Vulnerabilites related to cosmicperl - directory_pro
cve-2008-1147
Vulnerability from cvelistv5
Published
2008-03-04 23:00
Modified
2024-08-07 08:08
Severity ?
Summary
A certain pseudo-random number generator (PRNG) algorithm that uses XOR and 2-bit random hops (aka "Algorithm X2"), as used in OpenBSD 2.6 through 3.4, Mac OS X 10 through 10.5.1, FreeBSD 4.4 through 7.0, and DragonFlyBSD 1.0 through 1.10.1, allows remote attackers to guess sensitive values such as IP fragmentation IDs by observing a sequence of previously generated values. NOTE: this issue can be leveraged for attacks such as injection into TCP packets and OS fingerprinting.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:08:57.697Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "openbsd-xor-weak-security(41155)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41155"
          },
          {
            "name": "20080206 RE: A paper by Amit Klein (Trusteer): \"OpenBSD DNS Cache Poisoning and Multiple O/S Predictable IP ID Vulnerability\"",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://seclists.org/bugtraq/2008/Feb/0063.html"
          },
          {
            "name": "20080206 Re: A paper by Amit Klein (Trusteer): \"OpenBSD DNS Cache Poisoning and Multiple O/S Predictable IP ID Vulnerability\"",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://seclists.org/bugtraq/2008/Feb/0052.html"
          },
          {
            "name": "20080206 A paper by Amit Klein (Trusteer): \"OpenBSD DNS Cache Poisoning and Multiple O/S Predictable IP ID Vulnerability\"",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/487658"
          },
          {
            "name": "28819",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28819"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.trusteer.com/docs/OpenBSD_DNS_Cache_Poisoning_and_Multiple_OS_Predictable_IP_ID_Vulnerability.pdf"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.securiteam.com/securityreviews/5PP0H0UNGW.html"
          },
          {
            "name": "openbsd-prng-dns-spoofing(40329)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40329"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.freebsd.org/cgi/cvsweb.cgi/src/sys/netinet/ip_id.c?rev=1.10%3Bcontenttype="
          },
          {
            "name": "27647",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/27647"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-02-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A certain pseudo-random number generator (PRNG) algorithm that uses XOR and 2-bit random hops (aka \"Algorithm X2\"), as used in OpenBSD 2.6 through 3.4, Mac OS X 10 through 10.5.1, FreeBSD 4.4 through 7.0, and DragonFlyBSD 1.0 through 1.10.1, allows remote attackers to guess sensitive values such as IP fragmentation IDs by observing a sequence of previously generated values.  NOTE: this issue can be leveraged for attacks such as injection into TCP packets and OS fingerprinting."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "openbsd-xor-weak-security(41155)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41155"
        },
        {
          "name": "20080206 RE: A paper by Amit Klein (Trusteer): \"OpenBSD DNS Cache Poisoning and Multiple O/S Predictable IP ID Vulnerability\"",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://seclists.org/bugtraq/2008/Feb/0063.html"
        },
        {
          "name": "20080206 Re: A paper by Amit Klein (Trusteer): \"OpenBSD DNS Cache Poisoning and Multiple O/S Predictable IP ID Vulnerability\"",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://seclists.org/bugtraq/2008/Feb/0052.html"
        },
        {
          "name": "20080206 A paper by Amit Klein (Trusteer): \"OpenBSD DNS Cache Poisoning and Multiple O/S Predictable IP ID Vulnerability\"",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/487658"
        },
        {
          "name": "28819",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28819"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.trusteer.com/docs/OpenBSD_DNS_Cache_Poisoning_and_Multiple_OS_Predictable_IP_ID_Vulnerability.pdf"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.securiteam.com/securityreviews/5PP0H0UNGW.html"
        },
        {
          "name": "openbsd-prng-dns-spoofing(40329)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40329"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.freebsd.org/cgi/cvsweb.cgi/src/sys/netinet/ip_id.c?rev=1.10%3Bcontenttype="
        },
        {
          "name": "27647",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/27647"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-1147",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A certain pseudo-random number generator (PRNG) algorithm that uses XOR and 2-bit random hops (aka \"Algorithm X2\"), as used in OpenBSD 2.6 through 3.4, Mac OS X 10 through 10.5.1, FreeBSD 4.4 through 7.0, and DragonFlyBSD 1.0 through 1.10.1, allows remote attackers to guess sensitive values such as IP fragmentation IDs by observing a sequence of previously generated values.  NOTE: this issue can be leveraged for attacks such as injection into TCP packets and OS fingerprinting."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "openbsd-xor-weak-security(41155)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41155"
            },
            {
              "name": "20080206 RE: A paper by Amit Klein (Trusteer): \"OpenBSD DNS Cache Poisoning and Multiple O/S Predictable IP ID Vulnerability\"",
              "refsource": "BUGTRAQ",
              "url": "http://seclists.org/bugtraq/2008/Feb/0063.html"
            },
            {
              "name": "20080206 Re: A paper by Amit Klein (Trusteer): \"OpenBSD DNS Cache Poisoning and Multiple O/S Predictable IP ID Vulnerability\"",
              "refsource": "BUGTRAQ",
              "url": "http://seclists.org/bugtraq/2008/Feb/0052.html"
            },
            {
              "name": "20080206 A paper by Amit Klein (Trusteer): \"OpenBSD DNS Cache Poisoning and Multiple O/S Predictable IP ID Vulnerability\"",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/487658"
            },
            {
              "name": "28819",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28819"
            },
            {
              "name": "http://www.trusteer.com/docs/OpenBSD_DNS_Cache_Poisoning_and_Multiple_OS_Predictable_IP_ID_Vulnerability.pdf",
              "refsource": "MISC",
              "url": "http://www.trusteer.com/docs/OpenBSD_DNS_Cache_Poisoning_and_Multiple_OS_Predictable_IP_ID_Vulnerability.pdf"
            },
            {
              "name": "http://www.securiteam.com/securityreviews/5PP0H0UNGW.html",
              "refsource": "MISC",
              "url": "http://www.securiteam.com/securityreviews/5PP0H0UNGW.html"
            },
            {
              "name": "openbsd-prng-dns-spoofing(40329)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40329"
            },
            {
              "name": "http://www.freebsd.org/cgi/cvsweb.cgi/src/sys/netinet/ip_id.c?rev=1.10;contenttype=",
              "refsource": "CONFIRM",
              "url": "http://www.freebsd.org/cgi/cvsweb.cgi/src/sys/netinet/ip_id.c?rev=1.10;contenttype="
            },
            {
              "name": "27647",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/27647"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-1147",
    "datePublished": "2008-03-04T23:00:00",
    "dateReserved": "2008-03-04T00:00:00",
    "dateUpdated": "2024-08-07T08:08:57.697Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2008-1146
Vulnerability from cvelistv5
Published
2008-03-04 23:00
Modified
2024-08-07 08:08
Severity ?
Summary
A certain pseudo-random number generator (PRNG) algorithm that uses XOR and 3-bit random hops (aka "Algorithm X3"), as used in OpenBSD 2.8 through 4.2, allows remote attackers to guess sensitive values such as DNS transaction IDs by observing a sequence of previously generated values. NOTE: this issue can be leveraged for attacks such as DNS cache poisoning against OpenBSD's modification of BIND.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:08:57.711Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20080206 A paper by Amit Klein (Trusteer): \"OpenBSD DNS Cache Poisoning and Multiple O/S Predictable IP ID Vulnerability\"",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/487658"
          },
          {
            "name": "28819",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28819"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.trusteer.com/docs/OpenBSD_DNS_Cache_Poisoning_and_Multiple_OS_Predictable_IP_ID_Vulnerability.pdf"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.securiteam.com/securityreviews/5PP0H0UNGW.html"
          },
          {
            "name": "openbsd-prng-dns-spoofing(40329)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40329"
          },
          {
            "name": "27647",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/27647"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-02-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A certain pseudo-random number generator (PRNG) algorithm that uses XOR and 3-bit random hops (aka \"Algorithm X3\"), as used in OpenBSD 2.8 through 4.2, allows remote attackers to guess sensitive values such as DNS transaction IDs by observing a sequence of previously generated values.  NOTE: this issue can be leveraged for attacks such as DNS cache poisoning against OpenBSD\u0027s modification of BIND."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20080206 A paper by Amit Klein (Trusteer): \"OpenBSD DNS Cache Poisoning and Multiple O/S Predictable IP ID Vulnerability\"",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/487658"
        },
        {
          "name": "28819",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28819"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.trusteer.com/docs/OpenBSD_DNS_Cache_Poisoning_and_Multiple_OS_Predictable_IP_ID_Vulnerability.pdf"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.securiteam.com/securityreviews/5PP0H0UNGW.html"
        },
        {
          "name": "openbsd-prng-dns-spoofing(40329)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40329"
        },
        {
          "name": "27647",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/27647"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-1146",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A certain pseudo-random number generator (PRNG) algorithm that uses XOR and 3-bit random hops (aka \"Algorithm X3\"), as used in OpenBSD 2.8 through 4.2, allows remote attackers to guess sensitive values such as DNS transaction IDs by observing a sequence of previously generated values.  NOTE: this issue can be leveraged for attacks such as DNS cache poisoning against OpenBSD\u0027s modification of BIND."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20080206 A paper by Amit Klein (Trusteer): \"OpenBSD DNS Cache Poisoning and Multiple O/S Predictable IP ID Vulnerability\"",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/487658"
            },
            {
              "name": "28819",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28819"
            },
            {
              "name": "http://www.trusteer.com/docs/OpenBSD_DNS_Cache_Poisoning_and_Multiple_OS_Predictable_IP_ID_Vulnerability.pdf",
              "refsource": "MISC",
              "url": "http://www.trusteer.com/docs/OpenBSD_DNS_Cache_Poisoning_and_Multiple_OS_Predictable_IP_ID_Vulnerability.pdf"
            },
            {
              "name": "http://www.securiteam.com/securityreviews/5PP0H0UNGW.html",
              "refsource": "MISC",
              "url": "http://www.securiteam.com/securityreviews/5PP0H0UNGW.html"
            },
            {
              "name": "openbsd-prng-dns-spoofing(40329)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40329"
            },
            {
              "name": "27647",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/27647"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-1146",
    "datePublished": "2008-03-04T23:00:00",
    "dateReserved": "2008-03-04T00:00:00",
    "dateUpdated": "2024-08-07T08:08:57.711Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2008-1148
Vulnerability from cvelistv5
Published
2008-03-04 23:00
Modified
2024-08-07 08:08
Severity ?
Summary
A certain pseudo-random number generator (PRNG) algorithm that uses ADD with 0 random hops (aka "Algorithm A0"), as used in OpenBSD 3.5 through 4.2 and NetBSD 1.6.2 through 4.0, allows remote attackers to guess sensitive values such as (1) DNS transaction IDs or (2) IP fragmentation IDs by observing a sequence of previously generated values. NOTE: this issue can be leveraged for attacks such as DNS cache poisoning, injection into TCP packets, and OS fingerprinting.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:08:57.600Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20080206 A paper by Amit Klein (Trusteer): \"OpenBSD DNS Cache Poisoning and Multiple O/S Predictable IP ID Vulnerability\"",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/487658"
          },
          {
            "name": "openbsd-add-weak-security(41157)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41157"
          },
          {
            "name": "28819",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28819"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.trusteer.com/docs/OpenBSD_DNS_Cache_Poisoning_and_Multiple_OS_Predictable_IP_ID_Vulnerability.pdf"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.securiteam.com/securityreviews/5PP0H0UNGW.html"
          },
          {
            "name": "openbsd-prng-dns-spoofing(40329)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40329"
          },
          {
            "name": "27647",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/27647"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-02-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A certain pseudo-random number generator (PRNG) algorithm that uses ADD with 0 random hops (aka \"Algorithm A0\"), as used in OpenBSD 3.5 through 4.2 and NetBSD 1.6.2 through 4.0, allows remote attackers to guess sensitive values such as (1) DNS transaction IDs or (2) IP fragmentation IDs by observing a sequence of previously generated values.  NOTE: this issue can be leveraged for attacks such as DNS cache poisoning, injection into TCP packets, and OS fingerprinting."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20080206 A paper by Amit Klein (Trusteer): \"OpenBSD DNS Cache Poisoning and Multiple O/S Predictable IP ID Vulnerability\"",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/487658"
        },
        {
          "name": "openbsd-add-weak-security(41157)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41157"
        },
        {
          "name": "28819",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28819"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.trusteer.com/docs/OpenBSD_DNS_Cache_Poisoning_and_Multiple_OS_Predictable_IP_ID_Vulnerability.pdf"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.securiteam.com/securityreviews/5PP0H0UNGW.html"
        },
        {
          "name": "openbsd-prng-dns-spoofing(40329)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40329"
        },
        {
          "name": "27647",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/27647"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-1148",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A certain pseudo-random number generator (PRNG) algorithm that uses ADD with 0 random hops (aka \"Algorithm A0\"), as used in OpenBSD 3.5 through 4.2 and NetBSD 1.6.2 through 4.0, allows remote attackers to guess sensitive values such as (1) DNS transaction IDs or (2) IP fragmentation IDs by observing a sequence of previously generated values.  NOTE: this issue can be leveraged for attacks such as DNS cache poisoning, injection into TCP packets, and OS fingerprinting."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20080206 A paper by Amit Klein (Trusteer): \"OpenBSD DNS Cache Poisoning and Multiple O/S Predictable IP ID Vulnerability\"",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/487658"
            },
            {
              "name": "openbsd-add-weak-security(41157)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41157"
            },
            {
              "name": "28819",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28819"
            },
            {
              "name": "http://www.trusteer.com/docs/OpenBSD_DNS_Cache_Poisoning_and_Multiple_OS_Predictable_IP_ID_Vulnerability.pdf",
              "refsource": "MISC",
              "url": "http://www.trusteer.com/docs/OpenBSD_DNS_Cache_Poisoning_and_Multiple_OS_Predictable_IP_ID_Vulnerability.pdf"
            },
            {
              "name": "http://www.securiteam.com/securityreviews/5PP0H0UNGW.html",
              "refsource": "MISC",
              "url": "http://www.securiteam.com/securityreviews/5PP0H0UNGW.html"
            },
            {
              "name": "openbsd-prng-dns-spoofing(40329)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40329"
            },
            {
              "name": "27647",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/27647"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-1148",
    "datePublished": "2008-03-04T23:00:00",
    "dateReserved": "2008-03-04T00:00:00",
    "dateUpdated": "2024-08-07T08:08:57.600Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2001-0780
Vulnerability from cvelistv5
Published
2001-10-12 04:00
Modified
2024-08-08 04:30
Severity ?
