Vulnerabilites related to neoteris - instant_virtual_extranet
cve-2004-0079
Vulnerability from cvelistv5
Published
2004-03-18 05:00
Modified
2025-01-16 17:33
Summary
The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference.
References
http://www.securityfocus.com/bid/9899vdb-entry, x_refsource_BID
http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00087.htmlvendor-advisory, x_refsource_FEDORA
http://www.linuxsecurity.com/advisories/engarde_advisory-4135.htmlvendor-advisory, x_refsource_ENGARDE
http://marc.info/?l=bugtraq&m=108403806509920&w=2vendor-advisory, x_refsource_HP
http://www.redhat.com/support/errata/RHSA-2004-121.htmlvendor-advisory, x_refsource_REDHAT
http://www.mandriva.com/security/advisories?name=MDKSA-2004:023vendor-advisory, x_refsource_MANDRAKE
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2621vdb-entry, signature, x_refsource_OVAL
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834vendor-advisory, x_refsource_CONECTIVA
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txtvendor-advisory, x_refsource_SCO
http://secunia.com/advisories/17381third-party-advisory, x_refsource_SECUNIA
http://www.uniras.gov.uk/vuls/2004/224012/index.htmx_refsource_MISC
http://fedoranews.org/updates/FEDORA-2004-095.shtmlvendor-advisory, x_refsource_FEDORA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9779vdb-entry, signature, x_refsource_OVAL
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A975vdb-entry, signature, x_refsource_OVAL
http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524vendor-advisory, x_refsource_SUNALERT
http://www.novell.com/linux/security/advisories/2004_07_openssl.htmlvendor-advisory, x_refsource_SUSE
http://lists.apple.com/mhonarc/security-announce/msg00045.htmlx_refsource_CONFIRM
http://www.openssl.org/news/secadv_20040317.txtx_refsource_CONFIRM
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:05.openssl.ascvendor-advisory, x_refsource_FREEBSD
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-005.txt.ascvendor-advisory, x_refsource_NETBSD
http://www.ciac.org/ciac/bulletins/o-101.shtmlthird-party-advisory, government-resource, x_refsource_CIAC
http://www.us-cert.gov/cas/techalerts/TA04-078A.htmlthird-party-advisory, x_refsource_CERT
http://secunia.com/advisories/17401third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2005-829.htmlvendor-advisory, x_refsource_REDHAT
http://support.avaya.com/elmodocs2/security/ASA-2005-239.htmx_refsource_CONFIRM
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A870vdb-entry, signature, x_refsource_OVAL
http://www.redhat.com/support/errata/RHSA-2005-830.htmlvendor-advisory, x_refsource_REDHAT
http://security.gentoo.org/glsa/glsa-200403-03.xmlvendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/11139third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2004-120.htmlvendor-advisory, x_refsource_REDHAT
http://marc.info/?l=bugtraq&m=107953412903636&w=2mailing-list, x_refsource_BUGTRAQ
http://support.lexmark.com/index?page=content&id=TE88&locale=EN&userlocale=EN_USx_refsource_CONFIRM
http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.htmlvendor-advisory, x_refsource_APPLE
http://secunia.com/advisories/17398third-party-advisory, x_refsource_SECUNIA
http://www.slackware.org/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.455961vendor-advisory, x_refsource_SLACKWARE
http://www.redhat.com/support/errata/RHSA-2004-139.htmlvendor-advisory, x_refsource_REDHAT
https://exchange.xforce.ibmcloud.com/vulnerabilities/15505vdb-entry, x_refsource_XF
http://www.trustix.org/errata/2004/0012vendor-advisory, x_refsource_TRUSTIX
http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtmlvendor-advisory, x_refsource_CISCO
http://docs.info.apple.com/article.html?artnum=61798x_refsource_CONFIRM
http://www.kb.cert.org/vuls/id/288574third-party-advisory, x_refsource_CERT-VN
http://www.debian.org/security/2004/dsa-465vendor-advisory, x_refsource_DEBIAN
http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.htmlvendor-advisory, x_refsource_APPLE
http://secunia.com/advisories/18247third-party-advisory, x_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5770vdb-entry, signature, x_refsource_OVAL
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T00:01:23.689Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "9899",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/9899",
               },
               {
                  name: "FEDORA-2005-1042",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00087.html",
               },
               {
                  name: "ESA-20040317-003",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_ENGARDE",
                     "x_transferred",
                  ],
                  url: "http://www.linuxsecurity.com/advisories/engarde_advisory-4135.html",
               },
               {
                  name: "SSRT4717",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_HP",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=108403806509920&w=2",
               },
               {
                  name: "RHSA-2004:121",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2004-121.html",
               },
               {
                  name: "MDKSA-2004:023",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRAKE",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:023",
               },
               {
                  name: "oval:org.mitre.oval:def:2621",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2621",
               },
               {
                  name: "CLA-2004:834",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CONECTIVA",
                     "x_transferred",
                  ],
                  url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834",
               },
               {
                  name: "SCOSA-2004.10",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SCO",
                     "x_transferred",
                  ],
                  url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt",
               },
               {
                  name: "17381",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/17381",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://www.uniras.gov.uk/vuls/2004/224012/index.htm",
               },
               {
                  name: "FEDORA-2004-095",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://fedoranews.org/updates/FEDORA-2004-095.shtml",
               },
               {
                  name: "oval:org.mitre.oval:def:9779",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9779",
               },
               {
                  name: "oval:org.mitre.oval:def:975",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A975",
               },
               {
                  name: "57524",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUNALERT",
                     "x_transferred",
                  ],
                  url: "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524",
               },
               {
                  name: "SuSE-SA:2004:007",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://www.novell.com/linux/security/advisories/2004_07_openssl.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://lists.apple.com/mhonarc/security-announce/msg00045.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.openssl.org/news/secadv_20040317.txt",
               },
               {
                  name: "FreeBSD-SA-04:05",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FREEBSD",
                     "x_transferred",
                  ],
                  url: "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:05.openssl.asc",
               },
               {
                  name: "NetBSD-SA2004-005",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_NETBSD",
                     "x_transferred",
                  ],
                  url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-005.txt.asc",
               },
               {
                  name: "O-101",
                  tags: [
                     "third-party-advisory",
                     "government-resource",
                     "x_refsource_CIAC",
                     "x_transferred",
                  ],
                  url: "http://www.ciac.org/ciac/bulletins/o-101.shtml",
               },
               {
                  name: "TA04-078A",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT",
                     "x_transferred",
                  ],
                  url: "http://www.us-cert.gov/cas/techalerts/TA04-078A.html",
               },
               {
                  name: "17401",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/17401",
               },
               {
                  name: "RHSA-2005:829",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2005-829.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://support.avaya.com/elmodocs2/security/ASA-2005-239.htm",
               },
               {
                  name: "oval:org.mitre.oval:def:870",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A870",
               },
               {
                  name: "RHSA-2005:830",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2005-830.html",
               },
               {
                  name: "GLSA-200403-03",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://security.gentoo.org/glsa/glsa-200403-03.xml",
               },
               {
                  name: "11139",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/11139",
               },
               {
                  name: "RHSA-2004:120",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2004-120.html",
               },
               {
                  name: "20040317 New OpenSSL releases fix denial of service attacks [17 March 2004]",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=107953412903636&w=2",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://support.lexmark.com/index?page=content&id=TE88&locale=EN&userlocale=EN_US",
               },
               {
                  name: "APPLE-SA-2005-08-15",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_APPLE",
                     "x_transferred",
                  ],
                  url: "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html",
               },
               {
                  name: "17398",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/17398",
               },
               {
                  name: "SSA:2004-077",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SLACKWARE",
                     "x_transferred",
                  ],
                  url: "http://www.slackware.org/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.455961",
               },
               {
                  name: "RHSA-2004:139",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2004-139.html",
               },
               {
                  name: "openssl-dochangecipherspec-dos(15505)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/15505",
               },
               {
                  name: "2004-0012",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_TRUSTIX",
                     "x_transferred",
                  ],
                  url: "http://www.trustix.org/errata/2004/0012",
               },
               {
                  name: "20040317 Cisco OpenSSL Implementation Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CISCO",
                     "x_transferred",
                  ],
                  url: "http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://docs.info.apple.com/article.html?artnum=61798",
               },
               {
                  name: "VU#288574",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "http://www.kb.cert.org/vuls/id/288574",
               },
               {
                  name: "DSA-465",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2004/dsa-465",
               },
               {
                  name: "APPLE-SA-2005-08-17",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_APPLE",
                     "x_transferred",
                  ],
                  url: "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html",
               },
               {
                  name: "18247",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18247",
               },
               {
                  name: "oval:org.mitre.oval:def:5770",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5770",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "NETWORK",
                     availabilityImpact: "HIGH",
                     baseScore: 7.5,
                     baseSeverity: "HIGH",
                     confidentialityImpact: "NONE",
                     integrityImpact: "NONE",
                     privilegesRequired: "NONE",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2004-0079",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-01-08T16:21:54.985893Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-476",
                        description: "CWE-476 NULL Pointer Dereference",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-01-16T17:33:22.869Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2004-03-17T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-10-10T00:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "9899",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/9899",
            },
            {
               name: "FEDORA-2005-1042",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00087.html",
            },
            {
               name: "ESA-20040317-003",
               tags: [
                  "vendor-advisory",
                  "x_refsource_ENGARDE",
               ],
               url: "http://www.linuxsecurity.com/advisories/engarde_advisory-4135.html",
            },
            {
               name: "SSRT4717",
               tags: [
                  "vendor-advisory",
                  "x_refsource_HP",
               ],
               url: "http://marc.info/?l=bugtraq&m=108403806509920&w=2",
            },
            {
               name: "RHSA-2004:121",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2004-121.html",
            },
            {
               name: "MDKSA-2004:023",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRAKE",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:023",
            },
            {
               name: "oval:org.mitre.oval:def:2621",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2621",
            },
            {
               name: "CLA-2004:834",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CONECTIVA",
               ],
               url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834",
            },
            {
               name: "SCOSA-2004.10",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SCO",
               ],
               url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt",
            },
            {
               name: "17381",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/17381",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://www.uniras.gov.uk/vuls/2004/224012/index.htm",
            },
            {
               name: "FEDORA-2004-095",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://fedoranews.org/updates/FEDORA-2004-095.shtml",
            },
            {
               name: "oval:org.mitre.oval:def:9779",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9779",
            },
            {
               name: "oval:org.mitre.oval:def:975",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A975",
            },
            {
               name: "57524",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUNALERT",
               ],
               url: "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524",
            },
            {
               name: "SuSE-SA:2004:007",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://www.novell.com/linux/security/advisories/2004_07_openssl.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://lists.apple.com/mhonarc/security-announce/msg00045.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.openssl.org/news/secadv_20040317.txt",
            },
            {
               name: "FreeBSD-SA-04:05",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FREEBSD",
               ],
               url: "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:05.openssl.asc",
            },
            {
               name: "NetBSD-SA2004-005",
               tags: [
                  "vendor-advisory",
                  "x_refsource_NETBSD",
               ],
               url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-005.txt.asc",
            },
            {
               name: "O-101",
               tags: [
                  "third-party-advisory",
                  "government-resource",
                  "x_refsource_CIAC",
               ],
               url: "http://www.ciac.org/ciac/bulletins/o-101.shtml",
            },
            {
               name: "TA04-078A",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT",
               ],
               url: "http://www.us-cert.gov/cas/techalerts/TA04-078A.html",
            },
            {
               name: "17401",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/17401",
            },
            {
               name: "RHSA-2005:829",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2005-829.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://support.avaya.com/elmodocs2/security/ASA-2005-239.htm",
            },
            {
               name: "oval:org.mitre.oval:def:870",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A870",
            },
            {
               name: "RHSA-2005:830",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2005-830.html",
            },
            {
               name: "GLSA-200403-03",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://security.gentoo.org/glsa/glsa-200403-03.xml",
            },
            {
               name: "11139",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/11139",
            },
            {
               name: "RHSA-2004:120",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2004-120.html",
            },
            {
               name: "20040317 New OpenSSL releases fix denial of service attacks [17 March 2004]",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://marc.info/?l=bugtraq&m=107953412903636&w=2",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://support.lexmark.com/index?page=content&id=TE88&locale=EN&userlocale=EN_US",
            },
            {
               name: "APPLE-SA-2005-08-15",
               tags: [
                  "vendor-advisory",
                  "x_refsource_APPLE",
               ],
               url: "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html",
            },
            {
               name: "17398",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/17398",
            },
            {
               name: "SSA:2004-077",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SLACKWARE",
               ],
               url: "http://www.slackware.org/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.455961",
            },
            {
               name: "RHSA-2004:139",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2004-139.html",
            },
            {
               name: "openssl-dochangecipherspec-dos(15505)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/15505",
            },
            {
               name: "2004-0012",
               tags: [
                  "vendor-advisory",
                  "x_refsource_TRUSTIX",
               ],
               url: "http://www.trustix.org/errata/2004/0012",
            },
            {
               name: "20040317 Cisco OpenSSL Implementation Vulnerability",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CISCO",
               ],
               url: "http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://docs.info.apple.com/article.html?artnum=61798",
            },
            {
               name: "VU#288574",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "http://www.kb.cert.org/vuls/id/288574",
            },
            {
               name: "DSA-465",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2004/dsa-465",
            },
            {
               name: "APPLE-SA-2005-08-17",
               tags: [
                  "vendor-advisory",
                  "x_refsource_APPLE",
               ],
               url: "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html",
            },
            {
               name: "18247",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18247",
            },
            {
               name: "oval:org.mitre.oval:def:5770",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5770",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2004-0079",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "9899",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/9899",
                  },
                  {
                     name: "FEDORA-2005-1042",
                     refsource: "FEDORA",
                     url: "http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00087.html",
                  },
                  {
                     name: "ESA-20040317-003",
                     refsource: "ENGARDE",
                     url: "http://www.linuxsecurity.com/advisories/engarde_advisory-4135.html",
                  },
                  {
                     name: "SSRT4717",
                     refsource: "HP",
                     url: "http://marc.info/?l=bugtraq&m=108403806509920&w=2",
                  },
                  {
                     name: "RHSA-2004:121",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2004-121.html",
                  },
                  {
                     name: "MDKSA-2004:023",
                     refsource: "MANDRAKE",
                     url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:023",
                  },
                  {
                     name: "oval:org.mitre.oval:def:2621",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2621",
                  },
                  {
                     name: "CLA-2004:834",
                     refsource: "CONECTIVA",
                     url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834",
                  },
                  {
                     name: "SCOSA-2004.10",
                     refsource: "SCO",
                     url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt",
                  },
                  {
                     name: "17381",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/17381",
                  },
                  {
                     name: "http://www.uniras.gov.uk/vuls/2004/224012/index.htm",
                     refsource: "MISC",
                     url: "http://www.uniras.gov.uk/vuls/2004/224012/index.htm",
                  },
                  {
                     name: "FEDORA-2004-095",
                     refsource: "FEDORA",
                     url: "http://fedoranews.org/updates/FEDORA-2004-095.shtml",
                  },
                  {
                     name: "oval:org.mitre.oval:def:9779",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9779",
                  },
                  {
                     name: "oval:org.mitre.oval:def:975",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A975",
                  },
                  {
                     name: "57524",
                     refsource: "SUNALERT",
                     url: "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524",
                  },
                  {
                     name: "SuSE-SA:2004:007",
                     refsource: "SUSE",
                     url: "http://www.novell.com/linux/security/advisories/2004_07_openssl.html",
                  },
                  {
                     name: "http://lists.apple.com/mhonarc/security-announce/msg00045.html",
                     refsource: "CONFIRM",
                     url: "http://lists.apple.com/mhonarc/security-announce/msg00045.html",
                  },
                  {
                     name: "http://www.openssl.org/news/secadv_20040317.txt",
                     refsource: "CONFIRM",
                     url: "http://www.openssl.org/news/secadv_20040317.txt",
                  },
                  {
                     name: "FreeBSD-SA-04:05",
                     refsource: "FREEBSD",
                     url: "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:05.openssl.asc",
                  },
                  {
                     name: "NetBSD-SA2004-005",
                     refsource: "NETBSD",
                     url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-005.txt.asc",
                  },
                  {
                     name: "O-101",
                     refsource: "CIAC",
                     url: "http://www.ciac.org/ciac/bulletins/o-101.shtml",
                  },
                  {
                     name: "TA04-078A",
                     refsource: "CERT",
                     url: "http://www.us-cert.gov/cas/techalerts/TA04-078A.html",
                  },
                  {
                     name: "17401",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/17401",
                  },
                  {
                     name: "RHSA-2005:829",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2005-829.html",
                  },
                  {
                     name: "http://support.avaya.com/elmodocs2/security/ASA-2005-239.htm",
                     refsource: "CONFIRM",
                     url: "http://support.avaya.com/elmodocs2/security/ASA-2005-239.htm",
                  },
                  {
                     name: "oval:org.mitre.oval:def:870",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A870",
                  },
                  {
                     name: "RHSA-2005:830",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2005-830.html",
                  },
                  {
                     name: "GLSA-200403-03",
                     refsource: "GENTOO",
                     url: "http://security.gentoo.org/glsa/glsa-200403-03.xml",
                  },
                  {
                     name: "11139",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/11139",
                  },
                  {
                     name: "RHSA-2004:120",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2004-120.html",
                  },
                  {
                     name: "20040317 New OpenSSL releases fix denial of service attacks [17 March 2004]",
                     refsource: "BUGTRAQ",
                     url: "http://marc.info/?l=bugtraq&m=107953412903636&w=2",
                  },
                  {
                     name: "http://support.lexmark.com/index?page=content&id=TE88&locale=EN&userlocale=EN_US",
                     refsource: "CONFIRM",
                     url: "http://support.lexmark.com/index?page=content&id=TE88&locale=EN&userlocale=EN_US",
                  },
                  {
                     name: "APPLE-SA-2005-08-15",
                     refsource: "APPLE",
                     url: "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html",
                  },
                  {
                     name: "17398",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/17398",
                  },
                  {
                     name: "SSA:2004-077",
                     refsource: "SLACKWARE",
                     url: "http://www.slackware.org/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.455961",
                  },
                  {
                     name: "RHSA-2004:139",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2004-139.html",
                  },
                  {
                     name: "openssl-dochangecipherspec-dos(15505)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/15505",
                  },
                  {
                     name: "2004-0012",
                     refsource: "TRUSTIX",
                     url: "http://www.trustix.org/errata/2004/0012",
                  },
                  {
                     name: "20040317 Cisco OpenSSL Implementation Vulnerability",
                     refsource: "CISCO",
                     url: "http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml",
                  },
                  {
                     name: "http://docs.info.apple.com/article.html?artnum=61798",
                     refsource: "CONFIRM",
                     url: "http://docs.info.apple.com/article.html?artnum=61798",
                  },
                  {
                     name: "VU#288574",
                     refsource: "CERT-VN",
                     url: "http://www.kb.cert.org/vuls/id/288574",
                  },
                  {
                     name: "DSA-465",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2004/dsa-465",
                  },
                  {
                     name: "APPLE-SA-2005-08-17",
                     refsource: "APPLE",
                     url: "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html",
                  },
                  {
                     name: "18247",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/18247",
                  },
                  {
                     name: "oval:org.mitre.oval:def:5770",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5770",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2004-0079",
      datePublished: "2004-03-18T05:00:00",
      dateReserved: "2004-01-19T00:00:00",
      dateUpdated: "2025-01-16T17:33:22.869Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2004-0939
Vulnerability from cvelistv5
Published
2004-11-19 05:00
Modified
2024-08-08 00:31
Severity ?
Summary
changepassword.cgi in Neoteris Instant Virtual Extranet (IVE) 3.x and 4.x, with LDAP authentication or NT domain authentication enabled, does not limit the number of times a bad password can be entered, which allows remote attackers to guess passwords via a brute force attack.
References
http://www.gosecure.ca/SecInfo/gosecure-2004-10.txtx_refsource_MISC
http://marc.info/?l=bugtraq&m=109709990708794&w=2mailing-list, x_refsource_BUGTRAQ
http://www.osvdb.org/8365vdb-entry, x_refsource_OSVDB
http://secunia.com/advisories/12752third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/17629vdb-entry, x_refsource_XF
http://securitytracker.com/id?1011552vdb-entry, x_refsource_SECTRACK
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T00:31:48.153Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://www.gosecure.ca/SecInfo/gosecure-2004-10.txt",
               },
               {
                  name: "20041006 [GoSecure Advisory] Neoteris IVE Vulnerability",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=109709990708794&w=2",
               },
               {
                  name: "8365",
                  tags: [
                     "vdb-entry",
                     "x_refsource_OSVDB",
                     "x_transferred",
                  ],
                  url: "http://www.osvdb.org/8365",
               },
               {
                  name: "12752",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/12752",
               },
               {
                  name: "juniper-netscreen-password-bruteforce(17629)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17629",
               },
               {
                  name: "1011552",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://securitytracker.com/id?1011552",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2004-10-06T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "changepassword.cgi in Neoteris Instant Virtual Extranet (IVE) 3.x and 4.x, with LDAP authentication or NT domain authentication enabled, does not limit the number of times a bad password can be entered, which allows remote attackers to guess passwords via a brute force attack.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-07-10T14:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://www.gosecure.ca/SecInfo/gosecure-2004-10.txt",
            },
            {
               name: "20041006 [GoSecure Advisory] Neoteris IVE Vulnerability",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://marc.info/?l=bugtraq&m=109709990708794&w=2",
            },
            {
               name: "8365",
               tags: [
                  "vdb-entry",
                  "x_refsource_OSVDB",
               ],
               url: "http://www.osvdb.org/8365",
            },
            {
               name: "12752",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/12752",
            },
            {
               name: "juniper-netscreen-password-bruteforce(17629)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17629",
            },
            {
               name: "1011552",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://securitytracker.com/id?1011552",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2004-0939",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "changepassword.cgi in Neoteris Instant Virtual Extranet (IVE) 3.x and 4.x, with LDAP authentication or NT domain authentication enabled, does not limit the number of times a bad password can be entered, which allows remote attackers to guess passwords via a brute force attack.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.gosecure.ca/SecInfo/gosecure-2004-10.txt",
                     refsource: "MISC",
                     url: "http://www.gosecure.ca/SecInfo/gosecure-2004-10.txt",
                  },
                  {
                     name: "20041006 [GoSecure Advisory] Neoteris IVE Vulnerability",
                     refsource: "BUGTRAQ",
                     url: "http://marc.info/?l=bugtraq&m=109709990708794&w=2",
                  },
                  {
                     name: "8365",
                     refsource: "OSVDB",
                     url: "http://www.osvdb.org/8365",
                  },
                  {
                     name: "12752",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/12752",
                  },
                  {
                     name: "juniper-netscreen-password-bruteforce(17629)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17629",
                  },
                  {
                     name: "1011552",
                     refsource: "SECTRACK",
                     url: "http://securitytracker.com/id?1011552",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2004-0939",
      datePublished: "2004-11-19T05:00:00",
      dateReserved: "2004-10-06T00:00:00",
      dateUpdated: "2024-08-08T00:31:48.153Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2003-0217
Vulnerability from cvelistv5
Published
2003-05-14 04:00
Modified
2024-08-08 01:43
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Neoteris Instant Virtual Extranet (IVE) 3.01 and earlier allows remote attackers to insert arbitrary web script and bypass authentication via a certain CGI script.
References
http://marc.info/?l=bugtraq&m=105283833617480&w=2mailing-list, x_refsource_BUGTRAQ
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T01:43:36.087Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "20030513 XSS In Neoteris IVE Allows Session Hijacking",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=105283833617480&w=2",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2003-05-13T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Cross-site scripting (XSS) vulnerability in Neoteris Instant Virtual Extranet (IVE) 3.01 and earlier allows remote attackers to insert arbitrary web script and bypass authentication via a certain CGI script.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2016-10-17T13:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "20030513 XSS In Neoteris IVE Allows Session Hijacking",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://marc.info/?l=bugtraq&m=105283833617480&w=2",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2003-0217",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Cross-site scripting (XSS) vulnerability in Neoteris Instant Virtual Extranet (IVE) 3.01 and earlier allows remote attackers to insert arbitrary web script and bypass authentication via a certain CGI script.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "20030513 XSS In Neoteris IVE Allows Session Hijacking",
                     refsource: "BUGTRAQ",
                     url: "http://marc.info/?l=bugtraq&m=105283833617480&w=2",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2003-0217",
      datePublished: "2003-05-14T04:00:00",
      dateReserved: "2003-04-25T00:00:00",
      dateUpdated: "2024-08-08T01:43:36.087Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2004-0081
Vulnerability from cvelistv5
Published
2004-03-18 05:00
Modified
2024-08-08 00:01
Severity ?
Summary
OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool.
