScore": 9.3, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 5.8}]}, "weaknesses": [{"source": "secure@microsoft.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49038", "source": "secure@microsoft.com"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-49038", "sourceIdentifier": "secure@microsoft.com", "published": "2024-11-26T20:15:31.943", "lastModified": "2025-01-09T19:30:34.403", "vulnStatus": "Analyzed", "cveTags": [{"sourceIdentifier": "secure@microsoft.com", "tags": ["exclusively-hosted-service"]}], "descriptions": [{"lang": "en", "value": "Improper neutralization of input during web page generation ('Cross-site Scripting') in Copilot Studio by an unauthorized attacker leads to elevation of privilege over a network."}, {"lang": "es", "value": "La neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Copilot Studio por parte de un atacante no autorizado conduce a la elevaci\u00f3n de privilegios en una red."}], "metrics": {"cvssMetricV31": [{"source": "secure@microsoft.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", "baseScore": 9.3, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 5.8}, {"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "baseScore": 9.6, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 6.0}]}, "weaknesses": [{"source": "secure@microsoft.com", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-79"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:microsoft:copilot_studio:-:*:*:*:*:*:*:*", "matchCriteriaId": "7859CFCD-C125-4992-9DCD-A843175DF9BE"}]}]}], "references": [{"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49038", "source": "secure@microsoft.com", "tags": ["Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-7474.json b/cve/2024/CVE-2024-7474.json index 972d447b1c9..55da596f7b8 100644 --- a/cve/2024/CVE-2024-7474.json +++ b/cve/2024/CVE-2024-7474.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-7474", "sourceIdentifier": "security@huntr.dev", "published": "2024-10-29T13:15:09.530", "lastModified": "2024-11-14T14:15:19.373", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "In version 1.3.2 of lunary-ai/lunary, an Insecure Direct Object Reference (IDOR) vulnerability exists. A user can view or delete external users by manipulating the 'id' parameter in the request URL. The application does not perform adequate checks on the 'id' parameter, allowing unauthorized access to external user data."}, {"lang": "es", "value": " En la versi\u00f3n 1.3.2 de lunary-ai/lunary, existe una vulnerabilidad de referencia directa a objetos inseguros (IDOR). Un usuario puede ver o eliminar usuarios externos manipulando el par\u00e1metro 'id' en la URL de solicitud. La aplicaci\u00f3n no realiza comprobaciones adecuadas en el par\u00e1metro 'id', lo que permite el acceso no autorizado a los datos de usuarios externos."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "baseScore": 8.1, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 5.2}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "baseScore": 9.1, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "NONE"}, "exploitabilityScore": 3.9, "impactScore": 5.2}], "cvssMetricV30": [{"source": "security@huntr.dev", "type": "Secondary", "cvssData": {"version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "baseScore": 9.1, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "NONE"}, "exploitabilityScore": 3.9, "impactScore": 5.2}]}, "weaknesses": [{"source": "security@huntr.dev", "type": "Primary", "description": [{"lang": "en", "value": "CWE-639"}]}, {"source": "nvd@nist.gov", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-639"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:lunary:lunary:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.3.4", "matchCriteriaId": "7FD5C422-483D-4A50-A6B8-25C1352C3F46"}]}]}], "references": [{"url": "https://github.com/lunary-ai/lunary/commit/8f563c77d8614a72980113f530c7a9ec15a5f8d5", "source": "security@huntr.dev", "tags": ["Patch"]}, {"url": "https://huntr.com/bounties/95d8b993-3347-4ef5-a2b3-1f57219b7871", "source": "security@huntr.dev", "tags": ["Exploit", "Issue Tracking", "Third Party Advisory"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-7474", "sourceIdentifier": "security@huntr.dev", "published": "2024-10-29T13:15:09.530", "lastModified": "2025-01-09T18:15:29.380", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "In version 1.3.2 of lunary-ai/lunary, an Insecure Direct Object Reference (IDOR) vulnerability exists. A user can view or delete external users by manipulating the 'id' parameter in the request URL. The application does not perform adequate checks on the 'id' parameter, allowing unauthorized access to external user data."