var-200411-0173
Vulnerability from variot

OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool. This vulnerability was addressed in OpenSSL 0.9.6d and 0.9.7. The vulnerability is OpenSSL Applications and systems that use the library may also be affected. For more detailed information about other systems NISCC-224012 (JVN) , NISCC Advisory 224012 (CPNI Advisory 00389) Please check also.OpenSSL An application that uses the service disrupts service operation (DoS) It may be in a state. For the first issue, a NULL-pointer assignment can be triggered by attackers during SSL/TLS handshake exchanges. The CVE candidate name for this vulnerability is CAN-2004-0079. Versions 0.9.6c to 0.9.6k (inclusive) and from 0.9.7a to 0.9.7c (inclusive) are vulnerable. The second issue is also exploited during the SSL/TLS handshake, but only when Kerberos ciphersuites are in use. The vendor has reported that this vulnerability may not be a threat to many, because it occurs only when Kerberos ciphersuites are in use, an uncommon configuration. The CVE candidate name for this vulnerability is CAN-2004-0112. Versions 0.9.7a, 0.9.7b, and 0.9.7c are affected. This entry will be retired when individual BID records are created for each issue. *Note: A third denial-of-service vulnerability included in the announcement was discovered affecting 0.9.6 and fixed in 0.9.6d. The CVE candidate name for this vulnerability is CAN-2004-0081. Oracle Database Server, Oracle Application Server, Oracle Collaboration Suite, Oracle E-Business and Applications, Oracle Enterprise Manager Grid Control, and Oracle PeopleSoft Applications are reported prone to multiple vulnerabilities. Oracle has released a Critical Patch Update to address these issues in various supported applications and platforms. The issues identified by the vendor affect all security properties of the Oracle products and present local and remote threats. While various levels of authorization are required to leverage some issues, others do not require any authorization. This BID will be divided and updated into separate BIDs when more information is available. An attacker could exploit these vulnerabilities to take complete control of an affected database.

TITLE: Fedora update for openssl096b

SECUNIA ADVISORY ID: SA17381

VERIFY ADVISORY: http://secunia.com/advisories/17381/

CRITICAL: Moderately critical

IMPACT: DoS

WHERE:

From remote

OPERATING SYSTEM: Fedora Core 3 http://secunia.com/product/4222/

DESCRIPTION: Fedora has issued an update for openssl096b. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service).

For more information: SA10133 SA11139

SOLUTION: Apply updated packages.

Fedora Core 3: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/

8d68e4b430aa7c5ca067c12866ae694e SRPMS/openssl096b-0.9.6b-21.42.src.rpm 54a9e78a2fdd625b9dc9121e09eb4398 x86_64/openssl096b-0.9.6b-21.42.x86_64.rpm c5c6174e23eba8d038889d08f49231b8 x86_64/debug/openssl096b-debuginfo-0.9.6b-21.42.x86_64.rpm 56b63fc150d0c099b2e4f0950e21005b x86_64/openssl096b-0.9.6b-21.42.i386.rpm 56b63fc150d0c099b2e4f0950e21005b i386/openssl096b-0.9.6b-21.42.i386.rpm 93195495585c7e9789041c75b1ed5380 i386/debug/openssl096b-debuginfo-0.9.6b-21.42.i386.rpm