References
http://www.securityfocus.com/bid/9899vdb-entry, x_refsource_BID
http://www.linuxsecurity.com/advisories/engarde_advisory-4135.htmlvendor-advisory, x_refsource_ENGARDE
http://marc.info/?l=bugtraq&m=107955049331965&w=2mailing-list, x_refsource_BUGTRAQ
http://www.redhat.com/support/errata/RHSA-2004-121.htmlvendor-advisory, x_refsource_REDHAT
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834vendor-advisory, x_refsource_CONECTIVA
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txtvendor-advisory, x_refsource_SCO
ftp://patches.sgi.com/support/free/security/advisories/20040304-01-U.ascvendor-advisory, x_refsource_SGI
https://exchange.xforce.ibmcloud.com/vulnerabilities/15509vdb-entry, x_refsource_XF
http://www.uniras.gov.uk/vuls/2004/224012/index.htmx_refsource_MISC
http://fedoranews.org/updates/FEDORA-2004-095.shtmlvendor-advisory, x_refsource_FEDORA
http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524vendor-advisory, x_refsource_SUNALERT
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A871vdb-entry, signature, x_refsource_OVAL
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11755vdb-entry, signature, x_refsource_OVAL
http://www.kb.cert.org/vuls/id/465542third-party-advisory, x_refsource_CERT-VN
http://www.us-cert.gov/cas/techalerts/TA04-078A.htmlthird-party-advisory, x_refsource_CERT
http://security.gentoo.org/glsa/glsa-200403-03.xmlvendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/11139third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2004-120.htmlvendor-advisory, x_refsource_REDHAT
http://rhn.redhat.com/errata/RHSA-2004-119.htmlvendor-advisory, x_refsource_REDHAT
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A902vdb-entry, signature, x_refsource_OVAL
http://www.redhat.com/support/errata/RHSA-2004-139.htmlvendor-advisory, x_refsource_REDHAT
http://www.trustix.org/errata/2004/0012vendor-advisory, x_refsource_TRUSTIX
http://marc.info/?l=bugtraq&m=108403850228012&w=2mailing-list, x_refsource_BUGTRAQ
http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtmlvendor-advisory, x_refsource_CISCO
http://www.debian.org/security/2004/dsa-465vendor-advisory, x_refsource_DEBIAN
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T00:01:23.650Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "9899",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/9899",
               },
               {
                  name: "ESA-20040317-003",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_ENGARDE",
                     "x_transferred",
                  ],
                  url: "http://www.linuxsecurity.com/advisories/engarde_advisory-4135.html",
               },
               {
                  name: "20040317 Re: New OpenSSL releases fix denial of service attacks [17  March 2004]",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=107955049331965&w=2",
               },
               {
                  name: "RHSA-2004:121",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2004-121.html",
               },
               {
                  name: "CLA-2004:834",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CONECTIVA",
                     "x_transferred",
                  ],
                  url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834",
               },
               {
                  name: "SCOSA-2004.10",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SCO",
                     "x_transferred",
                  ],
                  url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt",
               },
               {
                  name: "20040304-01-U",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SGI",
                     "x_transferred",
                  ],
                  url: "ftp://patches.sgi.com/support/free/security/advisories/20040304-01-U.asc",
               },
               {
                  name: "openssl-tls-dos(15509)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/15509",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://www.uniras.gov.uk/vuls/2004/224012/index.htm",
               },
               {
                  name: "FEDORA-2004-095",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://fedoranews.org/updates/FEDORA-2004-095.shtml",
               },
               {
                  name: "57524",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUNALERT",
                     "x_transferred",
                  ],
                  url: "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524",
               },
               {
                  name: "oval:org.mitre.oval:def:871",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A871",
               },
               {
                  name: "oval:org.mitre.oval:def:11755",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11755",
               },
               {
                  name: "VU#465542",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "http://www.kb.cert.org/vuls/id/465542",
               },
               {
                  name: "TA04-078A",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT",
                     "x_transferred",
                  ],
                  url: "http://www.us-cert.gov/cas/techalerts/TA04-078A.html",
               },
               {
                  name: "GLSA-200403-03",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://security.gentoo.org/glsa/glsa-200403-03.xml",
               },
               {
                  name: "11139",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/11139",
               },
               {
                  name: "RHSA-2004:120",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2004-120.html",
               },
               {
                  name: "RHSA-2004:119",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2004-119.html",
               },
               {
                  name: "oval:org.mitre.oval:def:902",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A902",
               },
               {
                  name: "RHSA-2004:139",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2004-139.html",
               },
               {
                  name: "2004-0012",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_TRUSTIX",
                     "x_transferred",
                  ],
                  url: "http://www.trustix.org/errata/2004/0012",
               },
               {
                  name: "20040508 [FLSA-2004:1395] Updated OpenSSL resolves security vulnerability",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=108403850228012&w=2",
               },
               {
                  name: "20040317 Cisco OpenSSL Implementation Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CISCO",
                     "x_transferred",
                  ],
                  url: "http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml",
               },
               {
                  name: "DSA-465",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2004/dsa-465",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2004-03-17T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-10-10T00:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "9899",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/9899",
            },
            {
               name: "ESA-20040317-003",
               tags: [
                  "vendor-advisory",
                  "x_refsource_ENGARDE",
               ],
               url: "http://www.linuxsecurity.com/advisories/engarde_advisory-4135.html",
            },
            {
               name: "20040317 Re: New OpenSSL releases fix denial of service attacks [17  March 2004]",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://marc.info/?l=bugtraq&m=107955049331965&w=2",
            },
            {
               name: "RHSA-2004:121",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2004-121.html",
            },
            {
               name: "CLA-2004:834",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CONECTIVA",
               ],
               url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834",
            },
            {
               name: "SCOSA-2004.10",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SCO",
               ],
               url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt",
            },
            {
               name: "20040304-01-U",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SGI",
               ],
               url: "ftp://patches.sgi.com/support/free/security/advisories/20040304-01-U.asc",
            },
            {
               name: "openssl-tls-dos(15509)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/15509",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://www.uniras.gov.uk/vuls/2004/224012/index.htm",
            },
            {
               name: "FEDORA-2004-095",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://fedoranews.org/updates/FEDORA-2004-095.shtml",
            },
            {
               name: "57524",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUNALERT",
               ],
               url: "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524",
            },
            {
               name: "oval:org.mitre.oval:def:871",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A871",
            },
            {
               name: "oval:org.mitre.oval:def:11755",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11755",
            },
            {
               name: "VU#465542",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "http://www.kb.cert.org/vuls/id/465542",
            },
            {
               name: "TA04-078A",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT",
               ],
               url: "http://www.us-cert.gov/cas/techalerts/TA04-078A.html",
            },
            {
               name: "GLSA-200403-03",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://security.gentoo.org/glsa/glsa-200403-03.xml",
            },
            {
               name: "11139",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/11139",
            },
            {
               name: "RHSA-2004:120",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2004-120.html",
            },
            {
               name: "RHSA-2004:119",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2004-119.html",
            },
            {
               name: "oval:org.mitre.oval:def:902",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A902",
            },
            {
               name: "RHSA-2004:139",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2004-139.html",
            },
            {
               name: "2004-0012",
               tags: [
                  "vendor-advisory",
                  "x_refsource_TRUSTIX",
               ],
               url: "http://www.trustix.org/errata/2004/0012",
            },
            {
               name: "20040508 [FLSA-2004:1395] Updated OpenSSL resolves security vulnerability",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://marc.info/?l=bugtraq&m=108403850228012&w=2",
            },
            {
               name: "20040317 Cisco OpenSSL Implementation Vulnerability",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CISCO",
               ],
               url: "http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml",
            },
            {
               name: "DSA-465",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2004/dsa-465",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2004-0081",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "9899",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/9899",
                  },
                  {
                     name: "ESA-20040317-003",
                     refsource: "ENGARDE",
                     url: "http://www.linuxsecurity.com/advisories/engarde_advisory-4135.html",
                  },
                  {
                     name: "20040317 Re: New OpenSSL releases fix denial of service attacks [17  March 2004]",
                     refsource: "BUGTRAQ",
                     url: "http://marc.info/?l=bugtraq&m=107955049331965&w=2",
                  },
                  {
                     name: "RHSA-2004:121",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2004-121.html",
                  },
                  {
                     name: "CLA-2004:834",
                     refsource: "CONECTIVA",
                     url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834",
                  },
                  {
                     name: "SCOSA-2004.10",
                     refsource: "SCO",
                     url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt",
                  },
                  {
                     name: "20040304-01-U",
                     refsource: "SGI",
                     url: "ftp://patches.sgi.com/support/free/security/advisories/20040304-01-U.asc",
                  },
                  {
                     name: "openssl-tls-dos(15509)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/15509",
                  },
                  {
                     name: "http://www.uniras.gov.uk/vuls/2004/224012/index.htm",
                     refsource: "MISC",
                     url: "http://www.uniras.gov.uk/vuls/2004/224012/index.htm",
                  },
                  {
                     name: "FEDORA-2004-095",
                     refsource: "FEDORA",
                     url: "http://fedoranews.org/updates/FEDORA-2004-095.shtml",
                  },
                  {
                     name: "57524",
                     refsource: "SUNALERT",
                     url: "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524",
                  },
                  {
                     name: "oval:org.mitre.oval:def:871",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A871",
                  },
                  {
                     name: "oval:org.mitre.oval:def:11755",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11755",
                  },
                  {
                     name: "VU#465542",
                     refsource: "CERT-VN",
                     url: "http://www.kb.cert.org/vuls/id/465542",
                  },
                  {
                     name: "TA04-078A",
                     refsource: "CERT",
                     url: "http://www.us-cert.gov/cas/techalerts/TA04-078A.html",
                  },
                  {
                     name: "GLSA-200403-03",
                     refsource: "GENTOO",
                     url: "http://security.gentoo.org/glsa/glsa-200403-03.xml",
                  },
                  {
                     name: "11139",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/11139",
                  },
                  {
                     name: "RHSA-2004:120",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2004-120.html",
                  },
                  {
                     name: "RHSA-2004:119",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2004-119.html",
                  },
                  {
                     name: "oval:org.mitre.oval:def:902",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A902",
                  },
                  {
                     name: "RHSA-2004:139",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2004-139.html",
                  },
                  {
                     name: "2004-0012",
                     refsource: "TRUSTIX",
                     url: "http://www.trustix.org/errata/2004/0012",
                  },
                  {
                     name: "20040508 [FLSA-2004:1395] Updated OpenSSL resolves security vulnerability",
                     refsource: "BUGTRAQ",
                     url: "http://marc.info/?l=bugtraq&m=108403850228012&w=2",
                  },
                  {
                     name: "20040317 Cisco OpenSSL Implementation Vulnerability",
                     refsource: "CISCO",
                     url: "http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml",
                  },
                  {
                     name: "DSA-465",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2004/dsa-465",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2004-0081",
      datePublished: "2004-03-18T05:00:00",
      dateReserved: "2004-01-19T00:00:00",
      dateUpdated: "2024-08-08T00:01:23.650Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2005-2640
Vulnerability from cvelistv5
Published
2005-08-20 04:00
Modified
2024-08-07 22:45
Severity ?
Summary
Behavioral discrepancy information leak in Juniper Netscreen VPN running ScreenOS 5.2.0 and earlier, when using IKE with pre-shared key authentication, allows remote attackers to enumerate valid usernames via an IKE Aggressive Mode packet, which generates a response if the username is valid but does not respond when the username is invalid.
References
http://www.securityfocus.com/bid/14595vdb-entry, x_refsource_BID
http://marc.info/?l=bugtraq&m=112438068426034&w=2mailing-list, x_refsource_BUGTRAQ
http://www.nta-monitor.com/news/vpn-flaws/juniper/netscreen/index.htmx_refsource_MISC
http://securitytracker.com/id?1014728vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/16474/third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T22:45:01.317Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "14595",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/14595",
               },
               {
                  name: "20050818 Juniper Netscreen VPN Username Enumeration Vulnerability",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=112438068426034&w=2",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://www.nta-monitor.com/news/vpn-flaws/juniper/netscreen/index.htm",
               },
               {
                  name: "1014728",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://securitytracker.com/id?1014728",
               },
               {
                  name: "16474",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/16474/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2005-08-18T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Behavioral discrepancy information leak in Juniper Netscreen VPN running ScreenOS 5.2.0 and earlier, when using IKE with pre-shared key authentication, allows remote attackers to enumerate valid usernames via an IKE Aggressive Mode packet, which generates a response if the username is valid but does not respond when the username is invalid.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2016-10-17T13:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "14595",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/14595",
            },
            {
               name: "20050818 Juniper Netscreen VPN Username Enumeration Vulnerability",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://marc.info/?l=bugtraq&m=112438068426034&w=2",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://www.nta-monitor.com/news/vpn-flaws/juniper/netscreen/index.htm",
            },
            {
               name: "1014728",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://securitytracker.com/id?1014728",
            },
            {
               name: "16474",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/16474/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2005-2640",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Behavioral discrepancy information leak in Juniper Netscreen VPN running ScreenOS 5.2.0 and earlier, when using IKE with pre-shared key authentication, allows remote attackers to enumerate valid usernames via an IKE Aggressive Mode packet, which generates a response if the username is valid but does not respond when the username is invalid.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "14595",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/14595",
                  },
                  {
                     name: "20050818 Juniper Netscreen VPN Username Enumeration Vulnerability",
                     refsource: "BUGTRAQ",
                     url: "http://marc.info/?l=bugtraq&m=112438068426034&w=2",
                  },
                  {
                     name: "http://www.nta-monitor.com/news/vpn-flaws/juniper/netscreen/index.htm",
                     refsource: "MISC",
                     url: "http://www.nta-monitor.com/news/vpn-flaws/juniper/netscreen/index.htm",
                  },
                  {
                     name: "1014728",
                     refsource: "SECTRACK",
                     url: "http://securitytracker.com/id?1014728",
                  },
                  {
                     name: "16474",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/16474/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2005-2640",
      datePublished: "2005-08-20T04:00:00",
      dateReserved: "2005-08-20T00:00:00",
      dateUpdated: "2024-08-07T22:45:01.317Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2004-0112
Vulnerability from cvelistv5
Published
2004-03-18 05:00
Modified
2024-08-08 00:10
Severity ?
Summary
The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that causes an out-of-bounds read.
References
http://www.securityfocus.com/bid/9899vdb-entry, x_refsource_BID
http://marc.info/?l=bugtraq&m=108403806509920&w=2vendor-advisory, x_refsource_HP
http://www.redhat.com/support/errata/RHSA-2004-121.htmlvendor-advisory, x_refsource_REDHAT
http://www.mandriva.com/security/advisories?name=MDKSA-2004:023vendor-advisory, x_refsource_MANDRAKE
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834vendor-advisory, x_refsource_CONECTIVA
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txtvendor-advisory, x_refsource_SCO
http://www.uniras.gov.uk/vuls/2004/224012/index.htmx_refsource_MISC
http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524vendor-advisory, x_refsource_SUNALERT
http://www.novell.com/linux/security/advisories/2004_07_openssl.htmlvendor-advisory, x_refsource_SUSE
http://lists.apple.com/mhonarc/security-announce/msg00045.htmlx_refsource_CONFIRM
http://www.openssl.org/news/secadv_20040317.txtx_refsource_CONFIRM
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-005.txt.ascvendor-advisory, x_refsource_NETBSD
http://www.ciac.org/ciac/bulletins/o-101.shtmlthird-party-advisory, government-resource, x_refsource_CIAC
http://www.us-cert.gov/cas/techalerts/TA04-078A.htmlthird-party-advisory, x_refsource_CERT
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1049vdb-entry, signature, x_refsource_OVAL
https://exchange.xforce.ibmcloud.com/vulnerabilities/15508vdb-entry, x_refsource_XF
http://www.kb.cert.org/vuls/id/484726third-party-advisory, x_refsource_CERT-VN
http://security.gentoo.org/glsa/glsa-200403-03.xmlvendor-advisory, x_refsource_GENTOO
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9580vdb-entry, signature, x_refsource_OVAL
http://secunia.com/advisories/11139third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2004-120.htmlvendor-advisory, x_refsource_REDHAT
http://marc.info/?l=bugtraq&m=107953412903636&w=2mailing-list, x_refsource_BUGTRAQ
http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.htmlvendor-advisory, x_refsource_APPLE
http://www.slackware.org/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.455961vendor-advisory, x_refsource_SLACKWARE
http://www.trustix.org/errata/2004/0012vendor-advisory, x_refsource_TRUSTIX
http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtmlvendor-advisory, x_refsource_CISCO
http://docs.info.apple.com/article.html?artnum=61798x_refsource_CONFIRM
http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.htmlvendor-advisory, x_refsource_APPLE
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A928vdb-entry, signature, x_refsource_OVAL
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T00:10:03.359Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "9899",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/9899",
               },
               {
                  name: "SSRT4717",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_HP",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=108403806509920&w=2",
               },
               {
                  name: "RHSA-2004:121",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2004-121.html",
               },
               {
                  name: "MDKSA-2004:023",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRAKE",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:023",
               },
               {
                  name: "CLA-2004:834",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CONECTIVA",
                     "x_transferred",
                  ],
                  url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834",
               },
               {
                  name: "SCOSA-2004.10",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SCO",
                     "x_transferred",
                  ],
                  url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://www.uniras.gov.uk/vuls/2004/224012/index.htm",
               },
               {
                  name: "57524",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUNALERT",
                     "x_transferred",
                  ],
                  url: "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524",
               },
               {
                  name: "SuSE-SA:2004:007",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://www.novell.com/linux/security/advisories/2004_07_openssl.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://lists.apple.com/mhonarc/security-announce/msg00045.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.openssl.org/news/secadv_20040317.txt",
               },
               {
                  name: "NetBSD-SA2004-005",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_NETBSD",
                     "x_transferred",
                  ],
                  url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-005.txt.asc",
               },
               {
                  name: "O-101",
                  tags: [
                     "third-party-advisory",
                     "government-resource",
                     "x_refsource_CIAC",
                     "x_transferred",
                  ],
                  url: "http://www.ciac.org/ciac/bulletins/o-101.shtml",
               },
               {
                  name: "TA04-078A",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT",
                     "x_transferred",
                  ],
                  url: "http://www.us-cert.gov/cas/techalerts/TA04-078A.html",
               },
               {
                  name: "oval:org.mitre.oval:def:1049",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1049",
               },
               {
                  name: "openssl-kerberos-ciphersuites-dos(15508)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/15508",
               },
               {
                  name: "VU#484726",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "http://www.kb.cert.org/vuls/id/484726",
               },
               {
                  name: "GLSA-200403-03",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://security.gentoo.org/glsa/glsa-200403-03.xml",
               },
               {
                  name: "oval:org.mitre.oval:def:9580",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9580",
               },
               {
                  name: "11139",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/11139",
               },
               {
                  name: "RHSA-2004:120",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2004-120.html",
               },
               {
                  name: "20040317 New OpenSSL releases fix denial of service attacks [17 March 2004]",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=107953412903636&w=2",
               },
               {
                  name: "APPLE-SA-2005-08-15",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_APPLE",
                     "x_transferred",
                  ],
                  url: "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html",
               },
               {
                  name: "SSA:2004-077",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SLACKWARE",
                     "x_transferred",
                  ],
                  url: "http://www.slackware.org/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.455961",
               },
               {
                  name: "2004-0012",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_TRUSTIX",
                     "x_transferred",
                  ],
                  url: "http://www.trustix.org/errata/2004/0012",
               },
               {
                  name: "20040317 Cisco OpenSSL Implementation Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CISCO",
                     "x_transferred",
                  ],
                  url: "http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://docs.info.apple.com/article.html?artnum=61798",
               },
               {
                  name: "APPLE-SA-2005-08-17",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_APPLE",
                     "x_transferred",
                  ],
                  url: "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html",
               },
               {
                  name: "oval:org.mitre.oval:def:928",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A928",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2004-03-17T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that causes an out-of-bounds read.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-10-10T00:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "9899",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/9899",
            },
            {
               name: "SSRT4717",
               tags: [
                  "vendor-advisory",
                  "x_refsource_HP",
               ],
               url: "http://marc.info/?l=bugtraq&m=108403806509920&w=2",
            },
            {
               name: "RHSA-2004:121",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2004-121.html",
            },
            {
               name: "MDKSA-2004:023",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRAKE",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:023",
            },
            {
               name: "CLA-2004:834",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CONECTIVA",
               ],
               url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834",
            },
            {
               name: "SCOSA-2004.10",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SCO",
               ],
               url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://www.uniras.gov.uk/vuls/2004/224012/index.htm",
            },
            {
               name: "57524",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUNALERT",
               ],
               url: "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524",
            },
            {
               name: "SuSE-SA:2004:007",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://www.novell.com/linux/security/advisories/2004_07_openssl.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://lists.apple.com/mhonarc/security-announce/msg00045.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.openssl.org/news/secadv_20040317.txt",
            },
            {
               name: "NetBSD-SA2004-005",
               tags: [
                  "vendor-advisory",
                  "x_refsource_NETBSD",
               ],
               url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-005.txt.asc",
            },
            {
               name: "O-101",
               tags: [
                  "third-party-advisory",
                  "government-resource",
                  "x_refsource_CIAC",
               ],
               url: "http://www.ciac.org/ciac/bulletins/o-101.shtml",
            },
            {
               name: "TA04-078A",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT",
               ],
               url: "http://www.us-cert.gov/cas/techalerts/TA04-078A.html",
            },
            {
               name: "oval:org.mitre.oval:def:1049",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1049",
            },
            {
               name: "openssl-kerberos-ciphersuites-dos(15508)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/15508",
            },
            {
               name: "VU#484726",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "http://www.kb.cert.org/vuls/id/484726",
            },
            {
               name: "GLSA-200403-03",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://security.gentoo.org/glsa/glsa-200403-03.xml",
            },
            {
               name: "oval:org.mitre.oval:def:9580",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9580",
            },
            {
               name: "11139",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/11139",
            },
            {
               name: "RHSA-2004:120",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2004-120.html",
            },
            {
               name: "20040317 New OpenSSL releases fix denial of service attacks [17 March 2004]",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://marc.info/?l=bugtraq&m=107953412903636&w=2",
            },
            {
               name: "APPLE-SA-2005-08-15",
               tags: [
                  "vendor-advisory",
                  "x_refsource_APPLE",
               ],
               url: "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html",
            },
            {
               name: "SSA:2004-077",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SLACKWARE",
               ],
               url: "http://www.slackware.org/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.455961",
            },
            {
               name: "2004-0012",
               tags: [
                  "vendor-advisory",
                  "x_refsource_TRUSTIX",
               ],
               url: "http://www.trustix.org/errata/2004/0012",
            },
            {
               name: "20040317 Cisco OpenSSL Implementation Vulnerability",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CISCO",
               ],
               url: "http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://docs.info.apple.com/article.html?artnum=61798",
            },
            {
               name: "APPLE-SA-2005-08-17",
               tags: [
                  "vendor-advisory",
                  "x_refsource_APPLE",
               ],
               url: "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html",
            },
            {
               name: "oval:org.mitre.oval:def:928",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A928",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2004-0112",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that causes an out-of-bounds read.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "9899",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/9899",
                  },
                  {
                     name: "SSRT4717",
                     refsource: "HP",
                     url: "http://marc.info/?l=bugtraq&m=108403806509920&w=2",
                  },
                  {
                     name: "RHSA-2004:121",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2004-121.html",
                  },
                  {
                     name: "MDKSA-2004:023",
                     refsource: "MANDRAKE",
                     url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:023",
                  },
                  {
                     name: "CLA-2004:834",
                     refsource: "CONECTIVA",
                     url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834",
                  },
                  {
                     name: "SCOSA-2004.10",
                     refsource: "SCO",
                     url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt",
                  },
                  {
                     name: "http://www.uniras.gov.uk/vuls/2004/224012/index.htm",
                     refsource: "MISC",
                     url: "http://www.uniras.gov.uk/vuls/2004/224012/index.htm",
                  },
                  {
                     name: "57524",
                     refsource: "SUNALERT",
                     url: "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524",
                  },
                  {
                     name: "SuSE-SA:2004:007",
                     refsource: "SUSE",
                     url: "http://www.novell.com/linux/security/advisories/2004_07_openssl.html",
                  },
                  {
                     name: "http://lists.apple.com/mhonarc/security-announce/msg00045.html",
                     refsource: "CONFIRM",
                     url: "http://lists.apple.com/mhonarc/security-announce/msg00045.html",
                  },
                  {
                     name: "http://www.openssl.org/news/secadv_20040317.txt",
                     refsource: "CONFIRM",
                     url: "http://www.openssl.org/news/secadv_20040317.txt",
                  },
                  {
                     name: "NetBSD-SA2004-005",
                     refsource: "NETBSD",
                     url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-005.txt.asc",
                  },
                  {
                     name: "O-101",
                     refsource: "CIAC",
                     url: "http://www.ciac.org/ciac/bulletins/o-101.shtml",
                  },
                  {
                     name: "TA04-078A",
                     refsource: "CERT",
                     url: "http://www.us-cert.gov/cas/techalerts/TA04-078A.html",
                  },
                  {
                     name: "oval:org.mitre.oval:def:1049",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1049",
                  },
                  {
                     name: "openssl-kerberos-ciphersuites-dos(15508)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/15508",
                  },
                  {
                     name: "VU#484726",
                     refsource: "CERT-VN",
                     url: "http://www.kb.cert.org/vuls/id/484726",
                  },
                  {
                     name: "GLSA-200403-03",
                     refsource: "GENTOO",
                     url: "http://security.gentoo.org/glsa/glsa-200403-03.xml",
                  },
                  {
                     name: "oval:org.mitre.oval:def:9580",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9580",
                  },
                  {
                     name: "11139",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/11139",
                  },
                  {
                     name: "RHSA-2004:120",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2004-120.html",
                  },
                  {
                     name: "20040317 New OpenSSL releases fix denial of service attacks [17 March 2004]",
                     refsource: "BUGTRAQ",
                     url: "http://marc.info/?l=bugtraq&m=107953412903636&w=2",
                  },
                  {
                     name: "APPLE-SA-2005-08-15",
                     refsource: "APPLE",
                     url: "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html",
                  },
                  {
                     name: "SSA:2004-077",
                     refsource: "SLACKWARE",
                     url: "http://www.slackware.org/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.455961",
                  },
                  {
                     name: "2004-0012",
                     refsource: "TRUSTIX",
                     url: "http://www.trustix.org/errata/2004/0012",
                  },
                  {
                     name: "20040317 Cisco OpenSSL Implementation Vulnerability",
                     refsource: "CISCO",
                     url: "http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml",
                  },
                  {
                     name: "http://docs.info.apple.com/article.html?artnum=61798",
                     refsource: "CONFIRM",
                     url: "http://docs.info.apple.com/article.html?artnum=61798",
                  },
                  {
                     name: "APPLE-SA-2005-08-17",
                     refsource: "APPLE",
                     url: "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html",
                  },
                  {
                     name: "oval:org.mitre.oval:def:928",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A928",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2004-0112",
      datePublished: "2004-03-18T05:00:00",
      dateReserved: "2004-02-02T00:00:00",
      dateUpdated: "2024-08-08T00:10:03.359Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

Vulnerability from fkie_nvd
Published
2004-11-23 05:00
Modified
2024-11-20 23:47
Severity ?