}, {"lang": "es", "value": " En la versi\u00f3n 1.3.2 de lunary-ai/lunary, existe una vulnerabilidad de referencia directa a objetos inseguros (IDOR). Un usuario puede ver o eliminar usuarios externos manipulando el par\u00e1metro 'id' en la URL de solicitud. La aplicaci\u00f3n no realiza comprobaciones adecuadas en el par\u00e1metro 'id', lo que permite el acceso no autorizado a los datos de usuarios externos."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "baseScore": 8.1, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 5.2}], "cvssMetricV30": [{"source": "security@huntr.dev", "type": "Secondary", "cvssData": {"version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "baseScore": 9.1, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "NONE"}, "exploitabilityScore": 3.9, "impactScore": 5.2}]}, "weaknesses": [{"source": "security@huntr.dev", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-639"}]}, {"source": "nvd@nist.gov", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-639"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:lunary:lunary:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.3.4", "matchCriteriaId": "7FD5C422-483D-4A50-A6B8-25C1352C3F46"}]}]}], "references": [{"url": "https://github.com/lunary-ai/lunary/commit/8f563c77d8614a72980113f530c7a9ec15a5f8d5", "source": "security@huntr.dev", "tags": ["Patch"]}, {"url": "https://huntr.com/bounties/95d8b993-3347-4ef5-a2b3-1f57219b7871", "source": "security@huntr.dev", "tags": ["Exploit", "Issue Tracking", "Third Party Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-7807.json b/cve/2024/CVE-2024-7807.json index 63cd3e954ff..c2edc195f31 100644 --- a/cve/2024/CVE-2024-7807.json +++ b/cve/2024/CVE-2024-7807.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-7807", "sourceIdentifier": "security@huntr.dev", "published": "2024-10-29T13:15:10.360", "lastModified": "2024-11-14T14:15:19.500", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "A vulnerability in gaizhenbiao/chuanhuchatgpt version 20240628 allows for a Denial of Service (DOS) attack. When uploading a file, if an attacker appends a large number of characters to the end of a multipart boundary, the system will continuously process each character, rendering ChuanhuChatGPT inaccessible. This uncontrolled resource consumption can lead to prolonged unavailability of the service, disrupting operations and causing potential data inaccessibility and loss of productivity."}, {"lang": "es", "value": " Una vulnerabilidad en la versi\u00f3n 20240628 de gaizhenbiao/chuanhuchatgpt permite un ataque de denegaci\u00f3n de servicio (DOS). Al cargar un archivo, si un atacante agrega una gran cantidad de caracteres al final de un l\u00edmite de varias partes, el sistema procesar\u00e1 continuamente cada car\u00e1cter, lo que har\u00e1 que ChuanhuChatGPT sea inaccesible. Este consumo descontrolado de recursos puede provocar una indisponibilidad prolongada del servicio, lo que interrumpir\u00e1 las operaciones y provocar\u00e1 una posible inaccesibilidad de los datos y una p\u00e9rdida de productividad."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.6}], "cvssMetricV30": [{"source": "security@huntr.dev", "type": "Secondary", "cvssData": {"version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.6}]}, "weaknesses": [{"source": "security@huntr.dev", "type": "Primary", "description": [{"lang": "en", "value": "CWE-770"}]}, {"source": "nvd@nist.gov", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-770"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-770"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:gaizhenbiao:chuanhuchatgpt:20240628:*:*:*:*:*:*:*", "matchCriteriaId": "1FC10782-5CE4-4545-A3F3-499CB770338B"}]}]}], "references": [{"url": "https://github.com/gaizhenbiao/chuanhuchatgpt/commit/919222d285d73b9dcd71fb34de379eef8c90d175", "source": "security@huntr.dev", "tags": ["Patch"]}, {"url": "https://huntr.com/bounties/db67276d-36ee-4487-9165-b621c67ef8a3", "source": "security@huntr.dev", "tags": ["Exploit"]}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-7807", "sourceIdentifier": "security@huntr.dev", "published": "2024-10-29T13:15:10.360", "lastModified": "2025-01-09T18:15:29.543", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "A vulnerability in gaizhenbiao/chuanhuchatgpt version 20240628 allows for a Denial of Service (DOS) attack. When uploading a file, if an attacker appends a large number of characters to the end of a multipart boundary, the system will continuously process each character, rendering ChuanhuChatGPT inaccessible. This uncontrolled resource consumption can lead to prolonged unavailability of the service, disrupting operations and causing potential data inaccessibility and loss of productivity."