Summary
Directory traversal vulnerability in cosmicpro.cgi in Cosmicperl Directory Pro 2.0 allows remote attackers to gain sensitive information via a .. (dot dot) in the SHOW parameter.
References
http://www.securityfocus.com/bid/2793vdb-entry, x_refsource_BID
http://www.securityfocus.com/archive/1/187182mailing-list, x_refsource_BUGTRAQ
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T04:30:06.255Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "2793",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/2793"
          },
          {
            "name": "20010527 directorypro.cgi , directory traversal",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/187182"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2001-05-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Directory traversal vulnerability in cosmicpro.cgi in Cosmicperl Directory Pro 2.0 allows remote attackers to gain sensitive information via a .. (dot dot) in the SHOW parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-05-13T17:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "2793",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/2793"
        },
        {
          "name": "20010527 directorypro.cgi , directory traversal",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/187182"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2001-0780",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Directory traversal vulnerability in cosmicpro.cgi in Cosmicperl Directory Pro 2.0 allows remote attackers to gain sensitive information via a .. (dot dot) in the SHOW parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "2793",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/2793"
            },
            {
              "name": "20010527 directorypro.cgi , directory traversal",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/187182"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2001-0780",
    "datePublished": "2001-10-12T04:00:00",
    "dateReserved": "2001-10-12T00:00:00",
    "dateUpdated": "2024-08-08T04:30:06.255Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2008-03-04 23:44
Modified
2024-11-21 00:43
Severity ?
Summary
A certain pseudo-random number generator (PRNG) algorithm that uses XOR and 3-bit random hops (aka "Algorithm X3"), as used in OpenBSD 2.8 through 4.2, allows remote attackers to guess sensitive values such as DNS transaction IDs by observing a sequence of previously generated values. NOTE: this issue can be leveraged for attacks such as DNS cache poisoning against OpenBSD's modification of BIND.
Impacted products
Vendor Product Version
apple mac_os_x 10.0
apple mac_os_x 10.0.1
apple mac_os_x 10.0.2
apple mac_os_x 10.0.3
apple mac_os_x 10.0.4
apple mac_os_x 10.1
apple mac_os_x 10.1.1
apple mac_os_x 10.1.2
apple mac_os_x 10.1.3
apple mac_os_x 10.1.4
apple mac_os_x 10.1.5
apple mac_os_x 10.2
apple mac_os_x 10.2.1
apple mac_os_x 10.2.2
apple mac_os_x 10.2.3
apple mac_os_x 10.2.4
apple mac_os_x 10.2.5
apple mac_os_x 10.2.6
apple mac_os_x 10.2.7
apple mac_os_x 10.2.8
apple mac_os_x 10.3
apple mac_os_x 10.3.1
apple mac_os_x 10.3.2
apple mac_os_x 10.3.3
apple mac_os_x 10.3.4
apple mac_os_x 10.3.5
apple mac_os_x 10.3.6
apple mac_os_x 10.3.7
apple mac_os_x 10.3.8
apple mac_os_x 10.3.9
apple mac_os_x 10.4
apple mac_os_x 10.4.1
apple mac_os_x 10.4.2
apple mac_os_x 10.4.3
apple mac_os_x 10.4.4
apple mac_os_x 10.4.5
apple mac_os_x 10.4.6
apple mac_os_x 10.4.7
apple mac_os_x 10.4.8
apple mac_os_x 10.4.9
apple mac_os_x 10.4.10
apple mac_os_x 10.4.11
apple mac_os_x 10.5
apple mac_os_x 10.5.1
apple mac_os_x_server 10.0
apple mac_os_x_server 10.1
apple mac_os_x_server 10.1.1
apple mac_os_x_server 10.1.2
apple mac_os_x_server 10.1.3
apple mac_os_x_server 10.1.4
apple mac_os_x_server 10.1.5
apple mac_os_x_server 10.2
apple mac_os_x_server 10.2.1
apple mac_os_x_server 10.2.2
apple mac_os_x_server 10.2.3
apple mac_os_x_server 10.2.4
apple mac_os_x_server 10.2.5
apple mac_os_x_server 10.2.6
apple mac_os_x_server 10.2.7
apple mac_os_x_server 10.2.8
apple mac_os_x_server 10.3
apple mac_os_x_server 10.3.1
apple mac_os_x_server 10.3.2
apple mac_os_x_server 10.3.3
apple mac_os_x_server 10.3.4
apple mac_os_x_server 10.3.5
apple mac_os_x_server 10.3.6
apple mac_os_x_server 10.3.7
apple mac_os_x_server 10.3.8
apple mac_os_x_server 10.3.9
apple mac_os_x_server 10.4
apple mac_os_x_server 10.4.1
apple mac_os_x_server 10.4.2
apple mac_os_x_server 10.4.3
apple mac_os_x_server 10.4.4
apple mac_os_x_server 10.4.5
apple mac_os_x_server 10.4.6
apple mac_os_x_server 10.4.7
apple mac_os_x_server 10.4.8
apple mac_os_x_server 10.4.9
apple mac_os_x_server 10.4.10
apple mac_os_x_server 10.4.11
apple mac_os_x_server 10.5
dragonflybsd dragonflybsd 1.0
dragonflybsd dragonflybsd 1.1
dragonflybsd dragonflybsd 1.2
dragonflybsd dragonflybsd 1.10.1
freebsd freebsd 4.4
freebsd freebsd 4.4
freebsd freebsd 4.4
freebsd freebsd 4.4
freebsd freebsd 4.5
freebsd freebsd 4.5
freebsd freebsd 4.5
freebsd freebsd 4.5
freebsd freebsd 4.5
freebsd freebsd 4.6
freebsd freebsd 4.6
freebsd freebsd 4.6
freebsd freebsd 4.6
freebsd freebsd 4.6
freebsd freebsd 4.6.2
freebsd freebsd 4.7
freebsd freebsd 4.7
freebsd freebsd 4.7
freebsd freebsd 4.7
freebsd freebsd 4.7
freebsd freebsd 4.8
freebsd freebsd 4.8
freebsd freebsd 4.8
freebsd freebsd 4.8_prerelease
freebsd freebsd 4.9
freebsd freebsd 4.9
freebsd freebsd 4.9_prerelease
freebsd freebsd 4.10
freebsd freebsd 4.10
freebsd freebsd 4.10
freebsd freebsd 4.10
freebsd freebsd 4.10_prerelease
freebsd freebsd 4.11
freebsd freebsd 4.11
freebsd freebsd 4.11
freebsd freebsd 4.11_p20_release
freebsd freebsd 4.11_release
freebsd freebsd 5.0
freebsd freebsd 5.0
freebsd freebsd 5.0
freebsd freebsd 5.0
freebsd freebsd 5.1
freebsd freebsd 5.1
freebsd freebsd 5.1
freebsd freebsd 5.1
freebsd freebsd 5.1
freebsd freebsd 5.2
freebsd freebsd 5.2.1
freebsd freebsd 5.2.1
freebsd freebsd 5.3
freebsd freebsd 5.3
freebsd freebsd 5.3
freebsd freebsd 5.3
freebsd freebsd 5.4
freebsd freebsd 5.4
freebsd freebsd 5.4
freebsd freebsd 5.5_release
freebsd freebsd 5.5_stable
freebsd freebsd 6.0
freebsd freebsd 6.0
freebsd freebsd 6.0
freebsd freebsd 6.0_p5_release
freebsd freebsd 6.1
freebsd freebsd 6.1
freebsd freebsd 6.1
freebsd freebsd 6.1
freebsd freebsd 6.2
freebsd freebsd 6.2
freebsd freebsd 6.2_releng
freebsd freebsd 6.3
freebsd freebsd 6.3_releng
freebsd freebsd 7.0
freebsd freebsd 7.0_beta4
freebsd freebsd 7.0_releng
netbsd netbsd 1.6.2
netbsd netbsd 2.0
netbsd netbsd 2.0.1
netbsd netbsd 2.0.2
netbsd netbsd 2.0.3
netbsd netbsd 2.0.4
netbsd netbsd 2.1
netbsd netbsd 2.1.1
netbsd netbsd 3.0.1
netbsd netbsd 3.0.2
netbsd netbsd 3.1
netbsd netbsd 3.1
netbsd netbsd 3.1
netbsd netbsd 4.0
netbsd netbsd 4.0
netbsd netbsd 4.0
openbsd openbsd 2.6
openbsd openbsd 2.7
openbsd openbsd 2.8
openbsd openbsd 2.9
openbsd openbsd 3.0
openbsd openbsd 3.1
openbsd openbsd 3.2
openbsd openbsd 3.3
openbsd openbsd 3.4
openbsd openbsd 3.5
openbsd openbsd 3.6
openbsd openbsd 3.7
openbsd openbsd 3.8
openbsd openbsd 3.9
openbsd openbsd 4.0
openbsd openbsd 4.1
openbsd openbsd 4.2
cosmicperl directory_pro 10.0.3
darwin darwin 1.0
darwin darwin 9.1
navision financials_server 3.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "99C273D1-ADFE-4B4C-B543-7B9CA741A117",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BC31B69-3DE1-4CF3-ADC9-CA0BF1714CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "77CC671C-6D89-4279-86F7-DDE1D4D9A0CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E4B77F6-E71C-45ED-96CC-7872AD2FCBF8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "066ABC3B-B395-42D2-95C0-5B810F91A6F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "01BC19FC-6E03-4000-AE4B-232E47FA76F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "421FC2DD-0CF7-44A2-A63C-5221689E2363",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F8B70BC-42B7-453A-B506-7BE69D49A4B5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAAC6EA5-DCB2-4A50-A8BC-25CC43FAEF9B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA32F7D8-02F8-4CFE-B193-2888807BC4D6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9DCDE70-07DA-4F0B-805F-6BA03D410CD6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDCF4FB3-F781-46D5-BEE7-485B3DC78B83",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE52A344-8B07-480D-A57F-B1F6E6574F3B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "56CC0444-570C-4BB5-B53A-C5CA0BD87935",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "62E3EED7-FE30-4620-B40B-9CC49B77408A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AFD8BC6-4893-4D9D-A26E-27AAC864F94B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BD1F9A1-5ADB-451D-9525-D545E42D2B8F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7A24978-2891-425C-ACF6-E8F5C839C54A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B20E130-6078-4336-B614-273C27142B46",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB461678-560D-436E-A3AE-9E1E16DB0412",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFDADE04-29F0-446B-824B-0518880CF0A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED9BE602-A740-4CF7-9CAF-59061B16AB31",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "33E698C1-C313-40E6-BAF9-7C8F9CF02484",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF2D00AC-FA2A-4C39-B796-DC19072862CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "421079DA-B605-4E05-9454-C30CF7631CF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "93B734BA-3435-40A9-B22B-5D56CEB865A7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4B57B3E-B1B2-4F13-99D3-4F9DB3C07B5E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "30897327-44DD-4D6C-B8B6-2D66C44EA55D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B79D8F73-2E78-4A67-96BB-21AD9BCB0094",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC6931D5-DE7E-41F6-ADDC-AB5A8A167F69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0760FDDB-38D3-4263-9B4D-1AF5E613A4F9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFD4DE58-46C7-4E69-BF36-C5FD768B8248",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF824694-52DE-44E3-ACAD-60B2A84CD3CE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B73A0891-A37A-4E0D-AA73-B18BFD6B1447",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "26AC38AB-D689-4B2B-9DAE-F03F4DFD15BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C580935-0091-4163-B747-750FB7686973",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB0F2132-8431-4CEF-9A3D-A69425E3834E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "8719F3C4-F1DE-49B5-9301-22414A2B6F9C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "09ED46A8-1739-411C-8807-2A416BDB6DFE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "786BB737-EA99-4EC6-B742-0C35BF2453F9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D089858-3AF9-4B82-912D-AA33F25E3715",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EE39585-CF3B-4493-96D8-B394544C7643",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2442D35-7484-43D8-9077-3FDF63104816",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F3E721C-00CA-4D51-B542-F2BC5C0D65BF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB279593-17D1-4A65-BF54-969B38B74B23",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "80F5B731-D5A7-4694-9B27-CEE1DCC810EC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D5DB7BE-FC71-4ADE-8B9F-7EA401C8CA88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3E2571E-D9EB-43CD-82DD-8C813FF8D5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "36F4618C-1408-4097-B97D-5F32DE6D01DF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F558C40-D0DA-4700-95DA-DF1322C020E6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F8F30B-E4B8-4745-AFFA-8FD620E61994",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "00AE033B-5F16-4262-A397-02D7450189B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E831F3E-A980-47AF-BD05-2DB1A14689B4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "36991737-904F-4B26-AEE2-7B30411279E8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7EE6036-1A18-43F1-8A92-7DF39E1516E3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "620ECFC8-293D-4C2B-9698-67185BB6E2EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1F14A45-BDDB-4C12-9370-D5241975A928",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "46BC34D4-A1E8-4E01-982D-EAF03A0EB886",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "35932546-B614-47C0-98E6-8EF1EFE06725",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "38F17066-C090-4DD7-A1AC-D8FF70D268CE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E997653-C744-4F1F-9948-47579AB3BED3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF5A416A-F198-4B9C-8221-D36CC8A7FE5C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "384C130F-D1A9-4482-AF20-FC81933473A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BCD1C5-1AFC-4287-9AFD-81FB3F4F9E54",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CA6BD2A-3022-408D-8E4F-50865996E965",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "463D5628-7536-4029-99D6-5E525050059E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "69A39B11-1C23-4A6C-B4C5-AEC40836F173",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "78D48FD1-CB91-4310-9432-A4365FA67B11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "750C6C37-8460-4ED8-83AD-ACAF993E4A6E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "8923EE1A-DD48-4EC8-8698-A33093FD709C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D24D5FA5-95DD-4ECC-B99A-8CB33156A6D0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "29644501-54BD-45E9-A6C1-618892CD354F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A132487-E89F-4D0D-8366-14AFC904811F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD231103-D7C7-4697-BE90-D67558D6115C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCADAAA0-C885-466C-A122-A94E73EAF817",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "448DB1C7-7B0C-4076-9B9F-1CDCD5EB6930",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BE429EF-24D4-453A-8B43-8CCEF5D72773",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AC9692A-CE81-446D-B136-449662C4B9A2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "504D78AB-5374-48C9-B357-DB6BD2267D2D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "3029892E-1375-4F40-83D3-A51BDC4E9840",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.4.