OTHER REFERENCES: SA10133: http://secunia.com/advisories/10133/

SA11139: http://secunia.com/advisories/11139/


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-200411-0173",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "propack",
            scope: "eq",
            trust: 2.1,
            vendor: "sgi",
            version: "2.4",
         },
         {
            model: "propack",
            scope: "eq",
            trust: 2.1,
            vendor: "sgi",
            version: "2.3",
         },
         {
            model: "sg5",
            scope: "eq",
            trust: 1.9,
            vendor: "avaya",
            version: "4.4",
         },
         {
            model: "sg5",
            scope: "eq",
            trust: 1.9,
            vendor: "avaya",
            version: "4.3",
         },
         {
            model: "sg5",
            scope: "eq",
            trust: 1.9,
            vendor: "avaya",
            version: "4.2",
         },
         {
            model: "sg208",
            scope: "eq",
            trust: 1.9,
            vendor: "avaya",
            version: "4.4",
         },
         {
            model: "sg203",
            scope: "eq",
            trust: 1.9,
            vendor: "avaya",
            version: "4.31.29",
         },
         {
            model: "sg203",
            scope: "eq",
            trust: 1.9,
            vendor: "avaya",
            version: "4.4",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.8,
            vendor: "openssl",
            version: "0.9.6c",
         },
         {
            model: "gsx server",
            scope: "eq",
            trust: 1.3,
            vendor: "vmware",
            version: "2.5.1",
         },
         {
            model: "gsx server",
            scope: "eq",
            trust: 1.3,
            vendor: "vmware",
            version: "2.0",
         },
         {
            model: "stonegate vpn client",
            scope: "eq",
            trust: 1.3,
            vendor: "stonesoft",
            version: "2.0.9",
         },
         {
            model: "stonegate vpn client",
            scope: "eq",
            trust: 1.3,
            vendor: "stonesoft",
            version: "2.0.8",
         },
         {
            model: "stonegate vpn client",
            scope: "eq",
            trust: 1.3,
            vendor: "stonesoft",
            version: "2.0.7",
         },
         {
            model: "stonegate vpn client",
            scope: "eq",
            trust: 1.3,
            vendor: "stonesoft",
            version: "2.0",
         },
         {
            model: "stonegate vpn client",
            scope: "eq",
            trust: 1.3,
            vendor: "stonesoft",
            version: "1.7.2",
         },
         {
            model: "stonegate vpn client",
            scope: "eq",
            trust: 1.3,
            vendor: "stonesoft",
            version: "1.7",
         },
         {
            model: "stonegate",
            scope: "eq",
            trust: 1.3,
            vendor: "stonesoft",
            version: "2.2.4",
         },
         {
            model: "stonegate",
            scope: "eq",
            trust: 1.3,
            vendor: "stonesoft",
            version: "2.2.1",
         },
         {
            model: "stonegate",
            scope: "eq",
            trust: 1.3,
            vendor: "stonesoft",
            version: "2.2",
         },
         {
            model: "stonegate",
            scope: "eq",
            trust: 1.3,
            vendor: "stonesoft",
            version: "2.1",
         },
         {
            model: "stonegate",
            scope: "eq",
            trust: 1.3,
            vendor: "stonesoft",
            version: "2.0.9",
         },
         {
            model: "stonegate",
            scope: "eq",
            trust: 1.3,
            vendor: "stonesoft",
            version: "2.0.8",
         },
         {
            model: "stonegate",
            scope: "eq",
            trust: 1.3,
            vendor: "stonesoft",
            version: "2.0.7",
         },
         {
            model: "stonegate",
            scope: "eq",
            trust: 1.3,
            vendor: "stonesoft",
            version: "2.0.6",
         },
         {
            model: "stonegate",
            scope: "eq",
            trust: 1.3,
            vendor: "stonesoft",
            version: "2.0.5",
         },
         {
            model: "stonegate",
            scope: "eq",
            trust: 1.3,
            vendor: "stonesoft",
            version: "2.0.4",
         },
         {
            model: "stonegate",
            scope: "eq",
            trust: 1.3,
            vendor: "stonesoft",
            version: "2.0.1",
         },
         {
            model: "stonegate",
            scope: "eq",
            trust: 1.3,
            vendor: "stonesoft",
            version: "1.7.2",
         },
         {
            model: "stonegate",
            scope: "eq",
            trust: 1.3,
            vendor: "stonesoft",
            version: "1.7.1",
         },
         {
            model: "stonegate",
            scope: "eq",
            trust: 1.3,
            vendor: "stonesoft",
            version: "1.7",
         },
         {
            model: "stonegate",
            scope: "eq",
            trust: 1.3,
            vendor: "stonesoft",
            version: "1.6.3",
         },
         {
            model: "stonegate",
            scope: "eq",
            trust: 1.3,
            vendor: "stonesoft",
            version: "1.6.2",
         },
         {
            model: "stonegate",
            scope: "eq",
            trust: 1.3,
            vendor: "stonesoft",
            version: "1.5.18",
         },
         {
            model: "stonegate",
            scope: "eq",
            trust: 1.3,
            vendor: "stonesoft",
            version: "1.5.17",
         },
         {
            model: "stonebeat webcluster",
            scope: "eq",
            trust: 1.3,
            vendor: "stonesoft",
            version: "2.5",
         },
         {
            model: "stonebeat webcluster",
            scope: "eq",
            trust: 1.3,
            vendor: "stonesoft",
            version: "2.0",
         },
         {
            model: "stonebeat securitycluster",
            scope: "eq",
            trust: 1.3,
            vendor: "stonesoft",
            version: "2.5",
         },
         {
            model: "stonebeat securitycluster",
            scope: "eq",
            trust: 1.3,
            vendor: "stonesoft",
            version: "2.0",
         },
         {
            model: "servercluster",
            scope: "eq",
            trust: 1.3,
            vendor: "stonesoft",
            version: "2.5.2",
         },
         {
            model: "servercluster",
            scope: "eq",
            trust: 1.3,
            vendor: "stonesoft",
            version: "2.5",
         },
         {
            model: "propack",
            scope: "eq",
            trust: 1.3,
            vendor: "sgi",
            version: "3.0",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 1.3,
            vendor: "redhat",
            version: "8.0",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 1.3,
            vendor: "redhat",
            version: "7.3",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 1.3,
            vendor: "redhat",
            version: "7.2",
         },
         {
            model: "openbsd",
            scope: "eq",
            trust: 1.3,
            vendor: "openbsd",
            version: "3.4",
         },
         {
            model: "openbsd",
            scope: "eq",
            trust: 1.3,
            vendor: "openbsd",
            version: "3.3",
         },
         {
            model: "imanager",
            scope: "eq",
            trust: 1.3,
            vendor: "novell",
            version: "2.0",
         },
         {
            model: "imanager",
            scope: "eq",
            trust: 1.3,
            vendor: "novell",
            version: "1.5",
         },
         {
            model: "edirectory",
            scope: "eq",
            trust: 1.3,
            vendor: "novell",
            version: "8.7.1",
         },
         {
            model: "edirectory",
            scope: "eq",
            trust: 1.3,
            vendor: "novell",
            version: "8.7",
         },
         {
            model: "edirectory",
            scope: "eq",
            trust: 1.3,
            vendor: "novell",
            version: "8.6.2",
         },
         {
            model: "edirectory",
            scope: "eq",
            trust: 1.3,
            vendor: "novell",
            version: "8.5.27",
         },
         {
            model: "edirectory",
            scope: "eq",
            trust: 1.3,
            vendor: "novell",
            version: "8.5",
         },
         {
            model: "edirectory",
            scope: "eq",
            trust: 1.3,
            vendor: "novell",
            version: "8.0",
         },
         {
            model: "hp-ux",
            scope: "eq",
            trust: 1.3,
            vendor: "hp",
            version: "11.23",
         },
         {
            model: "hp-ux",
            scope: "eq",
            trust: 1.3,
            vendor: "hp",
            version: "11.11",
         },
         {
            model: "apache-based web server",
            scope: "eq",
            trust: 1.3,
            vendor: "hp",
            version: "2.0.43.04",
         },
         {
            model: "apache-based web server",
            scope: "eq",
            trust: 1.3,
            vendor: "hp",
            version: "2.0.43.00",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1.3,
            vendor: "freebsd",
            version: "5.2",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1.3,
            vendor: "freebsd",
            version: "5.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1.3,
            vendor: "freebsd",
            version: "4.9",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1.3,
            vendor: "freebsd",
            version: "4.8",
         },
         {
            model: "webns",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "7.10",
         },
         {
            model: "webns",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "6.10",
         },
         {
            model: "secure content accelerator",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "10000",
         },
         {
            model: "okena stormwatch",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "3.2",
         },
         {
            model: "firewall services module",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "1.1.3",
         },
         {
            model: "firewall services module",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "1.1.2",
         },
         {
            model: "css secure content accelerator",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "2.0",
         },
         {
            model: "css secure content accelerator",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "1.0",
         },
         {
            model: "ciscoworks common services",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "2.2",
         },
         {
            model: "ciscoworks common management foundation",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "2.1",
         },
         {
            model: "sg200",
            scope: "eq",
            trust: 1.3,
            vendor: "avaya",
            version: "4.31.29",
         },
         {
            model: "sg200",
            scope: "eq",
            trust: 1.3,
            vendor: "avaya",
            version: "4.4",
         },
         {
            model: "converged communications server",
            scope: "eq",
            trust: 1.3,
            vendor: "avaya",
            version: "2.0",
         },
         {
            model: "webstar",
            scope: "eq",
            trust: 1.3,
            vendor: "4d",
            version: "5.3.1",
         },
         {
            model: "webstar",
            scope: "eq",
            trust: 1.3,
            vendor: "4d",
            version: "5.3",
         },
         {
            model: "webstar",
            scope: "eq",
            trust: 1.3,
            vendor: "4d",
            version: "5.2.4",
         },
         {
            model: "webstar",
            scope: "eq",
            trust: 1.3,
            vendor: "4d",
            version: "5.2.3",
         },
         {
            model: "webstar",
            scope: "eq",
            trust: 1.3,
            vendor: "4d",
            version: "5.2.2",
         },
         {
            model: "webstar",
            scope: "eq",
            trust: 1.3,
            vendor: "4d",
            version: "5.2.1",
         },
         {
            model: "webstar",
            scope: "eq",
            trust: 1.3,
            vendor: "4d",
            version: "5.2",
         },
         {
            model: "webstar",
            scope: "eq",
            trust: 1.3,
            vendor: "4d",
            version: "4.0",
         },
         {
            model: "sidewinder",
            scope: "eq",
            trust: 1,
            vendor: "securecomputing",
            version: "5.2.0.03",
         },
         {
            model: "instant virtual extranet",
            scope: "eq",
            trust: 1,
            vendor: "neoteris",
            version: "3.2",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "3.0",
         },
         {
            model: "vsu",
            scope: "eq",
            trust: 1,
            vendor: "avaya",
            version: "10000_r2.0.1",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.7a",
         },
         {
            model: "speed technologies litespeed web server",
            scope: "eq",
            trust: 1,
            vendor: "lite",
            version: "1.3_rc3",
         },
         {
            model: "provider-1",
            scope: "eq",
            trust: 1,
            vendor: "checkpoint",
            version: "4.1",
         },
         {
            model: "pix firewall",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.2.2_.111",
         },
         {
            model: "webns",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.1_0.1.02",
         },
         {
            model: "wbem",
            scope: "eq",
            trust: 1,
            vendor: "hp",
            version: "a.02.00.00",
         },
         {
            model: "mac os x",
            scope: "eq",
            trust: 1,
            vendor: "apple",
            version: "10.3.3",
         },
         {
            model: "mac os x server",
            scope: "eq",
            trust: 1,
            vendor: "apple",
            version: "10.3.3",
         },
         {
            model: "vsu",
            scope: "eq",
            trust: 1,
            vendor: "avaya",
            version: "2000_r2.0.1",
         },
         {
            model: "stonebeat fullcluster",
            scope: "eq",
            trust: 1,
            vendor: "stonesoft",
            version: "1_3.0",
         },
         {
            model: "bsafe ssl-j",
            scope: "eq",
            trust: 1,
            vendor: "dell",
            version: "3.0.1",
         },
         {
            model: "s8300",
            scope: "eq",
            trust: 1,
            vendor: "avaya",
            version: "r2.0.0",
         },
         {
            model: "enterprise linux desktop",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "3.0",
         },
         {
            model: "pix firewall software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(3\\)",
         },
         {
            model: "pix firewall software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.1\\(1\\)",
         },
         {
            model: "application and content networking software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "css11000 content services switch",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "proxysg",
            scope: "eq",
            trust: 1,
            vendor: "bluecoat",
            version: "*",
         },
         {
            model: "wbem",
            scope: "eq",
            trust: 1,
            vendor: "hp",
            version: "a.01.05.08",
         },
         {
            model: "cacheos ca sa",
            scope: "eq",
            trust: 1,
            vendor: "bluecoat",
            version: "4.1.10",
         },
         {
            model: "firewall-1",
            scope: "eq",
            trust: 1,
            vendor: "checkpoint",
            version: "next_generation_fp0",
         },
         {
            model: "edirectory",
            scope: "eq",
            trust: 1,
            vendor: "novell",
            version: "8.5.12a",
         },
         {
            model: "sidewinder",
            scope: "eq",
            trust: 1,
            vendor: "securecomputing",
            version: "5.2.0.02",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(11b\\)e",
         },
         {
            model: "pix firewall software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.3\\(1\\)",
         },
         {
            model: "speed technologies litespeed web server",
            scope: "eq",
            trust: 1,
            vendor: "lite",
            version: "1.2.1",
         },
         {
            model: "pix firewall software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.1\\(3\\)",
         },
         {
            model: "sg208",