}, {"lang": "es", "value": " Una vulnerabilidad en la versi\u00f3n 20240628 de gaizhenbiao/chuanhuchatgpt permite un ataque de denegaci\u00f3n de servicio (DOS). Al cargar un archivo, si un atacante agrega una gran cantidad de caracteres al final de un l\u00edmite de varias partes, el sistema procesar\u00e1 continuamente cada car\u00e1cter, lo que har\u00e1 que ChuanhuChatGPT sea inaccesible. Este consumo descontrolado de recursos puede provocar una indisponibilidad prolongada del servicio, lo que interrumpir\u00e1 las operaciones y provocar\u00e1 una posible inaccesibilidad de los datos y una p\u00e9rdida de productividad."}], "metrics": {"cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.6}], "cvssMetricV30": [{"source": "security@huntr.dev", "type": "Secondary", "cvssData": {"version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.6}]}, "weaknesses": [{"source": "security@huntr.dev", "type": "Primary", "description": [{"lang": "en", "value": "CWE-770"}]}, {"source": "nvd@nist.gov", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-770"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:gaizhenbiao:chuanhuchatgpt:20240628:*:*:*:*:*:*:*", "matchCriteriaId": "1FC10782-5CE4-4545-A3F3-499CB770338B"}]}]}], "references": [{"url": "https://github.com/gaizhenbiao/chuanhuchatgpt/commit/919222d285d73b9dcd71fb34de379eef8c90d175", "source": "security@huntr.dev", "tags": ["Patch"]}, {"url": "https://huntr.com/bounties/db67276d-36ee-4487-9165-b621c67ef8a3", "source": "security@huntr.dev", "tags": ["Exploit"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-9202.json b/cve/2024/CVE-2024-9202.json index 4d8f22e8bbf..350c44afdd7 100644 --- a/cve/2024/CVE-2024-9202.json +++ b/cve/2024/CVE-2024-9202.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-9202", "sourceIdentifier": "emo@eclipse.org", "published": "2024-09-27T10:15:02.827", "lastModified": "2024-09-30T12:46:20.237", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "In Eclipse Dataspace Components versions 0.1.3 to 0.9.0, the Connector component filters which datasets (= data offers) another party can see in a requested catalog, to ensure that only authorized parties are able to view restricted offers.\nHowever, there is the possibility to request a single dataset, which should be subject to the same filtering process, but currently is missing the correct filtering.\n\n\nThis enables parties to potentially see datasets they should not have access to, thereby exposing sensitive information. Exploiting this vulnerability requires knowing the ID of a restricted dataset, but some IDs may be guessed by trying out many IDs in an automated way.\n\n\nAffected code:\n DatasetResolverImpl, L76-79 https://github.com/eclipse-edc/Connector/blob/v0.9.0/core/control-plane/control-plane-catalog/src/main/java/org/eclipse/edc/connector/controlplane/catalog/DatasetResolverImpl.java"}, {"lang": "es", "value": "En las versiones 0.1.3 a 0.9.0 de Eclipse Dataspace Components, el componente Connector filtra qu\u00e9 conjuntos de datos (= ofertas de datos) puede ver otra parte en un cat\u00e1logo solicitado, para garantizar que solo las partes autorizadas puedan ver las ofertas restringidas. Sin embargo, existe la posibilidad de solicitar un \u00fanico conjunto de datos, que deber\u00eda estar sujeto al mismo proceso de filtrado, pero que actualmente no tiene el filtrado correcto. Esto permite que las partes vean potencialmente conjuntos de datos a los que no deber\u00edan tener acceso, lo que expone informaci\u00f3n confidencial. Para explotar esta vulnerabilidad es necesario conocer el ID de un conjunto de datos restringido, pero algunos ID se pueden adivinar probando muchos ID de forma autom\u00e1tica. C\u00f3digo afectado: DatasetResolverImpl, L76-79 https://github.com/eclipse-edc/Connector/blob/v0.9.0/core/control-plane/control-plane-catalog/src/main/java/org/eclipse/edc/connector/controlplane/catalog/DatasetResolverImpl.java"}], "metrics": {"cvssMetricV40": [{"source": "emo@eclipse.org", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:M/U:Amber", "baseScore": 5.