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "81F8DA6D-2258-4138-8FB2-90BE3C68B230",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D09D5933-A7D9-4A61-B863-CD8E7D5E67D8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "20E8648C-5469-4280-A581-D4A9A41B7213",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:dragonflybsd:dragonflybsd:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFBE8937-E1BD-4601-AF1C-6DD20BB132AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:dragonflybsd:dragonflybsd:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D676C769-17D1-48B2-98F4-AC3BDF2C882B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:dragonflybsd:dragonflybsd:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEBD3CB7-D88A-4868-A6AD-0717A8A989EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:dragonflybsd:dragonflybsd:1.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C79071BA-D3FB-4FDF-96A1-477BA88C3E6E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "55C5FC1A-1253-4390-A4FC-573BB14EA937",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.4:release_p42:*:*:*:*:*:*",
              "matchCriteriaId": "6F4AC452-6042-409D-8673-ACAD108EE3B5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.4:releng:*:*:*:*:*:*",
              "matchCriteriaId": "2FE1009B-371A-48E2-A456-935A1F0B7D0D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.4:stable:*:*:*:*:*:*",
              "matchCriteriaId": "C844A170-B5A7-4703-AF3B-67366D44EA8B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "44308D13-D935-4FF8-AB52-F0E115ED1AD2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.5:release:*:*:*:*:*:*",
              "matchCriteriaId": "3D41CB12-7894-4D25-80EC-23C56171D973",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.5:release_p32:*:*:*:*:*:*",
              "matchCriteriaId": "9BCD9C12-EDAB-473F-9CC5-04F06B413720",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.5:releng:*:*:*:*:*:*",
              "matchCriteriaId": "58EBC5C8-5CA8-4881-A036-179FDEBA3CA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.5:stable:*:*:*:*:*:*",
              "matchCriteriaId": "09789843-6A1A-4CDB-97E8-89E82B79DDB5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C001822-FDF8-497C-AC2C-B59A00E9ACD2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.6:release:*:*:*:*:*:*",
              "matchCriteriaId": "118211EF-CED7-4EB5-9669-F54C8169D4AE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.6:release_p20:*:*:*:*:*:*",
              "matchCriteriaId": "58288F0F-B4CE-445C-AD93-DA73E3AD6FC3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.6:releng:*:*:*:*:*:*",
              "matchCriteriaId": "CC96FBA9-6A65-4CC7-BE68-ADAF450ABE21",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.6:stable:*:*:*:*:*:*",
              "matchCriteriaId": "9A405AE2-ECC4-4BB0-80DD-4736394FB217",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AB4AD26-6AF2-4F3A-B602-F231FAABA73E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "B86C77AB-B8FF-4376-9B4E-C88417396F3D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.7:release:*:*:*:*:*:*",
              "matchCriteriaId": "E5612FB0-8403-4A7E-B89A-D7BDFAC00078",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.7:release_p17:*:*:*:*:*:*",
              "matchCriteriaId": "FA699BB4-94AA-40E6-A6B6-33E3D416CDA7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.7:releng:*:*:*:*:*:*",
              "matchCriteriaId": "AFDA151E-E614-4A24-A34D-B6D5309110CC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.7:stable:*:*:*:*:*:*",
              "matchCriteriaId": "A7818E11-1BEB-4DAA-BA7A-A278454BA4B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "441BE3A0-20F4-4972-B279-19B3DB5FA14D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.8:release_p7:*:*:*:*:*:*",
              "matchCriteriaId": "B19BEAB3-8BED-422F-B228-240269CB0704",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.8:releng:*:*:*:*:*:*",
              "matchCriteriaId": "2D33C6EF-DBE1-4943-83E4-1F10670DAC6E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.8_prerelease:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8ED2959-64AA-487E-AA11-72595A6FAA04",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "00EAEA17-033A-4A50-8E39-D61154876D2F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.9:releng:*:*:*:*:*:*",
              "matchCriteriaId": "E6288144-0CD7-45B6-B5A7-09B1DF14FBE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.9_prerelease:*:*:*:*:*:*:*",
              "matchCriteriaId": "860BABDE-4266-4476-96F9-397DAD23C841",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FFD9D1C-A459-47AD-BC62-15631417A32F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.10:release:*:*:*:*:*:*",
              "matchCriteriaId": "4ECDEC87-0132-46B6-BD9B-A94F9B669EAA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.10:release_p8:*:*:*:*:*:*",
              "matchCriteriaId": "6E21E50A-A368-4487-A791-87366CC5C86E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.10:releng:*:*:*:*:*:*",
              "matchCriteriaId": "43E84296-9B5C-4623-A2C4-431D76FC2765",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.10_prerelease:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A9CA0AC-29ED-4C86-AB6C-DCAE28FC1BB5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.11:release_p3:*:*:*:*:*:*",
              "matchCriteriaId": "E18328E2-3CB5-4D36-8EA3-77DD909B46A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.11:releng:*:*:*:*:*:*",
              "matchCriteriaId": "EF73D76B-FBB8-4D10-8393-9FAF53392A4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.11:stable:*:*:*:*:*:*",
              "matchCriteriaId": "F177AE1C-58C2-4575-807C-ABFFC5119FA8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.11_p20_release:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3EFFC9A-016A-496B-A109-919189A9C808",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.11_release:*:*:*:*:*:*:*",
              "matchCriteriaId": "73E6E5C5-F80A-423D-BD93-BA837E808A70",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "61EBA52A-2D8B-4FB5-866E-AE67CE1842E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "3B13D898-C1B6-44B9-8432-7DDB8A380E9E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.0:release_p14:*:*:*:*:*:*",
              "matchCriteriaId": "51A612F6-E4EB-4E34-8F55-79E16C74758E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.0:releng:*:*:*:*:*:*",
              "matchCriteriaId": "5C19B266-8FE7-49ED-8678-2D522257491D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EE93350-92E6-4F5C-A14C-9993CFFDBCD4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.1:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "15C4D826-A419-45F5-B91C-1445DB480916",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.1:release:*:*:*:*:*:*",
              "matchCriteriaId": "0D9F2B04-A1F2-4788-A53D-C8274A758DDA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.1:release_p5:*:*:*:*:*:*",
              "matchCriteriaId": "FEC7B38F-C6FB-4213-AE18-2D039A4D8E7A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.1:releng:*:*:*:*:*:*",
              "matchCriteriaId": "9A5309ED-D84F-4F52-9864-5B0FEEEE5022",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD7C441E-444B-4DF5-8491-86805C70FB99",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.2.1:release:*:*:*:*:*:*",
              "matchCriteriaId": "C9CCE8F3-84EE-4571-8AAA-BF2D132E9BD4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.2.1:releng:*:*:*:*:*:*",
              "matchCriteriaId": "8E4BC012-ADE4-468F-9A25-261CD8055694",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8A80E6A-6502-4A33-83BA-7DCC606D79AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.3:release:*:*:*:*:*:*",
              "matchCriteriaId": "0D6428EB-5E1A-41CB-979C-4C9402251D8B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.3:releng:*:*:*:*:*:*",
              "matchCriteriaId": "2DCA9879-C9F5-475A-8EC9-04D151001C8D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.3:stable:*:*:*:*:*:*",
              "matchCriteriaId": "0A94132F-4C47-49CC-B03C-8756613E9A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.4:release:*:*:*:*:*:*",
              "matchCriteriaId": "3F629879-66F0-427B-86D8-D740E0E3F6E8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.4:releng:*:*:*:*:*:*",
              "matchCriteriaId": "C89129C5-A1DB-4018-B43A-C60C8E650080",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.4:stable:*:*:*:*:*:*",
              "matchCriteriaId": "60F7B4A9-4036-4061-8F3D-BDC3F1282EC0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.5_release:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFA9754D-773C-432E-8E74-52FDC83FF279",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.5_stable:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8812D60-F669-4EA3-AF4E-6329EF625E38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D2C79D5-D27F-4B08-A8DF-3E3AAF4E16A5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:6.0:release:*:*:*:*:*:*",
              "matchCriteriaId": "CCE4F2E6-2286-4D87-ADD7-7E999B4E5620",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:6.0:stable:*:*:*:*:*:*",
              "matchCriteriaId": "C07C3BEF-8D6A-4F23-96DE-AFE4369D08EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:6.0_p5_release:*:*:*:*:*:*:*",
              "matchCriteriaId": "67FDB43C-84D1-4B45-BFB9-340F3687A22F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4416CBA-76B9-4051-B015-F1BE89517309",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:6.1:release:*:*:*:*:*:*",
              "matchCriteriaId": "8C64EE9C-18E1-49C6-96DE-7E6F1607C0D7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:6.1:release_p10:*:*:*:*:*:*",
              "matchCriteriaId": "B36B3805-8A85-4357-ABC1-AB22C61E3381",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:6.1:stable:*:*:*:*:*:*",
              "matchCriteriaId": "231B70A8-890A-4790-A33A-64228656BF0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9118B602-3FB6-4701-AC09-763DD48334BA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:6.2:stable:*:*:*:*:*:*",
              "matchCriteriaId": "32FCB0B3-8FBE-49FA-B17E-0D5462C9E5B4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:6.2_releng:*:*:*:*:*:*:*",
              "matchCriteriaId": "589B62B4-FAA3-4F58-8104-EF84FEAFFB65",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F702C46F-CA02-4FA2-B7D6-C61C2C095679",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:6.3_releng:*:*:*:*:*:*:*",
              "matchCriteriaId": "72C2BE9D-91E1-48E9-9326-39CF583A57E0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:7.0:pre-release:*:*:*:*:*:*",