Summary
The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that causes an out-of-bounds read.
References
cve@mitre.orgftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-005.txt.ascBroken Link
cve@mitre.orgftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txtBroken Link
cve@mitre.orghttp://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834Broken Link
cve@mitre.orghttp://docs.info.apple.com/article.html?artnum=61798Broken Link
cve@mitre.orghttp://lists.apple.com/archives/security-announce/2005//Aug/msg00001.htmlMailing List
cve@mitre.orghttp://lists.apple.com/archives/security-announce/2005/Aug/msg00000.htmlMailing List
cve@mitre.orghttp://lists.apple.com/mhonarc/security-announce/msg00045.htmlBroken Link
cve@mitre.orghttp://marc.info/?l=bugtraq&m=107953412903636&w=2Mailing List, Third Party Advisory
cve@mitre.orghttp://marc.info/?l=bugtraq&m=108403806509920&w=2Mailing List, Third Party Advisory
cve@mitre.orghttp://secunia.com/advisories/11139Broken Link
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200403-03.xmlThird Party Advisory
cve@mitre.orghttp://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524Broken Link
cve@mitre.orghttp://www.ciac.org/ciac/bulletins/o-101.shtmlBroken Link
cve@mitre.orghttp://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtmlBroken Link
cve@mitre.orghttp://www.kb.cert.org/vuls/id/484726Third Party Advisory, US Government Resource
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2004:023Third Party Advisory
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2004_07_openssl.htmlBroken Link
cve@mitre.orghttp://www.openssl.org/news/secadv_20040317.txtBroken Link
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2004-120.htmlBroken Link
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2004-121.htmlBroken Link
cve@mitre.orghttp://www.securityfocus.com/bid/9899Broken Link, Third Party Advisory, VDB Entry, Vendor Advisory
cve@mitre.orghttp://www.slackware.org/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.455961Broken Link
cve@mitre.orghttp://www.trustix.org/errata/2004/0012Broken Link
cve@mitre.orghttp://www.uniras.gov.uk/vuls/2004/224012/index.htmBroken Link
cve@mitre.orghttp://www.us-cert.gov/cas/techalerts/TA04-078A.htmlBroken Link, Third Party Advisory, US Government Resource
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/15508Third Party Advisory, VDB Entry
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1049Broken Link
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A928Broken Link
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9580Broken Link
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-005.txt.ascBroken Link
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txtBroken Link
af854a3a-2127-422b-91ae-364da2661108http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834Broken Link
af854a3a-2127-422b-91ae-364da2661108http://docs.info.apple.com/article.html?artnum=61798Broken Link
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.htmlMailing List
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.htmlMailing List
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/mhonarc/security-announce/msg00045.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=107953412903636&w=2Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=108403806509920&w=2Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/11139Broken Link
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200403-03.xmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524Broken Link
af854a3a-2127-422b-91ae-364da2661108http://www.ciac.org/ciac/bulletins/o-101.shtmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/484726Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2004:023Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2004_07_openssl.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://www.openssl.org/news/secadv_20040317.txtBroken Link
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2004-120.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2004-121.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/9899Broken Link, Third Party Advisory, VDB Entry, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.slackware.org/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.455961Broken Link
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2004/0012Broken Link
af854a3a-2127-422b-91ae-364da2661108http://www.uniras.gov.uk/vuls/2004/224012/index.htmBroken Link
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA04-078A.htmlBroken Link, Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/15508Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1049Broken Link
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A928Broken Link
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9580Broken Link
Impacted products
Vendor Product Version
cisco firewall_services_module *
cisco firewall_services_module 1.1.2
cisco firewall_services_module 1.1.3
cisco firewall_services_module 1.1_\(3.005\)
cisco firewall_services_module 2.1_\(0.208\)
hp aaa_server *
hp apache-based_web_server 2.0.43.00
hp apache-based_web_server 2.0.43.04
symantec clientless_vpn_gateway_4400 5.0
cisco ciscoworks_common_management_foundation 2.1
cisco ciscoworks_common_services 2.2
avaya converged_communications_server 2.0
avaya sg200 4.4
avaya sg200 4.31.29
avaya sg203 4.4
avaya sg203 4.31.29
avaya sg208 *
avaya sg208 4.4
avaya sg5 4.2
avaya sg5 4.3
avaya sg5 4.4
apple mac_os_x 10.3.3
apple mac_os_x_server 10.3.3
freebsd freebsd 4.8
freebsd freebsd 4.8
freebsd freebsd 4.9
freebsd freebsd 5.1
freebsd freebsd 5.1
freebsd freebsd 5.1
freebsd freebsd 5.2
freebsd freebsd 5.2.1
hp hp-ux 8.05
hp hp-ux 11.00
hp hp-ux 11.11
hp hp-ux 11.23
openbsd openbsd 3.3
openbsd openbsd 3.4
redhat enterprise_linux 3.0
redhat enterprise_linux 3.0
redhat enterprise_linux 3.0
redhat enterprise_linux_desktop 3.0
redhat linux 7.2
redhat linux 7.3
redhat linux 8.0
sco openserver 5.0.6
sco openserver 5.0.7
cisco ios 12.1\(11\)e
cisco ios 12.1\(11b\)e
cisco ios 12.1\(11b\)e12
cisco ios 12.1\(11b\)e14
cisco ios 12.1\(13\)e9
cisco ios 12.1\(19\)e1
cisco ios 12.2\(14\)sy
cisco ios 12.2\(14\)sy1
cisco ios 12.2sy
cisco ios 12.2za
4d webstar 4.0
4d webstar 5.2
4d webstar 5.2.1
4d webstar 5.2.2
4d webstar 5.2.3
4d webstar 5.2.4
4d webstar 5.3
4d webstar 5.3.1
avaya intuity_audix *
avaya intuity_audix 5.1.46
avaya intuity_audix s3210
avaya intuity_audix s3400
avaya vsu 5
avaya vsu 5x
avaya vsu 100_r2.0.1
avaya vsu 500
avaya vsu 2000_r2.0.1
avaya vsu 5000_r2.0.1
avaya vsu 7500_r2.0.1
avaya vsu 10000_r2.0.1
checkpoint firewall-1 *
checkpoint firewall-1 2.0
checkpoint firewall-1 next_generation_fp0
checkpoint firewall-1 next_generation_fp1
checkpoint firewall-1 next_generation_fp2
checkpoint provider-1 4.1
checkpoint provider-1 4.1
checkpoint provider-1 4.1
checkpoint provider-1 4.1
checkpoint provider-1 4.1
checkpoint vpn-1 next_generation_fp0
checkpoint vpn-1 next_generation_fp1
checkpoint vpn-1 next_generation_fp2
checkpoint vpn-1 vsx_ng_with_application_intelligence
cisco access_registrar *
cisco application_and_content_networking_software *
cisco css_secure_content_accelerator 1.0
cisco css_secure_content_accelerator 2.0
cisco css11000_content_services_switch *
cisco okena_stormwatch 3.2
cisco pix_firewall 6.2.2_.111
cisco threat_response *
cisco webns 6.10
cisco webns 6.10_b4
cisco webns 7.1_0.1.02
cisco webns 7.1_0.2.06
cisco webns 7.2_0.0.03
cisco webns 7.10
cisco webns 7.10_.0.06s
dell bsafe_ssl-j 3.0
dell bsafe_ssl-j 3.0.1
dell bsafe_ssl-j 3.1
forcepoint stonegate 1.5.17
forcepoint stonegate 1.5.18
forcepoint stonegate 1.6.2
forcepoint stonegate 1.6.3
forcepoint stonegate 1.7
forcepoint stonegate 1.7.1
forcepoint stonegate 1.7.2
forcepoint stonegate 2.0.1
forcepoint stonegate 2.0.4
forcepoint stonegate 2.0.5
forcepoint stonegate 2.0.6
forcepoint stonegate 2.0.7
forcepoint stonegate 2.0.8
forcepoint stonegate 2.0.9
forcepoint stonegate 2.1
forcepoint stonegate 2.2
forcepoint stonegate 2.2.1
forcepoint stonegate 2.2.4
hp wbem a.01.05.08
hp wbem a.02.00.00
hp wbem a.02.00.01
litespeedtech litespeed_web_server 1.0.1
litespeedtech litespeed_web_server 1.0.2
litespeedtech litespeed_web_server 1.0.3
litespeedtech litespeed_web_server 1.1
litespeedtech litespeed_web_server 1.1.1
litespeedtech litespeed_web_server 1.2
litespeedtech litespeed_web_server 1.2
litespeedtech litespeed_web_server 1.2.1
litespeedtech litespeed_web_server 1.2.2
litespeedtech litespeed_web_server 1.3
litespeedtech litespeed_web_server 1.3
litespeedtech litespeed_web_server 1.3
litespeedtech litespeed_web_server 1.3
neoteris instant_virtual_extranet 3.0
neoteris instant_virtual_extranet 3.1
neoteris instant_virtual_extranet 3.2
neoteris instant_virtual_extranet 3.3
neoteris instant_virtual_extranet 3.3.1
novell edirectory 8.0
novell edirectory 8.5
novell edirectory 8.5.12a
novell edirectory 8.5.27
novell edirectory 8.6.2
novell edirectory 8.7
novell edirectory 8.7.1
novell edirectory 8.7.1
novell imanager 1.5
novell imanager 2.0
openssl openssl 0.9.6c
openssl openssl 0.9.6d
openssl openssl 0.9.6e
openssl openssl 0.9.6f
openssl openssl 0.9.6g
openssl openssl 0.9.6h
openssl openssl 0.9.6i
openssl openssl 0.9.6j
openssl openssl 0.9.6k
openssl openssl 0.9.7
openssl openssl 0.9.7
openssl openssl 0.9.7
openssl openssl 0.9.7
openssl openssl 0.9.7a
openssl openssl 0.9.7b
openssl openssl 0.9.7c
redhat openssl 0.9.6-15
redhat openssl 0.9.6b-3
redhat openssl 0.9.7a-2
redhat openssl 0.9.7a-2
redhat openssl 0.9.7a-2
sgi propack 2.3
sgi propack 2.4
sgi propack 3.0
stonesoft servercluster 2.5
stonesoft servercluster 2.5.2
stonesoft stonebeat_fullcluster 1_2.0
stonesoft stonebeat_fullcluster 1_3.0
stonesoft stonebeat_fullcluster 2.0
stonesoft stonebeat_fullcluster 2.5
stonesoft stonebeat_fullcluster 3.0
stonesoft stonebeat_securitycluster 2.0
stonesoft stonebeat_securitycluster 2.5
stonesoft stonebeat_webcluster 2.0
stonesoft stonebeat_webcluster 2.5
tarantella tarantella_enterprise 3.20
tarantella tarantella_enterprise 3.30
tarantella tarantella_enterprise 3.40
vmware gsx_server 2.0
vmware gsx_server 2.0.1_build_2129
vmware gsx_server 2.5.1
vmware gsx_server 2.5.1_build_5336
vmware gsx_server 3.0_build_7592
avaya s8300 r2.0.0
avaya s8300 r2.0.1
avaya s8500 r2.0.0
avaya s8500 r2.0.1
avaya s8700 r2.0.0
avaya s8700 r2.0.1
bluecoat proxysg *
cisco call_manager *
cisco content_services_switch_11500 *
cisco gss_4480_global_site_selector *
cisco gss_4490_global_site_selector *
cisco mds_9000 *
cisco secure_content_accelerator 10000
securecomputing sidewinder 5.2
securecomputing sidewinder 5.2.0.01
securecomputing sidewinder 5.2.0.02
securecomputing sidewinder 5.2.0.03
securecomputing sidewinder 5.2.0.04
securecomputing sidewinder 5.2.1
securecomputing sidewinder 5.2.1.02
sun crypto_accelerator_4000 1.0
bluecoat cacheos_ca_sa 4.1.10
bluecoat cacheos_ca_sa 4.1.12
cisco pix_firewall_software 6.0
cisco pix_firewall_software 6.0\(1\)
cisco pix_firewall_software 6.0\(2\)
cisco pix_firewall_software 6.0\(3\)
cisco pix_firewall_software 6.0\(4\)
cisco pix_firewall_software 6.0\(4.101\)
cisco pix_firewall_software 6.1
cisco pix_firewall_software 6.1\(1\)
cisco pix_firewall_software 6.1\(2\)
cisco pix_firewall_software 6.1\(3\)
cisco pix_firewall_software 6.1\(4\)
cisco pix_firewall_software 6.1\(5\)
cisco pix_firewall_software 6.2
cisco pix_firewall_software 6.2\(1\)
cisco pix_firewall_software 6.2\(2\)
cisco pix_firewall_software 6.2\(3\)
cisco pix_firewall_software 6.2\(3.100\)
cisco pix_firewall_software 6.3
cisco pix_firewall_software 6.3\(1\)
cisco pix_firewall_software 6.3\(2\)
cisco pix_firewall_software 6.3\(3.102\)
cisco pix_firewall_software 6.3\(3.109\)



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A9CB22A-21E0-46F6-B6CD-BB38A80FA7A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:firewall_services_module:1.1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9CAFC15-178C-4176-9668-D4A04B63E77B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:firewall_services_module:1.1.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C8D6949-89F4-40EF-98F4-8D15628DC345",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:firewall_services_module:1.1_\\(3.005\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "F3DB2AEE-FB5C-42B7-845B-EDA3E58D5D68",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:firewall_services_module:2.1_\\(0.208\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "6479D85C-1A12-486D-818C-6679F415CA26",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:aaa_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "287CF5FA-D0EC-4FD7-9718-973587EF34DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:apache-based_web_server:2.0.43.00:*:*:*:*:*:*:*",
                     matchCriteriaId: "C88168D4-7DB5-4720-8640-400BB680D0FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:apache-based_web_server:2.0.43.04:*:*:*:*:*:*:*",
                     matchCriteriaId: "968915A1-375B-4C69-BE11-9A393F7F1B0F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:symantec:clientless_vpn_gateway_4400:5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "11465DCA-72E5-40E9-9D8E-B3CD470C47E9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:cisco:ciscoworks_common_management_foundation:2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "3954D0D1-9FDF-47D0-9710-D0FB06955B8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:ciscoworks_common_services:2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D6712BD-DE8F-40F5-AC74-B9EFE9A50CFA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:converged_communications_server:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E586558A-ABC3-42EB-8B4D-DC92A0D695E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:sg200:4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A4C5F60-B32D-4D85-BA28-AE11972ED614",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:sg200:4.31.29:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A5935C3-3D83-461F-BC26-E03362115C42",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:sg203:4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "80AC523B-3106-46F2-B760-803DCF8061F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:sg203:4.31.29:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8B8D6F3-D15D-489F-A807-17E63F4831F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:sg208:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "808189BA-197F-49CE-933E-A728F395749C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:sg208:4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "32DCFA7B-7BBB-465A-A4AD-7E18EE3C02DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:sg5:4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC7EF0CD-EA39-457B-8E2E-9120B65A5835",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:sg5:4.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BC2983F-5212-464B-AC21-8A897DEC1F58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:sg5:4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBF17989-D1F2-4B04-80BD-CFABDD482ABA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF2D00AC-FA2A-4C39-B796-DC19072862CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:mac_os_x_server:10.3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8BCD1C5-1AFC-4287-9AFD-81FB3F4F9E54",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "441BE3A0-20F4-4972-B279-19B3DB5FA14D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.8:releng:*:*:*:*:*:*",
                     matchCriteriaId: "2D33C6EF-DBE1-4943-83E4-1F10670DAC6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "00EAEA17-033A-4A50-8E39-D61154876D2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "4EE93350-92E6-4F5C-A14C-9993CFFDBCD4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.1:release:*:*:*:*:*:*",
                     matchCriteriaId: "0D9F2B04-A1F2-4788-A53D-C8274A758DDA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.1:releng:*:*:*:*:*:*",
                     matchCriteriaId: "9A5309ED-D84F-4F52-9864-5B0FEEEE5022",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD7C441E-444B-4DF5-8491-86805C70FB99",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.2.1:release:*:*:*:*:*:*",
                     matchCriteriaId: "C9CCE8F3-84EE-4571-8AAA-BF2D132E9BD4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:hp:hp-ux:8.05:*:*:*:*:*:*:*",
                     matchCriteriaId: "31B1ADC1-9B6D-4B5E-A05A-D69599A3A0D5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*",
                     matchCriteriaId: "771931F7-9180-4EBD-8627-E1CF17D24647",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDD9BE2B-7255-4FC1-B452-E8370632B03F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:hp:hp-ux:11.23:*:*:*:*:*:*:*",
                     matchCriteriaId: "32310AFE-38CC-4C6C-AE13-54C18720F2C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:openbsd:openbsd:3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC46909F-DDFC-448B-BCDF-1EB343F96630",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:openbsd:openbsd:3.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "9496279F-AB43-4B53-81A6-87C651ABC4BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*",
                     matchCriteriaId: "78B46FFA-5B09-473E-AD33-3DB18BD0DAFE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "EC79FF22-2664-4C40-B0B3-6D23B5F45162",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*",
                     matchCriteriaId: "0EFE2E73-9536-41A9-B83B-0A06B54857F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux:7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "E562907F-D915-4030-847A-3C6834A80D4E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux:7.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "138985E6-5107-4E8B-A801-C3D5FE075227",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "038FEDE7-986F-4CA5-9003-BA68352B87D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sco:openserver:5.0.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E140F76-D078-4F58-89CF-3278CDCB9AF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9D76A8D-832B-411E-A458-186733C66010",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1\\(11\\)e:*:*:*:*:*:*:*",
                     matchCriteriaId: "580BA1FE-0826-47A7-8BD3-9225E0841EDD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1\\(11b\\)e:*:*:*:*:*:*:*",
                     matchCriteriaId: "040B04CD-B891-4F19-A7CC-5C2D462FBD6C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1\\(11b\\)e12:*:*:*:*:*:*:*",
                     matchCriteriaId: "5BF29685-7FFC-4093-A1D4-21E4871AF5C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1\\(11b\\)e14:*:*:*:*:*:*:*",
                     matchCriteriaId: "E72872C9-63AF-417F-BFAE-92B4D350C006",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1\\(13\\)e9:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BCF196-5E5A-4F31-BCE7-AA0C748CA922",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1\\(19\\)e1:*:*:*:*:*:*:*",
                     matchCriteriaId: "970939C5-1E6F-47B6-97E6-7B2C1E019985",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.2\\(14\\)sy:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD1F4148-E772-4708-8C1F-D67F969C11DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.2\\(14\\)sy1:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CEBCEF0-5982-4B30-8377-9CAC978A1CB0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.2sy:*:*:*:*:*:*:*",
                     matchCriteriaId: "09458CD7-D430-4957-8506-FAB2A3E2AA65",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.2za:*:*:*:*:*:*:*",
                     matchCriteriaId: "62626BB6-D4EA-4A8A-ABC1-F86B37F19EDB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:4d:webstar:4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8B87C95-4B34-4628-AD03-67D1DE13E097",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:4d:webstar:5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "758F95DB-E619-4B08-86FA-6CF2C1B0CBCD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:4d:webstar:5.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "4F04471C-732F-44EE-AD1B-6305C1DD7DDD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:4d:webstar:5.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "3499913B-5DCD-4115-8C7B-9E8AFF79DE5E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:4d:webstar:5.2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "E237919A-416B-4039-AAD2-7FAE1F4E100D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:4d:webstar:5.2.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "39149924-188C-40C1-B598-A9CD407C90DE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:4d:webstar:5.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "15D5780C-4E29-4BCA-A47E-29FF6EAF33FC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:4d:webstar:5.3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6501108-5455-48FE-AA82-37AFA5D7EC24",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:intuity_audix:*:*:lx:*:*:*:*:*",
                     matchCriteriaId: "C1A3B951-A1F8-4291-82FA-AB7922D13ACE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:intuity_audix:5.1.46:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F2E7C81-C0F5-4D36-9A23-03BE69295ED0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:intuity_audix:s3210:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D0EF4A3-2FE5-41E4-A764-30B379ECF081",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:intuity_audix:s3400:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCF6D59E-8AEA-4380-B86B-0803B2202F16",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:vsu:5:*:*:*:*:*:*:*",
                     matchCriteriaId: "140ABF28-FA39-4D77-AEB2-304962ED48C2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:vsu:5x:*:*:*:*:*:*:*",
                     matchCriteriaId: "09473DD9-5114-44C5-B56C-6630FBEBCACB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:vsu:100_r2.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7ECD3A4-5A39-4222-8350-524F11D8FFB0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:vsu:500:*:*:*:*:*:*:*",
                     matchCriteriaId: "D36C140D-E80C-479A-ADA7-18E901549059",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:vsu:2000_r2.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "940712E9-B041-4B7F-BD02-7DD0AE596D65",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:vsu:5000_r2.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "03B887A2-9025-4C5B-8901-71BC63BF5293",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:vsu:7500_r2.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "33264586-7160-4550-9FF9-4101D72F5C9B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:vsu:10000_r2.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE5E6521-0611-4473-82AC-21655F10FEC0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:checkpoint:firewall-1:*:*:vsx-ng-ai:*:*:*:*:*",
                     matchCriteriaId: "AA9A50A1-CA8C-4EE5-B68F-4958F6B4B028",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:checkpoint:firewall-1:2.0:*:gx:*:*:*:*:*",
                     matchCriteriaId: "8C83ABA2-87CD-429B-9800-590F8256B064",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:checkpoint:firewall-1:next_generation_fp0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4D9A576-2878-4AC4-AC95-E69CB8A84A71",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:checkpoint:firewall-1:next_generation_fp1:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A1A0B02-CF33-401F-9AB2-D595E586C795",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:checkpoint:firewall-1:next_generation_fp2:*:*:*:*:*:*:*",
                     matchCriteriaId: "8C0EF3F0-B82E-45B7-8D05-05E76009F7A2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:checkpoint:provider-1:4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "90FB3825-21A6-4DBE-8188-67672DBE01CB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:checkpoint:provider-1:4.1:sp1:*:*:*:*:*:*",
                     matchCriteriaId: "80623E58-8B46-4559-89A4-C329AACF3CB7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:checkpoint:provider-1:4.1:sp2:*:*:*:*:*:*",
                     matchCriteriaId: "AEE6C228-CD93-4636-868B-C19BC1674BE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:checkpoint:provider-1:4.1:sp3:*:*:*:*:*:*",
                     matchCriteriaId: "A645148C-AD0D-46C1-BEE3-10F5C9066279",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:checkpoint:provider-1:4.1:sp4:*:*:*:*:*:*",
                     matchCriteriaId: "0D69187C-7F46-4FF0-A8A0-0E1989EA79BC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:checkpoint:vpn-1:next_generation_fp0:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AE4A7EE-1BA3-46F1-BF4A-A72997EE0992",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:checkpoint:vpn-1:next_generation_fp1:*:*:*:*:*:*:*",
                     matchCriteriaId: "02029D75-FAF2-4842-9246-079C7DE36417",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:checkpoint:vpn-1:next_generation_fp2:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0146341-364C-4085-A2E1-BC8C260FBA3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:checkpoint:vpn-1:vsx_ng_with_application_intelligence:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5EF01C8-1C8A-4BD1-A13B-CE31F09F9523",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:access_registrar:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B8496E0D-2507-4C25-A122-0B846CBCA72A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:application_and_content_networking_software:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8E383F2A-DFCF-47F8-94EE-3563D41EA597",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:css_secure_content_accelerator:1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2D87EF0-056E-4128-89EB-2803ED83DEE9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:css_secure_content_accelerator:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB3163C1-2044-44DA-9C88-076D75FDF1EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:css11000_content_services_switch:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "07E1B690-C58B-4C08-A757-F3DF451FDAAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:okena_stormwatch:3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "31F0E14C-7681-4D1A-B982-A51E450B93A7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:pix_firewall:6.2.2_.111:*:*:*:*:*:*:*",
                     matchCriteriaId: "ECBC761F-A8F5-4CD8-B19C-5CE8FFC58FDD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:threat_response:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CF39E8B-C201-4940-81C9-14AF4C3DD4B5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:webns:6.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC604680-2E9E-4DC4-ACDD-74D552A45BA4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:webns:6.10_b4:*:*:*:*:*:*:*",
                     matchCriteriaId: "37A94436-D092-4C7E-B87B-63BC621EE82E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:webns:7.1_0.1.02:*:*:*:*:*:*:*",
                     matchCriteriaId: "862165CF-3CFB-4C6E-8238-86FA85F243C8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:webns:7.1_0.2.06:*:*:*:*:*:*:*",
                     matchCriteriaId: "056F3336-BAA8-4A03-90B4-7B31710FC1B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:webns:7.2_0.0.03:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FDC2510-FBB9-429A-B6D4-10AB11F93960",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:webns:7.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D45127E-A544-40A0-9D34-BD70D95C9772",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:webns:7.10_.0.06s:*:*:*:*:*:*:*",
                     matchCriteriaId: "56C69C3E-C895-45C8-8182-7BB412A0C828",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:dell:bsafe_ssl-j:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1FDD507-C38B-4C38-A54F-3DA6F07AD0B5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:dell:bsafe_ssl-j:3.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F2B7AC2-CF08-4AC9-9A71-3A8130F9F9AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:dell:bsafe_ssl-j:3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4D9564B-B92E-4C97-87FF-B56D62DCA775",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:forcepoint:stonegate:1.5.17:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF2AD44D-3BE8-4541-B62D-9F01D46F8E6A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:forcepoint:stonegate:1.5.18:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BF2E08B-9046-41A1-BEDE-EB0B6436315C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:forcepoint:stonegate:1.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "811E1BE8-3868-49F8-B6E8-D5705559B02E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:forcepoint:stonegate:1.6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "D67C9DB4-E46C-4E84-82D9-AF48EFDAEFBA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:forcepoint:stonegate:1.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "CF0E1BF0-6629-40DC-AB23-0256BABD0CB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:forcepoint:stonegate:1.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "1AC4E7E5-FCC1-46B0-B69F-F1F6B36838ED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:forcepoint:stonegate:1.7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C4AED89-F862-4071-8E94-481A59EDAE8E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:forcepoint:stonegate:2.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A3CB6FF-3840-4E80-A0A4-614D6686D2B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:forcepoint:stonegate:2.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "67010B0B-ECE7-4EE5-B103-05DC637E150F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:forcepoint:stonegate:2.0.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "1355EF99-35FC-44A7-BC56-F7C0EA49BF0C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:forcepoint:stonegate:2.0.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DDA8F10-B059-4403-A790-EFC8822588B2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:forcepoint:stonegate:2.0.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "A06BCD31-3FB6-468B-9BC9-EA573717B19F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:forcepoint:stonegate:2.0.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "360238CC-3BF5-4750-B16D-8A2E0257022E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:forcepoint:stonegate:2.0.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C55C754-E213-4E79-AA7B-2CAF8A464388",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:forcepoint:stonegate:2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "647BA524-5A79-408C-BBF2-5780BC522B64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:forcepoint:stonegate:2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "D599C49D-4D7D-4C44-9D8D-A3F76746BBA8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:forcepoint:stonegate:2.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B4DC717-0785-4C19-8A33-ACA5F378DF3C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:forcepoint:stonegate:2.2.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "858843D3-84BB-48B6-80D1-1271AE60150D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:hp:wbem:a.01.05.08:*:*:*:*:*:*:*",
                     matchCriteriaId: "B931D4F8-23F5-4ABA-A457-959995D30C58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:hp:wbem:a.02.00.00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE6A023E-9C2A-487F-B5CE-674C766BFE75",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:hp:wbem:a.02.00.01:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A15ACA2-D500-4260-B51A-6FE6AB5A45A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:litespeedtech:litespeed_web_server:1.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A7B80E0-40BB-4B4E-9711-AF293A038DD4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:litespeedtech:litespeed_web_server:1.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "9EFCFFE8-9CAD-4A7F-9751-8627E6297C9F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:a:litespeedtech:litespeed_web_server:1.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "D3653856-207E-46A7-92DD-D7F377F1829A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:a:litespeedtech:litespeed_web_server:1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E4627BB-0D75-44BC-989F-0E85C9FA0E2B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:a:litespeedtech:litespeed_web_server:1.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "19053434-F9E7-4839-AB5A-B226CC4616A5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:a:litespeedtech:litespeed_web_server:1.2:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "D04CABBA-7BEB-44EC-A6E4-A31E41A62BD7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:a:litespeedtech:litespeed_web_server:1.2:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "8D15C938-4DAB-4011-80EE-A2663E20BFC1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:a:litespeedtech:litespeed_web_server:1.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9C056ED-2492-4B1C-BCB9-4F36806C4A48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:a:litespeedtech:litespeed_web_server:1.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A72FC232-A2CB-443B-9A4A-8BBFEFE6517C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:a:litespeedtech:litespeed_web_server:1.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "BA347CD3-0619-4EA2-A736-B59EE9E3AC12",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:a:litespeedtech:litespeed_web_server:1.3:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "4ACEF29C-3225-43A7-9E07-FBCCF555887E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:a:litespeedtech:litespeed_web_server:1.3:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "46D932AF-FB1A-464D-BA3D-2DC2D3C187CD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:a:litespeedtech:litespeed_web_server:1.3:rc3:*:*:*:*:*:*",