            scope: "eq",
            trust: 1,
            vendor: "avaya",
            version: "*",
         },
         {
            model: "pix firewall software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.3\\(3.109\\)",
         },
         {
            model: "clientless vpn gateway 4400",
            scope: "eq",
            trust: 1,
            vendor: "symantec",
            version: "5.0",
         },
         {
            model: "pix firewall software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(4.101\\)",
         },
         {
            model: "pix firewall software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.2\\(1\\)",
         },
         {
            model: "instant virtual extranet",
            scope: "eq",
            trust: 1,
            vendor: "neoteris",
            version: "3.3",
         },
         {
            model: "intuity audix",
            scope: "eq",
            trust: 1,
            vendor: "avaya",
            version: "*",
         },
         {
            model: "vsu",
            scope: "eq",
            trust: 1,
            vendor: "avaya",
            version: "100_r2.0.1",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.6d",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.6i",
         },
         {
            model: "instant virtual extranet",
            scope: "eq",
            trust: 1,
            vendor: "neoteris",
            version: "3.3.1",
         },
         {
            model: "sidewinder",
            scope: "eq",
            trust: 1,
            vendor: "securecomputing",
            version: "5.2.1",
         },
         {
            model: "webns",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.10_.0.06s",
         },
         {
            model: "firewall services module",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "5.2.1",
         },
         {
            model: "s8700",
            scope: "eq",
            trust: 1,
            vendor: "avaya",
            version: "r2.0.0",
         },
         {
            model: "gsx server",
            scope: "eq",
            trust: 1,
            vendor: "vmware",
            version: "3.0_build_7592",
         },
         {
            model: "sidewinder",
            scope: "eq",
            trust: 1,
            vendor: "securecomputing",
            version: "5.2.0.01",
         },
         {
            model: "enterprise",
            scope: "eq",
            trust: 1,
            vendor: "tarantella",
            version: "3.30",
         },
         {
            model: "speed technologies litespeed web server",
            scope: "eq",
            trust: 1,
            vendor: "lite",
            version: "1.2.2",
         },
         {
            model: "pix firewall software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.2\\(3\\)",
         },
         {
            model: "stonebeat fullcluster",
            scope: "eq",
            trust: 1,
            vendor: "stonesoft",
            version: "1_2.0",
         },
         {
            model: "gsx server",
            scope: "eq",
            trust: 1,
            vendor: "vmware",
            version: "2.0.1_build_2129",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.6f",
         },
         {
            model: "intuity audix",
            scope: "eq",
            trust: 1,
            vendor: "avaya",
            version: "s3210",
         },
         {
            model: "instant virtual extranet",
            scope: "eq",
            trust: 1,
            vendor: "neoteris",
            version: "3.0",
         },
         {
            model: "webns",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.2_0.0.03",
         },
         {
            model: "content services switch 11500",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "pix firewall software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)",
         },
         {
            model: "crypto accelerator 4000",
            scope: "eq",
            trust: 1,
            vendor: "sun",
            version: "1.0",
         },
         {
            model: "hp-ux",
            scope: "eq",
            trust: 1,
            vendor: "hp",
            version: "8.05",
         },
         {
            model: "vsu",
            scope: "eq",
            trust: 1,
            vendor: "avaya",
            version: "5",
         },
         {
            model: "intuity audix",
            scope: "eq",
            trust: 1,
            vendor: "avaya",
            version: "5.1.46",
         },
         {
            model: "vsu",
            scope: "eq",
            trust: 1,
            vendor: "avaya",
            version: "500",
         },
         {
            model: "pix firewall software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.3\\(2\\)",
         },
         {
            model: "gsx server",
            scope: "eq",
            trust: 1,
            vendor: "vmware",
            version: "2.5.1_build_5336",
         },
         {
            model: "s8500",
            scope: "eq",
            trust: 1,
            vendor: "avaya",
            version: "r2.0.0",
         },
         {
            model: "speed technologies litespeed web server",
            scope: "eq",
            trust: 1,
            vendor: "lite",
            version: "1.3.1",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.6k",
         },
         {
            model: "vpn-1",
            scope: "eq",
            trust: 1,
            vendor: "checkpoint",
            version: "next_generation_fp0",
         },
         {
            model: "bsafe ssl-j",
            scope: "eq",
            trust: 1,
            vendor: "dell",
            version: "3.0",
         },
         {
            model: "sidewinder",
            scope: "eq",
            trust: 1,
            vendor: "securecomputing",
            version: "5.2.0.04",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(11b\\)e12",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(11\\)e",
         },
         {
            model: "speed technologies litespeed web server",
            scope: "eq",
            trust: 1,
            vendor: "lite",
            version: "1.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(19\\)e1",
         },
         {
            model: "call manager",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "aaa server",
            scope: "eq",
            trust: 1,
            vendor: "hp",
            version: "*",
         },
         {
            model: "gss 4480 global site selector",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "vsu",
            scope: "eq",
            trust: 1,
            vendor: "avaya",
            version: "5000_r2.0.1",
         },
         {
            model: "s8300",
            scope: "eq",
            trust: 1,
            vendor: "avaya",
            version: "r2.0.1",
         },
         {
            model: "firewall services module",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.1_\\(0.208\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(11b\\)e14",
         },
         {
            model: "speed technologies litespeed web server",
            scope: "eq",
            trust: 1,
            vendor: "lite",
            version: "1.3_rc1",
         },
         {
            model: "s8500",
            scope: "eq",
            trust: 1,
            vendor: "avaya",
            version: "r2.0.1",
         },
         {
            model: "firewall-1",
            scope: "eq",
            trust: 1,
            vendor: "checkpoint",
            version: "next_generation_fp2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2za",
         },
         {
            model: "speed technologies litespeed web server",
            scope: "eq",
            trust: 1,
            vendor: "lite",
            version: "1.3_rc2",
         },
         {
            model: "wbem",
            scope: "eq",
            trust: 1,
            vendor: "hp",
            version: "a.02.00.01",
         },
         {
            model: "bsafe ssl-j",
            scope: "eq",
            trust: 1,
            vendor: "dell",
            version: "3.1",
         },
         {
            model: "speed technologies litespeed web server",
            scope: "eq",
            trust: 1,
            vendor: "lite",
            version: "1.0.2",
         },
         {
            model: "speed technologies litespeed web server",
            scope: "eq",
            trust: 1,
            vendor: "lite",
            version: "1.2_rc1",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.6j",
         },
         {
            model: "cacheos ca sa",
            scope: "eq",
            trust: 1,
            vendor: "bluecoat",
            version: "4.1.12",
         },
         {
            model: "pix firewall software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.1",
         },
         {
            model: "speed technologies litespeed web server",
            scope: "eq",
            trust: 1,
            vendor: "lite",
            version: "1.0.3",
         },
         {
            model: "openserver",
            scope: "eq",
            trust: 1,
            vendor: "sco",
            version: "5.0.7",
         },
         {
            model: "firewall-1",
            scope: "eq",
            trust: 1,
            vendor: "checkpoint",
            version: "*",
         },
         {
            model: "firewall-1",
            scope: "eq",
            trust: 1,
            vendor: "checkpoint",
            version: "next_generation_fp1",
         },
         {
            model: "pix firewall software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.6h",
         },
         {
            model: "hp-ux",
            scope: "eq",
            trust: 1,
            vendor: "hp",
            version: "11.00",
         },
         {
            model: "pix firewall software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(4\\)",
         },
         {
            model: "vsu",
            scope: "eq",
            trust: 1,
            vendor: "avaya",
            version: "7500_r2.0.1",
         },
         {
            model: "enterprise",
            scope: "eq",
            trust: 1,
            vendor: "tarantella",
            version: "3.40",
         },
         {
            model: "vsu",
            scope: "eq",
            trust: 1,
            vendor: "avaya",
            version: "5x",
         },
         {
            model: "stonebeat fullcluster",
            scope: "eq",
            trust: 1,
            vendor: "stonesoft",
            version: "2.0",
         },
         {
            model: "firewall services module",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "1.1_\\(3.005\\)",
         },
         {
            model: "speed technologies litespeed web server",
            scope: "eq",
            trust: 1,
            vendor: "lite",
            version: "1.3",
         },
         {
            model: "pix firewall software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.1\\(5\\)",
         },
         {
            model: "webns",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.10_b4",
         },
         {
            model: "s8700",
            scope: "eq",
            trust: 1,
            vendor: "avaya",
            version: "r2.0.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(14\\)sy",
         },
         {
            model: "pix firewall software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.3\\(3.102\\)",
         },
         {
            model: "speed technologies litespeed web server",
            scope: "eq",
            trust: 1,
            vendor: "lite",
            version: "1.1.1",
         },
         {
            model: "firewall-1",
            scope: "eq",
            trust: 1,
            vendor: "checkpoint",
            version: "2.0",
         },
         {
            model: "sidewinder",
            scope: "eq",
            trust: 1,
            vendor: "securecomputing",
            version: "5.2",
         },
         {
            model: "enterprise",
            scope: "eq",
            trust: 1,
            vendor: "tarantella",
            version: "3.20",
         },
         {
            model: "pix firewall software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(1\\)",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "instant virtual extranet",
            scope: "eq",
            trust: 1,
            vendor: "neoteris",
            version: "3.1",
         },
         {
            model: "access registrar",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "pix firewall software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.2\\(3.100\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(14\\)sy1",
         },
         {
            model: "gss 4490 global site selector",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.7b",
         },
         {
            model: "stonebeat fullcluster",
            scope: "eq",
            trust: 1,
            vendor: "stonesoft",
            version: "2.5",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(13\\)e9",
         },
         {
            model: "pix firewall software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2sy",
         },
         {
            model: "speed technologies litespeed web server",
            scope: "eq",
            trust: 1,
            vendor: "lite",
            version: "1.0.1",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "0.9.6b-3",
         },
         {
            model: "pix firewall software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.2",
         },
         {
            model: "speed technologies litespeed web server",
            scope: "eq",
            trust: 1,
            vendor: "lite",
            version: "1.2_rc2",
         },
         {
            model: "stonebeat fullcluster",
            scope: "eq",
            trust: 1,
            vendor: "stonesoft",
            version: "3.0",
         },
         {
            model: "intuity audix",
            scope: "eq",
            trust: 1,
            vendor: "avaya",
            version: "s3400",
         },
         {
            model: "mds 9000",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "sidewinder",
            scope: "eq",
            trust: 1,
            vendor: "securecomputing",
            version: "5.2.1.02",
         },
         {
            model: "threat response",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "0.9.6-15",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.6g",
         },
         {
            model: "vpn-1",
            scope: "eq",
            trust: 1,
            vendor: "checkpoint",
            version: "next_generation_fp1",
         },
         {
            model: "vpn-1",
            scope: "eq",
            trust: 1,
            vendor: "checkpoint",
            version: "vsx_ng_with_application_intelligence",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.6e",
         },
         {
            model: "vpn-1",
            scope: "eq",
            trust: 1,
            vendor: "checkpoint",
            version: "next_generation",
         },
         {
            model: "pix firewall software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.2\\(2\\)",
         },
         {
            model: "openserver",
            scope: "eq",
            trust: 1,
            vendor: "sco",
            version: "5.0.6",
         },
         {
            model: "webns",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.1_0.2.06",
         },
         {
            model: "pix firewall software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.1\\(2\\)",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.7c",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "0.9.7a-2",
         },
         {
            model: "pix firewall software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.1\\(4\\)",
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "cisco",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "debian",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "gentoo linux",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "guardian digital",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "netscreen",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "openssl",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "red hat",
            version: null,
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 0.8,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 0.8,
            vendor: "openssl",
            version: "0.9.6a",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 0.8,
            vendor: "openssl",
            version: "0.9.6b",
         },
         {
            model: "vine linux",
            scope: "eq",
            trust: 0.8,
            vendor: "vine linux",
            version: "2.5",
         },
         {
            model: "vine linux",
            scope: "eq",
            trust: 0.8,
            vendor: "vine linux",
            version: "2.6",
         },
         {
            model: "asianux server",
            scope: "eq",
            trust: 0.8,
            vendor: "cybertrust",
            version: "2.0",
         },
         {
            model: "asianux server",
            scope: "eq",
            trust: 0.8,
            vendor: "cybertrust",
            version: "2.1",
         },
         {
            model: "crypto accelerator",
            scope: "eq",
            trust: 0.8,
            vendor: "sun microsystems",
            version: "1000 v1.0",
         },
         {
            model: "crypto accelerator",