              "matchCriteriaId": "42231BCC-2B90-4196-A1C2-408A353C1BEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:7.0_beta4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F06B831E-D8F2-4380-B279-559CE103210F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:7.0_releng:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ACC9072-4A33-4F1F-B790-2F9D5A52F71B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:netbsd:netbsd:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5071CA39-65B3-4AFB-8898-21819E57A084",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:netbsd:netbsd:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3C3F588-98DA-4F6F-A083-2B9EE534C561",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:netbsd:netbsd:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C2ED81B-8DA2-46D0-AE24-C61BF8E78AE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:netbsd:netbsd:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D18C95A3-15E3-41B8-AC28-ACEA57021E24",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:netbsd:netbsd:2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CFC6B75-9057-4E58-A4D4-8AEC12AE62E4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:netbsd:netbsd:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "36419DD6-0DB4-4BB6-A35F-D8FDB89402F1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:netbsd:netbsd:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "28BD9F91-2384-4557-9648-25FC00D04677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:netbsd:netbsd:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ECF9E5F-AF38-42B9-8B49-6C254394CDFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:netbsd:netbsd:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F9432E9-AACA-4242-BDAB-8792ACF72C12",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:netbsd:netbsd:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "29C02C6B-AAFD-4594-94A4-F26BA3648CB0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:netbsd:netbsd:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "57C533D7-771E-4E33-A4FE-764C0B73F920",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:netbsd:netbsd:3.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E59D3682-22E1-40C4-AC65-079005FB6194",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:netbsd:netbsd:3.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "3D95D05C-4FE1-4408-B8B8-5C5932800385",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:netbsd:netbsd:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9875E709-11BA-4B8F-A2FC-26844DD4D563",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:netbsd:netbsd:4.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "FCB9E9F8-7C6B-4BC7-A593-A11B9D6F0B35",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:netbsd:netbsd:4.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "2F4B6E29-B74F-45FF-AEB1-A118753F8E3C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DF053A1-C252-427E-9EEF-27240F422976",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "48A9C344-45AA-47B9-B35A-1A62E220D9C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "80EB24F0-46A7-481B-83ED-8BB012AE0C8E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA6AEAF0-FA61-4A3F-A083-1218C2027781",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "60DA30A1-3360-46BC-85B7-008D535F95BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA33E7E2-DE7B-411E-8991-718DA0988C51",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1957B3C0-7F25-469B-BC3F-7B09260837ED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC46909F-DDFC-448B-BCDF-1EB343F96630",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9496279F-AB43-4B53-81A6-87C651ABC4BA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDA160D4-5CAB-44E7-880A-59DD98FEAD62",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4D84D7A-EB7C-4196-B8B6-7B703C8055C2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEAE2873-0028-4744-B64E-8E2EA30447F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "783973F9-2A6E-4DDF-A64C-7794FFD0B7B9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5BB6C5D-4C43-4BB8-B1CE-A70BBE650CA1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC77812C-D84E-493E-9D21-1BA6C2129E70",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "16C117F3-3684-4683-9F9E-CEDD5B88F9CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DF8DD37-A337-4E9D-A34E-C2D561A24285",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cosmicperl:directory_pro:10.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D9D185E-D235-4731-A092-B667DC6FCBA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:darwin:darwin:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "80D58C3E-4F5D-42A0-95AA-25E0EAEBFCF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:darwin:darwin:9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4268605-39FE-49E0-ABC9-27DEA359779E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:navision:financials_server:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B70D3E5-924C-4AB7-ABF7-6273DE325007",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A certain pseudo-random number generator (PRNG) algorithm that uses XOR and 3-bit random hops (aka \"Algorithm X3\"), as used in OpenBSD 2.8 through 4.2, allows remote attackers to guess sensitive values such as DNS transaction IDs by observing a sequence of previously generated values.  NOTE: this issue can be leveraged for attacks such as DNS cache poisoning against OpenBSD\u0027s modification of BIND."
    },
    {
      "lang": "es",
      "value": "Cierto algoritmo generador de n\u00fameros pseudo-aleatorios(PRNG) que usa XOR y alterna en saltos de 3-bit (tambi\u00e9n conocido com o\"algoritmo X3\"), usado en OpenBSD de la v2.8 a la 4.2, permite a atacantes remotos adivinar datos sensibles como los IDs de una transacci\u00f3n DNS, observando una secuencia de datos generada previamente. NOTA: esta cuesti\u00f3n puede ser aprovechado por ataques como el envenenamiento de la cach\u00e9 DNS contra la modificaci\u00f3n BIND en OpenBDS."
    }
  ],
  "id": "CVE-2008-1146",
  "lastModified": "2024-11-21T00:43:47.150",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2008-03-04T23:44:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/28819"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securiteam.com/securityreviews/5PP0H0UNGW.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/487658"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/27647"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.trusteer.com/docs/OpenBSD_DNS_Cache_Poisoning_and_Multiple_OS_Predictable_IP_ID_Vulnerability.pdf"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40329"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28819"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securiteam.com/securityreviews/5PP0H0UNGW.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/487658"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/27647"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.trusteer.com/docs/OpenBSD_DNS_Cache_Poisoning_and_Multiple_OS_Predictable_IP_ID_Vulnerability.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40329"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-03-04 23:44
Modified
2024-11-21 00:43
Severity ?
Summary
A certain pseudo-random number generator (PRNG) algorithm that uses XOR and 2-bit random hops (aka "Algorithm X2"), as used in OpenBSD 2.6 through 3.4, Mac OS X 10 through 10.5.1, FreeBSD 4.4 through 7.0, and DragonFlyBSD 1.0 through 1.10.1, allows remote attackers to guess sensitive values such as IP fragmentation IDs by observing a sequence of previously generated values. NOTE: this issue can be leveraged for attacks such as injection into TCP packets and OS fingerprinting.
References
cve@mitre.orghttp://seclists.org/bugtraq/2008/Feb/0052.html
cve@mitre.orghttp://seclists.org/bugtraq/2008/Feb/0063.html
cve@mitre.orghttp://secunia.com/advisories/28819Vendor Advisory
cve@mitre.orghttp://www.freebsd.org/cgi/cvsweb.cgi/src/sys/netinet/ip_id.c?rev=1.10%3Bcontenttype=
cve@mitre.orghttp://www.securiteam.com/securityreviews/5PP0H0UNGW.html
cve@mitre.orghttp://www.securityfocus.com/archive/1/487658
cve@mitre.orghttp://www.securityfocus.com/bid/27647
cve@mitre.orghttp://www.trusteer.com/docs/OpenBSD_DNS_Cache_Poisoning_and_Multiple_OS_Predictable_IP_ID_Vulnerability.pdf
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/40329
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/41155
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/bugtraq/2008/Feb/0052.html
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/bugtraq/2008/Feb/0063.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28819Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.freebsd.org/cgi/cvsweb.cgi/src/sys/netinet/ip_id.c?rev=1.10%3Bcontenttype=
af854a3a-2127-422b-91ae-364da2661108http://www.securiteam.com/securityreviews/5PP0H0UNGW.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/487658
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/27647
af854a3a-2127-422b-91ae-364da2661108http://www.trusteer.com/docs/OpenBSD_DNS_Cache_Poisoning_and_Multiple_OS_Predictable_IP_ID_Vulnerability.pdf
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/40329
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/41155
Impacted products
Vendor Product Version
apple mac_os_x 10.0
apple mac_os_x 10.0.1
apple mac_os_x 10.0.2
apple mac_os_x 10.0.3
apple mac_os_x 10.0.4
apple mac_os_x 10.1
apple mac_os_x 10.1.1
apple mac_os_x 10.1.2
apple mac_os_x 10.1.3
apple mac_os_x 10.1.4
apple mac_os_x 10.1.5
apple mac_os_x 10.2
apple mac_os_x 10.2.1
apple mac_os_x 10.2.2
apple mac_os_x 10.2.3
apple mac_os_x 10.2.4
apple mac_os_x 10.2.5
apple mac_os_x 10.2.6
apple mac_os_x 10.2.7
apple mac_os_x 10.2.8
apple mac_os_x 10.3
apple mac_os_x 10.3.1
apple mac_os_x 10.3.2
apple mac_os_x 10.3.3
apple mac_os_x 10.3.4
apple mac_os_x 10.3.5
apple mac_os_x 10.3.6
apple mac_os_x 10.3.7
apple mac_os_x 10.3.8
apple mac_os_x 10.3.9
apple mac_os_x 10.4
apple mac_os_x 10.4.1
apple mac_os_x 10.4.2
apple mac_os_x 10.4.3
apple mac_os_x 10.4.4
apple mac_os_x 10.4.5
apple mac_os_x 10.4.6
apple mac_os_x 10.4.7
apple mac_os_x 10.4.8
apple mac_os_x 10.4.9
apple mac_os_x 10.4.10
apple mac_os_x 10.4.11
apple mac_os_x 10.5
apple mac_os_x 10.5.1
apple mac_os_x_server 10.0
apple mac_os_x_server 10.1
apple mac_os_x_server 10.1.1
apple mac_os_x_server 10.1.2
apple mac_os_x_server 10.1.3
apple mac_os_x_server 10.1.4
apple mac_os_x_server 10.1.5
apple mac_os_x_server 10.2
apple mac_os_x_server 10.2.1
apple mac_os_x_server 10.2.2
apple mac_os_x_server 10.2.3
apple mac_os_x_server 10.2.4
apple mac_os_x_server 10.2.5
apple mac_os_x_server 10.2.6
apple mac_os_x_server 10.2.7
apple mac_os_x_server 10.2.8
apple mac_os_x_server 10.3
apple mac_os_x_server 10.3.1
apple mac_os_x_server 10.3.2
apple mac_os_x_server 10.3.3
apple mac_os_x_server 10.3.4
apple mac_os_x_server 10.3.5
apple mac_os_x_server 10.3.6
apple mac_os_x_server 10.3.7
apple mac_os_x_server 10.3.8
apple mac_os_x_server 10.3.9
apple mac_os_x_server 10.4
apple mac_os_x_server 10.4.1
apple mac_os_x_server 10.4.2
apple mac_os_x_server 10.4.3
apple mac_os_x_server 10.4.4
apple mac_os_x_server 10.4.5
apple mac_os_x_server 10.4.6
apple mac_os_x_server 10.4.7
apple mac_os_x_server 10.4.8
apple mac_os_x_server 10.4.9
apple mac_os_x_server 10.4.10
apple mac_os_x_server 10.4.11
apple mac_os_x_server 10.5
dragonflybsd dragonflybsd 1.0
dragonflybsd dragonflybsd 1.1
dragonflybsd dragonflybsd 1.2
dragonflybsd dragonflybsd 1.10.1
freebsd freebsd 4.4
freebsd freebsd 4.4
freebsd freebsd 4.4
freebsd freebsd 4.4
freebsd freebsd 4.5
freebsd freebsd 4.5
freebsd freebsd 4.5
freebsd freebsd 4.5
freebsd freebsd 4.5
freebsd freebsd 4.6
freebsd freebsd 4.6
freebsd freebsd 4.6
freebsd freebsd 4.6
freebsd freebsd 4.6
freebsd freebsd 4.6.2
freebsd freebsd 4.7
freebsd freebsd 4.7
freebsd freebsd 4.7
freebsd freebsd 4.7
freebsd freebsd 4.7
freebsd freebsd 4.8
freebsd freebsd 4.8
freebsd freebsd 4.8
freebsd freebsd 4.8_prerelease
freebsd freebsd 4.9
freebsd freebsd 4.9
freebsd freebsd 4.9_prerelease
freebsd freebsd 4.10
freebsd freebsd 4.10
freebsd freebsd 4.10
freebsd freebsd 4.10
freebsd freebsd 4.10_prerelease
freebsd freebsd 4.11
freebsd freebsd 4.11
freebsd freebsd 4.11
freebsd freebsd 4.11_p20_release
freebsd freebsd 4.11_release
freebsd freebsd 5.0
freebsd freebsd 5.0
freebsd freebsd 5.0
freebsd freebsd 5.0
freebsd freebsd 5.1
freebsd freebsd 5.1
freebsd freebsd 5.1
freebsd freebsd 5.1
freebsd freebsd 5.1
freebsd freebsd 5.2
freebsd freebsd 5.2.1
freebsd freebsd 5.2.1
freebsd freebsd 5.3
freebsd freebsd 5.3
freebsd freebsd 5.3
freebsd freebsd 5.3
freebsd freebsd 5.4
freebsd freebsd 5.4
freebsd freebsd 5.4
freebsd freebsd 5.5_release
freebsd freebsd 5.5_stable
freebsd freebsd 6.0
freebsd freebsd 6.0
freebsd freebsd 6.0
freebsd freebsd 6.0_p5_release
freebsd freebsd 6.1
freebsd freebsd 6.1
freebsd freebsd 6.1
freebsd freebsd 6.1
freebsd freebsd 6.2
freebsd freebsd 6.2
freebsd freebsd 6.2_releng
freebsd freebsd 6.3
freebsd freebsd 6.3_releng
freebsd freebsd 7.0
freebsd freebsd 7.0_beta4
freebsd freebsd 7.0_releng
netbsd netbsd 1.6.2
netbsd netbsd 2.0
netbsd netbsd 2.0.1
netbsd netbsd 2.0.2
netbsd netbsd 2.0.3
netbsd netbsd 2.0.4
netbsd netbsd 2.1
netbsd netbsd 2.1.1
netbsd netbsd 3.0.1
netbsd netbsd 3.0.2
netbsd netbsd 3.1
netbsd netbsd 3.1
netbsd netbsd 3.1
netbsd netbsd 4.0
netbsd netbsd 4.0
netbsd netbsd 4.0
openbsd openbsd 2.6
openbsd openbsd 2.7
openbsd openbsd 2.8
openbsd openbsd 2.9
openbsd openbsd 3.0
openbsd openbsd 3.1
openbsd openbsd 3.2
openbsd openbsd 3.3
openbsd openbsd 3.4
openbsd openbsd 3.5
openbsd openbsd 3.6
openbsd openbsd 3.7
openbsd openbsd 3.8
openbsd openbsd 3.9
openbsd openbsd 4.0
openbsd openbsd 4.1
openbsd openbsd 4.2
cosmicperl directory_pro 10.0.3
darwin darwin 1.0
darwin darwin 9.1