                     matchCriteriaId: "9F532860-9E26-45C3-9FB3-6B0888F1279A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:a:neoteris:instant_virtual_extranet:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A037FAA6-6D26-4496-BC67-03475B4D1155",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:neoteris:instant_virtual_extranet:3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "D3831DD3-E783-4200-8986-FDBF7DD9BA53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:neoteris:instant_virtual_extranet:3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "2909C9D5-3D8F-4C41-B0E7-A0C0B432C19A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:neoteris:instant_virtual_extranet:3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "E09436DF-E3C1-4C03-A3BE-73C4BC84BB7B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:neoteris:instant_virtual_extranet:3.3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "699764B6-0F86-4AB0-86A3-4F2E69AD820C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:novell:edirectory:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7562ADC4-0D01-4FC2-98F0-1F4041BDA52E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:novell:edirectory:8.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6FAB588-BDBE-4A04-AB9E-4F700A3951F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:novell:edirectory:8.5.12a:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1B83F84-D1EF-43B4-8620-3C1BCCE44553",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:novell:edirectory:8.5.27:*:*:*:*:*:*:*",
                     matchCriteriaId: "41169D2F-4F16-466A-82E9-AD0735472B5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:novell:edirectory:8.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "947699C3-D9DE-411A-99C0-44ADD1D2223A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:novell:edirectory:8.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "15F668C0-8420-4401-AB0F-479575596CF0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:novell:edirectory:8.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDDCC7B6-34CA-4551-9833-306B93E517BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:novell:edirectory:8.7.1:sp1:*:*:*:*:*:*",
                     matchCriteriaId: "6D69C160-39F7-48B8-B9A3-CC86690453C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:novell:imanager:1.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "166BF638-ABDC-4BB9-BD4E-2B22681AD9CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:novell:imanager:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FA6420B-9F6A-48F4-A445-12B60A320347",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*",
                     matchCriteriaId: "0FCA45CE-4127-47AD-BBA8-8A6DD83AE1C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA1CA40-7DB5-4DCA-97A8-9A8CF4FECECC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*",
                     matchCriteriaId: "180D07AE-C571-4DD6-837C-43E2A946007A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA3E4D2A-6488-4F8B-A3CA-4161A10FA4DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*",
                     matchCriteriaId: "90789533-C741-4B1C-A24B-2C77B9E4DE5F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*",
                     matchCriteriaId: "1520065B-46D7-48A4-B9D0-5B49F690C5B4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B76FE2D-FBE0-4A3B-A0EA-179332D74F0E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*",
                     matchCriteriaId: "2AA526B9-726A-49D5-B3CA-EBE2DA303CA0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*",
                     matchCriteriaId: "494E48E7-EF86-4860-9A53-94F6C313746E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "45A518E8-21BE-4C5C-B425-410AB1208E9C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "9E3AB748-E463-445C-ABAB-4FEDDFD1878B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "660E4B8D-AABA-4520-BC4D-CF8E76E07C05",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.7:beta3:*:*:*:*:*:*",
                     matchCriteriaId: "85BFEED5-4941-41BB-93D1-CD5C2A41290E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*",
                     matchCriteriaId: "78E79A05-64F3-4397-952C-A5BB950C967D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F7C9E77-1EB2-4720-A8FD-23DC1C877D5A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*",
                     matchCriteriaId: "549BB01D-F322-4FE3-BDA2-4FEA8ED8568A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:openssl:0.9.6-15:*:i386:*:*:*:*:*",
                     matchCriteriaId: "09F3FB7B-0F68-49F3-A3B7-977A687A42E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:openssl:0.9.6b-3:*:i386:*:*:*:*:*",
                     matchCriteriaId: "088F2FF7-96E5-455E-A35B-D99F9854EC6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386:*:*:*:*:*",
                     matchCriteriaId: "FFA721BF-1B2E-479F-BF25-02D441BF175B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386_dev:*:*:*:*:*",
                     matchCriteriaId: "AFEDCE49-21CC-4168-818F-4C638EE3B077",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386_perl:*:*:*:*:*",
                     matchCriteriaId: "B7D18F9B-C0BE-4DE8-81F4-5BF56C00BF41",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sgi:propack:2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "26430687-409B-448F-934B-06AB937DDF63",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sgi:propack:2.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "0702A32E-E577-403C-B4D9-15037D7100A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "29DC217F-C257-4A3C-9CBD-08010C30BEC3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:servercluster:2.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F0F78F4-E81E-4C6B-AB73-D6AAE191060E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:servercluster:2.5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF1A5808-6D5D-48AD-9470-5A6510D17913",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonebeat_fullcluster:1_2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1E8990D-D9A0-4A71-9D87-EC047E01B0D8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonebeat_fullcluster:1_3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DBCC172-6867-4DFD-AAEF-9BDB4DA21F46",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonebeat_fullcluster:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C2F2BEEA-46BB-4718-B0F3-B4EC62B678A6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonebeat_fullcluster:2.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D09E11C-C5BB-409E-BB0D-7F351250419B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonebeat_fullcluster:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B06A05D-AA31-441D-9FC2-3558648C3B7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonebeat_securitycluster:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0886901-6F93-44C1-B774-84D7E5D9554C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonebeat_securitycluster:2.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F203A80-7C1E-4A04-8E99-63525E176753",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonebeat_webcluster:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA0A204C-158B-4014-A53C-75E0CD63E0DE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonebeat_webcluster:2.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "085BA581-7DA5-4FA4-A888-351281FD0A7D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:tarantella:tarantella_enterprise:3.20:*:*:*:*:*:*:*",
                     matchCriteriaId: "9519BCB2-B401-44CE-97F6-847BB36AE45F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:tarantella:tarantella_enterprise:3.30:*:*:*:*:*:*:*",
                     matchCriteriaId: "BBE573E8-DD94-4293-99AE-27B9067B3ED9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:tarantella:tarantella_enterprise:3.40:*:*:*:*:*:*:*",
                     matchCriteriaId: "D14413DA-5199-4282-9E22-D347E9D8E469",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:gsx_server:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "05CC5F49-0E9E-45D8-827D-A5940566DB25",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:gsx_server:2.0.1_build_2129:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D94EE19-6CE9-4E02-8174-D9954CDBF02B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:gsx_server:2.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4E4BEE3-AE7B-4481-B724-2E644E18ACC3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:gsx_server:2.5.1_build_5336:*:*:*:*:*:*:*",
                     matchCriteriaId: "EAAB7052-E0B6-472E-920B-A0F0AEA25D6A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:gsx_server:3.0_build_7592:*:*:*:*:*:*:*",
                     matchCriteriaId: "8CE38F15-BD42-4171-8670-86AA8169A60C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:s8300:r2.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "20C0BD87-CE4B-49D2-89BE-EF282C43AD72",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:s8300:r2.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "C3E6C4A8-59F4-43EE-8413-E95289037598",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:s8500:r2.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE76357A-27E6-4D85-9AA0-1BB658C41568",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:s8500:r2.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "C56C5FDB-24E2-479D-87CA-164CD28567D3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:s8700:r2.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "AEF6C16F-8EDF-4A24-BFEF-6A304D654EEB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:s8700:r2.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "D982AE39-BB57-49E7-B5FE-5EF1ADE2F019",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:bluecoat:proxysg:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B6CFEC9-0F8F-4CD4-ABD1-E6533F910F7F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:call_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "12DE5E22-DF93-46BE-85A3-D4E04379E901",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:content_services_switch_11500:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF28C435-C036-4507-8E3F-44E722F9974A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:gss_4480_global_site_selector:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDA957E2-ABF9-49B2-874F-3FC3060CE0B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:gss_4490_global_site_selector:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F2CDFE7-6853-4A31-85C0-50C57A8D606A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:mds_9000:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F2ED90B-DDBA-49DE-AC78-20E7D77C8858",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:secure_content_accelerator:10000:*:*:*:*:*:*:*",
                     matchCriteriaId: "408A9DB0-81EF-4186-B338-44954E67289B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:securecomputing:sidewinder:5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B0C5F92-7E93-4C3F-B22B-E6612A4D3E10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:securecomputing:sidewinder:5.2.0.01:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D0DC4B4-9AD9-4AC8-BFA7-A3D209B5D089",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:securecomputing:sidewinder:5.2.0.02:*:*:*:*:*:*:*",
                     matchCriteriaId: "303362A5-9C3C-4C85-8C97-2AB12CE01BF6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:securecomputing:sidewinder:5.2.0.03:*:*:*:*:*:*:*",
                     matchCriteriaId: "FED22DC1-E06B-4511-B920-6DAB792262D8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:securecomputing:sidewinder:5.2.0.04:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CE44CA7-4BC7-4C2B-948F-2ACABB91528B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:securecomputing:sidewinder:5.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "F757B2A7-869F-4702-81EB-466317A79D61",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:securecomputing:sidewinder:5.2.1.02:*:*:*:*:*:*:*",
                     matchCriteriaId: "01F6E9A9-6C85-48DA-BC61-55F8EACCB59F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:sun:crypto_accelerator_4000:1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "64AF1E33-4086-43E2-8F54-DA75A99D4B75",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:bluecoat:cacheos_ca_sa:4.1.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "53D16F03-A4C7-4497-AB74-499F208FF059",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:bluecoat:cacheos_ca_sa:4.1.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "13A33EC1-836B-4C8C-AC18-B5BD4F90E612",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "58BE9C02-2A01-4F6F-A6BD-BC0173561E9B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "C558CED8-8342-46CB-9F52-580B626D320E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "0F85D19E-6C26-429D-B876-F34238B9DAAF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "FEC7CCF7-CBC6-4EDC-8EDD-884DFFFBCC7D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(4\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "E5011A33-CD6D-4EFC-ACFD-E51C9AE726A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(4.101\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "09063867-0E64-4630-B35B-4CCA348E4DAB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "78F98CD7-A352-483C-9968-8FB2627A7CBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "F97FE485-705F-4707-B6C6-0EF9E8A85D5F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "E2B925E8-D2C2-4E8C-AC21-0C422245C482",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "B9170562-872E-4C32-869C-B10FF35A925E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(4\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "D0927A68-8BB2-4F03-8396-E9CACC158FC0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(5\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "559DDBA3-2AF4-4A0C-B219-6779BA931F21",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED9D142A-DDC8-4BD6-8C22-F242C9C0B1ED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "5226C9CC-6933-4F10-B426-B47782C606FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "757DAE9A-B25D-4B8A-A41B-66C2897B537E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "5E3DC170-E279-4725-B9EE-6840B5685CC9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(3.100\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "8091EDA9-BD18-47F7-8CEC-E086238647C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F867890-74A4-4892-B99A-27DB4603B873",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.3\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "CE05B514-F094-4632-B25B-973F976F6409",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.3\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "3392428D-1A85-4472-A276-C482A78E2CE1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.3\\(3.102\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "40954985-16E6-4F37-B014-6A55166AE093",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.3\\(3.109\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "0C097809-1FEF-4417-A201-42291CC29122",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that causes an out-of-bounds read.",
      },
      {
         lang: "es",
         value: "El código que une SSL/TLS en OpenSSL 0.9.7a, 0.9.7b y 0.9.7c, usando Kerberos, no comprueba adecuadamente la longitud de los tickets de Kerberos, lo que permite que atacantes remotos provoquen una denegación de servicio.",
      },
   ],
   id: "CVE-2004-0112",
   lastModified: "2024-11-20T23:47:47.537",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2004-11-23T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-005.txt.asc",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://docs.info.apple.com/article.html?artnum=61798",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://lists.apple.com/mhonarc/security-announce/msg00045.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://marc.info/?l=bugtraq&m=107953412903636&w=2",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://marc.info/?l=bugtraq&m=108403806509920&w=2",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://secunia.com/advisories/11139",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://security.gentoo.org/glsa/glsa-200403-03.xml",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://www.ciac.org/ciac/bulletins/o-101.shtml",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/484726",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:023",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://www.novell.com/linux/security/advisories/2004_07_openssl.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://www.openssl.org/news/secadv_20040317.txt",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2004-120.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2004-121.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
            "Third Party Advisory",
            "VDB Entry",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/9899",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://www.slackware.org/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.455961",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://www.trustix.org/errata/2004/0012",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://www.uniras.gov.uk/vuls/2004/224012/index.htm",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "http://www.us-cert.gov/cas/techalerts/TA04-078A.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/15508",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1049",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A928",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9580",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-005.txt.asc",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://docs.info.apple.com/article.html?artnum=61798",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://lists.apple.com/mhonarc/security-announce/msg00045.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://marc.info/?l=bugtraq&m=107953412903636&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://marc.info/?l=bugtraq&m=108403806509920&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://secunia.com/advisories/11139",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://security.gentoo.org/glsa/glsa-200403-03.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://www.ciac.org/ciac/bulletins/o-101.shtml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/484726",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://www.novell.com/linux/security/advisories/2004_07_openssl.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://www.openssl.org/news/secadv_20040317.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2004-120.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2004-121.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Third Party Advisory",
            "VDB Entry",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/9899",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://www.slackware.org/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.455961",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://www.trustix.org/errata/2004/0012",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://www.uniras.gov.uk/vuls/2004/224012/index.htm",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "http://www.us-cert.gov/cas/techalerts/TA04-078A.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/15508",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1049",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A928",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9580",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vendorComments: [
      {
         comment: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.",
         lastModified: "2007-03-14T00:00:00",
         organization: "Red Hat",
      },
   ],
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2003-06-16 04:00
Modified
2024-11-20 23:44
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Neoteris Instant Virtual Extranet (IVE) 3.01 and earlier allows remote attackers to insert arbitrary web script and bypass authentication via a certain CGI script.
Impacted products
Vendor Product Version
neoteris instant_virtual_extranet 3.01



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:neoteris:instant_virtual_extranet:3.01:*:*:*:*:*:*:*",
                     matchCriteriaId: "A89CF2B8-9681-4DD2-8462-2465405DFF88",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Cross-site scripting (XSS) vulnerability in Neoteris Instant Virtual Extranet (IVE) 3.01 and earlier allows remote attackers to insert arbitrary web script and bypass authentication via a certain CGI script.",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de secuencias de comandos en sitios cruzados en Neoteris Instant Virtual Extranet (IVE) 3.01 y anteriores permite que atacantes remotos inserten script web arbitrario y se salten la autentificación mediante un cierto script CGI.",
      },
   ],
   id: "CVE-2003-0217",
   lastModified: "2024-11-20T23:44:14.337",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 6.8,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: true,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2003-06-16T04:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://marc.info/?l=bugtraq&m=105283833617480&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=105283833617480&w=2",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2004-11-23 05:00
Modified
2025-01-16 18:15
Summary
The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference.
References
cve@mitre.orgftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:05.openssl.ascBroken Link
cve@mitre.orgftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-005.txt.ascBroken Link
cve@mitre.orgftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txtBroken Link
cve@mitre.orghttp://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834Broken Link
cve@mitre.orghttp://docs.info.apple.com/article.html?artnum=61798Broken Link
cve@mitre.orghttp://fedoranews.org/updates/FEDORA-2004-095.shtmlThird Party Advisory
cve@mitre.orghttp://lists.apple.com/archives/security-announce/2005//Aug/msg00001.htmlMailing List
cve@mitre.orghttp://lists.apple.com/archives/security-announce/2005/Aug/msg00000.htmlMailing List
cve@mitre.orghttp://lists.apple.com/mhonarc/security-announce/msg00045.htmlBroken Link
cve@mitre.orghttp://marc.info/?l=bugtraq&m=107953412903636&w=2Mailing List
cve@mitre.orghttp://marc.info/?l=bugtraq&m=108403806509920&w=2Mailing List
cve@mitre.orghttp://secunia.com/advisories/11139Broken Link
cve@mitre.orghttp://secunia.com/advisories/17381Broken Link
cve@mitre.orghttp://secunia.com/advisories/17398Broken Link
cve@mitre.orghttp://secunia.com/advisories/17401Broken Link
cve@mitre.orghttp://secunia.com/advisories/18247Broken Link
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200403-03.xmlThird Party Advisory
cve@mitre.orghttp://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524Broken Link
cve@mitre.orghttp://support.avaya.com/elmodocs2/security/ASA-2005-239.htmThird Party Advisory
cve@mitre.orghttp://support.lexmark.com/index?page=content&id=TE88&locale=EN&userlocale=EN_USBroken Link
cve@mitre.orghttp://www.ciac.org/ciac/bulletins/o-101.shtmlBroken Link
cve@mitre.orghttp://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtmlBroken Link
cve@mitre.orghttp://www.debian.org/security/2004/dsa-465Third Party Advisory
cve@mitre.orghttp://www.kb.cert.org/vuls/id/288574Third Party Advisory, US Government Resource
cve@mitre.orghttp://www.linuxsecurity.com/advisories/engarde_advisory-4135.htmlBroken Link
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2004:023Third Party Advisory
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2004_07_openssl.htmlBroken Link
cve@mitre.orghttp://www.openssl.org/news/secadv_20040317.txtThird Party Advisory
cve@mitre.orghttp://www.redhat.com/archives/fedora-announce-list/2005-October/msg00087.htmlMailing List
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2004-120.htmlBroken Link
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2004-121.htmlBroken Link
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2004-139.htmlBroken Link
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-829.htmlBroken Link
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-830.htmlBroken Link
cve@mitre.orghttp://www.securityfocus.com/bid/9899Broken Link, Third Party Advisory, VDB Entry, Vendor Advisory
cve@mitre.orghttp://www.slackware.org/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.455961Broken Link
cve@mitre.orghttp://www.trustix.org/errata/2004/0012Broken Link
cve@mitre.orghttp://www.uniras.gov.uk/vuls/2004/224012/index.htmBroken Link
cve@mitre.orghttp://www.us-cert.gov/cas/techalerts/TA04-078A.htmlBroken Link, Third Party Advisory, US Government Resource
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/15505Third Party Advisory, VDB Entry
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2621Broken Link
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5770Broken Link
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A870Broken Link
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A975Broken Link
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9779Broken Link
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:05.openssl.ascBroken Link
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-005.txt.ascBroken Link
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txtBroken Link
af854a3a-2127-422b-91ae-364da2661108http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834Broken Link
af854a3a-2127-422b-91ae-364da2661108http://docs.info.apple.com/article.html?artnum=61798Broken Link
af854a3a-2127-422b-91ae-364da2661108http://fedoranews.org/updates/FEDORA-2004-095.shtmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.htmlMailing List
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.htmlMailing List
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/mhonarc/security-announce/msg00045.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=107953412903636&w=2Mailing List
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=108403806509920&w=2Mailing List
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/11139Broken Link
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17381Broken Link
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17398Broken Link
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17401Broken Link
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18247Broken Link
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200403-03.xmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524Broken Link
af854a3a-2127-422b-91ae-364da2661108http://support.avaya.com/elmodocs2/security/ASA-2005-239.htmThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://support.lexmark.com/index?page=content&id=TE88&locale=EN&userlocale=EN_USBroken Link
af854a3a-2127-422b-91ae-364da2661108http://www.ciac.org/ciac/bulletins/o-101.shtmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2004/dsa-465Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/288574Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.linuxsecurity.com/advisories/engarde_advisory-4135.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2004:023Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2004_07_openssl.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://www.openssl.org/news/secadv_20040317.txtThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00087.htmlMailing List
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2004-120.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2004-121.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2004-139.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-829.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-830.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/9899Broken Link, Third Party Advisory, VDB Entry, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.slackware.org/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.455961Broken Link
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2004/0012Broken Link
af854a3a-2127-422b-91ae-364da2661108http://www.uniras.gov.uk/vuls/2004/224012/index.htmBroken Link
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA04-078A.htmlBroken Link, Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/15505Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2621Broken Link
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5770Broken Link
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A870Broken Link
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A975Broken Link
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9779Broken Link
Impacted products
Vendor Product Version
cisco firewall_services_module *
cisco firewall_services_module 1.1.2
cisco firewall_services_module 1.1.3
cisco firewall_services_module 1.1_\(3.005\)
cisco firewall_services_module 2.1_\(0.208\)
hp aaa_server *
hp apache-based_web_server 2.0.43.00
hp apache-based_web_server 2.0.43.04
symantec clientless_vpn_gateway_4400 5.0
cisco ciscoworks_common_management_foundation 2.1
cisco ciscoworks_common_services 2.2
avaya converged_communications_server 2.0
avaya sg200 4.4
avaya sg200 4.31.29
avaya sg203 4.4
avaya sg203 4.31.29
avaya sg208 *
avaya sg208 4.4
avaya sg5 4.2
avaya sg5 4.3
avaya sg5 4.4
apple mac_os_x 10.3.3
apple mac_os_x_server 10.3.3
freebsd freebsd 4.8
freebsd freebsd 4.8
freebsd freebsd 4.9
freebsd freebsd 5.1
freebsd freebsd 5.1
freebsd freebsd 5.1
freebsd freebsd 5.2
freebsd freebsd 5.2.1
hp hp-ux 8.05
hp hp-ux 11.00
hp hp-ux 11.11
hp hp-ux 11.23
openbsd openbsd 3.3
openbsd openbsd 3.4
redhat enterprise_linux 3.0
redhat enterprise_linux 3.0
redhat enterprise_linux 3.0
redhat enterprise_linux_desktop 3.0
redhat linux 7.2
redhat linux 7.3
redhat linux 8.0
sco openserver 5.0.6
sco openserver 5.0.7
cisco ios 12.1\(11\)e
cisco ios 12.1\(11b\)e
cisco ios 12.1\(11b\)e12
cisco ios 12.1\(11b\)e14
cisco ios 12.1\(13\)e9
cisco ios 12.1\(19\)e1
cisco ios 12.2\(14\)sy
cisco ios 12.2\(14\)sy1
cisco ios 12.2sy
cisco ios 12.2za
4d webstar 4.0
4d webstar 5.2
4d webstar 5.2.1
4d webstar 5.2.2
4d webstar 5.2.3
4d webstar 5.2.4
4d webstar 5.3
4d webstar 5.3.1
avaya intuity_audix *
avaya intuity_audix 5.1.46
avaya intuity_audix s3210
avaya intuity_audix s3400
avaya vsu 5
avaya vsu 5x
avaya vsu 100_r2.0.1
avaya vsu 500
avaya vsu 2000_r2.0.1
avaya vsu 5000_r2.0.1
avaya vsu 7500_r2.0.1
avaya vsu 10000_r2.0.1
checkpoint firewall-1 *
checkpoint firewall-1 2.0
checkpoint firewall-1 next_generation_fp0
checkpoint firewall-1 next_generation_fp1
checkpoint firewall-1 next_generation_fp2
checkpoint provider-1 4.1
checkpoint provider-1 4.1
checkpoint provider-1 4.1
checkpoint provider-1 4.1
checkpoint provider-1 4.1
checkpoint vpn-1 next_generation_fp0
checkpoint vpn-1 next_generation_fp1
checkpoint vpn-1 next_generation_fp2
checkpoint vpn-1 vsx_ng_with_application_intelligence
cisco access_registrar *
cisco application_and_content_networking_software *
cisco css_secure_content_accelerator 1.0
cisco css_secure_content_accelerator 2.0
cisco css11000_content_services_switch *
cisco okena_stormwatch 3.2
cisco pix_firewall 6.2.2_.111
cisco threat_response *
cisco webns 6.10
cisco webns 6.10_b4
cisco webns 7.1_0.1.02
cisco webns 7.1_0.2.06
cisco webns 7.2_0.0.03
cisco webns 7.10
cisco webns 7.10_.0.06s
dell bsafe_ssl-j 3.0
dell bsafe_ssl-j 3.0.1
dell bsafe_ssl-j 3.1
hp wbem a.01.05.08
hp wbem a.02.00.00
hp wbem a.02.00.01
lite speed_technologies_litespeed_web_server 1.0.1
lite speed_technologies_litespeed_web_server 1.0.2
lite speed_technologies_litespeed_web_server 1.0.3
lite speed_technologies_litespeed_web_server 1.1
lite speed_technologies_litespeed_web_server 1.1.1
lite speed_technologies_litespeed_web_server 1.2.1
lite speed_technologies_litespeed_web_server 1.2.2
lite speed_technologies_litespeed_web_server 1.2_rc1
lite speed_technologies_litespeed_web_server 1.2_rc2
lite speed_technologies_litespeed_web_server 1.3
lite speed_technologies_litespeed_web_server 1.3.1
lite speed_technologies_litespeed_web_server 1.3_rc1
lite speed_technologies_litespeed_web_server 1.3_rc2
lite speed_technologies_litespeed_web_server 1.3_rc3
neoteris instant_virtual_extranet 3.0
neoteris instant_virtual_extranet 3.1
neoteris instant_virtual_extranet 3.2
neoteris instant_virtual_extranet 3.3
neoteris instant_virtual_extranet 3.3.1
novell edirectory 8.0
novell edirectory 8.5
novell edirectory 8.5.12a
novell edirectory 8.5.27
novell edirectory 8.6.2
novell edirectory 8.7
novell edirectory 8.7.1
novell edirectory 8.7.1
novell imanager 1.5
novell imanager 2.0
openssl openssl 0.9.6c
openssl openssl 0.9.6d
openssl openssl 0.9.6e
openssl openssl 0.9.6f
openssl openssl 0.9.6g
openssl openssl 0.9.6h
openssl openssl 0.9.6i
openssl openssl 0.9.6j
openssl openssl 0.9.6k
openssl openssl 0.9.7
openssl openssl 0.9.7
openssl openssl 0.9.7
openssl openssl 0.9.7
openssl openssl 0.9.7a