            scope: "eq",
            trust: 0.8,
            vendor: "sun microsystems",
            version: "1000 v1.1",
         },
         {
            model: "crypto accelerator",
            scope: "eq",
            trust: 0.8,
            vendor: "sun microsystems",
            version: "4000 v1.0",
         },
         {
            model: "crypto accelerator",
            scope: "eq",
            trust: 0.8,
            vendor: "sun microsystems",
            version: "500",
         },
         {
            model: "netscreen idp",
            scope: "eq",
            trust: 0.8,
            vendor: "juniper",
            version: "2.0 - 2.1r6",
         },
         {
            model: "netscreen ive",
            scope: "eq",
            trust: 0.8,
            vendor: "juniper",
            version: null,
         },
         {
            model: "turbolinux advanced server",
            scope: "eq",
            trust: 0.8,
            vendor: "turbo linux",
            version: "6",
         },
         {
            model: "turbolinux appliance server",
            scope: "eq",
            trust: 0.8,
            vendor: "turbo linux",
            version: "1.0 (hosting)",
         },
         {
            model: "turbolinux appliance server",
            scope: "eq",
            trust: 0.8,
            vendor: "turbo linux",
            version: "1.0 (workgroup)",
         },
         {
            model: "turbolinux desktop",
            scope: "eq",
            trust: 0.8,
            vendor: "turbo linux",
            version: "10",
         },
         {
            model: "turbolinux server",
            scope: "eq",
            trust: 0.8,
            vendor: "turbo linux",
            version: "6.1",
         },
         {
            model: "turbolinux server",
            scope: "eq",
            trust: 0.8,
            vendor: "turbo linux",
            version: "6.5",
         },
         {
            model: "turbolinux server",
            scope: "eq",
            trust: 0.8,
            vendor: "turbo linux",
            version: "7",
         },
         {
            model: "turbolinux server",
            scope: "eq",
            trust: 0.8,
            vendor: "turbo linux",
            version: "8",
         },
         {
            model: "turbolinux workstation",
            scope: "eq",
            trust: 0.8,
            vendor: "turbo linux",
            version: "6.0",
         },
         {
            model: "turbolinux workstation",
            scope: "eq",
            trust: 0.8,
            vendor: "turbo linux",
            version: "7",
         },
         {
            model: "turbolinux workstation",
            scope: "eq",
            trust: 0.8,
            vendor: "turbo linux",
            version: "8",
         },
         {
            model: "firewall-1 gx",
            scope: "eq",
            trust: 0.8,
            vendor: "check point",
            version: "v2.0",
         },
         {
            model: "provider-1",
            scope: "eq",
            trust: 0.8,
            vendor: "check point",
            version: "ng and later",
         },
         {
            model: "vpn-1/firewall-1",
            scope: "eq",
            trust: 0.8,
            vendor: "check point",
            version: "ng and later",
         },
         {
            model: "vpn-1/firewall-1",
            scope: "eq",
            trust: 0.8,
            vendor: "check point",
            version: "vsx ng with application intelligence",
         },
         {
            model: "trendmicro interscan viruswall",
            scope: "eq",
            trust: 0.8,
            vendor: "trend micro",
            version: "3.81",
         },
         {
            model: "hp-ux",
            scope: "eq",
            trust: 0.8,
            vendor: "hewlett packard",
            version: "11.00",
         },
         {
            model: "hp-ux",
            scope: "eq",
            trust: 0.8,
            vendor: "hewlett packard",
            version: "11.11",
         },
         {
            model: "hp-ux",
            scope: "eq",
            trust: 0.8,
            vendor: "hewlett packard",
            version: "11.23",
         },
         {
            model: "hp-ux aaa server",
            scope: "lte",
            trust: 0.8,
            vendor: "hewlett packard",
            version: "a.06.01.02.04",
         },
         {
            model: "hp-ux aaa server",
            scope: "eq",
            trust: 0.8,
            vendor: "hewlett packard",
            version: "a.06.01.02.06",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.8,
            vendor: "red hat",
            version: "2.1 (as)",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.8,
            vendor: "red hat",
            version: "2.1 (es)",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.8,
            vendor: "red hat",
            version: "2.1 (ws)",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.8,
            vendor: "red hat",
            version: "3 (as)",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.8,
            vendor: "red hat",
            version: "3 (es)",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.8,
            vendor: "red hat",
            version: "3 (ws)",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.8,
            vendor: "red hat",
            version: "9",
         },
         {
            model: "ipcom series",
            scope: "eq",
            trust: 0.8,
            vendor: "fujitsu",
            version: "( for details",
         },
         {
            model: "ipcom series",
            scope: "eq",
            trust: 0.8,
            vendor: "fujitsu",
            version: "check the information provided by the vendor. )",
         },
         {
            model: "netshelter series",
            scope: "eq",
            trust: 0.8,
            vendor: "fujitsu",
            version: "( for details",
         },
         {
            model: "netshelter series",
            scope: "eq",
            trust: 0.8,
            vendor: "fujitsu",
            version: "check the information provided by the vendor. )",
         },
         {
            model: "netwatcher",
            scope: "eq",
            trust: 0.8,
            vendor: "fujitsu",
            version: "( sensor device )",
         },
         {
            model: "primergy sslaccelerator",
            scope: "eq",
            trust: 0.8,
            vendor: "fujitsu",
            version: "7110",
         },
         {
            model: "primergy sslaccelerator",
            scope: "eq",
            trust: 0.8,
            vendor: "fujitsu",
            version: "7115",
         },
         {
            model: "primergy sslaccelerator",
            scope: "eq",
            trust: 0.8,
            vendor: "fujitsu",
            version: "7117",
         },
         {
            model: "ios 12.1 e",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "sg208",
            scope: null,
            trust: 0.6,
            vendor: "avaya",
            version: null,
         },
         {
            model: "gsx server build",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "3.07592",
         },
         {
            model: "gsx server build",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "2.5.15336",
         },
         {
            model: "gsx server build",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "2.0.12129",
         },
         {
            model: "enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "tarantella",
            version: "33.40",
         },
         {
            model: "enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "tarantella",
            version: "33.30",
         },
         {
            model: "enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "tarantella",
            version: "33.200",
         },
         {
            model: "clientless vpn gateway series",
            scope: "eq",
            trust: 0.3,
            vendor: "symantec",
            version: "44005.0",
         },
         {
            model: "crypto accelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "sun",
            version: "40001.0",
         },
         {
            model: "stonebeat fullcluster for raptor",
            scope: "eq",
            trust: 0.3,
            vendor: "stonesoft",
            version: "2.5",
         },
         {
            model: "stonebeat fullcluster for raptor",
            scope: "eq",
            trust: 0.3,
            vendor: "stonesoft",
            version: "2.0",
         },
         {
            model: "stonebeat fullcluster for isa server",
            scope: "eq",
            trust: 0.3,
            vendor: "stonesoft",
            version: "3.0",
         },
         {
            model: "stonebeat fullcluster for gauntlet",
            scope: "eq",
            trust: 0.3,
            vendor: "stonesoft",
            version: "2.0",
         },
         {
            model: "stonebeat fullcluster for firewall-1",
            scope: "eq",
            trust: 0.3,
            vendor: "stonesoft",
            version: "3.0",
         },
         {
            model: "stonebeat fullcluster for firewall-1",
            scope: "eq",
            trust: 0.3,
            vendor: "stonesoft",
            version: "2.0",
         },
         {
            model: "propack sp6",
            scope: "eq",
            trust: 0.3,
            vendor: "sgi",
            version: "3.0",
         },
         {
            model: "irix m",
            scope: "eq",
            trust: 0.3,
            vendor: "sgi",
            version: "6.5.24",
         },
         {
            model: "irix m",
            scope: "eq",
            trust: 0.3,
            vendor: "sgi",
            version: "6.5.23",
         },
         {
            model: "irix m",
            scope: "eq",
            trust: 0.3,
            vendor: "sgi",
            version: "6.5.22",
         },
         {
            model: "irix m",
            scope: "eq",
            trust: 0.3,
            vendor: "sgi",
            version: "6.5.21",
         },
         {
            model: "irix f",
            scope: "eq",
            trust: 0.3,
            vendor: "sgi",
            version: "6.5.21",
         },
         {
            model: "irix m",
            scope: "eq",
            trust: 0.3,
            vendor: "sgi",
            version: "6.5.20",
         },
         {
            model: "irix f",
            scope: "eq",
            trust: 0.3,
            vendor: "sgi",
            version: "6.5.20",
         },
         {
            model: "computing sidewinder",
            scope: "eq",
            trust: 0.3,
            vendor: "secure",
            version: "5.2.1.02",
         },
         {
            model: "computing sidewinder",
            scope: "eq",
            trust: 0.3,
            vendor: "secure",
            version: "5.2.1",
         },
         {
            model: "computing sidewinder",
            scope: "eq",
            trust: 0.3,
            vendor: "secure",
            version: "5.2.0.04",
         },
         {
            model: "computing sidewinder",
            scope: "eq",
            trust: 0.3,
            vendor: "secure",
            version: "5.2.0.03",
         },
         {
            model: "computing sidewinder",
            scope: "eq",
            trust: 0.3,
            vendor: "secure",
            version: "5.2.0.02",
         },
         {
            model: "computing sidewinder",
            scope: "eq",
            trust: 0.3,
            vendor: "secure",
            version: "5.2.0.01",
         },
         {
            model: "computing sidewinder",
            scope: "eq",
            trust: 0.3,
            vendor: "secure",
            version: "5.2",
         },
         {
            model: "unixware",
            scope: "eq",
            trust: 0.3,
            vendor: "sco",
            version: "7.1.3",
         },
         {
            model: "unixware",
            scope: "eq",
            trust: 0.3,
            vendor: "sco",
            version: "7.1.1",
         },
         {
            model: "open server",
            scope: "eq",
            trust: 0.3,
            vendor: "sco",
            version: "5.0.7",
         },
         {
            model: "open server",
            scope: "eq",
            trust: 0.3,
            vendor: "sco",
            version: "5.0.6",
         },
         {
            model: "security bsafe ssl-j sdk",
            scope: "eq",
            trust: 0.3,
            vendor: "rsa",
            version: "3.1",
         },
         {
            model: "security bsafe ssl-j sdk",
            scope: "eq",
            trust: 0.3,
            vendor: "rsa",
            version: "3.0.1",
         },
         {
            model: "security bsafe ssl-j sdk",
            scope: "eq",
            trust: 0.3,
            vendor: "rsa",
            version: "3.0",
         },
         {
            model: "openssl096b-0.9.6b-3.i386.rpm",
            scope: null,
            trust: 0.3,
            vendor: "redhat",
            version: null,
         },
         {
            model: "openssl096-0.9.6-15.i386.rpm",
            scope: null,
            trust: 0.3,
            vendor: "redhat",
            version: null,
         },
         {
            model: "openssl-perl-0.9.7a-2.i386.rpm",
            scope: null,
            trust: 0.3,
            vendor: "redhat",
            version: null,
         },
         {
            model: "openssl-devel-0.9.7a-2.i386.rpm",
            scope: null,
            trust: 0.3,
            vendor: "redhat",
            version: null,
         },
         {
            model: "openssl-0.9.7a-2.i386.rpm",
            scope: null,
            trust: 0.3,
            vendor: "redhat",
            version: null,
         },
         {
            model: "linux i386",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7.3",
         },
         {
            model: "enterprise linux ws",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "4",
         },
         {
            model: "enterprise linux ws",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "3",
         },
         {
            model: "enterprise linux es",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "4",
         },
         {
            model: "enterprise linux es",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "3",
         },
         {
            model: "desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "4.0",
         },
         {
            model: "desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "3.0",
         },
         {
            model: "hat fedora core3",
            scope: null,
            trust: 0.3,
            vendor: "red",
            version: null,
         },
         {
            model: "hat fedora core2",
            scope: null,
            trust: 0.3,
            vendor: "red",
            version: null,
         },
         {
            model: "hat fedora core1",
            scope: null,
            trust: 0.3,
            vendor: "red",
            version: null,
         },
         {
            model: "hat enterprise linux as",
            scope: "eq",
            trust: 0.3,
            vendor: "red",
            version: "4",
         },
         {
            model: "hat enterprise linux as",
            scope: "eq",
            trust: 0.3,
            vendor: "red",
            version: "3",
         },
         {
            model: "project openssl c",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "project openssl beta3",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "project openssl beta2",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "project openssl beta1",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "project openssl b",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "project openssl a",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "project openssl k",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "project openssl j",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "project openssl i",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "project openssl h",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "project openssl g",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "project openssl f",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "project openssl e",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "project openssl d",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "project openssl c",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "edirectory su1",
            scope: "eq",
            trust: 0.3,
            vendor: "novell",
            version: "8.7.1",
         },
         {
            model: "edirectory a",
            scope: "eq",
            trust: 0.3,
            vendor: "novell",
            version: "8.5.12",
         },
         {
            model: "instant virtual extranet",
            scope: "eq",
            trust: 0.3,
            vendor: "netscreen",
            version: "3.3.1",
         },
         {
            model: "instant virtual extranet",
            scope: "eq",
            trust: 0.3,
            vendor: "netscreen",
            version: "3.3",
         },
         {
            model: "instant virtual extranet",
            scope: "eq",
            trust: 0.3,
            vendor: "netscreen",
            version: "3.2",
         },
         {
            model: "instant virtual extranet",
            scope: "eq",
            trust: 0.3,
            vendor: "netscreen",