navision financials_server 3.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "99C273D1-ADFE-4B4C-B543-7B9CA741A117",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BC31B69-3DE1-4CF3-ADC9-CA0BF1714CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "77CC671C-6D89-4279-86F7-DDE1D4D9A0CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E4B77F6-E71C-45ED-96CC-7872AD2FCBF8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "066ABC3B-B395-42D2-95C0-5B810F91A6F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "01BC19FC-6E03-4000-AE4B-232E47FA76F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "421FC2DD-0CF7-44A2-A63C-5221689E2363",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F8B70BC-42B7-453A-B506-7BE69D49A4B5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAAC6EA5-DCB2-4A50-A8BC-25CC43FAEF9B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA32F7D8-02F8-4CFE-B193-2888807BC4D6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9DCDE70-07DA-4F0B-805F-6BA03D410CD6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDCF4FB3-F781-46D5-BEE7-485B3DC78B83",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE52A344-8B07-480D-A57F-B1F6E6574F3B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "56CC0444-570C-4BB5-B53A-C5CA0BD87935",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "62E3EED7-FE30-4620-B40B-9CC49B77408A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AFD8BC6-4893-4D9D-A26E-27AAC864F94B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BD1F9A1-5ADB-451D-9525-D545E42D2B8F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7A24978-2891-425C-ACF6-E8F5C839C54A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B20E130-6078-4336-B614-273C27142B46",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB461678-560D-436E-A3AE-9E1E16DB0412",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFDADE04-29F0-446B-824B-0518880CF0A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED9BE602-A740-4CF7-9CAF-59061B16AB31",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "33E698C1-C313-40E6-BAF9-7C8F9CF02484",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF2D00AC-FA2A-4C39-B796-DC19072862CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "421079DA-B605-4E05-9454-C30CF7631CF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "93B734BA-3435-40A9-B22B-5D56CEB865A7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4B57B3E-B1B2-4F13-99D3-4F9DB3C07B5E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "30897327-44DD-4D6C-B8B6-2D66C44EA55D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B79D8F73-2E78-4A67-96BB-21AD9BCB0094",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC6931D5-DE7E-41F6-ADDC-AB5A8A167F69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0760FDDB-38D3-4263-9B4D-1AF5E613A4F9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFD4DE58-46C7-4E69-BF36-C5FD768B8248",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF824694-52DE-44E3-ACAD-60B2A84CD3CE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B73A0891-A37A-4E0D-AA73-B18BFD6B1447",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "26AC38AB-D689-4B2B-9DAE-F03F4DFD15BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C580935-0091-4163-B747-750FB7686973",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB0F2132-8431-4CEF-9A3D-A69425E3834E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "8719F3C4-F1DE-49B5-9301-22414A2B6F9C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "09ED46A8-1739-411C-8807-2A416BDB6DFE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "786BB737-EA99-4EC6-B742-0C35BF2453F9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D089858-3AF9-4B82-912D-AA33F25E3715",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EE39585-CF3B-4493-96D8-B394544C7643",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2442D35-7484-43D8-9077-3FDF63104816",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F3E721C-00CA-4D51-B542-F2BC5C0D65BF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB279593-17D1-4A65-BF54-969B38B74B23",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "80F5B731-D5A7-4694-9B27-CEE1DCC810EC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D5DB7BE-FC71-4ADE-8B9F-7EA401C8CA88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3E2571E-D9EB-43CD-82DD-8C813FF8D5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "36F4618C-1408-4097-B97D-5F32DE6D01DF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F558C40-D0DA-4700-95DA-DF1322C020E6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F8F30B-E4B8-4745-AFFA-8FD620E61994",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "00AE033B-5F16-4262-A397-02D7450189B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E831F3E-A980-47AF-BD05-2DB1A14689B4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "36991737-904F-4B26-AEE2-7B30411279E8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7EE6036-1A18-43F1-8A92-7DF39E1516E3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "620ECFC8-293D-4C2B-9698-67185BB6E2EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1F14A45-BDDB-4C12-9370-D5241975A928",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "46BC34D4-A1E8-4E01-982D-EAF03A0EB886",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "35932546-B614-47C0-98E6-8EF1EFE06725",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "38F17066-C090-4DD7-A1AC-D8FF70D268CE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E997653-C744-4F1F-9948-47579AB3BED3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF5A416A-F198-4B9C-8221-D36CC8A7FE5C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "384C130F-D1A9-4482-AF20-FC81933473A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BCD1C5-1AFC-4287-9AFD-81FB3F4F9E54",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CA6BD2A-3022-408D-8E4F-50865996E965",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "463D5628-7536-4029-99D6-5E525050059E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "69A39B11-1C23-4A6C-B4C5-AEC40836F173",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "78D48FD1-CB91-4310-9432-A4365FA67B11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "750C6C37-8460-4ED8-83AD-ACAF993E4A6E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "8923EE1A-DD48-4EC8-8698-A33093FD709C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D24D5FA5-95DD-4ECC-B99A-8CB33156A6D0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "29644501-54BD-45E9-A6C1-618892CD354F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A132487-E89F-4D0D-8366-14AFC904811F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD231103-D7C7-4697-BE90-D67558D6115C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCADAAA0-C885-466C-A122-A94E73EAF817",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "448DB1C7-7B0C-4076-9B9F-1CDCD5EB6930",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BE429EF-24D4-453A-8B43-8CCEF5D72773",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AC9692A-CE81-446D-B136-449662C4B9A2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "504D78AB-5374-48C9-B357-DB6BD2267D2D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "3029892E-1375-4F40-83D3-A51BDC4E9840",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.4.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "81F8DA6D-2258-4138-8FB2-90BE3C68B230",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D09D5933-A7D9-4A61-B863-CD8E7D5E67D8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "20E8648C-5469-4280-A581-D4A9A41B7213",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:dragonflybsd:dragonflybsd:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFBE8937-E1BD-4601-AF1C-6DD20BB132AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:dragonflybsd:dragonflybsd:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D676C769-17D1-48B2-98F4-AC3BDF2C882B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:dragonflybsd:dragonflybsd:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEBD3CB7-D88A-4868-A6AD-0717A8A989EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:dragonflybsd:dragonflybsd:1.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C79071BA-D3FB-4FDF-96A1-477BA88C3E6E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "55C5FC1A-1253-4390-A4FC-573BB14EA937",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.4:release_p42:*:*:*:*:*:*",
              "matchCriteriaId": "6F4AC452-6042-409D-8673-ACAD108EE3B5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.4:releng:*:*:*:*:*:*",
              "matchCriteriaId": "2FE1009B-371A-48E2-A456-935A1F0B7D0D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.4:stable:*:*:*:*:*:*",
              "matchCriteriaId": "C844A170-B5A7-4703-AF3B-67366D44EA8B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "44308D13-D935-4FF8-AB52-F0E115ED1AD2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.5:release:*:*:*:*:*:*",
              "matchCriteriaId": "3D41CB12-7894-4D25-80EC-23C56171D973",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.5:release_p32:*:*:*:*:*:*",
              "matchCriteriaId": "9BCD9C12-EDAB-473F-9CC5-04F06B413720",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.5:releng:*:*:*:*:*:*",
              "matchCriteriaId": "58EBC5C8-5CA8-4881-A036-179FDEBA3CA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.5:stable:*:*:*:*:*:*",
              "matchCriteriaId": "09789843-6A1A-4CDB-97E8-89E82B79DDB5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C001822-FDF8-497C-AC2C-B59A00E9ACD2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.6:release:*:*:*:*:*:*",
              "matchCriteriaId": "118211EF-CED7-4EB5-9669-F54C8169D4AE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.6:release_p20:*:*:*:*:*:*",
              "matchCriteriaId": "58288F0F-B4CE-445C-AD93-DA73E3AD6FC3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.6:releng:*:*:*:*:*:*",
              "matchCriteriaId": "CC96FBA9-6A65-4CC7-BE68-ADAF450ABE21",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.6:stable:*:*:*:*:*:*",
              "matchCriteriaId": "9A405AE2-ECC4-4BB0-80DD-4736394FB217",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AB4AD26-6AF2-4F3A-B602-F231FAABA73E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "B86C77AB-B8FF-4376-9B4E-C88417396F3D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.7:release:*:*:*:*:*:*",
              "matchCriteriaId": "E5612FB0-8403-4A7E-B89A-D7BDFAC00078",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.7:release_p17:*:*:*:*:*:*",
              "matchCriteriaId": "FA699BB4-94AA-40E6-A6B6-33E3D416CDA7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.7:releng:*:*:*:*:*:*",
              "matchCriteriaId": "AFDA151E-E614-4A24-A34D-B6D5309110CC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.7:stable:*:*:*:*:*:*",
              "matchCriteriaId": "A7818E11-1BEB-4DAA-BA7A-A278454BA4B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "441BE3A0-20F4-4972-B279-19B3DB5FA14D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.8:release_p7:*:*:*:*:*:*",
              "matchCriteriaId": "B19BEAB3-8BED-422F-B228-240269CB0704",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.8:releng:*:*:*:*:*:*",
              "matchCriteriaId": "2D33C6EF-DBE1-4943-83E4-1F10670DAC6E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.8_prerelease:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8ED2959-64AA-487E-AA11-72595A6FAA04",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "00EAEA17-033A-4A50-8E39-D61154876D2F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.9:releng:*:*:*:*:*:*",
              "matchCriteriaId": "E6288144-0CD7-45B6-B5A7-09B1DF14FBE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.9_prerelease:*:*:*:*:*:*:*",
              "matchCriteriaId": "860BABDE-4266-4476-96F9-397DAD23C841",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FFD9D1C-A459-47AD-BC62-15631417A32F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.10:release:*:*:*:*:*:*",
              "matchCriteriaId": "4ECDEC87-0132-46B6-BD9B-A94F9B669EAA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.10:release_p8:*:*:*:*:*:*",
              "matchCriteriaId": "6E21E50A-A368-4487-A791-87366CC5C86E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.10:releng:*:*:*:*:*:*",
              "matchCriteriaId": "43E84296-9B5C-4623-A2C4-431D76FC2765",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.10_prerelease:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A9CA0AC-29ED-4C86-AB6C-DCAE28FC1BB5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.11:release_p3:*:*:*:*:*:*",
              "matchCriteriaId": "E18328E2-3CB5-4D36-8EA3-77DD909B46A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.11:releng:*:*:*:*:*:*",
              "matchCriteriaId": "EF73D76B-FBB8-4D10-8393-9FAF53392A4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.11:stable:*:*:*:*:*:*",
              "matchCriteriaId": "F177AE1C-58C2-4575-807C-ABFFC5119FA8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.11_p20_release:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3EFFC9A-016A-496B-A109-919189A9C808",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.11_release:*:*:*:*:*:*:*",
              "matchCriteriaId": "73E6E5C5-F80A-423D-BD93-BA837E808A70",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "61EBA52A-2D8B-4FB5-866E-AE67CE1842E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "3B13D898-C1B6-44B9-8432-7DDB8A380E9E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.0:release_p14:*:*:*:*:*:*",