openssl openssl 0.9.7b
openssl openssl 0.9.7c
redhat openssl 0.9.6-15
redhat openssl 0.9.6b-3
redhat openssl 0.9.7a-2
redhat openssl 0.9.7a-2
redhat openssl 0.9.7a-2
sgi propack 2.3
sgi propack 2.4
sgi propack 3.0
stonesoft servercluster 2.5
stonesoft servercluster 2.5.2
stonesoft stonebeat_fullcluster 1_2.0
stonesoft stonebeat_fullcluster 1_3.0
stonesoft stonebeat_fullcluster 2.0
stonesoft stonebeat_fullcluster 2.5
stonesoft stonebeat_fullcluster 3.0
stonesoft stonebeat_securitycluster 2.0
stonesoft stonebeat_securitycluster 2.5
stonesoft stonebeat_webcluster 2.0
stonesoft stonebeat_webcluster 2.5
stonesoft stonegate 1.5.17
stonesoft stonegate 1.5.18
stonesoft stonegate 1.6.2
stonesoft stonegate 1.6.3
stonesoft stonegate 1.7
stonesoft stonegate 1.7.1
stonesoft stonegate 1.7.2
stonesoft stonegate 2.0.1
stonesoft stonegate 2.0.4
stonesoft stonegate 2.0.5
stonesoft stonegate 2.0.6
stonesoft stonegate 2.0.7
stonesoft stonegate 2.0.8
stonesoft stonegate 2.0.9
stonesoft stonegate 2.1
stonesoft stonegate 2.2
stonesoft stonegate 2.2.1
stonesoft stonegate 2.2.4
stonesoft stonegate_vpn_client 1.7
stonesoft stonegate_vpn_client 1.7.2
stonesoft stonegate_vpn_client 2.0
stonesoft stonegate_vpn_client 2.0.7
stonesoft stonegate_vpn_client 2.0.8
stonesoft stonegate_vpn_client 2.0.9
tarantella tarantella_enterprise 3.20
tarantella tarantella_enterprise 3.30
tarantella tarantella_enterprise 3.40
vmware gsx_server 2.0
vmware gsx_server 2.0.1_build_2129
vmware gsx_server 2.5.1
vmware gsx_server 2.5.1_build_5336
vmware gsx_server 3.0_build_7592
avaya s8300 r2.0.0
avaya s8300 r2.0.1
avaya s8500 r2.0.0
avaya s8500 r2.0.1
avaya s8700 r2.0.0
avaya s8700 r2.0.1
bluecoat proxysg *
cisco call_manager *
cisco content_services_switch_11500 *
cisco gss_4480_global_site_selector *
cisco gss_4490_global_site_selector *
cisco mds_9000 *
cisco secure_content_accelerator 10000
securecomputing sidewinder 5.2
securecomputing sidewinder 5.2.0.01
securecomputing sidewinder 5.2.0.02
securecomputing sidewinder 5.2.0.03
securecomputing sidewinder 5.2.0.04
securecomputing sidewinder 5.2.1
securecomputing sidewinder 5.2.1.02
sun crypto_accelerator_4000 1.0
bluecoat cacheos_ca_sa 4.1.10
bluecoat cacheos_ca_sa 4.1.12
cisco pix_firewall_software 6.0
cisco pix_firewall_software 6.0\(1\)
cisco pix_firewall_software 6.0\(2\)
cisco pix_firewall_software 6.0\(3\)
cisco pix_firewall_software 6.0\(4\)
cisco pix_firewall_software 6.0\(4.101\)
cisco pix_firewall_software 6.1
cisco pix_firewall_software 6.1\(1\)
cisco pix_firewall_software 6.1\(2\)
cisco pix_firewall_software 6.1\(3\)
cisco pix_firewall_software 6.1\(4\)
cisco pix_firewall_software 6.1\(5\)
cisco pix_firewall_software 6.2
cisco pix_firewall_software 6.2\(1\)
cisco pix_firewall_software 6.2\(2\)
cisco pix_firewall_software 6.2\(3\)
cisco pix_firewall_software 6.2\(3.100\)
cisco pix_firewall_software 6.3
cisco pix_firewall_software 6.3\(1\)
cisco pix_firewall_software 6.3\(2\)
cisco pix_firewall_software 6.3\(3.102\)
cisco pix_firewall_software 6.3\(3.109\)



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A9CB22A-21E0-46F6-B6CD-BB38A80FA7A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:firewall_services_module:1.1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9CAFC15-178C-4176-9668-D4A04B63E77B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:firewall_services_module:1.1.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C8D6949-89F4-40EF-98F4-8D15628DC345",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:firewall_services_module:1.1_\\(3.005\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "F3DB2AEE-FB5C-42B7-845B-EDA3E58D5D68",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:firewall_services_module:2.1_\\(0.208\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "6479D85C-1A12-486D-818C-6679F415CA26",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:aaa_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "287CF5FA-D0EC-4FD7-9718-973587EF34DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:apache-based_web_server:2.0.43.00:*:*:*:*:*:*:*",
                     matchCriteriaId: "C88168D4-7DB5-4720-8640-400BB680D0FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:apache-based_web_server:2.0.43.04:*:*:*:*:*:*:*",
                     matchCriteriaId: "968915A1-375B-4C69-BE11-9A393F7F1B0F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:symantec:clientless_vpn_gateway_4400:5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "11465DCA-72E5-40E9-9D8E-B3CD470C47E9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:cisco:ciscoworks_common_management_foundation:2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "3954D0D1-9FDF-47D0-9710-D0FB06955B8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:ciscoworks_common_services:2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D6712BD-DE8F-40F5-AC74-B9EFE9A50CFA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:converged_communications_server:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E586558A-ABC3-42EB-8B4D-DC92A0D695E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:sg200:4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A4C5F60-B32D-4D85-BA28-AE11972ED614",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:sg200:4.31.29:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A5935C3-3D83-461F-BC26-E03362115C42",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:sg203:4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "80AC523B-3106-46F2-B760-803DCF8061F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:sg203:4.31.29:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8B8D6F3-D15D-489F-A807-17E63F4831F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:sg208:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "808189BA-197F-49CE-933E-A728F395749C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:sg208:4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "32DCFA7B-7BBB-465A-A4AD-7E18EE3C02DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:sg5:4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC7EF0CD-EA39-457B-8E2E-9120B65A5835",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:sg5:4.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BC2983F-5212-464B-AC21-8A897DEC1F58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:sg5:4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBF17989-D1F2-4B04-80BD-CFABDD482ABA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF2D00AC-FA2A-4C39-B796-DC19072862CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:mac_os_x_server:10.3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8BCD1C5-1AFC-4287-9AFD-81FB3F4F9E54",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "441BE3A0-20F4-4972-B279-19B3DB5FA14D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.8:releng:*:*:*:*:*:*",
                     matchCriteriaId: "2D33C6EF-DBE1-4943-83E4-1F10670DAC6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "00EAEA17-033A-4A50-8E39-D61154876D2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "4EE93350-92E6-4F5C-A14C-9993CFFDBCD4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.1:release:*:*:*:*:*:*",
                     matchCriteriaId: "0D9F2B04-A1F2-4788-A53D-C8274A758DDA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.1:releng:*:*:*:*:*:*",
                     matchCriteriaId: "9A5309ED-D84F-4F52-9864-5B0FEEEE5022",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD7C441E-444B-4DF5-8491-86805C70FB99",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.2.1:release:*:*:*:*:*:*",
                     matchCriteriaId: "C9CCE8F3-84EE-4571-8AAA-BF2D132E9BD4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:hp:hp-ux:8.05:*:*:*:*:*:*:*",
                     matchCriteriaId: "31B1ADC1-9B6D-4B5E-A05A-D69599A3A0D5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*",
                     matchCriteriaId: "771931F7-9180-4EBD-8627-E1CF17D24647",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDD9BE2B-7255-4FC1-B452-E8370632B03F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:hp:hp-ux:11.23:*:*:*:*:*:*:*",
                     matchCriteriaId: "32310AFE-38CC-4C6C-AE13-54C18720F2C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:openbsd:openbsd:3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC46909F-DDFC-448B-BCDF-1EB343F96630",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:openbsd:openbsd:3.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "9496279F-AB43-4B53-81A6-87C651ABC4BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*",
                     matchCriteriaId: "78B46FFA-5B09-473E-AD33-3DB18BD0DAFE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "EC79FF22-2664-4C40-B0B3-6D23B5F45162",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*",
                     matchCriteriaId: "0EFE2E73-9536-41A9-B83B-0A06B54857F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux:7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "E562907F-D915-4030-847A-3C6834A80D4E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux:7.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "138985E6-5107-4E8B-A801-C3D5FE075227",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "038FEDE7-986F-4CA5-9003-BA68352B87D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sco:openserver:5.0.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E140F76-D078-4F58-89CF-3278CDCB9AF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9D76A8D-832B-411E-A458-186733C66010",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1\\(11\\)e:*:*:*:*:*:*:*",
                     matchCriteriaId: "580BA1FE-0826-47A7-8BD3-9225E0841EDD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1\\(11b\\)e:*:*:*:*:*:*:*",
                     matchCriteriaId: "040B04CD-B891-4F19-A7CC-5C2D462FBD6C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1\\(11b\\)e12:*:*:*:*:*:*:*",
                     matchCriteriaId: "5BF29685-7FFC-4093-A1D4-21E4871AF5C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1\\(11b\\)e14:*:*:*:*:*:*:*",
                     matchCriteriaId: "E72872C9-63AF-417F-BFAE-92B4D350C006",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1\\(13\\)e9:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BCF196-5E5A-4F31-BCE7-AA0C748CA922",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1\\(19\\)e1:*:*:*:*:*:*:*",
                     matchCriteriaId: "970939C5-1E6F-47B6-97E6-7B2C1E019985",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.2\\(14\\)sy:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD1F4148-E772-4708-8C1F-D67F969C11DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.2\\(14\\)sy1:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CEBCEF0-5982-4B30-8377-9CAC978A1CB0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.2sy:*:*:*:*:*:*:*",
                     matchCriteriaId: "09458CD7-D430-4957-8506-FAB2A3E2AA65",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.2za:*:*:*:*:*:*:*",
                     matchCriteriaId: "62626BB6-D4EA-4A8A-ABC1-F86B37F19EDB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:4d:webstar:4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8B87C95-4B34-4628-AD03-67D1DE13E097",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:4d:webstar:5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "758F95DB-E619-4B08-86FA-6CF2C1B0CBCD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:4d:webstar:5.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "4F04471C-732F-44EE-AD1B-6305C1DD7DDD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:4d:webstar:5.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "3499913B-5DCD-4115-8C7B-9E8AFF79DE5E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:4d:webstar:5.2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "E237919A-416B-4039-AAD2-7FAE1F4E100D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:4d:webstar:5.2.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "39149924-188C-40C1-B598-A9CD407C90DE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:4d:webstar:5.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "15D5780C-4E29-4BCA-A47E-29FF6EAF33FC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:4d:webstar:5.3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6501108-5455-48FE-AA82-37AFA5D7EC24",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:intuity_audix:*:*:lx:*:*:*:*:*",
                     matchCriteriaId: "C1A3B951-A1F8-4291-82FA-AB7922D13ACE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:intuity_audix:5.1.46:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F2E7C81-C0F5-4D36-9A23-03BE69295ED0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:intuity_audix:s3210:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D0EF4A3-2FE5-41E4-A764-30B379ECF081",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:intuity_audix:s3400:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCF6D59E-8AEA-4380-B86B-0803B2202F16",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:vsu:5:*:*:*:*:*:*:*",
                     matchCriteriaId: "140ABF28-FA39-4D77-AEB2-304962ED48C2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:vsu:5x:*:*:*:*:*:*:*",
                     matchCriteriaId: "09473DD9-5114-44C5-B56C-6630FBEBCACB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:vsu:100_r2.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7ECD3A4-5A39-4222-8350-524F11D8FFB0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:vsu:500:*:*:*:*:*:*:*",
                     matchCriteriaId: "D36C140D-E80C-479A-ADA7-18E901549059",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:vsu:2000_r2.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "940712E9-B041-4B7F-BD02-7DD0AE596D65",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:vsu:5000_r2.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "03B887A2-9025-4C5B-8901-71BC63BF5293",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:vsu:7500_r2.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "33264586-7160-4550-9FF9-4101D72F5C9B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:vsu:10000_r2.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE5E6521-0611-4473-82AC-21655F10FEC0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:checkpoint:firewall-1:*:*:vsx-ng-ai:*:*:*:*:*",
                     matchCriteriaId: "AA9A50A1-CA8C-4EE5-B68F-4958F6B4B028",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:checkpoint:firewall-1:2.0:*:gx:*:*:*:*:*",
                     matchCriteriaId: "8C83ABA2-87CD-429B-9800-590F8256B064",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:checkpoint:firewall-1:next_generation_fp0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4D9A576-2878-4AC4-AC95-E69CB8A84A71",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:checkpoint:firewall-1:next_generation_fp1:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A1A0B02-CF33-401F-9AB2-D595E586C795",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:checkpoint:firewall-1:next_generation_fp2:*:*:*:*:*:*:*",
                     matchCriteriaId: "8C0EF3F0-B82E-45B7-8D05-05E76009F7A2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:checkpoint:provider-1:4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "90FB3825-21A6-4DBE-8188-67672DBE01CB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:checkpoint:provider-1:4.1:sp1:*:*:*:*:*:*",
                     matchCriteriaId: "80623E58-8B46-4559-89A4-C329AACF3CB7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:checkpoint:provider-1:4.1:sp2:*:*:*:*:*:*",
                     matchCriteriaId: "AEE6C228-CD93-4636-868B-C19BC1674BE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:checkpoint:provider-1:4.1:sp3:*:*:*:*:*:*",
                     matchCriteriaId: "A645148C-AD0D-46C1-BEE3-10F5C9066279",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:checkpoint:provider-1:4.1:sp4:*:*:*:*:*:*",
                     matchCriteriaId: "0D69187C-7F46-4FF0-A8A0-0E1989EA79BC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:checkpoint:vpn-1:next_generation_fp0:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AE4A7EE-1BA3-46F1-BF4A-A72997EE0992",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:checkpoint:vpn-1:next_generation_fp1:*:*:*:*:*:*:*",
                     matchCriteriaId: "02029D75-FAF2-4842-9246-079C7DE36417",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:checkpoint:vpn-1:next_generation_fp2:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0146341-364C-4085-A2E1-BC8C260FBA3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:checkpoint:vpn-1:vsx_ng_with_application_intelligence:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5EF01C8-1C8A-4BD1-A13B-CE31F09F9523",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:access_registrar:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B8496E0D-2507-4C25-A122-0B846CBCA72A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:application_and_content_networking_software:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8E383F2A-DFCF-47F8-94EE-3563D41EA597",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:css_secure_content_accelerator:1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2D87EF0-056E-4128-89EB-2803ED83DEE9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:css_secure_content_accelerator:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB3163C1-2044-44DA-9C88-076D75FDF1EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:css11000_content_services_switch:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "07E1B690-C58B-4C08-A757-F3DF451FDAAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:okena_stormwatch:3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "31F0E14C-7681-4D1A-B982-A51E450B93A7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:pix_firewall:6.2.2_.111:*:*:*:*:*:*:*",
                     matchCriteriaId: "ECBC761F-A8F5-4CD8-B19C-5CE8FFC58FDD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:threat_response:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CF39E8B-C201-4940-81C9-14AF4C3DD4B5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:webns:6.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC604680-2E9E-4DC4-ACDD-74D552A45BA4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:webns:6.10_b4:*:*:*:*:*:*:*",
                     matchCriteriaId: "37A94436-D092-4C7E-B87B-63BC621EE82E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:webns:7.1_0.1.02:*:*:*:*:*:*:*",
                     matchCriteriaId: "862165CF-3CFB-4C6E-8238-86FA85F243C8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:webns:7.1_0.2.06:*:*:*:*:*:*:*",
                     matchCriteriaId: "056F3336-BAA8-4A03-90B4-7B31710FC1B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:webns:7.2_0.0.03:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FDC2510-FBB9-429A-B6D4-10AB11F93960",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:webns:7.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D45127E-A544-40A0-9D34-BD70D95C9772",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:webns:7.10_.0.06s:*:*:*:*:*:*:*",
                     matchCriteriaId: "56C69C3E-C895-45C8-8182-7BB412A0C828",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:dell:bsafe_ssl-j:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1FDD507-C38B-4C38-A54F-3DA6F07AD0B5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:dell:bsafe_ssl-j:3.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F2B7AC2-CF08-4AC9-9A71-3A8130F9F9AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:dell:bsafe_ssl-j:3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4D9564B-B92E-4C97-87FF-B56D62DCA775",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:hp:wbem:a.01.05.08:*:*:*:*:*:*:*",
                     matchCriteriaId: "B931D4F8-23F5-4ABA-A457-959995D30C58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:hp:wbem:a.02.00.00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE6A023E-9C2A-487F-B5CE-674C766BFE75",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:hp:wbem:a.02.00.01:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A15ACA2-D500-4260-B51A-6FE6AB5A45A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A045971-8756-47E8-9044-C39D08B36F1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "CAA95881-7231-4FDA-AF73-04DF9FF0B64C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "62B7F6AD-EDBD-4B09-BDB2-795ED114F2AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "F045AB7B-1551-46E5-A5CC-BF13C1BB49F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "44E85930-3AAD-420B-8E3E-AEC57344F6C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "52FD4485-BCA2-485A-A0CF-F8152C9DBFA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CF53BE4-FE2D-4D63-BD0F-A423D0FE3BE3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.2_rc1:*:*:*:*:*:*:*",
                     matchCriteriaId: "00993464-BE09-4691-B3F0-51BBA9FB80C3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.2_rc2:*:*:*:*:*:*:*",
                     matchCriteriaId: "896AB39E-2078-4BA2-9522-477BD5F98FD1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB9279EC-47CF-45F1-B4CC-B2B332E82E34",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7300C3E-8105-4C23-89B9-7D29CED18C15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3_rc1:*:*:*:*:*:*:*",
                     matchCriteriaId: "90C59DB2-48DA-4172-A1F5-25CF3B5097AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3_rc2:*:*:*:*:*:*:*",
                     matchCriteriaId: "715F4E0B-7E4B-4520-A987-9B3ED3136B75",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3_rc3:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CA1F606-C558-40FD-9300-6E2796F47BA8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:neoteris:instant_virtual_extranet:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A037FAA6-6D26-4496-BC67-03475B4D1155",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:neoteris:instant_virtual_extranet:3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "D3831DD3-E783-4200-8986-FDBF7DD9BA53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:neoteris:instant_virtual_extranet:3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "2909C9D5-3D8F-4C41-B0E7-A0C0B432C19A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:neoteris:instant_virtual_extranet:3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "E09436DF-E3C1-4C03-A3BE-73C4BC84BB7B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:neoteris:instant_virtual_extranet:3.3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "699764B6-0F86-4AB0-86A3-4F2E69AD820C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:novell:edirectory:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7562ADC4-0D01-4FC2-98F0-1F4041BDA52E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:novell:edirectory:8.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6FAB588-BDBE-4A04-AB9E-4F700A3951F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:novell:edirectory:8.5.12a:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1B83F84-D1EF-43B4-8620-3C1BCCE44553",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:novell:edirectory:8.5.27:*:*:*:*:*:*:*",
                     matchCriteriaId: "41169D2F-4F16-466A-82E9-AD0735472B5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:novell:edirectory:8.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "947699C3-D9DE-411A-99C0-44ADD1D2223A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:novell:edirectory:8.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "15F668C0-8420-4401-AB0F-479575596CF0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:novell:edirectory:8.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDDCC7B6-34CA-4551-9833-306B93E517BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:novell:edirectory:8.7.1:sp1:*:*:*:*:*:*",
                     matchCriteriaId: "6D69C160-39F7-48B8-B9A3-CC86690453C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:novell:imanager:1.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "166BF638-ABDC-4BB9-BD4E-2B22681AD9CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:novell:imanager:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FA6420B-9F6A-48F4-A445-12B60A320347",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*",
                     matchCriteriaId: "0FCA45CE-4127-47AD-BBA8-8A6DD83AE1C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA1CA40-7DB5-4DCA-97A8-9A8CF4FECECC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*",
                     matchCriteriaId: "180D07AE-C571-4DD6-837C-43E2A946007A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA3E4D2A-6488-4F8B-A3CA-4161A10FA4DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*",
                     matchCriteriaId: "90789533-C741-4B1C-A24B-2C77B9E4DE5F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*",
                     matchCriteriaId: "1520065B-46D7-48A4-B9D0-5B49F690C5B4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B76FE2D-FBE0-4A3B-A0EA-179332D74F0E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*",
                     matchCriteriaId: "2AA526B9-726A-49D5-B3CA-EBE2DA303CA0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*",
                     matchCriteriaId: "494E48E7-EF86-4860-9A53-94F6C313746E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "45A518E8-21BE-4C5C-B425-410AB1208E9C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "9E3AB748-E463-445C-ABAB-4FEDDFD1878B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "660E4B8D-AABA-4520-BC4D-CF8E76E07C05",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.7:beta3:*:*:*:*:*:*",
                     matchCriteriaId: "85BFEED5-4941-41BB-93D1-CD5C2A41290E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*",
                     matchCriteriaId: "78E79A05-64F3-4397-952C-A5BB950C967D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F7C9E77-1EB2-4720-A8FD-23DC1C877D5A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*",
                     matchCriteriaId: "549BB01D-F322-4FE3-BDA2-4FEA8ED8568A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:openssl:0.9.6-15:*:i386:*:*:*:*:*",
                     matchCriteriaId: "09F3FB7B-0F68-49F3-A3B7-977A687A42E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:openssl:0.9.6b-3:*:i386:*:*:*:*:*",
                     matchCriteriaId: "088F2FF7-96E5-455E-A35B-D99F9854EC6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386:*:*:*:*:*",
                     matchCriteriaId: "FFA721BF-1B2E-479F-BF25-02D441BF175B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386_dev:*:*:*:*:*",
                     matchCriteriaId: "AFEDCE49-21CC-4168-818F-4C638EE3B077",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386_perl:*:*:*:*:*",
                     matchCriteriaId: "B7D18F9B-C0BE-4DE8-81F4-5BF56C00BF41",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sgi:propack:2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "26430687-409B-448F-934B-06AB937DDF63",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sgi:propack:2.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "0702A32E-E577-403C-B4D9-15037D7100A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "29DC217F-C257-4A3C-9CBD-08010C30BEC3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:servercluster:2.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F0F78F4-E81E-4C6B-AB73-D6AAE191060E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:servercluster:2.5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF1A5808-6D5D-48AD-9470-5A6510D17913",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonebeat_fullcluster:1_2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1E8990D-D9A0-4A71-9D87-EC047E01B0D8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonebeat_fullcluster:1_3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DBCC172-6867-4DFD-AAEF-9BDB4DA21F46",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonebeat_fullcluster:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C2F2BEEA-46BB-4718-B0F3-B4EC62B678A6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonebeat_fullcluster:2.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D09E11C-C5BB-409E-BB0D-7F351250419B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonebeat_fullcluster:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B06A05D-AA31-441D-9FC2-3558648C3B7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonebeat_securitycluster:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0886901-6F93-44C1-B774-84D7E5D9554C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonebeat_securitycluster:2.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F203A80-7C1E-4A04-8E99-63525E176753",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonebeat_webcluster:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA0A204C-158B-4014-A53C-75E0CD63E0DE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonebeat_webcluster:2.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "085BA581-7DA5-4FA4-A888-351281FD0A7D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonegate:1.5.17:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA1C4B3C-5701-4233-BA94-28915713F9C8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonegate:1.5.18:*:*:*:*:*:*:*",
                     matchCriteriaId: "28D9F8D7-698A-486A-918A-7DB5CAFBB3CB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonegate:1.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "D125C2A0-A4B5-48D6-A38A-54755C3FDF4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonegate:1.6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F85F672-0F21-4AD7-8620-13D82F2ECC22",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonegate:1.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "89070041-613A-4F7B-BD6A-C6091D21FC52",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonegate:1.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9A71933-4BD5-4B11-8B14-D997E75F29CD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonegate:1.7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B6BE11D-FC02-4950-A554-08CC9D8B1853",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonegate:2.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A53FD0E1-9BAA-43F0-BCC9-0BE8D4356F55",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonegate:2.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "B80ADAE8-94D4-46A4-A5ED-FF134D808B52",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonegate:2.0.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "69FA0221-5073-4D45-950F-119497B53FED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonegate:2.0.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4AE5B43-7C90-4C2A-A215-30F5EC5841C9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonegate:2.0.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CC1A110-B203-4962-8E1A-74BD98121AF6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonegate:2.0.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5A92C4D-B024-4D39-9479-409C39586F64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonegate:2.0.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7E0C4F5-CF02-4FF6-AE9B-5B6B70D5C067",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonegate:2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E8998CC-E372-46D0-8339-47DC8D92D253",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonegate:2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF131FDC-BF8D-4A17-99F0-444EB900E83D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonegate:2.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "880811B3-E78E-456E-972E-DE733F368576",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonegate:2.2.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "22411F18-2B93-405A-A3B5-2CF0A04977C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonegate_vpn_client:1.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "C71188B7-E6DC-41E5-B619-367341113501",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonegate_vpn_client:1.7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "07491444-0196-4504-A971-A5E388B86BBA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonegate_vpn_client:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "72BC6CD2-3291-4E69-8DC6-F3AB853F8931",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonegate_vpn_client:2.0.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD43EDDF-58A7-4705-B8C7-FD76C35A437D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonegate_vpn_client:2.0.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7C2E603-568F-40F6-9A7C-439E2A51B37F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonegate_vpn_client:2.0.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "703421A7-E8C5-450B-97EF-FD9D99D4B834",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:tarantella:tarantella_enterprise:3.20:*:*:*:*:*:*:*",
                     matchCriteriaId: "9519BCB2-B401-44CE-97F6-847BB36AE45F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:tarantella:tarantella_enterprise:3.30:*:*:*:*:*:*:*",
                     matchCriteriaId: "BBE573E8-DD94-4293-99AE-27B9067B3ED9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:tarantella:tarantella_enterprise:3.40:*:*:*:*:*:*:*",
                     matchCriteriaId: "D14413DA-5199-4282-9E22-D347E9D8E469",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:gsx_server:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "05CC5F49-0E9E-45D8-827D-A5940566DB25",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:gsx_server:2.0.1_build_2129:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D94EE19-6CE9-4E02-8174-D9954CDBF02B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:gsx_server:2.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4E4BEE3-AE7B-4481-B724-2E644E18ACC3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:gsx_server:2.5.1_build_5336:*:*:*:*:*:*:*",