            version: "3.1",
         },
         {
            model: "instant virtual extranet",
            scope: "eq",
            trust: 0.3,
            vendor: "netscreen",
            version: "3.0",
         },
         {
            model: "litespeed web server",
            scope: "eq",
            trust: 0.3,
            vendor: "lite speed",
            version: "1.3.1",
         },
         {
            model: "litespeed web server rc3",
            scope: "eq",
            trust: 0.3,
            vendor: "lite speed",
            version: "1.3",
         },
         {
            model: "litespeed web server rc2",
            scope: "eq",
            trust: 0.3,
            vendor: "lite speed",
            version: "1.3",
         },
         {
            model: "litespeed web server rc1",
            scope: "eq",
            trust: 0.3,
            vendor: "lite speed",
            version: "1.3",
         },
         {
            model: "litespeed web server",
            scope: "eq",
            trust: 0.3,
            vendor: "lite speed",
            version: "1.3",
         },
         {
            model: "litespeed web server",
            scope: "eq",
            trust: 0.3,
            vendor: "lite speed",
            version: "1.2.2",
         },
         {
            model: "litespeed web server",
            scope: "eq",
            trust: 0.3,
            vendor: "lite speed",
            version: "1.2.1",
         },
         {
            model: "litespeed web server rc2",
            scope: "eq",
            trust: 0.3,
            vendor: "lite speed",
            version: "1.2",
         },
         {
            model: "litespeed web server rc1",
            scope: "eq",
            trust: 0.3,
            vendor: "lite speed",
            version: "1.2",
         },
         {
            model: "litespeed web server",
            scope: "eq",
            trust: 0.3,
            vendor: "lite speed",
            version: "1.1.1",
         },
         {
            model: "litespeed web server",
            scope: "eq",
            trust: 0.3,
            vendor: "lite speed",
            version: "1.1",
         },
         {
            model: "litespeed web server",
            scope: "eq",
            trust: 0.3,
            vendor: "lite speed",
            version: "1.0.3",
         },
         {
            model: "litespeed web server",
            scope: "eq",
            trust: 0.3,
            vendor: "lite speed",
            version: "1.0.2",
         },
         {
            model: "litespeed web server",
            scope: "eq",
            trust: 0.3,
            vendor: "lite speed",
            version: "1.0.1",
         },
         {
            model: "wbem a.02.00.01",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "wbem a.02.00.00",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "wbem a.01.05.08",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "hp-ux",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "11.0",
         },
         {
            model: "hp-ux",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.5",
         },
         {
            model: "aaa server",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.2",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.1",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.1",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.8",
         },
         {
            model: "associates etrust security command center",
            scope: "eq",
            trust: 0.3,
            vendor: "computer",
            version: "1.0",
         },
         {
            model: "secure gateway for solaris",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "1.13",
         },
         {
            model: "secure gateway for solaris",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "1.12",
         },
         {
            model: "secure gateway for solaris",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "1.1",
         },
         {
            model: "webns .0.06s",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.10",
         },
         {
            model: "webns",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.20.0.03",
         },
         {
            model: "webns",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.10.2.06",
         },
         {
            model: "webns",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.10.1.02",
         },
         {
            model: "webns b4",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.10",
         },
         {
            model: "threat response",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "pix firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3.2",
         },
         {
            model: "pix firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3.1",
         },
         {
            model: "pix firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(3.109)",
         },
         {
            model: "pix firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(3.102)",
         },
         {
            model: "pix firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(1)",
         },
         {
            model: "pix firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3",
         },
         {
            model: "pix firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.2.3",
         },
         {
            model: "pix firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.2.2.111",
         },
         {
            model: "pix firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.2.2",
         },
         {
            model: "pix firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.2.1",
         },
         {
            model: "pix firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.2(3.100)",
         },
         {
            model: "pix firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.2(3)",
         },
         {
            model: "pix firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.2(2)",
         },
         {
            model: "pix firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.2(1)",
         },
         {
            model: "pix firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.2",
         },
         {
            model: "pix firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1.5",
         },
         {
            model: "pix firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1.4",
         },
         {
            model: "pix firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1.3",
         },
         {
            model: "pix firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1(5)",
         },
         {
            model: "pix firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1(4)",
         },
         {
            model: "pix firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1(3)",
         },
         {
            model: "pix firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1(2)",
         },
         {
            model: "pix firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1(1)",
         },
         {
            model: "pix firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1",
         },
         {
            model: "pix firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.0.4",
         },
         {
            model: "pix firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.0.3",
         },
         {
            model: "pix firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.0(4.101)",
         },
         {
            model: "pix firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.0(4)",
         },
         {
            model: "pix firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.0(2)",
         },
         {
            model: "pix firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.0(1)",
         },
         {
            model: "pix firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.0",
         },
         {
            model: "mds",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "9000",
         },
         {
            model: "ios 12.2za",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sy",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sy1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sy",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 e1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 e9",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 e14",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 e12",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ec",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ea1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "gss global site selector",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "44900",
         },
         {
            model: "gss global site selector",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4480",
         },
         {
            model: "firewall services module",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1(0.208)",
         },
         {
            model: "firewall services module",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1.1(3.005)",
         },
         {
            model: "firewall services module",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "css11500 content services switch",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "css11000 content services switch",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "call manager",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "application & content networking software",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "access registrar",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "point software vpn-1 vsx ng with application intelligence",
            scope: null,
            trust: 0.3,
            vendor: "check",
            version: null,
         },
         {
            model: "point software vpn-1 next generation fp2",
            scope: null,
            trust: 0.3,
            vendor: "check",
            version: null,
         },
         {
            model: "point software vpn-1 next generation fp1",
            scope: null,
            trust: 0.3,
            vendor: "check",
            version: null,
         },
         {
            model: "point software vpn-1 next generation fp0",
            scope: null,
            trust: 0.3,
            vendor: "check",
            version: null,
         },
         {
            model: "point software providor-1 sp4",
            scope: "eq",
            trust: 0.3,
            vendor: "check",
            version: "4.1",
         },
         {
            model: "point software providor-1 sp3",
            scope: "eq",
            trust: 0.3,
            vendor: "check",
            version: "4.1",
         },
         {
            model: "point software providor-1 sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "check",
            version: "4.1",
         },
         {
            model: "point software providor-1 sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "check",
            version: "4.1",
         },
         {
            model: "point software providor-1",
            scope: "eq",
            trust: 0.3,
            vendor: "check",
            version: "4.1",
         },
         {
            model: "point software firewall-1 vsx ng with application intelligence",
            scope: null,
            trust: 0.3,
            vendor: "check",
            version: null,
         },
         {
            model: "point software firewall-1 next generation fp2",
            scope: null,
            trust: 0.3,
            vendor: "check",
            version: null,
         },
         {
            model: "point software firewall-1 next generation fp1",
            scope: null,
            trust: 0.3,
            vendor: "check",
            version: null,
         },
         {
            model: "point software firewall-1 next generation fp0",
            scope: null,
            trust: 0.3,
            vendor: "check",
            version: null,
         },
         {
            model: "point software firewall-1 gx",
            scope: "eq",
            trust: 0.3,
            vendor: "check",
            version: "2.0",
         },
         {
            model: "coat systems proxysg",
            scope: "eq",
            trust: 0.3,
            vendor: "blue",
            version: "0",
         },
         {
            model: "coat systems cacheos ca/sa",
            scope: "eq",
            trust: 0.3,
            vendor: "blue",
            version: "4.1.12",
         },
         {
            model: "coat systems cacheos ca/sa",
            scope: "eq",
            trust: 0.3,
            vendor: "blue",
            version: "4.1.10",
         },
         {
            model: "vsu r2.0.1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7500",
         },
         {
            model: "vsu",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5x0",
         },
         {
            model: "vsu r2.0.1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5000",
         },
         {
            model: "vsu",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5000",
         },
         {
            model: "vsu",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "50",
         },
         {
            model: "vsu r2.0.1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "2000",
         },
         {
            model: "vsu r2.0.1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "10000",
         },
         {
            model: "vsu r2.0.1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "100",
         },
         {
            model: "sg5x",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "4.4",
         },
         {
            model: "sg5x",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "4.3",
         },
         {
            model: "sg5x",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "4.2",
         },
         {
            model: "sg208",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "0",
         },
         {
            model: "s8700 r2.0.1",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "s8700 r2.0.0",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "s8500 r2.0.1",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "s8500 r2.0.0",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "s8300 r2.0.1",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "s8300 r2.0.0",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "intuity r5 r5.1.46",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "intuity audix r5",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "0",
         },
         {
            model: "intuity s3400",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "intuity s3210",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "intuity lx",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "mac os server",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.4.2",
         },
         {
            model: "mac os server",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.3.9",
         },
         {
            model: "mac os server",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.3.3",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.4.2",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.3.9",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.3.3",
         },
         {
            model: "gsx server",
            scope: "ne",
            trust: 0.3,
            vendor: "vmware",
            version: "2.5.2",
         },
         {
            model: "stonegate sparc",
            scope: "ne",
            trust: 0.3,
            vendor: "stonesoft",
            version: "2.2.12",
         },
         {
            model: "stonegate",
            scope: "ne",
            trust: 0.3,
            vendor: "stonesoft",
            version: "2.2.5x86",
         },
         {
            model: "stonegate ibm zseries",
            scope: "ne",
            trust: 0.3,
            vendor: "stonesoft",
            version: "2.2.5",
         },
         {
            model: "computing sidewinder",
            scope: "ne",
            trust: 0.3,
            vendor: "secure",
            version: "5.2.1.10",
         },
         {
            model: "security bsafe ssl-j sdk",
            scope: "ne",
            trust: 0.3,
            vendor: "rsa",
            version: "4.1",
         },
         {
            model: "project openssl d",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "project openssl m",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "litespeed web server",
            scope: "ne",
            trust: 0.3,
            vendor: "lite speed",
            version: "1.3.2",
         },
         {
            model: "litespeed web server",
            scope: "ne",
            trust: 0.3,
            vendor: "lite speed",
            version: "1.0.2",
         },
         {
            model: "secure gateway for solaris",
            scope: "ne",
            trust: 0.3,
            vendor: "citrix",
            version: "1.14",
         },
         {
            model: "threat response",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2.0.3",
         },
         {
            model: "mds",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "90002.0(0.86)",
         },
         {
            model: "mds",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "90001.3(3.33)",
         },
         {
            model: "point software vpn-1 sp6",
            scope: "ne",
            trust: 0.3,