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "LOW", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "LOW", "vulnerableSystemIntegrity": "NONE", "vulnerableSystemAvailability": "NONE", "subsequentSystemConfidentiality": "LOW", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "MODERATE", "providerUrgency": "AMBER"}}]}, "weaknesses": [{"source": "emo@eclipse.org", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-862"}]}], "references": [{"url": "https://github.com/eclipse-edc/Connector/pull/4490", "source": "emo@eclipse.org"}, {"url": "https://github.com/eclipse-edc/Connector/pull/4491", "source": "emo@eclipse.org"}, {"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/35", "source": "emo@eclipse.org"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-9202", "sourceIdentifier": "emo@eclipse.org", "published": "2024-09-27T10:15:02.827", "lastModified": "2025-01-09T18:07:29.847", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "In Eclipse Dataspace Components versions 0.1.3 to 0.9.0, the Connector component filters which datasets (= data offers) another party can see in a requested catalog, to ensure that only authorized parties are able to view restricted offers.\nHowever, there is the possibility to request a single dataset, which should be subject to the same filtering process, but currently is missing the correct filtering.\n\n\nThis enables parties to potentially see datasets they should not have access to, thereby exposing sensitive information. Exploiting this vulnerability requires knowing the ID of a restricted dataset, but some IDs may be guessed by trying out many IDs in an automated way.\n\n\nAffected code:\n DatasetResolverImpl, L76-79 https://github.com/eclipse-edc/Connector/blob/v0.9.0/core/control-plane/control-plane-catalog/src/main/java/org/eclipse/edc/connector/controlplane/catalog/DatasetResolverImpl.java"}, {"lang": "es", "value": "En las versiones 0.1.3 a 0.9.0 de Eclipse Dataspace Components, el componente Connector filtra qu\u00e9 conjuntos de datos (= ofertas de datos) puede ver otra parte en un cat\u00e1logo solicitado, para garantizar que solo las partes autorizadas puedan ver las ofertas restringidas. Sin embargo, existe la posibilidad de solicitar un \u00fanico conjunto de datos, que deber\u00eda estar sujeto al mismo proceso de filtrado, pero que actualmente no tiene el filtrado correcto. Esto permite que las partes vean potencialmente conjuntos de datos a los que no deber\u00edan tener acceso, lo que expone informaci\u00f3n confidencial. Para explotar esta vulnerabilidad es necesario conocer el ID de un conjunto de datos restringido, pero algunos ID se pueden adivinar probando muchos ID de forma autom\u00e1tica. C\u00f3digo afectado: DatasetResolverImpl, L76-79 https://github.com/eclipse-edc/Connector/blob/v0.9.0/core/control-plane/control-plane-catalog/src/main/java/org/eclipse/edc/connector/controlplane/catalog/DatasetResolverImpl.java"}], "metrics": {"cvssMetricV40": [{"source": "emo@eclipse.org", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:M/U:Amber", "baseScore": 5.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "LOW", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "LOW", "vulnerableSystemIntegrity": "NONE", "vulnerableSystemAvailability": "NONE", "subsequentSystemConfidentiality": "LOW", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "MODERATE", "providerUrgency": "AMBER"}}], "cvssMetricV31": [{"source": "nvd@nist.gov", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "baseScore": 5.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE"}, "exploitabilityScore": 1.6, "impactScore": 3.6}]}, "weaknesses": [{"source": "emo@eclipse.org", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-862"}]}, {"source": "nvd@nist.gov", "type": "Primary", "description": [{"lang": "en", "value": "CWE-862"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:eclipse:eclipse_dataspace_components:*:*:*:*:*:*:*:*", "versionStartIncluding": "0.1.3", "versionEndExcluding": "0.9.1", "matchCriteriaId": "19307830-8F92-4DE4-9921-4E8204DD647E"}]}]}], "references": [{"url": "https://github.com/eclipse-edc/Connector/pull/4490", "source": "emo@eclipse.org", "tags": ["Issue Tracking", "Patch"]}, {"url": "https://github.com/eclipse-edc/Connector/pull/4491", "source": "emo@eclipse.org", "tags": ["Issue