                     matchCriteriaId: "EAAB7052-E0B6-472E-920B-A0F0AEA25D6A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:gsx_server:3.0_build_7592:*:*:*:*:*:*:*",
                     matchCriteriaId: "8CE38F15-BD42-4171-8670-86AA8169A60C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:s8300:r2.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "20C0BD87-CE4B-49D2-89BE-EF282C43AD72",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:s8300:r2.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "C3E6C4A8-59F4-43EE-8413-E95289037598",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:s8500:r2.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE76357A-27E6-4D85-9AA0-1BB658C41568",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:s8500:r2.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "C56C5FDB-24E2-479D-87CA-164CD28567D3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:s8700:r2.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "AEF6C16F-8EDF-4A24-BFEF-6A304D654EEB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:s8700:r2.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "D982AE39-BB57-49E7-B5FE-5EF1ADE2F019",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:bluecoat:proxysg:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B6CFEC9-0F8F-4CD4-ABD1-E6533F910F7F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:call_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "12DE5E22-DF93-46BE-85A3-D4E04379E901",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:content_services_switch_11500:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF28C435-C036-4507-8E3F-44E722F9974A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:gss_4480_global_site_selector:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDA957E2-ABF9-49B2-874F-3FC3060CE0B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:gss_4490_global_site_selector:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F2CDFE7-6853-4A31-85C0-50C57A8D606A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:mds_9000:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F2ED90B-DDBA-49DE-AC78-20E7D77C8858",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:secure_content_accelerator:10000:*:*:*:*:*:*:*",
                     matchCriteriaId: "408A9DB0-81EF-4186-B338-44954E67289B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:securecomputing:sidewinder:5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B0C5F92-7E93-4C3F-B22B-E6612A4D3E10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:securecomputing:sidewinder:5.2.0.01:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D0DC4B4-9AD9-4AC8-BFA7-A3D209B5D089",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:securecomputing:sidewinder:5.2.0.02:*:*:*:*:*:*:*",
                     matchCriteriaId: "303362A5-9C3C-4C85-8C97-2AB12CE01BF6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:securecomputing:sidewinder:5.2.0.03:*:*:*:*:*:*:*",
                     matchCriteriaId: "FED22DC1-E06B-4511-B920-6DAB792262D8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:securecomputing:sidewinder:5.2.0.04:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CE44CA7-4BC7-4C2B-948F-2ACABB91528B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:securecomputing:sidewinder:5.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "F757B2A7-869F-4702-81EB-466317A79D61",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:securecomputing:sidewinder:5.2.1.02:*:*:*:*:*:*:*",
                     matchCriteriaId: "01F6E9A9-6C85-48DA-BC61-55F8EACCB59F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:sun:crypto_accelerator_4000:1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "64AF1E33-4086-43E2-8F54-DA75A99D4B75",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:bluecoat:cacheos_ca_sa:4.1.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "53D16F03-A4C7-4497-AB74-499F208FF059",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:bluecoat:cacheos_ca_sa:4.1.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "13A33EC1-836B-4C8C-AC18-B5BD4F90E612",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "58BE9C02-2A01-4F6F-A6BD-BC0173561E9B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "C558CED8-8342-46CB-9F52-580B626D320E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "0F85D19E-6C26-429D-B876-F34238B9DAAF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "FEC7CCF7-CBC6-4EDC-8EDD-884DFFFBCC7D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(4\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "E5011A33-CD6D-4EFC-ACFD-E51C9AE726A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(4.101\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "09063867-0E64-4630-B35B-4CCA348E4DAB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "78F98CD7-A352-483C-9968-8FB2627A7CBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "F97FE485-705F-4707-B6C6-0EF9E8A85D5F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "E2B925E8-D2C2-4E8C-AC21-0C422245C482",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "B9170562-872E-4C32-869C-B10FF35A925E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(4\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "D0927A68-8BB2-4F03-8396-E9CACC158FC0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(5\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "559DDBA3-2AF4-4A0C-B219-6779BA931F21",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED9D142A-DDC8-4BD6-8C22-F242C9C0B1ED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "5226C9CC-6933-4F10-B426-B47782C606FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "757DAE9A-B25D-4B8A-A41B-66C2897B537E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "5E3DC170-E279-4725-B9EE-6840B5685CC9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(3.100\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "8091EDA9-BD18-47F7-8CEC-E086238647C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F867890-74A4-4892-B99A-27DB4603B873",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.3\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "CE05B514-F094-4632-B25B-973F976F6409",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.3\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "3392428D-1A85-4472-A276-C482A78E2CE1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.3\\(3.102\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "40954985-16E6-4F37-B014-6A55166AE093",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.3\\(3.109\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "0C097809-1FEF-4417-A201-42291CC29122",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference.",
      },
      {
         lang: "es",
         value: "La función  do_change_cipher_spec en OpenSSL  0.9.6c hasta 0.9.6.k y 0.9.7a hasta 0.9.7c permite que atacantes remotos provoquen una denegación de servicio (caída) mediante una hábil unión SSL/TLS que provoca un puntero nulo.",
      },
   ],
   id: "CVE-2004-0079",
   lastModified: "2025-01-16T18:15:19.483",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2004-11-23T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:05.openssl.asc",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-005.txt.asc",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://docs.info.apple.com/article.html?artnum=61798",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://fedoranews.org/updates/FEDORA-2004-095.shtml",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://lists.apple.com/mhonarc/security-announce/msg00045.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "http://marc.info/?l=bugtraq&m=107953412903636&w=2",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "http://marc.info/?l=bugtraq&m=108403806509920&w=2",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://secunia.com/advisories/11139",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://secunia.com/advisories/17381",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://secunia.com/advisories/17398",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://secunia.com/advisories/17401",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://secunia.com/advisories/18247",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://security.gentoo.org/glsa/glsa-200403-03.xml",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://support.avaya.com/elmodocs2/security/ASA-2005-239.htm",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://support.lexmark.com/index?page=content&id=TE88&locale=EN&userlocale=EN_US",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://www.ciac.org/ciac/bulletins/o-101.shtml",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.debian.org/security/2004/dsa-465",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/288574",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://www.linuxsecurity.com/advisories/engarde_advisory-4135.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:023",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://www.novell.com/linux/security/advisories/2004_07_openssl.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.openssl.org/news/secadv_20040317.txt",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00087.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2004-120.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2004-121.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2004-139.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2005-829.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2005-830.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
            "Third Party Advisory",
            "VDB Entry",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/9899",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://www.slackware.org/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.455961",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://www.trustix.org/errata/2004/0012",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://www.uniras.gov.uk/vuls/2004/224012/index.htm",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "http://www.us-cert.gov/cas/techalerts/TA04-078A.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/15505",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2621",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5770",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A870",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A975",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9779",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:05.openssl.asc",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-005.txt.asc",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://docs.info.apple.com/article.html?artnum=61798",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://fedoranews.org/updates/FEDORA-2004-095.shtml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://lists.apple.com/mhonarc/security-announce/msg00045.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "http://marc.info/?l=bugtraq&m=107953412903636&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "http://marc.info/?l=bugtraq&m=108403806509920&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://secunia.com/advisories/11139",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://secunia.com/advisories/17381",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://secunia.com/advisories/17398",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://secunia.com/advisories/17401",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://secunia.com/advisories/18247",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://security.gentoo.org/glsa/glsa-200403-03.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://support.avaya.com/elmodocs2/security/ASA-2005-239.htm",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://support.lexmark.com/index?page=content&id=TE88&locale=EN&userlocale=EN_US",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://www.ciac.org/ciac/bulletins/o-101.shtml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.debian.org/security/2004/dsa-465",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/288574",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://www.linuxsecurity.com/advisories/engarde_advisory-4135.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://www.novell.com/linux/security/advisories/2004_07_openssl.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.openssl.org/news/secadv_20040317.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00087.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2004-120.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2004-121.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2004-139.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2005-829.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2005-830.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Third Party Advisory",
            "VDB Entry",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/9899",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://www.slackware.org/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.455961",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://www.trustix.org/errata/2004/0012",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://www.uniras.gov.uk/vuls/2004/224012/index.htm",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "http://www.us-cert.gov/cas/techalerts/TA04-078A.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/15505",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2621",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5770",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A870",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A975",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9779",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vendorComments: [
      {
         comment: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.",
         lastModified: "2007-03-14T00:00:00",
         organization: "Red Hat",
      },
   ],
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-476",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-476",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2004-11-23 05:00
Modified
2024-11-20 23:47
Severity ?
Summary
OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool.
References
cve@mitre.orgftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt
cve@mitre.orgftp://patches.sgi.com/support/free/security/advisories/20040304-01-U.asc
cve@mitre.orghttp://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834
cve@mitre.orghttp://fedoranews.org/updates/FEDORA-2004-095.shtml
cve@mitre.orghttp://marc.info/?l=bugtraq&m=107955049331965&w=2
cve@mitre.orghttp://marc.info/?l=bugtraq&m=108403850228012&w=2
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2004-119.html
cve@mitre.orghttp://secunia.com/advisories/11139
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200403-03.xml
cve@mitre.orghttp://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524
cve@mitre.orghttp://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml
cve@mitre.orghttp://www.debian.org/security/2004/dsa-465
cve@mitre.orghttp://www.kb.cert.org/vuls/id/465542Third Party Advisory, US Government Resource
cve@mitre.orghttp://www.linuxsecurity.com/advisories/engarde_advisory-4135.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2004-120.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2004-121.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2004-139.html
cve@mitre.orghttp://www.securityfocus.com/bid/9899Vendor Advisory
cve@mitre.orghttp://www.trustix.org/errata/2004/0012
cve@mitre.orghttp://www.uniras.gov.uk/vuls/2004/224012/index.htm
cve@mitre.orghttp://www.us-cert.gov/cas/techalerts/TA04-078A.htmlUS Government Resource
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/15509
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11755
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A871
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A902
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt
af854a3a-2127-422b-91ae-364da2661108ftp://patches.sgi.com/support/free/security/advisories/20040304-01-U.asc
af854a3a-2127-422b-91ae-364da2661108http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834
af854a3a-2127-422b-91ae-364da2661108http://fedoranews.org/updates/FEDORA-2004-095.shtml
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=107955049331965&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=108403850228012&w=2
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2004-119.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/11139
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200403-03.xml
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524
af854a3a-2127-422b-91ae-364da2661108http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2004/dsa-465
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/465542Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.linuxsecurity.com/advisories/engarde_advisory-4135.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2004-120.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2004-121.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2004-139.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/9899Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2004/0012
af854a3a-2127-422b-91ae-364da2661108http://www.uniras.gov.uk/vuls/2004/224012/index.htm
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA04-078A.htmlUS Government Resource
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/15509
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11755
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A871
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A902
Impacted products
Vendor Product Version
cisco firewall_services_module *
cisco firewall_services_module 1.1.2
cisco firewall_services_module 1.1.3
cisco firewall_services_module 1.1_\(3.005\)
cisco firewall_services_module 2.1_\(0.208\)
hp aaa_server *
hp apache-based_web_server 2.0.43.00
hp apache-based_web_server 2.0.43.04
symantec clientless_vpn_gateway_4400 5.0
cisco ciscoworks_common_management_foundation 2.1
cisco ciscoworks_common_services 2.2
avaya converged_communications_server 2.0
avaya sg200 4.4
avaya sg200 4.31.29
avaya sg203 4.4
avaya sg203 4.31.29
avaya sg208 *
avaya sg208 4.4
avaya sg5 4.2
avaya sg5 4.3
avaya sg5 4.4
apple mac_os_x 10.3.3
apple mac_os_x_server 10.3.3
freebsd freebsd 4.8
freebsd freebsd 4.8
freebsd freebsd 4.9
freebsd freebsd 5.1
freebsd freebsd 5.1
freebsd freebsd 5.1
freebsd freebsd 5.2
freebsd freebsd 5.2.1
hp hp-ux 8.05
hp hp-ux 11.00
hp hp-ux 11.11
hp hp-ux 11.23
openbsd openbsd 3.3
openbsd openbsd 3.4
redhat enterprise_linux 3.0
redhat enterprise_linux 3.0
redhat enterprise_linux 3.0
redhat enterprise_linux_desktop 3.0
redhat linux 7.2
redhat linux 7.3
redhat linux 8.0
sco openserver 5.0.6
sco openserver 5.0.7
cisco ios 12.1\(11\)e
cisco ios 12.1\(11b\)e
cisco ios 12.1\(11b\)e12
cisco ios 12.1\(11b\)e14
cisco ios 12.1\(13\)e9
cisco ios 12.1\(19\)e1
cisco ios 12.2\(14\)sy
cisco ios 12.2\(14\)sy1
cisco ios 12.2sy
cisco ios 12.2za
4d webstar 4.0
4d webstar 5.2
4d webstar 5.2.1
4d webstar 5.2.2
4d webstar 5.2.3
4d webstar 5.2.4
4d webstar 5.3
4d webstar 5.3.1
avaya intuity_audix *
avaya intuity_audix 5.1.46
avaya intuity_audix s3210
avaya intuity_audix s3400
avaya vsu 5
avaya vsu 5x
avaya vsu 100_r2.0.1
avaya vsu 500
avaya vsu 2000_r2.0.1
avaya vsu 5000_r2.0.1
avaya vsu 7500_r2.0.1
avaya vsu 10000_r2.0.1
checkpoint firewall-1 *
checkpoint firewall-1 2.0
checkpoint firewall-1 next_generation_fp0
checkpoint firewall-1 next_generation_fp1
checkpoint firewall-1 next_generation_fp2
checkpoint provider-1 4.1
checkpoint provider-1 4.1
checkpoint provider-1 4.1
checkpoint provider-1 4.1
checkpoint provider-1 4.1
checkpoint vpn-1 next_generation
checkpoint vpn-1 next_generation_fp0
checkpoint vpn-1 next_generation_fp1
checkpoint vpn-1 vsx_ng_with_application_intelligence
cisco access_registrar *
cisco application_and_content_networking_software *
cisco css_secure_content_accelerator 1.0
cisco css_secure_content_accelerator 2.0
cisco css11000_content_services_switch *
cisco okena_stormwatch 3.2
cisco pix_firewall 6.2.2_.111
cisco threat_response *
cisco webns 6.10
cisco webns 6.10_b4
cisco webns 7.1_0.1.02
cisco webns 7.1_0.2.06
cisco webns 7.2_0.0.03
cisco webns 7.10
cisco webns 7.10_.0.06s
dell bsafe_ssl-j 3.0
dell bsafe_ssl-j 3.0.1
dell bsafe_ssl-j 3.1
hp wbem a.01.05.08
hp wbem a.02.00.00
hp wbem a.02.00.01
lite speed_technologies_litespeed_web_server 1.0.1
lite speed_technologies_litespeed_web_server 1.0.2
lite speed_technologies_litespeed_web_server 1.0.3
lite speed_technologies_litespeed_web_server 1.1
lite speed_technologies_litespeed_web_server 1.1.1
lite speed_technologies_litespeed_web_server 1.2.1
lite speed_technologies_litespeed_web_server 1.2.2
lite speed_technologies_litespeed_web_server 1.2_rc1
lite speed_technologies_litespeed_web_server 1.2_rc2
lite speed_technologies_litespeed_web_server 1.3
lite speed_technologies_litespeed_web_server 1.3.1
lite speed_technologies_litespeed_web_server 1.3_rc1
lite speed_technologies_litespeed_web_server 1.3_rc2
lite speed_technologies_litespeed_web_server 1.3_rc3
neoteris instant_virtual_extranet 3.0
neoteris instant_virtual_extranet 3.1
neoteris instant_virtual_extranet 3.2
neoteris instant_virtual_extranet 3.3
neoteris instant_virtual_extranet 3.3.1
novell edirectory 8.0
novell edirectory 8.5
novell edirectory 8.5.12a
novell edirectory 8.5.27
novell edirectory 8.6.2
novell edirectory 8.7
novell edirectory 8.7.1
novell edirectory 8.7.1
novell imanager 1.5
novell imanager 2.0
openssl openssl 0.9.6c
openssl openssl 0.9.6d
openssl openssl 0.9.6e
openssl openssl 0.9.6f
openssl openssl 0.9.6g
openssl openssl 0.9.6h
openssl openssl 0.9.6i
openssl openssl 0.9.6j
openssl openssl 0.9.6k
openssl openssl 0.9.7
openssl openssl 0.9.7
openssl openssl 0.9.7
openssl openssl 0.9.7
openssl openssl 0.9.7a
openssl openssl 0.9.7b
openssl openssl 0.9.7c
redhat openssl 0.9.6-15
redhat openssl 0.9.6b-3
redhat openssl 0.9.7a-2
redhat openssl 0.9.7a-2
redhat openssl 0.9.7a-2
sgi propack 2.3
sgi propack 2.4
sgi propack 3.0
stonesoft servercluster 2.5
stonesoft servercluster 2.5.2
stonesoft stonebeat_fullcluster 1_2.0
stonesoft stonebeat_fullcluster 1_3.0
stonesoft stonebeat_fullcluster 2.0
stonesoft stonebeat_fullcluster 2.5
stonesoft stonebeat_fullcluster 3.0
stonesoft stonebeat_securitycluster 2.0
stonesoft stonebeat_securitycluster 2.5
stonesoft stonebeat_webcluster 2.0
stonesoft stonebeat_webcluster 2.5
stonesoft stonegate 1.5.17
stonesoft stonegate 1.5.18
stonesoft stonegate 1.6.2
stonesoft stonegate 1.6.3
stonesoft stonegate 1.7
stonesoft stonegate 1.7.1
stonesoft stonegate 1.7.2
stonesoft stonegate 2.0.1
stonesoft stonegate 2.0.4
stonesoft stonegate 2.0.5
stonesoft stonegate 2.0.6
stonesoft stonegate 2.0.7
stonesoft stonegate 2.0.8
stonesoft stonegate 2.0.9
stonesoft stonegate 2.1
stonesoft stonegate 2.2
stonesoft stonegate 2.2.1
stonesoft stonegate 2.2.4
stonesoft stonegate_vpn_client 1.7
stonesoft stonegate_vpn_client 1.7.2
stonesoft stonegate_vpn_client 2.0
stonesoft stonegate_vpn_client 2.0.7
stonesoft stonegate_vpn_client 2.0.8
stonesoft stonegate_vpn_client 2.0.9
tarantella tarantella_enterprise 3.20
tarantella tarantella_enterprise 3.30
tarantella tarantella_enterprise 3.40
vmware gsx_server 2.0
vmware gsx_server 2.0.1_build_2129
vmware gsx_server 2.5.1
vmware gsx_server 2.5.1_build_5336
vmware gsx_server 3.0_build_7592
avaya s8300 r2.0.0
avaya s8300 r2.0.1
avaya s8500 r2.0.0
avaya s8500 r2.0.1
avaya s8700 r2.0.0
avaya s8700 r2.0.1
bluecoat proxysg *
cisco call_manager *
cisco content_services_switch_11500 *
cisco gss_4480_global_site_selector *
cisco gss_4490_global_site_selector *
cisco mds_9000 *
cisco secure_content_accelerator 10000
securecomputing sidewinder 5.2
securecomputing sidewinder 5.2.0.01
securecomputing sidewinder 5.2.0.02
securecomputing sidewinder 5.2.0.03
securecomputing sidewinder 5.2.0.04
securecomputing sidewinder 5.2.1
securecomputing sidewinder 5.2.1.02
sun crypto_accelerator_4000 1.0
bluecoat cacheos_ca_sa 4.1.10
bluecoat cacheos_ca_sa 4.1.12
cisco pix_firewall_software 6.0
cisco pix_firewall_software 6.0\(1\)
cisco pix_firewall_software 6.0\(2\)
cisco pix_firewall_software 6.0\(3\)
cisco pix_firewall_software 6.0\(4\)
cisco pix_firewall_software 6.0\(4.101\)
cisco pix_firewall_software 6.1
cisco pix_firewall_software 6.1\(1\)
cisco pix_firewall_software 6.1\(2\)
cisco pix_firewall_software 6.1\(3\)
cisco pix_firewall_software 6.1\(4\)
cisco pix_firewall_software 6.1\(5\)
cisco pix_firewall_software 6.2
cisco pix_firewall_software 6.2\(1\)
cisco pix_firewall_software 6.2\(2\)
cisco pix_firewall_software 6.2\(3\)
cisco pix_firewall_software 6.2\(3.100\)
cisco pix_firewall_software 6.3
cisco pix_firewall_software 6.3\(1\)
cisco pix_firewall_software 6.3\(2\)
cisco pix_firewall_software 6.3\(3.102\)
cisco pix_firewall_software 6.3\(3.109\)



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A9CB22A-21E0-46F6-B6CD-BB38A80FA7A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:firewall_services_module:1.1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9CAFC15-178C-4176-9668-D4A04B63E77B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:firewall_services_module:1.1.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C8D6949-89F4-40EF-98F4-8D15628DC345",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:firewall_services_module:1.1_\\(3.005\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "F3DB2AEE-FB5C-42B7-845B-EDA3E58D5D68",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:firewall_services_module:2.1_\\(0.208\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "6479D85C-1A12-486D-818C-6679F415CA26",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:aaa_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "287CF5FA-D0EC-4FD7-9718-973587EF34DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:apache-based_web_server:2.0.43.00:*:*:*:*:*:*:*",
                     matchCriteriaId: "C88168D4-7DB5-4720-8640-400BB680D0FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:hp:apache-based_web_server:2.0.43.04:*:*:*:*:*:*:*",
                     matchCriteriaId: "968915A1-375B-4C69-BE11-9A393F7F1B0F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:symantec:clientless_vpn_gateway_4400:5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "11465DCA-72E5-40E9-9D8E-B3CD470C47E9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:cisco:ciscoworks_common_management_foundation:2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "3954D0D1-9FDF-47D0-9710-D0FB06955B8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:ciscoworks_common_services:2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D6712BD-DE8F-40F5-AC74-B9EFE9A50CFA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:converged_communications_server:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E586558A-ABC3-42EB-8B4D-DC92A0D695E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:sg200:4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A4C5F60-B32D-4D85-BA28-AE11972ED614",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:sg200:4.31.29:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A5935C3-3D83-461F-BC26-E03362115C42",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:sg203:4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "80AC523B-3106-46F2-B760-803DCF8061F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:sg203:4.31.29:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8B8D6F3-D15D-489F-A807-17E63F4831F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:sg208:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "808189BA-197F-49CE-933E-A728F395749C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:sg208:4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "32DCFA7B-7BBB-465A-A4AD-7E18EE3C02DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:sg5:4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC7EF0CD-EA39-457B-8E2E-9120B65A5835",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:sg5:4.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BC2983F-5212-464B-AC21-8A897DEC1F58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:sg5:4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBF17989-D1F2-4B04-80BD-CFABDD482ABA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF2D00AC-FA2A-4C39-B796-DC19072862CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:mac_os_x_server:10.3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8BCD1C5-1AFC-4287-9AFD-81FB3F4F9E54",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "441BE3A0-20F4-4972-B279-19B3DB5FA14D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.8:releng:*:*:*:*:*:*",
                     matchCriteriaId: "2D33C6EF-DBE1-4943-83E4-1F10670DAC6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "00EAEA17-033A-4A50-8E39-D61154876D2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "4EE93350-92E6-4F5C-A14C-9993CFFDBCD4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.1:release:*:*:*:*:*:*",
                     matchCriteriaId: "0D9F2B04-A1F2-4788-A53D-C8274A758DDA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.1:releng:*:*:*:*:*:*",
                     matchCriteriaId: "9A5309ED-D84F-4F52-9864-5B0FEEEE5022",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD7C441E-444B-4DF5-8491-86805C70FB99",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.2.1:release:*:*:*:*:*:*",
                     matchCriteriaId: "C9CCE8F3-84EE-4571-8AAA-BF2D132E9BD4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:hp:hp-ux:8.05:*:*:*:*:*:*:*",
                     matchCriteriaId: "31B1ADC1-9B6D-4B5E-A05A-D69599A3A0D5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*",
                     matchCriteriaId: "771931F7-9180-4EBD-8627-E1CF17D24647",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDD9BE2B-7255-4FC1-B452-E8370632B03F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:hp:hp-ux:11.23:*:*:*:*:*:*:*",
                     matchCriteriaId: "32310AFE-38CC-4C6C-AE13-54C18720F2C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:openbsd:openbsd:3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC46909F-DDFC-448B-BCDF-1EB343F96630",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:openbsd:openbsd:3.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "9496279F-AB43-4B53-81A6-87C651ABC4BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*",
                     matchCriteriaId: "78B46FFA-5B09-473E-AD33-3DB18BD0DAFE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "EC79FF22-2664-4C40-B0B3-6D23B5F45162",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*",
                     matchCriteriaId: "0EFE2E73-9536-41A9-B83B-0A06B54857F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux:7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "E562907F-D915-4030-847A-3C6834A80D4E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux:7.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "138985E6-5107-4E8B-A801-C3D5FE075227",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "038FEDE7-986F-4CA5-9003-BA68352B87D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sco:openserver:5.0.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E140F76-D078-4F58-89CF-3278CDCB9AF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9D76A8D-832B-411E-A458-186733C66010",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1\\(11\\)e:*:*:*:*:*:*:*",
                     matchCriteriaId: "580BA1FE-0826-47A7-8BD3-9225E0841EDD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1\\(11b\\)e:*:*:*:*:*:*:*",
                     matchCriteriaId: "040B04CD-B891-4F19-A7CC-5C2D462FBD6C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1\\(11b\\)e12:*:*:*:*:*:*:*",
                     matchCriteriaId: "5BF29685-7FFC-4093-A1D4-21E4871AF5C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1\\(11b\\)e14:*:*:*:*:*:*:*",
                     matchCriteriaId: "E72872C9-63AF-417F-BFAE-92B4D350C006",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1\\(13\\)e9:*:*:*:*:*:*:*",
                     matchCriteriaId: "80BCF196-5E5A-4F31-BCE7-AA0C748CA922",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1\\(19\\)e1:*:*:*:*:*:*:*",
                     matchCriteriaId: "970939C5-1E6F-47B6-97E6-7B2C1E019985",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.2\\(14\\)sy:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD1F4148-E772-4708-8C1F-D67F969C11DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.2\\(14\\)sy1:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CEBCEF0-5982-4B30-8377-9CAC978A1CB0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.2sy:*:*:*:*:*:*:*",
                     matchCriteriaId: "09458CD7-D430-4957-8506-FAB2A3E2AA65",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.2za:*:*:*:*:*:*:*",