            vendor: "check",
            version: "4.1",
         },
         {
            model: "point software vpn-1 sp5a",
            scope: "ne",
            trust: 0.3,
            vendor: "check",
            version: "4.1",
         },
         {
            model: "point software vpn-1 sp5",
            scope: "ne",
            trust: 0.3,
            vendor: "check",
            version: "4.1",
         },
         {
            model: "point software vpn-1 sp4",
            scope: "ne",
            trust: 0.3,
            vendor: "check",
            version: "4.1",
         },
         {
            model: "point software vpn-1 sp3",
            scope: "ne",
            trust: 0.3,
            vendor: "check",
            version: "4.1",
         },
         {
            model: "point software vpn-1 sp2",
            scope: "ne",
            trust: 0.3,
            vendor: "check",
            version: "4.1",
         },
         {
            model: "point software vpn-1 sp1",
            scope: "ne",
            trust: 0.3,
            vendor: "check",
            version: "4.1",
         },
         {
            model: "point software vpn-1",
            scope: "ne",
            trust: 0.3,
            vendor: "check",
            version: "4.1",
         },
         {
            model: "point software firewall-1 sp6",
            scope: "ne",
            trust: 0.3,
            vendor: "check",
            version: "4.1",
         },
         {
            model: "point software firewall-1 sp5a",
            scope: "ne",
            trust: 0.3,
            vendor: "check",
            version: "4.1",
         },
         {
            model: "point software firewall-1 sp5",
            scope: "ne",
            trust: 0.3,
            vendor: "check",
            version: "4.1",
         },
         {
            model: "point software firewall-1 sp4",
            scope: "ne",
            trust: 0.3,
            vendor: "check",
            version: "4.1",
         },
         {
            model: "point software firewall-1 sp3",
            scope: "ne",
            trust: 0.3,
            vendor: "check",
            version: "4.1",
         },
         {
            model: "point software firewall-1 sp2",
            scope: "ne",
            trust: 0.3,
            vendor: "check",
            version: "4.1",
         },
         {
            model: "point software firewall-1 sp1",
            scope: "ne",
            trust: 0.3,
            vendor: "check",
            version: "4.1",
         },
         {
            model: "point software firewall-1",
            scope: "ne",
            trust: 0.3,
            vendor: "check",
            version: "4.1",
         },
         {
            model: "webstar",
            scope: "ne",
            trust: 0.3,
            vendor: "4d",
            version: "5.3.2",
         },
         {
            model: "oneworld xe/erp8 applications sp22",
            scope: null,
            trust: 0.3,
            vendor: "peoplesoft",
            version: null,
         },
         {
            model: "enterpriseone applications",
            scope: "eq",
            trust: 0.3,
            vendor: "peoplesoft",
            version: "8.93",
         },
         {
            model: "enterpriseone applications sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "peoplesoft",
            version: "8.9",
         },
         {
            model: "oracle9i standard edition",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "9.2.6",
         },
         {
            model: "oracle9i standard edition",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "9.2.0.5",
         },
         {
            model: "oracle9i standard edition",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "9.0.4",
         },
         {
            model: "oracle9i standard edition",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "9.0.1.5",
         },
         {
            model: "oracle9i standard edition",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "9.0.1.4",
         },
         {
            model: "oracle9i personal edition",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "9.2.6",
         },
         {
            model: "oracle9i personal edition",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "9.2.0.5",
         },
         {
            model: "oracle9i personal edition",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "9.0.4",
         },
         {
            model: "oracle9i personal edition",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "9.0.1.5",
         },
         {
            model: "oracle9i personal edition",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "9.0.1.4",
         },
         {
            model: "oracle9i enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "9.2.6.0",
         },
         {
            model: "oracle9i enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "9.2.0.5",
         },
         {
            model: "oracle9i enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "9.0.4",
         },
         {
            model: "oracle9i enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "9.0.1.5",
         },
         {
            model: "oracle9i enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "9.0.1.4",
         },
         {
            model: "oracle9i application server",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "9.0.3.1",
         },
         {
            model: "oracle9i application server",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "9.0.2.3",
         },
         {
            model: "oracle9i application server",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "1.0.2.2",
         },
         {
            model: "oracle8i standard edition",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "8.1.7.4",
         },
         {
            model: "oracle8i enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "8.1.7.4.0",
         },
         {
            model: "oracle10g standard edition",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.1.0.4",
         },
         {
            model: "oracle10g standard edition",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.1.0.3.1",
         },
         {
            model: "oracle10g standard edition",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.1.0.3",
         },
         {
            model: "oracle10g standard edition",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.1.0.2",
         },
         {
            model: "oracle10g personal edition",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.1.0.4",
         },
         {
            model: "oracle10g personal edition",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.1.0.3.1",
         },
         {
            model: "oracle10g personal edition",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.1.0.3",
         },
         {
            model: "oracle10g personal edition",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.1.0.2",
         },
         {
            model: "oracle10g enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.1.0.4",
         },
         {
            model: "oracle10g enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.1.0.3.1",
         },
         {
            model: "oracle10g enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.1.0.3",
         },
         {
            model: "oracle10g enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.1.0.2",
         },
         {
            model: "oracle10g application server",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.1.2",
         },
         {
            model: "oracle10g application server",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.1.0.3.1",
         },
         {
            model: "oracle10g application server",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "9.0.4.1",
         },
         {
            model: "oracle10g application server",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "9.0.4.0",
         },
         {
            model: "enterprise manager grid control 10g",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.1.3",
         },
         {
            model: "enterprise manager grid control 10g",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.1.0.2",
         },
         {
            model: "enterprise manager",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "9.0.4.1",
         },
         {
            model: "enterprise manager",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "9.0.4.0",
         },
         {
            model: "e-business suite 11i",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "11.5.10",
         },
         {
            model: "e-business suite 11i",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "11.5.9",
         },
         {
            model: "e-business suite 11i",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "11.5.8",
         },
         {
            model: "e-business suite 11i",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "11.5.7",
         },
         {
            model: "e-business suite 11i",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "11.5.6",
         },
         {
            model: "e-business suite 11i",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "11.5.5",
         },
         {
            model: "e-business suite 11i",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "11.5.4",
         },
         {
            model: "e-business suite 11i",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "11.5.3",
         },
         {
            model: "e-business suite 11i",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "11.5.2",
         },
         {
            model: "e-business suite 11i",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "11.5.1",
         },
         {
            model: "e-business suite 11i",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "11.5",
         },
         {
            model: "e-business suite",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "11.0",
         },
         {
            model: "collaboration suite release",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "29.0.4.2",
         },
         {
            model: "collaboration suite release",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "29.0.4.1",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#465542",
         },
         {
            db: "BID",
            id: "9899",
         },
         {
            db: "BID",
            id: "13139",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2004-000087",
         },
         {
            db: "NVD",
            id: "CVE-2004-0081",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200411-078",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:firewall_services_module:1.1.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:firewall_services_module:1.1_\\(3.005\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:firewall_services_module:1.1.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:symantec:clientless_vpn_gateway_4400:5.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:hp:apache-based_web_server:2.0.43.00:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:hp:apache-based_web_server:2.0.43.04:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:firewall_services_module:2.1_\\(0.208\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:hp:aaa_server:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:ciscoworks_common_management_foundation:2.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:ciscoworks_common_services:2.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:avaya:sg208:4.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:avaya:sg5:4.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:avaya:sg5:4.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:5.1:release:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:hp:hp-ux:8.05:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:openbsd:openbsd:3.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:linux:8.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:sco:openserver:5.0.6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:avaya:sg203:4.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:avaya:sg208:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.8:releng:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:hp:hp-ux:11.23:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:linux:7.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:linux:7.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:avaya:sg200:4.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:avaya:sg203:4.31.29:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:apple:mac_os_x_server:10.3.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.8:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:5.2.1:release:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:avaya:converged_communications_server:2.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:avaya:sg200:4.31.29:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:avaya:sg5:4.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:5.1:releng:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:openbsd:openbsd:3.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(11b\\)e14:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(13\\)e9:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(11b\\)e:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(11b\\)e12:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.2za:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(11\\)e:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(14\\)sy1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.2sy:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(19\\)e1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(14\\)sy:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:a:4d:webstar:4.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:4d:webstar:5.2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:avaya:intuity_audix:5.1.46:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:avaya:intuity_audix:s3210:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:avaya:vsu:5000_r2.0.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:avaya:vsu:5x:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:checkpoint:provider-1:4.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:checkpoint:provider-1:4.1:sp1:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:cisco:access_registrar:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:cisco:application_and_content_networking_software:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:cisco:webns:6.10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:cisco:webns:6.10_b4:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:hp:wbem:a.02.00.00:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:hp:wbem:a.02.00.01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.2_rc1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.2_rc2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:neoteris:instant_virtual_extranet:3.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:neoteris:instant_virtual_extranet:3.2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:novell:edirectory:8.6.2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:novell:edirectory:8.7:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:novell:edirectory:8.7.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:4d:webstar:5.3:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:4d:webstar:5.3.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:avaya:intuity_audix:*:*:lx:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:avaya:vsu:5:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:avaya:vsu:500:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:checkpoint:firewall-1:next_generation_fp1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:checkpoint:firewall-1:next_generation_fp2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:checkpoint:vpn-1:next_generation_fp1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:checkpoint:vpn-1:vsx_ng_with_application_intelligence:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:cisco:pix_firewall:6.2.2_.111:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:cisco:threat_response:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:cisco:webns:7.2_0.0.03:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:hp:wbem:a.01.05.08:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.2.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.2.2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3_rc3:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:neoteris:instant_virtual_extranet:3.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:novell:edirectory:8.5.12a:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:novell:edirectory:8.5.27:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:redhat:openssl:0.9.6b-3:*:i386:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:stonesoft:servercluster:2.5:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:stonesoft:stonebeat_securitycluster:2.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:stonesoft:stonebeat_securitycluster:2.5:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:stonesoft:stonegate:1.7:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:stonesoft:stonegate:1.7.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:stonesoft:stonegate:1.7.2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:stonesoft:stonegate:2.0.9:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:stonesoft:stonegate:2.