Tracking", "Patch"]}, {"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/35", "source": "emo@eclipse.org", "tags": ["Issue Tracking", "Vendor Advisory"]}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-9575.json b/cve/2024/CVE-2024-9575.json index a64b039a0db..3ead92ab486 100644 --- a/cve/2024/CVE-2024-9575.json +++ b/cve/2024/CVE-2024-9575.json @@ -1 +1 @@ -{"cve": {"id": "CVE-2024-9575", "sourceIdentifier": "655498c3-6ec5-4f0b-aea6-853b334d05a6", "published": "2024-10-09T10:15:06.853", "lastModified": "2024-10-14T08:15:02.970", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Local File Inclusion vulnerability in pretix Widget WordPress plugin pretix-widget on Windows allows PHP Local File Inclusion. This issue affects pretix Widget WordPress plugin: from 1.0.0 through 1.0.5."}, {"lang": "es", "value": "Vulnerabilidad de inclusi\u00f3n de archivos locales en el complemento pretix Widget de WordPress pretix-widget en Windows permite la inclusi\u00f3n de archivos locales en PHP. Este problema afecta al complemento pretix Widget de WordPress: desde la versi\u00f3n 1.0.0 hasta la 1.0.5."}], "metrics": {"cvssMetricV40": [{"source": "655498c3-6ec5-4f0b-aea6-853b334d05a6", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:L/U:X", "baseScore": 8.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "HIGH", "userInteraction": "PASSIVE", "vulnerableSystemConfidentiality": "HIGH", "vulnerableSystemIntegrity": "HIGH", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "LOW", "subsequentSystemIntegrity": "LOW", "subsequentSystemAvailability": "LOW", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "LOW", "providerUrgency": "NOT_DEFINED"}}], "cvssMetricV31": [{"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "baseScore": 8.1, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 5.2}]}, "weaknesses": [{"source": "655498c3-6ec5-4f0b-aea6-853b334d05a6", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-22"}, {"lang": "en", "value": "CWE-73"}]}], "references": [{"url": "https://patchstack.com/database/vulnerability/pretix-widget/wordpress-pretix-widget-plugin-1-0-5-local-file-inclusion-vulnerability?_s_id=cve", "source": "655498c3-6ec5-4f0b-aea6-853b334d05a6"}, {"url": "https://pretix.eu/about/en/blog/20241009-wordpress-plugin-1-0-6/", "source": "655498c3-6ec5-4f0b-aea6-853b334d05a6"}]}} \ No newline at end of file +{"cve": {"id": "CVE-2024-9575", "sourceIdentifier": "655498c3-6ec5-4f0b-aea6-853b334d05a6", "published": "2024-10-09T10:15:06.853", "lastModified": "2025-01-09T18:15:29.763", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Local File Inclusion vulnerability in pretix Widget WordPress plugin pretix-widget on Windows allows PHP Local File Inclusion. This issue affects pretix Widget WordPress plugin: from 1.0.0 through 1.0.5."}, {"lang": "es", "value": "Vulnerabilidad de inclusi\u00f3n de archivos locales en el complemento pretix Widget de WordPress pretix-widget en Windows permite la inclusi\u00f3n de archivos locales en PHP. Este problema afecta al complemento pretix Widget de WordPress: desde la versi\u00f3n 1.0.0 hasta la 1.0.5."}], "metrics": {"cvssMetricV40": [{"source": "655498c3-6ec5-4f0b-aea6-853b334d05a6", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:L/U:X", "baseScore": 8.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "HIGH", "userInteraction": "PASSIVE", "vulnerableSystemConfidentiality": "HIGH", "vulnerableSystemIntegrity": "HIGH", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "LOW", "subsequentSystemIntegrity": "LOW", "subsequentSystemAvailability": "LOW", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "LOW", "providerUrgency": "NOT_DEFINED"}}]}, "weaknesses": [{"source": "655498c3-6ec5-4f0b-aea6-853b334d05a6", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-22"}, {"lang": "en", "value": "CWE-73"}]}], "references": [{"url": "https://patchstack.com/database/vulnerability/pretix-widget/wordpress-pretix-widget-plugin-1-0-5-local-file-inclusion-vulnerability?_s_id=cve", "source": "655498c3-6ec5-4f0b-aea6-853b334d05a6"}, {"url": "https://pretix.eu/about/en/blog/20241009-wordpress-plugin-1-0-6/", "source": "655498c3-6ec5-4f0b-aea6-853b334d05a6"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-21598.json b/cve/2025/CVE-2025-21598.json new file mode 100644 index 00000000000..378dcba66fe --- /dev/null +++ b/cve/2025/CVE-2025-21598.