              "matchCriteriaId": "51A612F6-E4EB-4E34-8F55-79E16C74758E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.0:releng:*:*:*:*:*:*",
              "matchCriteriaId": "5C19B266-8FE7-49ED-8678-2D522257491D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EE93350-92E6-4F5C-A14C-9993CFFDBCD4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.1:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "15C4D826-A419-45F5-B91C-1445DB480916",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.1:release:*:*:*:*:*:*",
              "matchCriteriaId": "0D9F2B04-A1F2-4788-A53D-C8274A758DDA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.1:release_p5:*:*:*:*:*:*",
              "matchCriteriaId": "FEC7B38F-C6FB-4213-AE18-2D039A4D8E7A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.1:releng:*:*:*:*:*:*",
              "matchCriteriaId": "9A5309ED-D84F-4F52-9864-5B0FEEEE5022",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD7C441E-444B-4DF5-8491-86805C70FB99",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.2.1:release:*:*:*:*:*:*",
              "matchCriteriaId": "C9CCE8F3-84EE-4571-8AAA-BF2D132E9BD4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.2.1:releng:*:*:*:*:*:*",
              "matchCriteriaId": "8E4BC012-ADE4-468F-9A25-261CD8055694",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8A80E6A-6502-4A33-83BA-7DCC606D79AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.3:release:*:*:*:*:*:*",
              "matchCriteriaId": "0D6428EB-5E1A-41CB-979C-4C9402251D8B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.3:releng:*:*:*:*:*:*",
              "matchCriteriaId": "2DCA9879-C9F5-475A-8EC9-04D151001C8D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.3:stable:*:*:*:*:*:*",
              "matchCriteriaId": "0A94132F-4C47-49CC-B03C-8756613E9A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.4:release:*:*:*:*:*:*",
              "matchCriteriaId": "3F629879-66F0-427B-86D8-D740E0E3F6E8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.4:releng:*:*:*:*:*:*",
              "matchCriteriaId": "C89129C5-A1DB-4018-B43A-C60C8E650080",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.4:stable:*:*:*:*:*:*",
              "matchCriteriaId": "60F7B4A9-4036-4061-8F3D-BDC3F1282EC0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.5_release:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFA9754D-773C-432E-8E74-52FDC83FF279",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.5_stable:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8812D60-F669-4EA3-AF4E-6329EF625E38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D2C79D5-D27F-4B08-A8DF-3E3AAF4E16A5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:6.0:release:*:*:*:*:*:*",
              "matchCriteriaId": "CCE4F2E6-2286-4D87-ADD7-7E999B4E5620",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:6.0:stable:*:*:*:*:*:*",
              "matchCriteriaId": "C07C3BEF-8D6A-4F23-96DE-AFE4369D08EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:6.0_p5_release:*:*:*:*:*:*:*",
              "matchCriteriaId": "67FDB43C-84D1-4B45-BFB9-340F3687A22F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4416CBA-76B9-4051-B015-F1BE89517309",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:6.1:release:*:*:*:*:*:*",
              "matchCriteriaId": "8C64EE9C-18E1-49C6-96DE-7E6F1607C0D7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:6.1:release_p10:*:*:*:*:*:*",
              "matchCriteriaId": "B36B3805-8A85-4357-ABC1-AB22C61E3381",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:6.1:stable:*:*:*:*:*:*",
              "matchCriteriaId": "231B70A8-890A-4790-A33A-64228656BF0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9118B602-3FB6-4701-AC09-763DD48334BA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:6.2:stable:*:*:*:*:*:*",
              "matchCriteriaId": "32FCB0B3-8FBE-49FA-B17E-0D5462C9E5B4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:6.2_releng:*:*:*:*:*:*:*",
              "matchCriteriaId": "589B62B4-FAA3-4F58-8104-EF84FEAFFB65",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F702C46F-CA02-4FA2-B7D6-C61C2C095679",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:6.3_releng:*:*:*:*:*:*:*",
              "matchCriteriaId": "72C2BE9D-91E1-48E9-9326-39CF583A57E0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:7.0:pre-release:*:*:*:*:*:*",
              "matchCriteriaId": "42231BCC-2B90-4196-A1C2-408A353C1BEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:7.0_beta4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F06B831E-D8F2-4380-B279-559CE103210F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:7.0_releng:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ACC9072-4A33-4F1F-B790-2F9D5A52F71B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:netbsd:netbsd:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5071CA39-65B3-4AFB-8898-21819E57A084",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:netbsd:netbsd:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3C3F588-98DA-4F6F-A083-2B9EE534C561",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:netbsd:netbsd:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C2ED81B-8DA2-46D0-AE24-C61BF8E78AE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:netbsd:netbsd:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D18C95A3-15E3-41B8-AC28-ACEA57021E24",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:netbsd:netbsd:2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CFC6B75-9057-4E58-A4D4-8AEC12AE62E4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:netbsd:netbsd:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "36419DD6-0DB4-4BB6-A35F-D8FDB89402F1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:netbsd:netbsd:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "28BD9F91-2384-4557-9648-25FC00D04677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:netbsd:netbsd:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ECF9E5F-AF38-42B9-8B49-6C254394CDFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:netbsd:netbsd:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F9432E9-AACA-4242-BDAB-8792ACF72C12",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:netbsd:netbsd:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "29C02C6B-AAFD-4594-94A4-F26BA3648CB0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:netbsd:netbsd:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "57C533D7-771E-4E33-A4FE-764C0B73F920",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:netbsd:netbsd:3.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E59D3682-22E1-40C4-AC65-079005FB6194",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:netbsd:netbsd:3.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "3D95D05C-4FE1-4408-B8B8-5C5932800385",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:netbsd:netbsd:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9875E709-11BA-4B8F-A2FC-26844DD4D563",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:netbsd:netbsd:4.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "FCB9E9F8-7C6B-4BC7-A593-A11B9D6F0B35",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:netbsd:netbsd:4.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "2F4B6E29-B74F-45FF-AEB1-A118753F8E3C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DF053A1-C252-427E-9EEF-27240F422976",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "48A9C344-45AA-47B9-B35A-1A62E220D9C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "80EB24F0-46A7-481B-83ED-8BB012AE0C8E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA6AEAF0-FA61-4A3F-A083-1218C2027781",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "60DA30A1-3360-46BC-85B7-008D535F95BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA33E7E2-DE7B-411E-8991-718DA0988C51",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1957B3C0-7F25-469B-BC3F-7B09260837ED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC46909F-DDFC-448B-BCDF-1EB343F96630",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9496279F-AB43-4B53-81A6-87C651ABC4BA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDA160D4-5CAB-44E7-880A-59DD98FEAD62",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4D84D7A-EB7C-4196-B8B6-7B703C8055C2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEAE2873-0028-4744-B64E-8E2EA30447F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "783973F9-2A6E-4DDF-A64C-7794FFD0B7B9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5BB6C5D-4C43-4BB8-B1CE-A70BBE650CA1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC77812C-D84E-493E-9D21-1BA6C2129E70",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "16C117F3-3684-4683-9F9E-CEDD5B88F9CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DF8DD37-A337-4E9D-A34E-C2D561A24285",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cosmicperl:directory_pro:10.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D9D185E-D235-4731-A092-B667DC6FCBA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:darwin:darwin:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "80D58C3E-4F5D-42A0-95AA-25E0EAEBFCF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:darwin:darwin:9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4268605-39FE-49E0-ABC9-27DEA359779E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:navision:financials_server:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B70D3E5-924C-4AB7-ABF7-6273DE325007",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A certain pseudo-random number generator (PRNG) algorithm that uses XOR and 2-bit random hops (aka \"Algorithm X2\"), as used in OpenBSD 2.6 through 3.4, Mac OS X 10 through 10.5.1, FreeBSD 4.4 through 7.0, and DragonFlyBSD 1.0 through 1.10.1, allows remote attackers to guess sensitive values such as IP fragmentation IDs by observing a sequence of previously generated values.  NOTE: this issue can be leveraged for attacks such as injection into TCP packets and OS fingerprinting."
    },
    {
      "lang": "es",
      "value": "Cierto algoritmo generador de n\u00fameros pseudo-aleatorios(PRNG) que usa XOR y alterna en saltos de 2-bit (tambi\u00e9n conocido com o\"algoritmo X2\"), usado en OpenBSD de la v2.6 a la 3.4, Mac OS X de la v10 a a 10.5.1, FreeBSD 4.4 a la 7.0 y DragonFlyBSD 1.0 a la 1.10.1, permite a atacantes remotos adivinar datos sensibles como los IDs de una fragmentaci\u00f3n IP observando una secuencia generada previamente. NOTA: este fallo puede ser aprovechado por ataques como la inyecci\u00f3n de paquetes TCP y OS fingerprinting."
    }
  ],
  "id": "CVE-2008-1147",
  "lastModified": "2024-11-21T00:43:47.333",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2008-03-04T23:44:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://seclists.org/bugtraq/2008/Feb/0052.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://seclists.org/bugtraq/2008/Feb/0063.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28819"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.freebsd.org/cgi/cvsweb.cgi/src/sys/netinet/ip_id.c?rev=1.10%3Bcontenttype="
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securiteam.com/securityreviews/5PP0H0UNGW.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/487658"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/27647"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.trusteer.com/docs/OpenBSD_DNS_Cache_Poisoning_and_Multiple_OS_Predictable_IP_ID_Vulnerability.pdf"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40329"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41155"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seclists.org/bugtraq/2008/Feb/0052.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seclists.org/bugtraq/2008/Feb/0063.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28819"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.freebsd.org/cgi/cvsweb.cgi/src/sys/netinet/ip_id.c?rev=1.10%3Bcontenttype="
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securiteam.com/securityreviews/5PP0H0UNGW.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/487658"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/27647"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.trusteer.com/docs/OpenBSD_DNS_Cache_Poisoning_and_Multiple_OS_Predictable_IP_ID_Vulnerability.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40329"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41155"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-03-04 23:44
Modified
2024-11-21 00:43
Severity ?
Summary
A certain pseudo-random number generator (PRNG) algorithm that uses ADD with 0 random hops (aka "Algorithm A0"), as used in OpenBSD 3.5 through 4.2 and NetBSD 1.6.2 through 4.0, allows remote attackers to guess sensitive values such as (1) DNS transaction IDs or (2) IP fragmentation IDs by observing a sequence of previously generated values. NOTE: this issue can be leveraged for attacks such as DNS cache poisoning, injection into TCP packets, and OS fingerprinting.