                     matchCriteriaId: "62626BB6-D4EA-4A8A-ABC1-F86B37F19EDB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:4d:webstar:4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8B87C95-4B34-4628-AD03-67D1DE13E097",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:4d:webstar:5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "758F95DB-E619-4B08-86FA-6CF2C1B0CBCD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:4d:webstar:5.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "4F04471C-732F-44EE-AD1B-6305C1DD7DDD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:4d:webstar:5.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "3499913B-5DCD-4115-8C7B-9E8AFF79DE5E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:4d:webstar:5.2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "E237919A-416B-4039-AAD2-7FAE1F4E100D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:4d:webstar:5.2.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "39149924-188C-40C1-B598-A9CD407C90DE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:4d:webstar:5.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "15D5780C-4E29-4BCA-A47E-29FF6EAF33FC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:4d:webstar:5.3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6501108-5455-48FE-AA82-37AFA5D7EC24",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:intuity_audix:*:*:lx:*:*:*:*:*",
                     matchCriteriaId: "C1A3B951-A1F8-4291-82FA-AB7922D13ACE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:intuity_audix:5.1.46:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F2E7C81-C0F5-4D36-9A23-03BE69295ED0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:intuity_audix:s3210:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D0EF4A3-2FE5-41E4-A764-30B379ECF081",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:intuity_audix:s3400:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCF6D59E-8AEA-4380-B86B-0803B2202F16",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:vsu:5:*:*:*:*:*:*:*",
                     matchCriteriaId: "140ABF28-FA39-4D77-AEB2-304962ED48C2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:vsu:5x:*:*:*:*:*:*:*",
                     matchCriteriaId: "09473DD9-5114-44C5-B56C-6630FBEBCACB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:vsu:100_r2.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7ECD3A4-5A39-4222-8350-524F11D8FFB0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:vsu:500:*:*:*:*:*:*:*",
                     matchCriteriaId: "D36C140D-E80C-479A-ADA7-18E901549059",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:vsu:2000_r2.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "940712E9-B041-4B7F-BD02-7DD0AE596D65",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:vsu:5000_r2.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "03B887A2-9025-4C5B-8901-71BC63BF5293",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:vsu:7500_r2.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "33264586-7160-4550-9FF9-4101D72F5C9B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:vsu:10000_r2.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE5E6521-0611-4473-82AC-21655F10FEC0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:checkpoint:firewall-1:*:*:vsx-ng-ai:*:*:*:*:*",
                     matchCriteriaId: "AA9A50A1-CA8C-4EE5-B68F-4958F6B4B028",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:checkpoint:firewall-1:2.0:*:gx:*:*:*:*:*",
                     matchCriteriaId: "8C83ABA2-87CD-429B-9800-590F8256B064",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:checkpoint:firewall-1:next_generation_fp0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4D9A576-2878-4AC4-AC95-E69CB8A84A71",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:checkpoint:firewall-1:next_generation_fp1:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A1A0B02-CF33-401F-9AB2-D595E586C795",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:checkpoint:firewall-1:next_generation_fp2:*:*:*:*:*:*:*",
                     matchCriteriaId: "8C0EF3F0-B82E-45B7-8D05-05E76009F7A2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:checkpoint:provider-1:4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "90FB3825-21A6-4DBE-8188-67672DBE01CB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:checkpoint:provider-1:4.1:sp1:*:*:*:*:*:*",
                     matchCriteriaId: "80623E58-8B46-4559-89A4-C329AACF3CB7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:checkpoint:provider-1:4.1:sp2:*:*:*:*:*:*",
                     matchCriteriaId: "AEE6C228-CD93-4636-868B-C19BC1674BE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:checkpoint:provider-1:4.1:sp3:*:*:*:*:*:*",
                     matchCriteriaId: "A645148C-AD0D-46C1-BEE3-10F5C9066279",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:checkpoint:provider-1:4.1:sp4:*:*:*:*:*:*",
                     matchCriteriaId: "0D69187C-7F46-4FF0-A8A0-0E1989EA79BC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:checkpoint:vpn-1:next_generation:*:*:*:*:*:*:*",
                     matchCriteriaId: "C48F4DF4-8091-45D0-9F80-F760500B1202",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:checkpoint:vpn-1:next_generation_fp0:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AE4A7EE-1BA3-46F1-BF4A-A72997EE0992",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:checkpoint:vpn-1:next_generation_fp1:*:*:*:*:*:*:*",
                     matchCriteriaId: "02029D75-FAF2-4842-9246-079C7DE36417",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:checkpoint:vpn-1:vsx_ng_with_application_intelligence:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5EF01C8-1C8A-4BD1-A13B-CE31F09F9523",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:access_registrar:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B8496E0D-2507-4C25-A122-0B846CBCA72A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:application_and_content_networking_software:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8E383F2A-DFCF-47F8-94EE-3563D41EA597",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:css_secure_content_accelerator:1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2D87EF0-056E-4128-89EB-2803ED83DEE9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:css_secure_content_accelerator:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB3163C1-2044-44DA-9C88-076D75FDF1EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:css11000_content_services_switch:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "07E1B690-C58B-4C08-A757-F3DF451FDAAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:okena_stormwatch:3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "31F0E14C-7681-4D1A-B982-A51E450B93A7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:pix_firewall:6.2.2_.111:*:*:*:*:*:*:*",
                     matchCriteriaId: "ECBC761F-A8F5-4CD8-B19C-5CE8FFC58FDD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:threat_response:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CF39E8B-C201-4940-81C9-14AF4C3DD4B5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:webns:6.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC604680-2E9E-4DC4-ACDD-74D552A45BA4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:webns:6.10_b4:*:*:*:*:*:*:*",
                     matchCriteriaId: "37A94436-D092-4C7E-B87B-63BC621EE82E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:webns:7.1_0.1.02:*:*:*:*:*:*:*",
                     matchCriteriaId: "862165CF-3CFB-4C6E-8238-86FA85F243C8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:webns:7.1_0.2.06:*:*:*:*:*:*:*",
                     matchCriteriaId: "056F3336-BAA8-4A03-90B4-7B31710FC1B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:webns:7.2_0.0.03:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FDC2510-FBB9-429A-B6D4-10AB11F93960",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:webns:7.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D45127E-A544-40A0-9D34-BD70D95C9772",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:webns:7.10_.0.06s:*:*:*:*:*:*:*",
                     matchCriteriaId: "56C69C3E-C895-45C8-8182-7BB412A0C828",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:dell:bsafe_ssl-j:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1FDD507-C38B-4C38-A54F-3DA6F07AD0B5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:dell:bsafe_ssl-j:3.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F2B7AC2-CF08-4AC9-9A71-3A8130F9F9AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:dell:bsafe_ssl-j:3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4D9564B-B92E-4C97-87FF-B56D62DCA775",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:hp:wbem:a.01.05.08:*:*:*:*:*:*:*",
                     matchCriteriaId: "B931D4F8-23F5-4ABA-A457-959995D30C58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:hp:wbem:a.02.00.00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE6A023E-9C2A-487F-B5CE-674C766BFE75",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:hp:wbem:a.02.00.01:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A15ACA2-D500-4260-B51A-6FE6AB5A45A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A045971-8756-47E8-9044-C39D08B36F1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "CAA95881-7231-4FDA-AF73-04DF9FF0B64C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "62B7F6AD-EDBD-4B09-BDB2-795ED114F2AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "F045AB7B-1551-46E5-A5CC-BF13C1BB49F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "44E85930-3AAD-420B-8E3E-AEC57344F6C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "52FD4485-BCA2-485A-A0CF-F8152C9DBFA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CF53BE4-FE2D-4D63-BD0F-A423D0FE3BE3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.2_rc1:*:*:*:*:*:*:*",
                     matchCriteriaId: "00993464-BE09-4691-B3F0-51BBA9FB80C3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.2_rc2:*:*:*:*:*:*:*",
                     matchCriteriaId: "896AB39E-2078-4BA2-9522-477BD5F98FD1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB9279EC-47CF-45F1-B4CC-B2B332E82E34",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7300C3E-8105-4C23-89B9-7D29CED18C15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3_rc1:*:*:*:*:*:*:*",
                     matchCriteriaId: "90C59DB2-48DA-4172-A1F5-25CF3B5097AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3_rc2:*:*:*:*:*:*:*",
                     matchCriteriaId: "715F4E0B-7E4B-4520-A987-9B3ED3136B75",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3_rc3:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CA1F606-C558-40FD-9300-6E2796F47BA8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:neoteris:instant_virtual_extranet:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A037FAA6-6D26-4496-BC67-03475B4D1155",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:neoteris:instant_virtual_extranet:3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "D3831DD3-E783-4200-8986-FDBF7DD9BA53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:neoteris:instant_virtual_extranet:3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "2909C9D5-3D8F-4C41-B0E7-A0C0B432C19A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:neoteris:instant_virtual_extranet:3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "E09436DF-E3C1-4C03-A3BE-73C4BC84BB7B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:neoteris:instant_virtual_extranet:3.3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "699764B6-0F86-4AB0-86A3-4F2E69AD820C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:novell:edirectory:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7562ADC4-0D01-4FC2-98F0-1F4041BDA52E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:novell:edirectory:8.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6FAB588-BDBE-4A04-AB9E-4F700A3951F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:novell:edirectory:8.5.12a:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1B83F84-D1EF-43B4-8620-3C1BCCE44553",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:novell:edirectory:8.5.27:*:*:*:*:*:*:*",
                     matchCriteriaId: "41169D2F-4F16-466A-82E9-AD0735472B5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:novell:edirectory:8.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "947699C3-D9DE-411A-99C0-44ADD1D2223A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:novell:edirectory:8.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "15F668C0-8420-4401-AB0F-479575596CF0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:novell:edirectory:8.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDDCC7B6-34CA-4551-9833-306B93E517BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:novell:edirectory:8.7.1:sp1:*:*:*:*:*:*",
                     matchCriteriaId: "6D69C160-39F7-48B8-B9A3-CC86690453C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:novell:imanager:1.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "166BF638-ABDC-4BB9-BD4E-2B22681AD9CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:novell:imanager:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FA6420B-9F6A-48F4-A445-12B60A320347",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*",
                     matchCriteriaId: "0FCA45CE-4127-47AD-BBA8-8A6DD83AE1C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA1CA40-7DB5-4DCA-97A8-9A8CF4FECECC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*",
                     matchCriteriaId: "180D07AE-C571-4DD6-837C-43E2A946007A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA3E4D2A-6488-4F8B-A3CA-4161A10FA4DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*",
                     matchCriteriaId: "90789533-C741-4B1C-A24B-2C77B9E4DE5F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*",
                     matchCriteriaId: "1520065B-46D7-48A4-B9D0-5B49F690C5B4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B76FE2D-FBE0-4A3B-A0EA-179332D74F0E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*",
                     matchCriteriaId: "2AA526B9-726A-49D5-B3CA-EBE2DA303CA0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*",
                     matchCriteriaId: "494E48E7-EF86-4860-9A53-94F6C313746E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "45A518E8-21BE-4C5C-B425-410AB1208E9C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "9E3AB748-E463-445C-ABAB-4FEDDFD1878B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "660E4B8D-AABA-4520-BC4D-CF8E76E07C05",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.7:beta3:*:*:*:*:*:*",
                     matchCriteriaId: "85BFEED5-4941-41BB-93D1-CD5C2A41290E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*",
                     matchCriteriaId: "78E79A05-64F3-4397-952C-A5BB950C967D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F7C9E77-1EB2-4720-A8FD-23DC1C877D5A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*",
                     matchCriteriaId: "549BB01D-F322-4FE3-BDA2-4FEA8ED8568A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:openssl:0.9.6-15:*:i386:*:*:*:*:*",
                     matchCriteriaId: "09F3FB7B-0F68-49F3-A3B7-977A687A42E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:openssl:0.9.6b-3:*:i386:*:*:*:*:*",
                     matchCriteriaId: "088F2FF7-96E5-455E-A35B-D99F9854EC6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386:*:*:*:*:*",
                     matchCriteriaId: "FFA721BF-1B2E-479F-BF25-02D441BF175B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386_dev:*:*:*:*:*",
                     matchCriteriaId: "AFEDCE49-21CC-4168-818F-4C638EE3B077",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386_perl:*:*:*:*:*",
                     matchCriteriaId: "B7D18F9B-C0BE-4DE8-81F4-5BF56C00BF41",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sgi:propack:2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "26430687-409B-448F-934B-06AB937DDF63",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sgi:propack:2.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "0702A32E-E577-403C-B4D9-15037D7100A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "29DC217F-C257-4A3C-9CBD-08010C30BEC3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:servercluster:2.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F0F78F4-E81E-4C6B-AB73-D6AAE191060E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:servercluster:2.5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF1A5808-6D5D-48AD-9470-5A6510D17913",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonebeat_fullcluster:1_2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1E8990D-D9A0-4A71-9D87-EC047E01B0D8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonebeat_fullcluster:1_3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DBCC172-6867-4DFD-AAEF-9BDB4DA21F46",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonebeat_fullcluster:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C2F2BEEA-46BB-4718-B0F3-B4EC62B678A6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonebeat_fullcluster:2.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D09E11C-C5BB-409E-BB0D-7F351250419B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonebeat_fullcluster:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B06A05D-AA31-441D-9FC2-3558648C3B7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonebeat_securitycluster:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0886901-6F93-44C1-B774-84D7E5D9554C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonebeat_securitycluster:2.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F203A80-7C1E-4A04-8E99-63525E176753",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonebeat_webcluster:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA0A204C-158B-4014-A53C-75E0CD63E0DE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonebeat_webcluster:2.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "085BA581-7DA5-4FA4-A888-351281FD0A7D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonegate:1.5.17:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA1C4B3C-5701-4233-BA94-28915713F9C8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonegate:1.5.18:*:*:*:*:*:*:*",
                     matchCriteriaId: "28D9F8D7-698A-486A-918A-7DB5CAFBB3CB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonegate:1.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "D125C2A0-A4B5-48D6-A38A-54755C3FDF4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonegate:1.6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F85F672-0F21-4AD7-8620-13D82F2ECC22",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonegate:1.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "89070041-613A-4F7B-BD6A-C6091D21FC52",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonegate:1.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9A71933-4BD5-4B11-8B14-D997E75F29CD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonegate:1.7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B6BE11D-FC02-4950-A554-08CC9D8B1853",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonegate:2.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A53FD0E1-9BAA-43F0-BCC9-0BE8D4356F55",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonegate:2.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "B80ADAE8-94D4-46A4-A5ED-FF134D808B52",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonegate:2.0.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "69FA0221-5073-4D45-950F-119497B53FED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonegate:2.0.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4AE5B43-7C90-4C2A-A215-30F5EC5841C9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonegate:2.0.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CC1A110-B203-4962-8E1A-74BD98121AF6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonegate:2.0.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5A92C4D-B024-4D39-9479-409C39586F64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonegate:2.0.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7E0C4F5-CF02-4FF6-AE9B-5B6B70D5C067",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonegate:2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E8998CC-E372-46D0-8339-47DC8D92D253",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonegate:2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF131FDC-BF8D-4A17-99F0-444EB900E83D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonegate:2.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "880811B3-E78E-456E-972E-DE733F368576",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonegate:2.2.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "22411F18-2B93-405A-A3B5-2CF0A04977C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonegate_vpn_client:1.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "C71188B7-E6DC-41E5-B619-367341113501",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonegate_vpn_client:1.7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "07491444-0196-4504-A971-A5E388B86BBA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonegate_vpn_client:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "72BC6CD2-3291-4E69-8DC6-F3AB853F8931",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonegate_vpn_client:2.0.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD43EDDF-58A7-4705-B8C7-FD76C35A437D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonegate_vpn_client:2.0.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7C2E603-568F-40F6-9A7C-439E2A51B37F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:stonesoft:stonegate_vpn_client:2.0.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "703421A7-E8C5-450B-97EF-FD9D99D4B834",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:tarantella:tarantella_enterprise:3.20:*:*:*:*:*:*:*",
                     matchCriteriaId: "9519BCB2-B401-44CE-97F6-847BB36AE45F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:tarantella:tarantella_enterprise:3.30:*:*:*:*:*:*:*",
                     matchCriteriaId: "BBE573E8-DD94-4293-99AE-27B9067B3ED9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:tarantella:tarantella_enterprise:3.40:*:*:*:*:*:*:*",
                     matchCriteriaId: "D14413DA-5199-4282-9E22-D347E9D8E469",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:gsx_server:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "05CC5F49-0E9E-45D8-827D-A5940566DB25",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:gsx_server:2.0.1_build_2129:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D94EE19-6CE9-4E02-8174-D9954CDBF02B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:gsx_server:2.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4E4BEE3-AE7B-4481-B724-2E644E18ACC3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:gsx_server:2.5.1_build_5336:*:*:*:*:*:*:*",
                     matchCriteriaId: "EAAB7052-E0B6-472E-920B-A0F0AEA25D6A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:gsx_server:3.0_build_7592:*:*:*:*:*:*:*",
                     matchCriteriaId: "8CE38F15-BD42-4171-8670-86AA8169A60C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:s8300:r2.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "20C0BD87-CE4B-49D2-89BE-EF282C43AD72",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:s8300:r2.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "C3E6C4A8-59F4-43EE-8413-E95289037598",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:s8500:r2.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE76357A-27E6-4D85-9AA0-1BB658C41568",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:s8500:r2.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "C56C5FDB-24E2-479D-87CA-164CD28567D3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:s8700:r2.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "AEF6C16F-8EDF-4A24-BFEF-6A304D654EEB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:s8700:r2.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "D982AE39-BB57-49E7-B5FE-5EF1ADE2F019",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:bluecoat:proxysg:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B6CFEC9-0F8F-4CD4-ABD1-E6533F910F7F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:call_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "12DE5E22-DF93-46BE-85A3-D4E04379E901",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:content_services_switch_11500:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF28C435-C036-4507-8E3F-44E722F9974A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:gss_4480_global_site_selector:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDA957E2-ABF9-49B2-874F-3FC3060CE0B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:gss_4490_global_site_selector:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F2CDFE7-6853-4A31-85C0-50C57A8D606A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:mds_9000:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F2ED90B-DDBA-49DE-AC78-20E7D77C8858",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:secure_content_accelerator:10000:*:*:*:*:*:*:*",
                     matchCriteriaId: "408A9DB0-81EF-4186-B338-44954E67289B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:securecomputing:sidewinder:5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B0C5F92-7E93-4C3F-B22B-E6612A4D3E10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:securecomputing:sidewinder:5.2.0.01:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D0DC4B4-9AD9-4AC8-BFA7-A3D209B5D089",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:securecomputing:sidewinder:5.2.0.02:*:*:*:*:*:*:*",
                     matchCriteriaId: "303362A5-9C3C-4C85-8C97-2AB12CE01BF6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:securecomputing:sidewinder:5.2.0.03:*:*:*:*:*:*:*",
                     matchCriteriaId: "FED22DC1-E06B-4511-B920-6DAB792262D8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:securecomputing:sidewinder:5.2.0.04:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CE44CA7-4BC7-4C2B-948F-2ACABB91528B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:securecomputing:sidewinder:5.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "F757B2A7-869F-4702-81EB-466317A79D61",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:securecomputing:sidewinder:5.2.1.02:*:*:*:*:*:*:*",
                     matchCriteriaId: "01F6E9A9-6C85-48DA-BC61-55F8EACCB59F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:sun:crypto_accelerator_4000:1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "64AF1E33-4086-43E2-8F54-DA75A99D4B75",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:bluecoat:cacheos_ca_sa:4.1.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "53D16F03-A4C7-4497-AB74-499F208FF059",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:bluecoat:cacheos_ca_sa:4.1.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "13A33EC1-836B-4C8C-AC18-B5BD4F90E612",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "58BE9C02-2A01-4F6F-A6BD-BC0173561E9B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "C558CED8-8342-46CB-9F52-580B626D320E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "0F85D19E-6C26-429D-B876-F34238B9DAAF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "FEC7CCF7-CBC6-4EDC-8EDD-884DFFFBCC7D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(4\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "E5011A33-CD6D-4EFC-ACFD-E51C9AE726A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(4.101\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "09063867-0E64-4630-B35B-4CCA348E4DAB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "78F98CD7-A352-483C-9968-8FB2627A7CBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "F97FE485-705F-4707-B6C6-0EF9E8A85D5F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "E2B925E8-D2C2-4E8C-AC21-0C422245C482",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "B9170562-872E-4C32-869C-B10FF35A925E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(4\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "D0927A68-8BB2-4F03-8396-E9CACC158FC0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(5\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "559DDBA3-2AF4-4A0C-B219-6779BA931F21",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED9D142A-DDC8-4BD6-8C22-F242C9C0B1ED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "5226C9CC-6933-4F10-B426-B47782C606FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "757DAE9A-B25D-4B8A-A41B-66C2897B537E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "5E3DC170-E279-4725-B9EE-6840B5685CC9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(3.100\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "8091EDA9-BD18-47F7-8CEC-E086238647C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F867890-74A4-4892-B99A-27DB4603B873",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.3\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "CE05B514-F094-4632-B25B-973F976F6409",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.3\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "3392428D-1A85-4472-A276-C482A78E2CE1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.3\\(3.102\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "40954985-16E6-4F37-B014-6A55166AE093",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.3\\(3.109\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "0C097809-1FEF-4417-A201-42291CC29122",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool.",
      },
      {
         lang: "es",
         value: "OpenSSL 0.9.6 anteriores a la 0.9.6d no manejan adecuadamente los tipos de mensajes desconocidos, lo que permite a atacantes remotos causar una denegación de servicios (por bucle infinito), como se demuestra utilizando la herramienta de testeo Codenomicon TLS.",
      },
   ],
   id: "CVE-2004-0081",
   lastModified: "2024-11-20T23:47:43.390",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2004-11-23T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt",
      },
      {
         source: "cve@mitre.org",
         url: "ftp://patches.sgi.com/support/free/security/advisories/20040304-01-U.asc",
      },
      {
         source: "cve@mitre.org",
         url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834",
      },
      {
         source: "cve@mitre.org",
         url: "http://fedoranews.org/updates/FEDORA-2004-095.shtml",
      },
      {
         source: "cve@mitre.org",
         url: "http://marc.info/?l=bugtraq&m=107955049331965&w=2",
      },
      {
         source: "cve@mitre.org",
         url: "http://marc.info/?l=bugtraq&m=108403850228012&w=2",
      },
      {
         source: "cve@mitre.org",
         url: "http://rhn.redhat.com/errata/RHSA-2004-119.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/11139",
      },
      {
         source: "cve@mitre.org",
         url: "http://security.gentoo.org/glsa/glsa-200403-03.xml",
      },
      {
         source: "cve@mitre.org",
         url: "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2004/dsa-465",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/465542",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.linuxsecurity.com/advisories/engarde_advisory-4135.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2004-120.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2004-121.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2004-139.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/9899",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.trustix.org/errata/2004/0012",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.uniras.gov.uk/vuls/2004/224012/index.htm",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "US Government Resource",
         ],
         url: "http://www.us-cert.gov/cas/techalerts/TA04-078A.html",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/15509",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11755",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A871",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A902",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "ftp://patches.sgi.com/support/free/security/advisories/20040304-01-U.asc",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://fedoranews.org/updates/FEDORA-2004-095.shtml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=107955049331965&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=108403850228012&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2004-119.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/11139",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://security.gentoo.org/glsa/glsa-200403-03.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2004/dsa-465",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/465542",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.linuxsecurity.com/advisories/engarde_advisory-4135.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2004-120.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2004-121.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2004-139.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/9899",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.trustix.org/errata/2004/0012",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.uniras.gov.uk/vuls/2004/224012/index.htm",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "US Government Resource",
         ],
         url: "http://www.us-cert.gov/cas/techalerts/TA04-078A.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/15509",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11755",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A871",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A902",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2005-08-23 04:00
Modified
2024-11-21 00:00
Severity ?