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-21598", "sourceIdentifier": "sirt@juniper.net", "published": "2025-01-09T19:15:20.123", "lastModified": "2025-01-09T19:15:20.123", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "An\u00a0Out-of-bounds Read vulnerability in Juniper Networks Junos OS and Junos OS Evolved's routing protocol daemon (rpd) allows an unauthenticated, network-based attacker to send\u00a0malformed BGP packets to a device configured with packet receive trace options enabled to crash rpd.\nThis issue affects:\n\nJunos OS:\u00a0\n\n\n\n * from 21.2R3-S8 before 21.2R3-S9,\u00a0\n * from 21.4R3-S7 before 21.4R3-S9,\u00a0\n * from 22.2R3-S4 before 22.2R3-S5,\u00a0\n * from 22.3R3-S2 before 22.3R3-S4,\u00a0\n * from 22.4R3 before 22.4R3-S5,\u00a0\n * from 23.2R2 before 23.2R2-S2,\u00a0\n * from 23.4R1 before 23.4R2-S1,\u00a0\n * from 24.2R1 before 24.2R1-S1, 24.2R2.\n\n\nJunos OS Evolved:\n * from 21.4R3-S7-EVO before 21.4R3-S9-EVO,\u00a0\n * from 22.2R3-S4-EVO before 22.2R3-S5-EVO,\u00a0\n * from 22.3R3-S2-EVO before 22.3R3-S4-EVO,\u00a0\n * from 22.4R3-EVO before 22.4R3-S5-EVO,\u00a0\n * from 23.2R2-EVO before 23.2R2-S2-EVO,\u00a0\n * from 23.4R1-EVO before 23.4R2-S1-EVO,\u00a0\n * from 24.2R1-EVO before 24.2R1-S2-EVO, 24.2R2-EVO.\n\n\nThis issue requires a BGP session to be established.\n\nThis issue can propagate and multiply through multiple ASes until reaching vulnerable devices.\n\nThis issue affects iBGP and eBGP.\n\nThis issue affects IPv4 and IPv6.\n\nAn indicator of compromise may be the presence of malformed update messages in a neighboring AS which is unaffected by this issue:\n\nFor example, by issuing the command on the neighboring device:\n\u00a0show log messages\n\nReviewing for similar messages from devices within proximity to each other may indicate this malformed packet is propagating:\n\u00a0 rpd[]: Received malformed update from (External AS )\nand\n\u00a0 rpd[]: Malformed Attribute"}], "metrics": {"cvssMetricV40": [{"source": "sirt@juniper.net", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:A/V:C/RE:M/U:Amber", "baseScore": 8.2, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "PRESENT", "privilegesRequired": "NONE", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "NONE", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "subsequentSystemAvailability": "LOW", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "YES", "recovery": "AUTOMATIC", "valueDensity": "CONCENTRATED", "vulnerabilityResponseEffort": "MODERATE", "providerUrgency": "AMBER"}}], "cvssMetricV31": [{"source": "sirt@juniper.net", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.6}]}, "weaknesses": [{"source": "sirt@juniper.net", "type": "Primary", "description": [{"lang": "en", "value": "CWE-125"}]}], "references": [{"url": "https://supportportal.juniper.net/JSA92867", "source": "sirt@juniper.net"}, {"url": "https://www.juniper.net/documentation/us/en/software/junos/cli-reference/topics/ref/statement/traceoptions-edit-protocols-bgp.html", "source": "sirt@juniper.net"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-21628.json b/cve/2025/CVE-2025-21628.json new file mode 100644 index 00000000000..a6de823aa28 --- /dev/null +++ b/cve/2025/CVE-2025-21628.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-21628", "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-09T18:15:30.070", "lastModified": "2025-01-09T18:15:30.070", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Chatwoot is a customer engagement suite. Prior to 3.16.0, conversation and contact filters endpoints did not sanitize the input of query_operator passed from the frontend or the API. This provided any actor who is authenticated, an attack vector to run arbitrary SQL within the filter query by adding a tautological WHERE clause. This issue is patched with v3.16.0."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L", "baseScore": 9.1, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 3.1, "impactScore": 5.3}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-89"}]}], "references": [{"url": "https://github.com/chatwoot/chatwoot/commit/b34dac7bbe3c910186083b680e51aad5ea60b44b", "source": "security-advisories@github.com"}, {"url": "https://github.com/chatwoot/chatwoot/security/advisories/GHSA-g8f9-hh83-rcq9", "source": "security-advisories@github.com"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-22149.json b/cve/2025/CVE-2025-22149.json new file mode 100644 index 00000000000..c0b2ad69828 --- /dev/null +++ b/cve/2025/CVE-2025-22149.