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:stonesoft:stonegate_vpn_client:2.0.7:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:stonesoft:stonegate_vpn_client:2.0.8:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:vmware:gsx_server:2.5.1_build_5336:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:vmware:gsx_server:3.0_build_7592:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:bluecoat:proxysg:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:call_manager:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:securecomputing:sidewinder:5.2.0.01:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:securecomputing:sidewinder:5.2.0.02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:pix_firewall_software:6.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(1\\):*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(2\\):*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(3\\):*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(3.100\\):*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:pix_firewall_software:6.3:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:4d:webstar:5.2.3:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:4d:webstar:5.2.4:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:avaya:vsu:10000_r2.0.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:avaya:vsu:2000_r2.0.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:checkpoint:firewall-1:2.0:*:gx:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:checkpoint:firewall-1:next_generation_fp0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:checkpoint:provider-1:4.1:sp4:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:checkpoint:vpn-1:next_generation:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:checkpoint:vpn-1:next_generation_fp0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:cisco:css11000_content_services_switch:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:cisco:okena_stormwatch:3.2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:cisco:webns:7.10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:cisco:webns:7.10_.0.06s:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.1.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3_rc1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:openssl:openssl:0.9.7:beta3:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386_dev:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386_perl:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:dell:bsafe_ssl-j:3.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:stonesoft:servercluster:2.5.2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:stonesoft:stonebeat_fullcluster:1_2.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:stonesoft:stonebeat_webcluster:2.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:stonesoft:stonebeat_webcluster:2.5:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:stonesoft:stonegate:2.0.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:stonesoft:stonegate:2.0.4:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:stonesoft:stonegate:2.2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:stonesoft:stonegate:2.2.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:stonesoft:stonegate_vpn_client:2.0.9:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:tarantella:tarantella_enterprise:3.20:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:avaya:s8300:r2.0.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:avaya:s8300:r2.0.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:content_services_switch_11500:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:gss_4480_global_site_selector:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:securecomputing:sidewinder:5.2.0.03:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:securecomputing:sidewinder:5.2.0.04:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(2\\):*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(3\\):*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(4\\):*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(5\\):*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:pix_firewall_software:6.3\\(1\\):*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:pix_firewall_software:6.3\\(2\\):*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:pix_firewall_software:6.3\\(3.102\\):*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3_rc2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:novell:edirectory:8.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:novell:edirectory:8.5:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:novell:imanager:2.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:redhat:openssl:0.9.6-15:*:i386:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:sgi:propack:2.3:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:sgi:propack:2.4:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:stonesoft:stonebeat_fullcluster:2.5:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:stonesoft:stonebeat_fullcluster:3.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:stonesoft:stonegate:1.6.2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:stonesoft:stonegate:1.6.3:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:stonesoft:stonegate:2.0.7:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:stonesoft:stonegate:2.0.8:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:stonesoft:stonegate_vpn_client:1.7.2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:stonesoft:stonegate_vpn_client:2.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:vmware:gsx_server:2.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:vmware:gsx_server:2.0.1_build_2129:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:vmware:gsx_server:2.5.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:avaya:s8700:r2.0.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:avaya:s8700:r2.0.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:secure_content_accelerator:10000:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:securecomputing:sidewinder:5.2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:bluecoat:cacheos_ca_sa:4.1.10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:bluecoat:cacheos_ca_sa:4.1.12:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:pix_firewall_software:6.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(1\\):*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(2\\):*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(3\\):*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:4d:webstar:5.2.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:4d:webstar:5.2.2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:avaya:intuity_audix:s3400:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:avaya:vsu:100_r2.0.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:avaya:vsu:7500_r2.0.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:checkpoint:firewall-1:*:*:vsx-ng-ai:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:checkpoint:provider-1:4.1:sp2:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:checkpoint:provider-1:4.1:sp3:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:cisco:css_secure_content_accelerator:1.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:cisco:css_secure_content_accelerator:2.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:cisco:webns:7.1_0.1.02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:cisco:webns:7.1_0.2.06:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.0.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.0.2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.0.3:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:neoteris:instant_virtual_extranet:3.3:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:neoteris:instant_virtual_extranet:3.3.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:novell:edirectory:8.7.1:sp1:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:novell:imanager:1.5:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:dell:bsafe_ssl-j:3.0.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:dell:bsafe_ssl-j:3.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:stonesoft:stonebeat_fullcluster:1_3.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:stonesoft:stonebeat_fullcluster:2.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:stonesoft:stonegate:1.5.17:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:stonesoft:stonegate:1.5.18:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:stonesoft:stonegate:2.0.5:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:stonesoft:stonegate:2.0.6:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:stonesoft:stonegate:2.2.4:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:stonesoft:stonegate_vpn_client:1.7:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:tarantella:tarantella_enterprise:3.30:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:tarantella:tarantella_enterprise:3.40:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:avaya:s8500:r2.0.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:avaya:s8500:r2.0.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:gss_4490_global_site_selector:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:mds_9000:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:securecomputing:sidewinder:5.2.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:securecomputing:sidewinder:5.2.1.02:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:sun:crypto_accelerator_4000:1.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(4\\):*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(4.101\\):*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:pix_firewall_software:6.2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(1\\):*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:pix_firewall_software:6.3\\(3.109\\):*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2004-0081",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "David Litchfield※ david@nextgenss.com",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200411-078",
         },
      ],
      trust: 0.6,
   },
   cve: "CVE-2004-0081",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Partial",
                  baseScore: 5,
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2004-0081",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "VHN-8511",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2004-0081",
                  trust: 1.8,
                  value: "MEDIUM",
               },
               {
                  author: "CARNEGIE MELLON",
                  id: "VU#465542",
                  trust: 0.8,
                  value: "5.16",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-200411-078",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-8511",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#465542",
         },
         {
            db: "VULHUB",
            id: "VHN-8511",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2004-000087",
         },
         {
            db: "NVD",
            id: "CVE-2004-0081",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200411-078",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool.  This vulnerability was addressed in OpenSSL 0.9.6d and 0.9.7. The vulnerability is OpenSSL Applications and systems that use the library may also be affected. For more detailed information about other systems NISCC-224012 (JVN) , NISCC Advisory 224012 (CPNI Advisory 00389) Please check also.OpenSSL An application that uses the service disrupts service operation (DoS) It may be in a state. \nFor the first issue, a NULL-pointer assignment can be triggered by attackers during SSL/TLS handshake exchanges. The CVE candidate name for this vulnerability is CAN-2004-0079. Versions 0.9.6c to 0.9.6k (inclusive) and from 0.9.7a to 0.9.7c (inclusive) are vulnerable. \nThe second issue is also exploited during the SSL/TLS handshake, but only when Kerberos ciphersuites are in use. The vendor has reported that this vulnerability may not be a threat to many, because it occurs only when Kerberos ciphersuites are in use, an uncommon configuration. The CVE candidate name for this vulnerability is CAN-2004-0112. Versions 0.9.7a, 0.9.7b, and 0.9.7c are affected. \nThis entry will be retired when individual BID records are created for each issue. \n*Note: A third denial-of-service vulnerability included in the announcement was discovered affecting 0.9.6 and fixed in 0.9.6d. The CVE candidate name for this vulnerability is CAN-2004-0081. Oracle Database Server, Oracle Application Server, Oracle Collaboration Suite, Oracle E-Business and Applications, Oracle Enterprise Manager Grid Control, and Oracle PeopleSoft Applications are reported prone to multiple vulnerabilities. \nOracle has released a Critical Patch Update to address these issues in various supported applications and platforms. \nThe issues identified by the vendor affect all security properties of the Oracle products and present local and remote threats. While various levels of authorization are required to leverage some issues, others do not require any authorization. \nThis BID will be divided and updated into separate BIDs when more information is available. An attacker could exploit these vulnerabilities to take complete control of an affected database. \n\nTITLE:\nFedora update for openssl096b\n\nSECUNIA ADVISORY ID:\nSA17381\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/17381/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nDoS\n\nWHERE:\n>From remote\n\nOPERATING SYSTEM:\nFedora Core 3\nhttp://secunia.com/product/4222/\n\nDESCRIPTION:\nFedora has issued an update for openssl096b. This fixes some\nvulnerabilities, which can be exploited by malicious people to cause\na DoS (Denial of Service). \n\nFor more information:\nSA10133\nSA11139\n\nSOLUTION:\nApply updated packages. \n\nFedora Core 3:\nhttp://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/\n\n8d68e4b430aa7c5ca067c12866ae694e\nSRPMS/openssl096b-0.9.6b-21.42.src.rpm\n54a9e78a2fdd625b9dc9121e09eb4398\nx86_64/openssl096b-0.9.6b-21.42.x86_64.rpm\nc5c6174e23eba8d038889d08f49231b8\nx86_64/debug/openssl096b-debuginfo-0.9.6b-21.42.x86_64.rpm\n56b63fc150d0c099b2e4f0950e21005b\nx86_64/openssl096b-0.9.6b-21.42.i386.rpm\n56b63fc150d0c099b2e4f0950e21005b\ni386/openssl096b-0.9.6b-21.42.i386.rpm\n93195495585c7e9789041c75b1ed5380\ni386/debug/openssl096b-debuginfo-0.9.6b-21.42.i386.rpm\n\nOTHER REFERENCES:\nSA10133:\nhttp://secunia.com/advisories/10133/\n\nSA11139:\nhttp://secunia.com/advisories/11139/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
      sources: [
         {
            db: "NVD",
            id: "CVE-2004-0081",
         },
         {
            db: "CERT/CC",
            id: "VU#465542",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2004-000087",
         },
         {
            db: "BID",
            id: "9899",
         },
         {
            db: "BID",
            id: "13139",
         },
         {
            db: "VULHUB",
            id: "VHN-8511",
         },
         {
            db: "PACKETSTORM",
            id: "41200",
         },
         {
            db: "PACKETSTORM",
            id: "41105",
         },
      ],
      trust: 3.15,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#465542",
            trust: 3.3,
         },
         {
            db: "NVD",
            id: "CVE-2004-0081",
            trust: 3.1,
         },
         {
            db: "BID",
            id: "9899",
            trust: 2.8,
         },
         {
            db: "USCERT",
            id: "TA04-078A",
            trust: 2.5,
         },
         {
            db: "SECUNIA",
            id: "11139",
            trust: 1.7,
         },
         {
            db: "SECTRACK",
            id: "1009458",
            trust: 0.8,
         },
         {
            db: "XF",
            id: "15509",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2004-000087",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-200411-078",
            trust: 0.7,
         },
         {
            db: "BID",
            id: "13139",
            trust: 0.3,
         },
         {
            db: "VULHUB",
            id: "VHN-8511",
            trust: 0.1,
         },
         {
            db: "SECUNIA",
            id: "17398",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "41200",
            trust: 0.1,
         },
         {
            db: "SECUNIA",
            id: "17381",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "41105",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#465542",
         },
         {
            db: "VULHUB",
            id: "VHN-8511",
         },
         {
            db: "BID",
            id: "9899",
         },
         {
            db: "BID",
            id: "13139",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2004-000087",
         },
         {
            db: "PACKETSTORM",
            id: "41200",
         },
         {
            db: "PACKETSTORM",
            id: "41105",
         },
         {
            db: "NVD",
            id: "CVE-2004-0081",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200411-078",
         },
      ],
   },
   id: "VAR-200411-0173",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-8511",
         },
      ],
      trust: 0.52271296,
   },
   last_update_date: "2023-12-18T11:48:29.371000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "OpenSSL Vulnerability",
            trust: 0.8,
            url: "http://www.checkpoint.com/services/techsupport/alerts/openssl.html",
         },
         {
            title: "HPSBUX01011",
            trust: 0.8,
            url: "http://www1.itrc.hp.com/service/cki/docdisplay.do?docid=c00897351",
         },