Summary
Behavioral discrepancy information leak in Juniper Netscreen VPN running ScreenOS 5.2.0 and earlier, when using IKE with pre-shared key authentication, allows remote attackers to enumerate valid usernames via an IKE Aggressive Mode packet, which generates a response if the username is valid but does not respond when the username is invalid.
Impacted products
Vendor Product Version
neoteris instant_virtual_extranet 3.0
neoteris instant_virtual_extranet 3.1
neoteris instant_virtual_extranet 3.2
neoteris instant_virtual_extranet 3.3
neoteris instant_virtual_extranet 3.3.1
juniper netscreen_screenos 1.7
juniper netscreen_screenos 1.64
juniper netscreen_screenos 1.66
juniper netscreen_screenos 1.66_r2
juniper netscreen_screenos 1.73_r1
juniper netscreen_screenos 1.73_r2
juniper netscreen_screenos 2.0.1_r8
juniper netscreen_screenos 2.1
juniper netscreen_screenos 2.1_r6
juniper netscreen_screenos 2.1_r7
juniper netscreen_screenos 2.5
juniper netscreen_screenos 2.5r1
juniper netscreen_screenos 2.5r2
juniper netscreen_screenos 2.5r6
juniper netscreen_screenos 2.6.0
juniper netscreen_screenos 2.6.1
juniper netscreen_screenos 2.6.1r1
juniper netscreen_screenos 2.6.1r2
juniper netscreen_screenos 2.6.1r3
juniper netscreen_screenos 2.6.1r4
juniper netscreen_screenos 2.6.1r5
juniper netscreen_screenos 2.6.1r6
juniper netscreen_screenos 2.6.1r7
juniper netscreen_screenos 2.6.1r8
juniper netscreen_screenos 2.6.1r9
juniper netscreen_screenos 2.6.1r10
juniper netscreen_screenos 2.6.1r11
juniper netscreen_screenos 2.6.1r12
juniper netscreen_screenos 2.7.1
juniper netscreen_screenos 2.7.1r1
juniper netscreen_screenos 2.7.1r2
juniper netscreen_screenos 2.7.1r3
juniper netscreen_screenos 2.8
juniper netscreen_screenos 2.8_r1
juniper netscreen_screenos 2.10_r3
juniper netscreen_screenos 2.10_r4
juniper netscreen_screenos 3.0.0
juniper netscreen_screenos 3.0.0r1
juniper netscreen_screenos 3.0.0r2
juniper netscreen_screenos 3.0.0r3
juniper netscreen_screenos 3.0.0r4
juniper netscreen_screenos 3.0.1
juniper netscreen_screenos 3.0.1r1
juniper netscreen_screenos 3.0.1r2
juniper netscreen_screenos 3.0.1r3
juniper netscreen_screenos 3.0.1r4
juniper netscreen_screenos 3.0.1r5
juniper netscreen_screenos 3.0.1r6
juniper netscreen_screenos 3.0.1r7
juniper netscreen_screenos 3.0.2
juniper netscreen_screenos 3.0.3
juniper netscreen_screenos 3.0.3_r1.1
juniper netscreen_screenos 3.0.3r1
juniper netscreen_screenos 3.0.3r2
juniper netscreen_screenos 3.0.3r3
juniper netscreen_screenos 3.0.3r4
juniper netscreen_screenos 3.0.3r5
juniper netscreen_screenos 3.0.3r6
juniper netscreen_screenos 3.0.3r7
juniper netscreen_screenos 3.0.3r8
juniper netscreen_screenos 3.1.0
juniper netscreen_screenos 3.1.0r1
juniper netscreen_screenos 3.1.0r2
juniper netscreen_screenos 3.1.0r3
juniper netscreen_screenos 3.1.0r4
juniper netscreen_screenos 3.1.0r5
juniper netscreen_screenos 3.1.0r6
juniper netscreen_screenos 3.1.0r7
juniper netscreen_screenos 3.1.0r8
juniper netscreen_screenos 3.1.0r9
juniper netscreen_screenos 3.1.0r10
juniper netscreen_screenos 3.1.0r11
juniper netscreen_screenos 3.1.0r12
juniper netscreen_screenos 3.1.1_r2
juniper netscreen_screenos 4.0.0
juniper netscreen_screenos 4.0.0
juniper netscreen_screenos 4.0.0r1
juniper netscreen_screenos 4.0.0r2
juniper netscreen_screenos 4.0.0r3
juniper netscreen_screenos 4.0.0r4
juniper netscreen_screenos 4.0.0r5
juniper netscreen_screenos 4.0.0r6
juniper netscreen_screenos 4.0.0r7
juniper netscreen_screenos 4.0.0r8
juniper netscreen_screenos 4.0.0r9
juniper netscreen_screenos 4.0.0r10
juniper netscreen_screenos 4.0.0r11
juniper netscreen_screenos 4.0.0r12
juniper netscreen_screenos 4.0.1
juniper netscreen_screenos 4.0.1r1
juniper netscreen_screenos 4.0.1r2
juniper netscreen_screenos 4.0.1r3
juniper netscreen_screenos 4.0.1r4
juniper netscreen_screenos 4.0.1r5
juniper netscreen_screenos 4.0.1r6
juniper netscreen_screenos 4.0.1r7
juniper netscreen_screenos 4.0.1r8
juniper netscreen_screenos 4.0.1r9
juniper netscreen_screenos 4.0.1r10
juniper netscreen_screenos 4.0.2
juniper netscreen_screenos 4.0.3
juniper netscreen_screenos 4.0.3r1
juniper netscreen_screenos 4.0.3r2
juniper netscreen_screenos 4.0.3r3
juniper netscreen_screenos 4.0.3r4
juniper netscreen_screenos 5.0.0
juniper netscreen_screenos 5.1.0
juniper netscreen_screenos 5.1.0r3a
juniper netscreen_screenos 5.2.0
netscreen ns-10 *
netscreen ns-100 3.0_.pe1.0
netscreen ns-204 5.0.0_r6.0
netscreen ns-204 0110.0_11_4.0_r10.0
netscreen ns-204 0110.0_11_5.1.0_r3a
netscreen ns-500 4110.0_11_4.0_r10.0
netscreen ns-500 4110.0_11_5.1.0_r3a
netscreen ns-50ns25 5.0.0_r6.0
juniper netscreen-5gt 5.0
juniper netscreen-idp 3.0
juniper netscreen-idp 3.0r1
juniper netscreen-idp 3.0r2
juniper netscreen-idp_10 3.0.1_r1
juniper netscreen-idp_100 3.0.1_r1
juniper netscreen-idp_1000 3.0.1_r1
juniper netscreen-idp_500 3.0.1_r1
netscreen netscreen-sa_5000_series *
netscreen netscreen-sa_5020_series 4.2_r2.2
netscreen netscreen-sa_5050_series 4.2_r2.2



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:neoteris:instant_virtual_extranet:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A037FAA6-6D26-4496-BC67-03475B4D1155",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:neoteris:instant_virtual_extranet:3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "D3831DD3-E783-4200-8986-FDBF7DD9BA53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:neoteris:instant_virtual_extranet:3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "2909C9D5-3D8F-4C41-B0E7-A0C0B432C19A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:neoteris:instant_virtual_extranet:3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "E09436DF-E3C1-4C03-A3BE-73C4BC84BB7B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:neoteris:instant_virtual_extranet:3.3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "699764B6-0F86-4AB0-86A3-4F2E69AD820C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:1.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "24BB54A7-24D0-409E-8924-D212543E4AAE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:1.64:*:*:*:*:*:*:*",
                     matchCriteriaId: "74187E80-0EDA-4FE7-A113-FCB723AF08B8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:1.66:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D6691BE-2591-495A-BB72-2DA9956944A0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:1.66_r2:*:*:*:*:*:*:*",
                     matchCriteriaId: "CAB79FD3-29CB-4694-9A67-C6AF2EADA89D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:1.73_r1:*:*:*:*:*:*:*",
                     matchCriteriaId: "92455F85-9BFA-4684-9A6D-0E52AFA7161B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:1.73_r2:*:*:*:*:*:*:*",
                     matchCriteriaId: "1173EA59-AEAE-49E6-B6DD-775B28C678D7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:2.0.1_r8:*:*:*:*:*:*:*",
                     matchCriteriaId: "6711CD61-E16E-41B8-8948-592171D73B5A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "CAD0131A-D07C-4B23-8CEC-E7CF659DB55E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:2.1_r6:*:*:*:*:*:*:*",
                     matchCriteriaId: "2837DDC0-9F2C-4782-AA1E-5315AB12528F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:2.1_r7:*:*:*:*:*:*:*",
                     matchCriteriaId: "07B065C9-93C6-43EB-ADD1-532FC6FBEA87",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:2.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D38841C-DF2D-41D8-BD15-EBBB9E9D83E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:2.5r1:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDDBDBE1-E16B-4F03-9072-8B28E9467FED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:2.5r2:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E099835-7C70-44F1-9E2B-07AF5B3C0577",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:2.5r6:*:*:*:*:*:*:*",
                     matchCriteriaId: "D10CDE09-1896-4E99-B2A0-93F89164225A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:2.6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F3159CA4-0944-4419-9B60-E93269710377",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:2.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F43896A-2EF6-4069-8B81-815E4C232C0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r1:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A7DFAB9-4D4D-4179-9DC4-F654D6E2DAB7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r2:*:*:*:*:*:*:*",
                     matchCriteriaId: "26EC0CE2-5A5C-44ED-A423-CC20B7FFE22F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r3:*:*:*:*:*:*:*",
                     matchCriteriaId: "E2BD48EE-C23B-412C-895D-F58CD81FC673",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r4:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7A6CA51-F121-44F7-80D1-CF38261D299C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r5:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5064E9A-677E-418E-91A7-2DB686B662DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r6:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB00325B-29C6-41DA-9274-C9B4C54BC53E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r7:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DF67517-638C-4D57-8402-F336A74C4BB8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r8:*:*:*:*:*:*:*",
                     matchCriteriaId: "07AC301B-0487-4FDB-B1F8-B225099B96FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r9:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7CE0BC3-6B59-4EAB-A2BD-CF73B3BD415F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r10:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9B65997-2AB7-42D1-A1D9-E999A33366CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r11:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB3F1262-141B-48E0-8EAC-97B043EBD9FC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r12:*:*:*:*:*:*:*",
                     matchCriteriaId: "214DA9E7-E8E5-4579-86E8-A5A8BC887860",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:2.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CE7F646-B716-47D7-84E8-CA875A85C983",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:2.7.1r1:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA96638D-AD5F-4EFD-983B-181DCCF3EAE0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:2.7.1r2:*:*:*:*:*:*:*",
                     matchCriteriaId: "2E30F9B6-24EB-44FB-9E73-5DD480A48CB7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:2.7.1r3:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1648D07-823B-4BF9-87EC-DB34797B5B5C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:2.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D06FC50-39AE-4988-8C96-38A991CD7F97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:2.8_r1:*:*:*:*:*:*:*",
                     matchCriteriaId: "B33B8346-B753-443F-BB24-74FF6C55340B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:2.10_r3:*:*:*:*:*:*:*",
                     matchCriteriaId: "47DE8E73-0F1B-42E4-9BD6-7F5066D7330B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:2.10_r4:*:*:*:*:*:*:*",
                     matchCriteriaId: "057B0387-44C0-45BE-9D91-D5A01C9D8020",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:3.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "28EB52A7-E8EC-46AA-A3F5-81BFA01666D7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:3.0.0r1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A25881AB-69D0-46E5-A502-C65933A457B4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:3.0.0r2:*:*:*:*:*:*:*",
                     matchCriteriaId: "B14314AE-812D-4654-B6CE-43917A1F0542",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:3.0.0r3:*:*:*:*:*:*:*",
                     matchCriteriaId: "20F7E636-40E0-45CC-A39E-C8BDF9CFBE6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:3.0.0r4:*:*:*:*:*:*:*",
                     matchCriteriaId: "463EC9BA-B241-45D6-AB89-53EB8156E40F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:3.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "179C18B1-3731-4DBC-A942-D810671401BF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r1:*:*:*:*:*:*:*",
                     matchCriteriaId: "D53868A9-67B6-40AD-B4F0-6911F1D2FC6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r2:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA52D22-A0D6-413A-9F49-0452356D2BE8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r3:*:*:*:*:*:*:*",
                     matchCriteriaId: "02BF2DCD-4F61-4FA2-B82B-FB9DEB33054F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r4:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C844B2C-26BB-460D-A36E-B74F45169F46",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r5:*:*:*:*:*:*:*",
                     matchCriteriaId: "93F618F5-E695-41BA-BFDB-E63A9A422F74",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r6:*:*:*:*:*:*:*",
                     matchCriteriaId: "31811D82-B28F-49CD-8C86-A4DE7CD95F31",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r7:*:*:*:*:*:*:*",
                     matchCriteriaId: "56D1957D-9F30-4D66-BA14-8015E260C076",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:3.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9FCB548-2488-4EBC-AA21-4A57F5F87E41",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:3.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A4C0FC0-AB52-498B-84AE-DF2C380B079D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:3.0.3_r1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "05578911-51E3-447B-98B6-083D3F35E8F1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r1:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D71F4A5-7380-4E0E-9B81-7CCBECA3EFF0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r2:*:*:*:*:*:*:*",
                     matchCriteriaId: "981D2274-9686-4F6F-83B1-F4D0DA909983",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r3:*:*:*:*:*:*:*",
                     matchCriteriaId: "A5CD9C77-891A-4E0D-9D5D-214466699044",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r4:*:*:*:*:*:*:*",
                     matchCriteriaId: "F27C7E28-915C-4ECC-A9BC-779F70905614",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r5:*:*:*:*:*:*:*",
                     matchCriteriaId: "47206DFC-7840-4CB8-8ED4-2212C287B4DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r6:*:*:*:*:*:*:*",
                     matchCriteriaId: "A46904E1-F2E5-45BA-8945-4FB3EF34D299",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r7:*:*:*:*:*:*:*",
                     matchCriteriaId: "45551432-C02B-426D-89DC-16573A7C8CD0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r8:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBCFE4A9-9018-4F21-8BB4-D12AD0C33690",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:3.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "5BFC9DEB-00D5-4FC9-A608-1F7364FF21F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r1:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDBA6417-9C4C-41D9-91C7-96C255EB2298",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r2:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7C65E89-186B-4D14-8A40-58B780731DF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r3:*:*:*:*:*:*:*",
                     matchCriteriaId: "26637853-7036-434E-A9AC-AAC88D84D826",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r4:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A890FC9-CF8B-413A-A580-2F59A42D1744",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r5:*:*:*:*:*:*:*",
                     matchCriteriaId: "F555CCA2-95D0-4D11-A182-5A00A03403D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r6:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4B50AC2-39DE-4446-A9ED-0627C4A9DC21",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r7:*:*:*:*:*:*:*",
                     matchCriteriaId: "F01ED64F-5617-412D-807D-7FAF0E45172F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r8:*:*:*:*:*:*:*",
                     matchCriteriaId: "50B215E3-FDB1-43C6-9A7E-A98F381CB311",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r9:*:*:*:*:*:*:*",
                     matchCriteriaId: "058331CE-8DCF-4B8D-83F5-F23D935D9931",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r10:*:*:*:*:*:*:*",
                     matchCriteriaId: "98D3D6B3-7BB7-40AC-8FB3-F8362DA36047",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r11:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C2E0233-3161-4B45-9EB2-D46BE76E1520",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r12:*:*:*:*:*:*:*",
                     matchCriteriaId: "12B61290-20EC-4D3C-A7BF-85545F5BA5BC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:3.1.1_r2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A85A76EC-8F86-47A6-A85A-8B4216C99142",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:4.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "26958BB3-1484-42EC-AC3A-33A748B377F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:4.0.0:*:dial:*:*:*:*:*",
                     matchCriteriaId: "6AB0B6EE-BEDE-46AD-859E-9601297B0217",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9E29D5B-872A-4CD5-9A44-EBFA5A7C7554",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r2:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE3851B7-72BC-4DDF-A718-69068128CA15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r3:*:*:*:*:*:*:*",
                     matchCriteriaId: "19A6D877-DF7D-4E9B-8855-2ACF97C5FC29",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r4:*:*:*:*:*:*:*",
                     matchCriteriaId: "54FBDD05-CAA6-4034-8C2D-94E965BE2132",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r5:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BD1CFF3-3211-43E2-858C-37142EE54490",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r6:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BC0306C-FDDD-4B5F-B371-17CA2231C63A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r7:*:*:*:*:*:*:*",
                     matchCriteriaId: "63E607F4-E348-4385-9C2C-558BB0402585",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r8:*:*:*:*:*:*:*",
                     matchCriteriaId: "35CA445F-428A-4EDB-A18A-5E626D0E04BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r9:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E8885D9-20A0-443D-9650-912F360C9B14",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r10:*:*:*:*:*:*:*",
                     matchCriteriaId: "4FD70CC4-334A-4734-97DE-C31A6C2014AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r11:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC456F90-05EB-4C88-9650-ED71A35A80C5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r12:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAEA92AE-A047-4A20-A209-B9CAC646BFC2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:4.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "78FF0914-F907-41F4-9F2D-6ECD601C73C1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r1:*:*:*:*:*:*:*",
                     matchCriteriaId: "48518416-3F00-4174-A0EF-57E5A614F8A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r2:*:*:*:*:*:*:*",
                     matchCriteriaId: "ACCD6F2D-642E-407E-A16D-73B97F709431",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r3:*:*:*:*:*:*:*",
                     matchCriteriaId: "438438F8-C7C3-427A-B7AA-1E7F8DA5C014",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r4:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED08E19A-67ED-47F9-B40F-B8CFF496AF7C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r5:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB9021FD-198B-4D7D-BAF3-D83EC3D64EFE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r6:*:*:*:*:*:*:*",
                     matchCriteriaId: "01E861C0-AF82-4F7C-A515-005083D7D699",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r7:*:*:*:*:*:*:*",
                     matchCriteriaId: "38B7AEE2-BAA4-4FDA-A627-F5A7370D2C5E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r8:*:*:*:*:*:*:*",
                     matchCriteriaId: "3BCB5149-8C43-42A2-A9B2-541802FBE5B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r9:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C3A3552-2D77-494E-902E-9529AA2074D3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r10:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD90D085-60F7-4B3F-8C82-B9F362EFFB89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:4.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "627A41F5-BE3C-41AD-B455-0D73BE5CA010",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:4.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D41144E-9F64-4919-87DA-09092AA2030A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r1:*:*:*:*:*:*:*",
                     matchCriteriaId: "F85BBA70-D185-4A84-8D66-2D3ACE336C6F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r2:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0F6E761-1941-4B9F-98DC-1EED40B851A1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r3:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A3720A8-B042-4366-A4F2-2262CDD0CAF9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r4:*:*:*:*:*:*:*",
                     matchCriteriaId: "66AEC6EE-F483-4156-91DB-E939B45D09E8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:5.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "4F4B1021-40CB-4A11-9650-F1BDBD6943D2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:5.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "19172BCC-BFF0-4031-8AFE-B63422731B17",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:5.1.0r3a:*:*:*:*:*:*:*",
                     matchCriteriaId: "3ACCBC8E-7C9E-4C3A-8A0F-BBF4E2F92AD4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:netscreen_screenos:5.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "98471F46-A271-4B0A-89A9-12D544474393",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:netscreen:ns-10:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FDFE9E5-AA71-4D17-886A-E0B493B4B833",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:netscreen:ns-100:3.0_.pe1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "27E6687D-08CF-48AC-8112-555149E57B45",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:netscreen:ns-204:5.0.0_r6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "04797E9E-60CB-40B3-BE23-6051C72A43D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:netscreen:ns-204:0110.0_11_4.0_r10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "871B28F0-C082-4AD1-A4DE-22B3DC00E6BF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:netscreen:ns-204:0110.0_11_5.1.0_r3a:*:*:*:*:*:*:*",
                     matchCriteriaId: "1AEABCBA-45BD-45B0-9343-68178FDCB493",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:netscreen:ns-500:4110.0_11_4.0_r10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0F057D3-1ECB-4804-8C83-9277EFD4C322",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:netscreen:ns-500:4110.0_11_5.1.0_r3a:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D551820-CF22-4F80-A2A6-223D9CE63444",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:netscreen:ns-50ns25:5.0.0_r6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "877DF54F-752E-4FBC-8E00-7F5FD3AE63E0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:netscreen-5gt:5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A482DFA5-4108-4B0F-BD8E-04FEB52D3537",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:netscreen-idp:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B97B63E-CE45-4DF9-9838-D9CE96CECE72",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:netscreen-idp:3.0r1:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE5F6D51-15B0-449D-9418-8C4C7A1E1D7B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:netscreen-idp:3.0r2:*:*:*:*:*:*:*",
                     matchCriteriaId: "C696E607-0927-4087-A437-9C5459EB8BE5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:netscreen-idp_10:3.0.1_r1:*:*:*:*:*:*:*",
                     matchCriteriaId: "142A3E18-3E20-415E-A53C-01E1C8865300",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:netscreen-idp_100:3.0.1_r1:*:*:*:*:*:*:*",
                     matchCriteriaId: "957172A3-6B8A-48E1-911F-28A6F055FB41",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:netscreen-idp_1000:3.0.1_r1:*:*:*:*:*:*:*",
                     matchCriteriaId: "95A9B902-09D4-4A29-9BA7-FD7898B24ECC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:netscreen-idp_500:3.0.1_r1:*:*:*:*:*:*:*",
                     matchCriteriaId: "214A7AFF-B36F-4ABC-8C7D-93B1493ADEB5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:netscreen:netscreen-sa_5000_series:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA34EB36-E5E9-43B6-ABB8-B292BC7B0CBA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:netscreen:netscreen-sa_5020_series:4.2_r2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "56B26742-2B48-4D2A-8AA3-9E86ED482424",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:netscreen:netscreen-sa_5050_series:4.2_r2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B9103D8-B207-4622-AA6C-8D58EB36688E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Behavioral discrepancy information leak in Juniper Netscreen VPN running ScreenOS 5.2.0 and earlier, when using IKE with pre-shared key authentication, allows remote attackers to enumerate valid usernames via an IKE Aggressive Mode packet, which generates a response if the username is valid but does not respond when the username is invalid.",
      },
   ],
   id: "CVE-2005-2640",
   lastModified: "2024-11-21T00:00:02.210",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2005-08-23T04:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://marc.info/?l=bugtraq&m=112438068426034&w=2",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/16474/",
      },
      {
         source: "cve@mitre.org",
         url: "http://securitytracker.com/id?1014728",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Vendor Advisory",
         ],
         url: "http://www.nta-monitor.com/news/vpn-flaws/juniper/netscreen/index.htm",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
         ],
         url: "http://www.securityfocus.com/bid/14595",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=112438068426034&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/16474/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://securitytracker.com/id?1014728",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Vendor Advisory",
         ],
         url: "http://www.nta-monitor.com/news/vpn-flaws/juniper/netscreen/index.htm",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
         ],
         url: "http://www.securityfocus.com/bid/14595",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2005-02-09 05:00
Modified
2024-11-20 23:49
Severity ?
Summary
changepassword.cgi in Neoteris Instant Virtual Extranet (IVE) 3.x and 4.x, with LDAP authentication or NT domain authentication enabled, does not limit the number of times a bad password can be entered, which allows remote attackers to guess passwords via a brute force attack.
Impacted products
Vendor Product Version
neoteris instant_virtual_extranet *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:neoteris:instant_virtual_extranet:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "29713258-2103-4987-97CC-22D2A2A8F08D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "changepassword.cgi in Neoteris Instant Virtual Extranet (IVE) 3.x and 4.x, with LDAP authentication or NT domain authentication enabled, does not limit the number of times a bad password can be entered, which allows remote attackers to guess passwords via a brute force attack.",
      },
   ],
   id: "CVE-2004-0939",
   lastModified: "2024-11-20T23:49:44.033",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2005-02-09T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://marc.info/?l=bugtraq&m=109709990708794&w=2",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/12752",
      },
      {
         source: "cve@mitre.org",
         url: "http://securitytracker.com/id?1011552",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.gosecure.ca/SecInfo/gosecure-2004-10.txt",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.osvdb.org/8365",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17629",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=109709990708794&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/12752",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://securitytracker.com/id?1011552",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.gosecure.ca/SecInfo/gosecure-2004-10.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.osvdb.org/8365",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17629",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}