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-22149", "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-09T18:15:30.233", "lastModified": "2025-01-09T18:15:30.233", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "JWK Set (JSON Web Key Set) is a JWK and JWK Set Go implementation. Prior to 0.6.0, the project's provided HTTP client's local JWK Set cache should do a full replacement when the goroutine refreshes the remote JWK Set. The current behavior is to overwrite or append. This is a security issue for use cases that utilize the provided auto-caching HTTP client and where key removal from a JWK Set is equivalent to revocation. The affected auto-caching HTTP client was added in version v0.5.0 and fixed in v0.6.0. The only workaround would be to remove the provided auto-caching HTTP client and replace it with a custom implementation. This involves setting the HTTPClientStorageOptions.RefreshInterval to zero (or not specifying the value)."}], "metrics": {"cvssMetricV40": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "baseScore": 2.1, "baseSeverity": "LOW", "attackVector": "NETWORK", "attackComplexity": "HIGH", "attackRequirements": "PRESENT", "privilegesRequired": "HIGH", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "NONE", "vulnerableSystemAvailability": "NONE", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "LOW", "subsequentSystemAvailability": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "safety": "NOT_DEFINED", "automatable": "NOT_DEFINED", "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED"}}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-672"}]}], "references": [{"url": "https://github.com/MicahParks/jwkset/commit/01db49a90f7f20c7fb39a699a2f19a7a5f379ed3", "source": "security-advisories@github.com"}, {"url": "https://github.com/MicahParks/jwkset/issues/40", "source": "security-advisories@github.com"}, {"url": "https://github.com/MicahParks/jwkset/security/advisories/GHSA-675f-rq2r-jw82", "source": "security-advisories@github.com"}]}} \ No newline at end of file diff --git a/cve/2025/CVE-2025-22151.json b/cve/2025/CVE-2025-22151.json new file mode 100644 index 00000000000..67d6ddd99ba --- /dev/null +++ b/cve/2025/CVE-2025-22151.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2025-22151", "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-09T19:15:20.410", "lastModified": "2025-01-09T19:15:20.410", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Strawberry GraphQL is a library for creating GraphQL APIs. Starting in 0.182.0 and prior to version 0.257.0, a type confusion vulnerability exists in Strawberry GraphQL's relay integration that affects multiple ORM integrations (Django, SQLAlchemy, Pydantic). The vulnerability occurs when multiple GraphQL types are mapped to the same underlying model while using the relay node interface. When querying for a specific type using the global node field (e.g., FruitType:some-id), the resolver may incorrectly return an instance of a different type mapped to the same model (e.g., SpecialFruitType). This can lead to information disclosure if the alternate type exposes sensitive fields and potential privilege escalation if the alternate type contains data intended for restricted access. This vulnerability is fixed in 0.257.0."}], "metrics": {"cvssMetricV31": [{"source": "security-advisories@github.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "baseScore": 3.7, "baseSeverity": "LOW", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.2, "impactScore": 1.4}]}, "weaknesses": [{"source": "security-advisories@github.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-843"}]}], "references": [{"url": "https://github.com/strawberry-graphql/strawberry/commit/526eb82b70451c0e59d5a71ae9b7396f59974bd8", "source": "security-advisories@github.com"}, {"url": "https://github.com/strawberry-graphql/strawberry/security/advisories/GHSA-5xh2-23cc-5jc6", "source": "security-advisories@github.com"}]}} \ No newline at end of file diff --git a/syncdate.json b/syncdate.json index da46d5e99b4..d56394f23cd 100644 --- a/syncdate.json +++ b/syncdate.json @@ -1,10 +1,10 @@ { "vulnerabilities": { - "lastModStartDate": "2025-01-09T16:03:51.723", - "lastModEndDate": "2025-01-09T18:03:23.457" + "lastModStartDate": "2025-01-09T18:03:23.457", + "lastModEndDate": "2025-01-09T20:03:02.220" }, "matchStrings": { - "lastModStartDate": "2025-01-09T16:03:26.630", - "lastModEndDate": "2025-01-09T18:03:08.097" + "lastModStartDate": "2025-01-09T18:03:08.097", + "lastModEndDate": "2025-01-09T20:02:51.870" } } \ No newline at end of file