Impacted products
Vendor Product Version
apple mac_os_x 10.0
apple mac_os_x 10.0.1
apple mac_os_x 10.0.2
apple mac_os_x 10.0.3
apple mac_os_x 10.0.4
apple mac_os_x 10.1
apple mac_os_x 10.1.1
apple mac_os_x 10.1.2
apple mac_os_x 10.1.3
apple mac_os_x 10.1.4
apple mac_os_x 10.1.5
apple mac_os_x 10.2
apple mac_os_x 10.2.1
apple mac_os_x 10.2.2
apple mac_os_x 10.2.3
apple mac_os_x 10.2.4
apple mac_os_x 10.2.5
apple mac_os_x 10.2.6
apple mac_os_x 10.2.7
apple mac_os_x 10.2.8
apple mac_os_x 10.3
apple mac_os_x 10.3.1
apple mac_os_x 10.3.2
apple mac_os_x 10.3.3
apple mac_os_x 10.3.4
apple mac_os_x 10.3.5
apple mac_os_x 10.3.6
apple mac_os_x 10.3.7
apple mac_os_x 10.3.8
apple mac_os_x 10.3.9
apple mac_os_x 10.4
apple mac_os_x 10.4.1
apple mac_os_x 10.4.2
apple mac_os_x 10.4.3
apple mac_os_x 10.4.4
apple mac_os_x 10.4.5
apple mac_os_x 10.4.6
apple mac_os_x 10.4.7
apple mac_os_x 10.4.8
apple mac_os_x 10.4.9
apple mac_os_x 10.4.10
apple mac_os_x 10.4.11
apple mac_os_x 10.5
apple mac_os_x 10.5.1
apple mac_os_x_server 10.0
apple mac_os_x_server 10.1
apple mac_os_x_server 10.1.1
apple mac_os_x_server 10.1.2
apple mac_os_x_server 10.1.3
apple mac_os_x_server 10.1.4
apple mac_os_x_server 10.1.5
apple mac_os_x_server 10.2
apple mac_os_x_server 10.2.1
apple mac_os_x_server 10.2.2
apple mac_os_x_server 10.2.3
apple mac_os_x_server 10.2.4
apple mac_os_x_server 10.2.5
apple mac_os_x_server 10.2.6
apple mac_os_x_server 10.2.7
apple mac_os_x_server 10.2.8
apple mac_os_x_server 10.3
apple mac_os_x_server 10.3.1
apple mac_os_x_server 10.3.2
apple mac_os_x_server 10.3.3
apple mac_os_x_server 10.3.4
apple mac_os_x_server 10.3.5
apple mac_os_x_server 10.3.6
apple mac_os_x_server 10.3.7
apple mac_os_x_server 10.3.8
apple mac_os_x_server 10.3.9
apple mac_os_x_server 10.4
apple mac_os_x_server 10.4.1
apple mac_os_x_server 10.4.2
apple mac_os_x_server 10.4.3
apple mac_os_x_server 10.4.4
apple mac_os_x_server 10.4.5
apple mac_os_x_server 10.4.6
apple mac_os_x_server 10.4.7
apple mac_os_x_server 10.4.8
apple mac_os_x_server 10.4.9
apple mac_os_x_server 10.4.10
apple mac_os_x_server 10.4.11
apple mac_os_x_server 10.5
dragonflybsd dragonflybsd 1.0
dragonflybsd dragonflybsd 1.1
dragonflybsd dragonflybsd 1.2
dragonflybsd dragonflybsd 1.10.1
freebsd freebsd 4.4
freebsd freebsd 4.4
freebsd freebsd 4.4
freebsd freebsd 4.4
freebsd freebsd 4.5
freebsd freebsd 4.5
freebsd freebsd 4.5
freebsd freebsd 4.5
freebsd freebsd 4.5
freebsd freebsd 4.6
freebsd freebsd 4.6
freebsd freebsd 4.6
freebsd freebsd 4.6
freebsd freebsd 4.6
freebsd freebsd 4.6.2
freebsd freebsd 4.7
freebsd freebsd 4.7
freebsd freebsd 4.7
freebsd freebsd 4.7
freebsd freebsd 4.7
freebsd freebsd 4.8
freebsd freebsd 4.8
freebsd freebsd 4.8
freebsd freebsd 4.8_prerelease
freebsd freebsd 4.9
freebsd freebsd 4.9
freebsd freebsd 4.9_prerelease
freebsd freebsd 4.10
freebsd freebsd 4.10
freebsd freebsd 4.10
freebsd freebsd 4.10
freebsd freebsd 4.10_prerelease
freebsd freebsd 4.11
freebsd freebsd 4.11
freebsd freebsd 4.11
freebsd freebsd 4.11_p20_release
freebsd freebsd 4.11_release
freebsd freebsd 5.0
freebsd freebsd 5.0
freebsd freebsd 5.0
freebsd freebsd 5.0
freebsd freebsd 5.1
freebsd freebsd 5.1
freebsd freebsd 5.1
freebsd freebsd 5.1
freebsd freebsd 5.1
freebsd freebsd 5.2
freebsd freebsd 5.2.1
freebsd freebsd 5.2.1
freebsd freebsd 5.3
freebsd freebsd 5.3
freebsd freebsd 5.3
freebsd freebsd 5.3
freebsd freebsd 5.4
freebsd freebsd 5.4
freebsd freebsd 5.4
freebsd freebsd 5.5_release
freebsd freebsd 5.5_stable
freebsd freebsd 6.0
freebsd freebsd 6.0
freebsd freebsd 6.0
freebsd freebsd 6.0_p5_release
freebsd freebsd 6.1
freebsd freebsd 6.1
freebsd freebsd 6.1
freebsd freebsd 6.1
freebsd freebsd 6.2
freebsd freebsd 6.2
freebsd freebsd 6.2_releng
freebsd freebsd 6.3
freebsd freebsd 6.3_releng
freebsd freebsd 7.0
freebsd freebsd 7.0_beta4
freebsd freebsd 7.0_releng
netbsd netbsd 1.6.2
netbsd netbsd 2.0
netbsd netbsd 2.0.1
netbsd netbsd 2.0.2
netbsd netbsd 2.0.3
netbsd netbsd 2.0.4
netbsd netbsd 2.1
netbsd netbsd 2.1.1
netbsd netbsd 3.0.1
netbsd netbsd 3.0.2
netbsd netbsd 3.1
netbsd netbsd 3.1
netbsd netbsd 3.1
netbsd netbsd 4.0
netbsd netbsd 4.0
netbsd netbsd 4.0
openbsd openbsd 2.6
openbsd openbsd 2.7
openbsd openbsd 2.8
openbsd openbsd 2.9
openbsd openbsd 3.0
openbsd openbsd 3.1
openbsd openbsd 3.2
openbsd openbsd 3.3
openbsd openbsd 3.4
openbsd openbsd 3.5
openbsd openbsd 3.6
openbsd openbsd 3.7
openbsd openbsd 3.8
openbsd openbsd 3.9
openbsd openbsd 4.0
openbsd openbsd 4.1
openbsd openbsd 4.2
cosmicperl directory_pro 10.0.3
darwin darwin 1.0
darwin darwin 9.1
navision financials_server 3.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "99C273D1-ADFE-4B4C-B543-7B9CA741A117",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BC31B69-3DE1-4CF3-ADC9-CA0BF1714CBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "77CC671C-6D89-4279-86F7-DDE1D4D9A0CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E4B77F6-E71C-45ED-96CC-7872AD2FCBF8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "066ABC3B-B395-42D2-95C0-5B810F91A6F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "01BC19FC-6E03-4000-AE4B-232E47FA76F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "421FC2DD-0CF7-44A2-A63C-5221689E2363",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F8B70BC-42B7-453A-B506-7BE69D49A4B5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAAC6EA5-DCB2-4A50-A8BC-25CC43FAEF9B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA32F7D8-02F8-4CFE-B193-2888807BC4D6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9DCDE70-07DA-4F0B-805F-6BA03D410CD6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDCF4FB3-F781-46D5-BEE7-485B3DC78B83",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE52A344-8B07-480D-A57F-B1F6E6574F3B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "56CC0444-570C-4BB5-B53A-C5CA0BD87935",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "62E3EED7-FE30-4620-B40B-9CC49B77408A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AFD8BC6-4893-4D9D-A26E-27AAC864F94B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BD1F9A1-5ADB-451D-9525-D545E42D2B8F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7A24978-2891-425C-ACF6-E8F5C839C54A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B20E130-6078-4336-B614-273C27142B46",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB461678-560D-436E-A3AE-9E1E16DB0412",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFDADE04-29F0-446B-824B-0518880CF0A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED9BE602-A740-4CF7-9CAF-59061B16AB31",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "33E698C1-C313-40E6-BAF9-7C8F9CF02484",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF2D00AC-FA2A-4C39-B796-DC19072862CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "421079DA-B605-4E05-9454-C30CF7631CF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "93B734BA-3435-40A9-B22B-5D56CEB865A7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4B57B3E-B1B2-4F13-99D3-4F9DB3C07B5E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "30897327-44DD-4D6C-B8B6-2D66C44EA55D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B79D8F73-2E78-4A67-96BB-21AD9BCB0094",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC6931D5-DE7E-41F6-ADDC-AB5A8A167F69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0760FDDB-38D3-4263-9B4D-1AF5E613A4F9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFD4DE58-46C7-4E69-BF36-C5FD768B8248",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF824694-52DE-44E3-ACAD-60B2A84CD3CE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B73A0891-A37A-4E0D-AA73-B18BFD6B1447",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "26AC38AB-D689-4B2B-9DAE-F03F4DFD15BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C580935-0091-4163-B747-750FB7686973",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB0F2132-8431-4CEF-9A3D-A69425E3834E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "8719F3C4-F1DE-49B5-9301-22414A2B6F9C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "09ED46A8-1739-411C-8807-2A416BDB6DFE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "786BB737-EA99-4EC6-B742-0C35BF2453F9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D089858-3AF9-4B82-912D-AA33F25E3715",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EE39585-CF3B-4493-96D8-B394544C7643",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2442D35-7484-43D8-9077-3FDF63104816",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F3E721C-00CA-4D51-B542-F2BC5C0D65BF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB279593-17D1-4A65-BF54-969B38B74B23",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "80F5B731-D5A7-4694-9B27-CEE1DCC810EC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D5DB7BE-FC71-4ADE-8B9F-7EA401C8CA88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3E2571E-D9EB-43CD-82DD-8C813FF8D5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "36F4618C-1408-4097-B97D-5F32DE6D01DF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F558C40-D0DA-4700-95DA-DF1322C020E6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F8F30B-E4B8-4745-AFFA-8FD620E61994",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "00AE033B-5F16-4262-A397-02D7450189B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E831F3E-A980-47AF-BD05-2DB1A14689B4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "36991737-904F-4B26-AEE2-7B30411279E8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7EE6036-1A18-43F1-8A92-7DF39E1516E3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "620ECFC8-293D-4C2B-9698-67185BB6E2EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1F14A45-BDDB-4C12-9370-D5241975A928",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "46BC34D4-A1E8-4E01-982D-EAF03A0EB886",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "35932546-B614-47C0-98E6-8EF1EFE06725",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "38F17066-C090-4DD7-A1AC-D8FF70D268CE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E997653-C744-4F1F-9948-47579AB3BED3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF5A416A-F198-4B9C-8221-D36CC8A7FE5C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "384C130F-D1A9-4482-AF20-FC81933473A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BCD1C5-1AFC-4287-9AFD-81FB3F4F9E54",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CA6BD2A-3022-408D-8E4F-50865996E965",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "463D5628-7536-4029-99D6-5E525050059E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "69A39B11-1C23-4A6C-B4C5-AEC40836F173",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "78D48FD1-CB91-4310-9432-A4365FA67B11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "750C6C37-8460-4ED8-83AD-ACAF993E4A6E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "8923EE1A-DD48-4EC8-8698-A33093FD709C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D24D5FA5-95DD-4ECC-B99A-8CB33156A6D0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "29644501-54BD-45E9-A6C1-618892CD354F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A132487-E89F-4D0D-8366-14AFC904811F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD231103-D7C7-4697-BE90-D67558D6115C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCADAAA0-C885-466C-A122-A94E73EAF817",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "448DB1C7-7B0C-4076-9B9F-1CDCD5EB6930",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BE429EF-24D4-453A-8B43-8CCEF5D72773",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AC9692A-CE81-446D-B136-449662C4B9A2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "504D78AB-5374-48C9-B357-DB6BD2267D2D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "3029892E-1375-4F40-83D3-A51BDC4E9840",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.4.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "81F8DA6D-2258-4138-8FB2-90BE3C68B230",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D09D5933-A7D9-4A61-B863-CD8E7D5E67D8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "20E8648C-5469-4280-A581-D4A9A41B7213",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:dragonflybsd:dragonflybsd:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFBE8937-E1BD-4601-AF1C-6DD20BB132AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:dragonflybsd:dragonflybsd:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D676C769-17D1-48B2-98F4-AC3BDF2C882B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:dragonflybsd:dragonflybsd:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEBD3CB7-D88A-4868-A6AD-0717A8A989EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:dragonflybsd:dragonflybsd:1.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C79071BA-D3FB-4FDF-96A1-477BA88C3E6E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "55C5FC1A-1253-4390-A4FC-573BB14EA937",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.4:release_p42:*:*:*:*:*:*",
              "matchCriteriaId": "6F4AC452-6042-409D-8673-ACAD108EE3B5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.4:releng:*:*:*:*:*:*",
              "matchCriteriaId": "2FE1009B-371A-48E2-A456-935A1F0B7D0D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.4:stable:*:*:*:*:*:*",
              "matchCriteriaId": "C844A170-B5A7-4703-AF3B-67366D44EA8B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "44308D13-D935-4FF8-AB52-F0E115ED1AD2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.5:release:*:*:*:*:*:*",
              "matchCriteriaId": "3D41CB12-7894-4D25-80EC-23C56171D973",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.5:release_p32:*:*:*:*:*:*",
              "matchCriteriaId": "9BCD9C12-EDAB-473F-9CC5-04F06B413720",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.5:releng:*:*:*:*:*:*",
              "matchCriteriaId": "58EBC5C8-5CA8-4881-A036-179FDEBA3CA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.5:stable:*:*:*:*:*:*",
              "matchCriteriaId": "09789843-6A1A-4CDB-97E8-89E82B79DDB5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C001822-FDF8-497C-AC2C-B59A00E9ACD2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.6:release:*:*:*:*:*:*",
              "matchCriteriaId": "118211EF-CED7-4EB5-9669-F54C8169D4AE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.6:release_p20:*:*:*:*:*:*",
              "matchCriteriaId": "58288F0F-B4CE-445C-AD93-DA73E3AD6FC3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.6:releng:*:*:*:*:*:*",
              "matchCriteriaId": "CC96FBA9-6A65-4CC7-BE68-ADAF450ABE21",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.6:stable:*:*:*:*:*:*",
              "matchCriteriaId": "9A405AE2-ECC4-4BB0-80DD-4736394FB217",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AB4AD26-6AF2-4F3A-B602-F231FAABA73E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "B86C77AB-B8FF-4376-9B4E-C88417396F3D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.7:release:*:*:*:*:*:*",
              "matchCriteriaId": "E5612FB0-8403-4A7E-B89A-D7BDFAC00078",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.7:release_p17:*:*:*:*:*:*",
              "matchCriteriaId": "FA699BB4-94AA-40E6-A6B6-33E3D416CDA7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.7:releng:*:*:*:*:*:*",
              "matchCriteriaId": "AFDA151E-E614-4A24-A34D-B6D5309110CC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.7:stable:*:*:*:*:*:*",
              "matchCriteriaId": "A7818E11-1BEB-4DAA-BA7A-A278454BA4B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "441BE3A0-20F4-4972-B279-19B3DB5FA14D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.8:release_p7:*:*:*:*:*:*",
              "matchCriteriaId": "B19BEAB3-8BED-422F-B228-240269CB0704",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.8:releng:*:*:*:*:*:*",
              "matchCriteriaId": "2D33C6EF-DBE1-4943-83E4-1F10670DAC6E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.8_prerelease:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8ED2959-64AA-487E-AA11-72595A6FAA04",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "00EAEA17-033A-4A50-8E39-D61154876D2F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.9:releng:*:*:*:*:*:*",
              "matchCriteriaId": "E6288144-0CD7-45B6-B5A7-09B1DF14FBE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.9_prerelease:*:*:*:*:*:*:*",
              "matchCriteriaId": "860BABDE-4266-4476-96F9-397DAD23C841",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FFD9D1C-A459-47AD-BC62-15631417A32F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.10:release:*:*:*:*:*:*",
              "matchCriteriaId": "4ECDEC87-0132-46B6-BD9B-A94F9B669EAA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.10:release_p8:*:*:*:*:*:*",
              "matchCriteriaId": "6E21E50A-A368-4487-A791-87366CC5C86E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.10:releng:*:*:*:*:*:*",
              "matchCriteriaId": "43E84296-9B5C-4623-A2C4-431D76FC2765",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.10_prerelease:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A9CA0AC-29ED-4C86-AB6C-DCAE28FC1BB5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.11:release_p3:*:*:*:*:*:*",
              "matchCriteriaId": "E18328E2-3CB5-4D36-8EA3-77DD909B46A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.11:releng:*:*:*:*:*:*",
              "matchCriteriaId": "EF73D76B-FBB8-4D10-8393-9FAF53392A4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.11:stable:*:*:*:*:*:*",
              "matchCriteriaId": "F177AE1C-58C2-4575-807C-ABFFC5119FA8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.11_p20_release:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3EFFC9A-016A-496B-A109-919189A9C808",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.11_release:*:*:*:*:*:*:*",
              "matchCriteriaId": "73E6E5C5-F80A-423D-BD93-BA837E808A70",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "61EBA52A-2D8B-4FB5-866E-AE67CE1842E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "3B13D898-C1B6-44B9-8432-7DDB8A380E9E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.0:release_p14:*:*:*:*:*:*",
              "matchCriteriaId": "51A612F6-E4EB-4E34-8F55-79E16C74758E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.0:releng:*:*:*:*:*:*",
              "matchCriteriaId": "5C19B266-8FE7-49ED-8678-2D522257491D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EE93350-92E6-4F5C-A14C-9993CFFDBCD4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.1:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "15C4D826-A419-45F5-B91C-1445DB480916",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.1:release:*:*:*:*:*:*",
              "matchCriteriaId": "0D9F2B04-A1F2-4788-A53D-C8274A758DDA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.1:release_p5:*:*:*:*:*:*",
              "matchCriteriaId": "FEC7B38F-C6FB-4213-AE18-2D039A4D8E7A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.1:releng:*:*:*:*:*:*",
              "matchCriteriaId": "9A5309ED-D84F-4F52-9864-5B0FEEEE5022",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD7C441E-444B-4DF5-8491-86805C70FB99",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.2.1:release:*:*:*:*:*:*",
              "matchCriteriaId": "C9CCE8F3-84EE-4571-8AAA-BF2D132E9BD4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.2.1:releng:*:*:*:*:*:*",
              "matchCriteriaId": "8E4BC012-ADE4-468F-9A25-261CD8055694",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8A80E6A-6502-4A33-83BA-7DCC606D79AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.3:release:*:*:*:*:*:*",
              "matchCriteriaId": "0D6428EB-5E1A-41CB-979C-4C9402251D8B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.3:releng:*:*:*:*:*:*",
              "matchCriteriaId": "2DCA9879-C9F5-475A-8EC9-04D151001C8D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.3:stable:*:*:*:*:*:*",
              "matchCriteriaId": "0A94132F-4C47-49CC-B03C-8756613E9A38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.4:release:*:*:*:*:*:*",
              "matchCriteriaId": "3F629879-66F0-427B-86D8-D740E0E3F6E8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.4:releng:*:*:*:*:*:*",
              "matchCriteriaId": "C89129C5-A1DB-4018-B43A-C60C8E650080",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.4:stable:*:*:*:*:*:*",
              "matchCriteriaId": "60F7B4A9-4036-4061-8F3D-BDC3F1282EC0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.5_release:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFA9754D-773C-432E-8E74-52FDC83FF279",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.5_stable:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8812D60-F669-4EA3-AF4E-6329EF625E38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D2C79D5-D27F-4B08-A8DF-3E3AAF4E16A5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:6.0:release:*:*:*:*:*:*",
              "matchCriteriaId": "CCE4F2E6-2286-4D87-ADD7-7E999B4E5620",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:6.0:stable:*:*:*:*:*:*",
              "matchCriteriaId": "C07C3BEF-8D6A-4F23-96DE-AFE4369D08EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:6.0_p5_release:*:*:*:*:*:*:*",
              "matchCriteriaId": "67FDB43C-84D1-4B45-BFB9-340F3687A22F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4416CBA-76B9-4051-B015-F1BE89517309",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:6.1:release:*:*:*:*:*:*",
              "matchCriteriaId": "8C64EE9C-18E1-49C6-96DE-7E6F1607C0D7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:6.1:release_p10:*:*:*:*:*:*",
              "matchCriteriaId": "B36B3805-8A85-4357-ABC1-AB22C61E3381",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:6.1:stable:*:*:*:*:*:*",
              "matchCriteriaId": "231B70A8-890A-4790-A33A-64228656BF0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9118B602-3FB6-4701-AC09-763DD48334BA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:6.2:stable:*:*:*:*:*:*",
              "matchCriteriaId": "32FCB0B3-8FBE-49FA-B17E-0D5462C9E5B4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:6.2_releng:*:*:*:*:*:*:*",
              "matchCriteriaId": "589B62B4-FAA3-4F58-8104-EF84FEAFFB65",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F702C46F-CA02-4FA2-B7D6-C61C2C095679",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:6.3_releng:*:*:*:*:*:*:*",
              "matchCriteriaId": "72C2BE9D-91E1-48E9-9326-39CF583A57E0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:7.0:pre-release:*:*:*:*:*:*",
              "matchCriteriaId": "42231BCC-2B90-4196-A1C2-408A353C1BEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:7.0_beta4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F06B831E-D8F2-4380-B279-559CE103210F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:7.0_releng:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ACC9072-4A33-4F1F-B790-2F9D5A52F71B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:netbsd:netbsd:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5071CA39-65B3-4AFB-8898-21819E57A084",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:netbsd:netbsd:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3C3F588-98DA-4F6F-A083-2B9EE534C561",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:netbsd:netbsd:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C2ED81B-8DA2-46D0-AE24-C61BF8E78AE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:netbsd:netbsd:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D18C95A3-15E3-41B8-AC28-ACEA57021E24",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:netbsd:netbsd:2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CFC6B75-9057-4E58-A4D4-8AEC12AE62E4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:netbsd:netbsd:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "36419DD6-0DB4-4BB6-A35F-D8FDB89402F1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:netbsd:netbsd:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "28BD9F91-2384-4557-9648-25FC00D04677",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:netbsd:netbsd:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ECF9E5F-AF38-42B9-8B49-6C254394CDFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:netbsd:netbsd:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F9432E9-AACA-4242-BDAB-8792ACF72C12",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:netbsd:netbsd:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "29C02C6B-AAFD-4594-94A4-F26BA3648CB0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:netbsd:netbsd:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "57C533D7-771E-4E33-A4FE-764C0B73F920",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:netbsd:netbsd:3.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E59D3682-22E1-40C4-AC65-079005FB6194",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:netbsd:netbsd:3.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "3D95D05C-4FE1-4408-B8B8-5C5932800385",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:netbsd:netbsd:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9875E709-11BA-4B8F-A2FC-26844DD4D563",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:netbsd:netbsd:4.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "FCB9E9F8-7C6B-4BC7-A593-A11B9D6F0B35",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:netbsd:netbsd:4.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "2F4B6E29-B74F-45FF-AEB1-A118753F8E3C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DF053A1-C252-427E-9EEF-27240F422976",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "48A9C344-45AA-47B9-B35A-1A62E220D9C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "80EB24F0-46A7-481B-83ED-8BB012AE0C8E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA6AEAF0-FA61-4A3F-A083-1218C2027781",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "60DA30A1-3360-46BC-85B7-008D535F95BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA33E7E2-DE7B-411E-8991-718DA0988C51",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1957B3C0-7F25-469B-BC3F-7B09260837ED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC46909F-DDFC-448B-BCDF-1EB343F96630",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9496279F-AB43-4B53-81A6-87C651ABC4BA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDA160D4-5CAB-44E7-880A-59DD98FEAD62",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4D84D7A-EB7C-4196-B8B6-7B703C8055C2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEAE2873-0028-4744-B64E-8E2EA30447F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "783973F9-2A6E-4DDF-A64C-7794FFD0B7B9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5BB6C5D-4C43-4BB8-B1CE-A70BBE650CA1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC77812C-D84E-493E-9D21-1BA6C2129E70",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "16C117F3-3684-4683-9F9E-CEDD5B88F9CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DF8DD37-A337-4E9D-A34E-C2D561A24285",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cosmicperl:directory_pro:10.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D9D185E-D235-4731-A092-B667DC6FCBA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:darwin:darwin:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "80D58C3E-4F5D-42A0-95AA-25E0EAEBFCF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:darwin:darwin:9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4268605-39FE-49E0-ABC9-27DEA359779E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:navision:financials_server:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B70D3E5-924C-4AB7-ABF7-6273DE325007",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A certain pseudo-random number generator (PRNG) algorithm that uses ADD with 0 random hops (aka \"Algorithm A0\"), as used in OpenBSD 3.5 through 4.2 and NetBSD 1.6.2 through 4.0, allows remote attackers to guess sensitive values such as (1) DNS transaction IDs or (2) IP fragmentation IDs by observing a sequence of previously generated values.  NOTE: this issue can be leveraged for attacks such as DNS cache poisoning, injection into TCP packets, and OS fingerprinting."
    },
    {
      "lang": "es",
      "value": "Cierto algoritmo generador de n\u00fameros pseudo-aleatorios(PRNG) que usa ADD con 0 saltos aleatorios(tambi\u00e9n conocido como \"algoritmo A0\"), usado en OpenBSD de la v3.5 a la 4.2 y NetBSD v1.6.2 a la 4.0, permite a atacantes remotos adivinar datos sensibles como (1)los IDs de una transacci\u00f3n DNS, (2)IDs de una fragmentaci\u00f3n IP observando una secuencias generadas previamente. NOTA: este fallo puede ser aprovechado por ataques como el envenenamiento de la cach\u00e9s DNS, la inyecci\u00f3n de paquetes TCP y OS fingerprinting."
    }
  ],
  "id": "CVE-2008-1148",
  "lastModified": "2024-11-21T00:43:47.510",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2008-03-04T23:44:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28819"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securiteam.com/securityreviews/5PP0H0UNGW.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/487658"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/27647"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.trusteer.com/docs/OpenBSD_DNS_Cache_Poisoning_and_Multiple_OS_Predictable_IP_ID_Vulnerability.pdf"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40329"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41157"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28819"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securiteam.com/securityreviews/5PP0H0UNGW.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/487658"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/27647"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.trusteer.com/docs/OpenBSD_DNS_Cache_Poisoning_and_Multiple_OS_Predictable_IP_ID_Vulnerability.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40329"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41157"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2001-10-18 04:00
Modified
2024-11-20 23:36
Severity ?
Summary
Directory traversal vulnerability in cosmicpro.cgi in Cosmicperl Directory Pro 2.0 allows remote attackers to gain sensitive information via a .. (dot dot) in the SHOW parameter.
Impacted products
Vendor Product Version
cosmicperl directory_pro 2.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cosmicperl:directory_pro:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB0B0B46-45E7-4C24-87A8-78A667F0A751",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Directory traversal vulnerability in cosmicpro.cgi in Cosmicperl Directory Pro 2.0 allows remote attackers to gain sensitive information via a .. (dot dot) in the SHOW parameter."
    }
  ],
  "id": "CVE-2001-0780",
  "lastModified": "2024-11-20T23:36:08.403",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2001-10-18T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/archive/1/187182"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/2793"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/archive/1/187182"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/2793"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}