         {
            title: "HPSBUX01011",
            trust: 0.8,
            url: "http://h50221.www5.hp.com/upassist/itrc_japan/assist2/secbltn/hp-ux/hpsbux01011.html",
         },
         {
            title: "NetScreen Advisory 58466",
            trust: 0.8,
            url: "http://www.juniper.net/support/security/alerts/adv58466-2.txt",
         },
         {
            title: "openssl096",
            trust: 0.8,
            url: "http://www.miraclelinux.com/support/update/list.php?errata_id=155",
         },
         {
            title: "Top Page",
            trust: 0.8,
            url: "http://www.openssl.org/",
         },
         {
            title: "RHSA-2004:119",
            trust: 0.8,
            url: "https://rhn.redhat.com/errata/rhsa-2004-119.html",
         },
         {
            title: "RHSA-2004:121",
            trust: 0.8,
            url: "https://rhn.redhat.com/errata/rhsa-2004-121.html",
         },
         {
            title: "RHSA-2004:120",
            trust: 0.8,
            url: "https://rhn.redhat.com/errata/rhsa-2004-120.html",
         },
         {
            title: "20040304-01-U",
            trust: 0.8,
            url: "ftp://patches.sgi.com/support/free/security/advisories/20040304-01-u.asc",
         },
         {
            title: "57571",
            trust: 0.8,
            url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57571-1",
         },
         {
            title: "57524",
            trust: 0.8,
            url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57524-1",
         },
         {
            title: "57571",
            trust: 0.8,
            url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57571-3",
         },
         {
            title: "57524",
            trust: 0.8,
            url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57524-3",
         },
         {
            title: "19387",
            trust: 0.8,
            url: "http://kb.trendmicro.com/solutions/solutiondetail.asp?solutionid=19387",
         },
         {
            title: "TLSA-2004-9",
            trust: 0.8,
            url: "http://www.turbolinux.com/security/2004/tlsa-2004-9.txt",
         },
         {
            title: "OpenSSL に関する脆弱性",
            trust: 0.8,
            url: "http://www.checkpoint.co.jp/techsupport/alerts/openssl.html",
         },
         {
            title: "RHSA-2004:120",
            trust: 0.8,
            url: "http://www.jp.redhat.com/support/errata/rhsa/rhsa-2004-120j.html",
         },
         {
            title: "RHSA-2004:119",
            trust: 0.8,
            url: "http://www.jp.redhat.com/support/errata/rhsa/rhsa-2004-119j.html",
         },
         {
            title: "openssl にセキュリティホール",
            trust: 0.8,
            url: "http://vinelinux.org/errata/25x/20040319-1.html",
         },
         {
            title: "TLSA-2004-9",
            trust: 0.8,
            url: "http://www.turbolinux.co.jp/security/2004/tlsa-2004-9j.txt",
         },
         {
            title: "IPCOMシリーズのOpenSSL脆弱性への対応について",
            trust: 0.8,
            url: "http://primeserver.fujitsu.com/ipcom/support/security20040325/",
         },
         {
            title: "[重要] OpenSSL脆弱性への対応について",
            trust: 0.8,
            url: "http://jp.fujitsu.com/support/security/backnumber/2004/0325/",
         },
         {
            title: "224012",
            trust: 0.8,
            url: "http://software.fujitsu.com/jp/security/vulnerabilities/cert/niscc.html#224012-openssl",
         },
         {
            title: "OpenSSL Security vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=169015",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2004-000087",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200411-078",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "NVD-CWE-Other",
            trust: 1,
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2004-0081",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.5,
            url: "http://www.uniras.gov.uk/vuls/2004/224012/index.htm",
         },
         {
            trust: 2.5,
            url: "http://www.securityfocus.com/bid/9899",
         },
         {
            trust: 2.5,
            url: "http://www.us-cert.gov/cas/techalerts/ta04-078a.html",
         },
         {
            trust: 2.5,
            url: "http://www.kb.cert.org/vuls/id/465542",
         },
         {
            trust: 2.3,
            url: "http://rhn.redhat.com/errata/rhsa-2004-119.html",
         },
         {
            trust: 2,
            url: "http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml",
         },
         {
            trust: 1.7,
            url: "http://www.debian.org/security/2004/dsa-465",
         },
         {
            trust: 1.7,
            url: "http://www.linuxsecurity.com/advisories/engarde_advisory-4135.html",
         },
         {
            trust: 1.7,
            url: "http://fedoranews.org/updates/fedora-2004-095.shtml",
         },
         {
            trust: 1.7,
            url: "http://security.gentoo.org/glsa/glsa-200403-03.xml",
         },
         {
            trust: 1.7,
            url: "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a11755",
         },
         {
            trust: 1.7,
            url: "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a871",
         },
         {
            trust: 1.7,
            url: "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a902",
         },
         {
            trust: 1.7,
            url: "http://www.redhat.com/support/errata/rhsa-2004-120.html",
         },
         {
            trust: 1.7,
            url: "http://www.redhat.com/support/errata/rhsa-2004-121.html",
         },
         {
            trust: 1.7,
            url: "http://www.redhat.com/support/errata/rhsa-2004-139.html",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/11139",
         },
         {
            trust: 1.7,
            url: "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524",
         },
         {
            trust: 1.7,
            url: "http://www.trustix.org/errata/2004/0012",
         },
         {
            trust: 1.7,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/15509",
         },
         {
            trust: 1.6,
            url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834",
         },
         {
            trust: 1.6,
            url: "http://marc.info/?l=bugtraq&m=107955049331965&w=2",
         },
         {
            trust: 1.6,
            url: "http://marc.info/?l=bugtraq&m=108403850228012&w=2",
         },
         {
            trust: 1.1,
            url: "ftp://ftp.sco.com/pub/updates/openserver/scosa-2004.10/scosa-2004.10.txt",
         },
         {
            trust: 1.1,
            url: "ftp://patches.sgi.com/support/free/security/advisories/20040304-01-u.asc",
         },
         {
            trust: 0.8,
            url: "http://www.openssl.org",
         },
         {
            trust: 0.8,
            url: "http://cvs.openssl.org/chngview?cn=5721",
         },
         {
            trust: 0.8,
            url: "http://cvs.openssl.org/chngview?cn=5722",
         },
         {
            trust: 0.8,
            url: "http://cvs.openssl.org/getfile?v=1.618.2.137&f=openssl/changes",
         },
         {
            trust: 0.8,
            url: "http://cvs.openssl.org/getfile?v=1.954&f=openssl/changes",
         },
         {
            trust: 0.8,
            url: "http://www.ciac.org/ciac/bulletins/o-101.shtml",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2004-0081",
         },
         {
            trust: 0.8,
            url: "http://www.cpni.gov.uk/products/vulnerabilitydisclosures/default.aspx?id=va-20040317-00389.xml",
         },
         {
            trust: 0.8,
            url: "http://xforce.iss.net/xforce/xfdb/15509",
         },
         {
            trust: 0.8,
            url: "http://www.jpcert.or.jp/wr/2004/wr041201.txt",
         },
         {
            trust: 0.8,
            url: "http://www.jpcert.or.jp/wr/2004/wr041301.txt",
         },
         {
            trust: 0.8,
            url: "http://www.jpcert.or.jp/wr/2004/wr041701.txt",
         },
         {
            trust: 0.8,
            url: "http://www.jpcert.or.jp/wr/2004/wr041801.txt",
         },
         {
            trust: 0.8,
            url: "http://jvn.jp/niscc/niscc-224012",
         },
         {
            trust: 0.8,
            url: "http://jvn.jp/cert/jvnta04-078a/index.html",
         },
         {
            trust: 0.8,
            url: "http://jvn.jp/tr/trta04-078a",
         },
         {
            trust: 0.8,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2004-0081",
         },
         {
            trust: 0.8,
            url: "http://www.cpni.gov.uk/docs/re-20040317-00389.pdf?lang=en",
         },
         {
            trust: 0.8,
            url: "http://www.securitytracker.com/alerts/2004/mar/1009458.html",
         },
         {
            trust: 0.8,
            url: "http://www.cyberpolice.go.jp/important/20040318_082932.html",
         },
         {
            trust: 0.6,
            url: "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f57524",
         },
         {
            trust: 0.3,
            url: "http://www.4d.com/products/4dwsv.html",
         },
         {
            trust: 0.3,
            url: "http://support.avaya.com/japple/css/japple?page=avaya.css.openpage&temp.template.name=securityadvisory",
         },
         {
            trust: 0.3,
            url: "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000827",
         },
         {
            trust: 0.3,
            url: "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000834",
         },
         {
            trust: 0.3,
            url: "ftp://ftp.symantec.com/public/english_us_canada/products/sym_clientless_vpn/sym_clientless_vpn_5/updates/hf1-readme.txt",
         },
         {
            trust: 0.3,
            url: "http://www.vmware.com/support/kb/enduser/std_adp.php?p_faqid=1256",
         },
         {
            trust: 0.3,
            url: "http://www.vmware.com/support/kb/enduser/std_adp.php?p_faqid=1257",
         },
         {
            trust: 0.3,
            url: "http://www.netscreen.com/services/security/alerts/adv58466-signed.txt",
         },
         {
            trust: 0.3,
            url: "http://www.stonesoft.com/document/art/3123.html",
         },
         {
            trust: 0.3,
            url: "http://support.avaya.com/elmodocs2/security/asa-2005-239.htm",
         },
         {
            trust: 0.3,
            url: "http://www.checkpoint.com/techsupport/alerts/openssl.html",
         },
         {
            trust: 0.3,
            url: "http://rhn.redhat.com/errata/rhsa-2004-120.html",
         },
         {
            trust: 0.3,
            url: "http://rhn.redhat.com/errata/rhsa-2004-139.html",
         },
         {
            trust: 0.3,
            url: "http://rhn.redhat.com/errata/rhsa-2005-830.html",
         },
         {
            trust: 0.3,
            url: "http://www.bluecoat.com/support/knowledge/advisory_openssl_can-2004-0079.html",
         },
         {
            trust: 0.3,
            url: "http://www.apple.com/support/downloads/securityupdate_2004-04-05_(10_3_3).html",
         },
         {
            trust: 0.3,
            url: "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2968981.htm",
         },
         {
            trust: 0.3,
            url: "http://www.securecomputing.com/pdf/52110relnotes.pdf",
         },
         {
            trust: 0.3,
            url: "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f57571",
         },
         {
            trust: 0.3,
            url: "http://www.tarantella.com/security/bulletin-10.html",
         },
         {
            trust: 0.3,
            url: "http://www.adiscon.com/common/en/advisory/2004-03-18.asp",
         },
         {
            trust: 0.3,
            url: "http://www.uniras.gov.uk/l1/l2/l3/alerts2004/alert-1204.txt",
         },
         {
            trust: 0.3,
            url: "http://www.litespeedtech.com",
         },
         {
            trust: 0.3,
            url: "/archive/1/357672",
         },
         {
            trust: 0.3,
            url: "http://www.oracle.com/technology/deploy/security/pdf/cpuapr2005.pdf",
         },
         {
            trust: 0.3,
            url: "http://www.oracle.com/index.html",
         },
         {
            trust: 0.3,
            url: "http://www.peoplesoft.com:80/corp/en/support/security_index.jsp",
         },
         {
            trust: 0.3,
            url: "/archive/1/395699",
         },
         {
            trust: 0.2,
            url: "http://secunia.com/secunia_security_advisories/",
         },
         {
            trust: 0.2,
            url: "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org",
         },
         {
            trust: 0.2,
            url: "http://secunia.com/advisories/11139/",
         },
         {
            trust: 0.2,
            url: "http://secunia.com/about_secunia_advisories/",
         },
         {
            trust: 0.1,
            url: "http://marc.info/?l=bugtraq&m=107955049331965&w=2",
         },
         {
            trust: 0.1,
            url: "http://marc.info/?l=bugtraq&m=108403850228012&w=2",
         },
         {
            trust: 0.1,
            url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/48/",
         },
         {
            trust: 0.1,
            url: "http://rhn.redhat.com/errata/rhsa-2005-829.html",
         },
         {
            trust: 0.1,
            url: "http://rhn.redhat.com/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/1326/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/1306/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/advisories/17398/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/1044/",
         },
         {
            trust: 0.1,
            url: "http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/4222/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/advisories/17381/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/advisories/10133/",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#465542",
         },
         {
            db: "VULHUB",
            id: "VHN-8511",
         },
         {
            db: "BID",
            id: "9899",
         },
         {
            db: "BID",
            id: "13139",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2004-000087",
         },
         {
            db: "PACKETSTORM",
            id: "41200",
         },
         {
            db: "PACKETSTORM",
            id: "41105",
         },
         {
            db: "NVD",
            id: "CVE-2004-0081",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200411-078",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#465542",
         },
         {
            db: "VULHUB",
            id: "VHN-8511",
         },
         {
            db: "BID",
            id: "9899",
         },
         {
            db: "BID",
            id: "13139",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2004-000087",
         },
         {
            db: "PACKETSTORM",
            id: "41200",
         },
         {
            db: "PACKETSTORM",
            id: "41105",
         },
         {
            db: "NVD",
            id: "CVE-2004-0081",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200411-078",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2004-03-17T00:00:00",
            db: "CERT/CC",
            id: "VU#465542",
         },
         {
            date: "2004-11-23T00:00:00",
            db: "VULHUB",
            id: "VHN-8511",
         },
         {
            date: "2004-03-17T00:00:00",
            db: "BID",
            id: "9899",
         },
         {
            date: "2005-04-12T00:00:00",
            db: "BID",
            id: "13139",
         },
         {
            date: "2007-04-01T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2004-000087",
         },
         {
            date: "2005-11-03T01:02:14",
            db: "PACKETSTORM",
            id: "41200",
         },
         {
            date: "2005-11-02T01:11:22",
            db: "PACKETSTORM",
            id: "41105",
         },
         {
            date: "2004-11-23T05:00:00",
            db: "NVD",
            id: "CVE-2004-0081",
         },
         {
            date: "2003-07-18T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200411-078",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2005-05-06T00:00:00",
            db: "CERT/CC",
            id: "VU#465542",
         },
         {
            date: "2018-10-30T00:00:00",
            db: "VULHUB",
            id: "VHN-8511",
         },
         {
            date: "2015-03-19T08:20:00",
            db: "BID",
            id: "9899",
         },
         {
            date: "2006-05-05T23:30:00",
            db: "BID",
            id: "13139",
         },
         {
            date: "2007-04-01T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2004-000087",
         },
         {
            date: "2021-11-08T15:48:31.743000",
            db: "NVD",
            id: "CVE-2004-0081",
         },
         {
            date: "2021-11-09T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200411-078",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "network",
      sources: [
         {
            db: "BID",
            id: "9899",
         },
         {
            db: "BID",
            id: "13139",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "OpenSSL does not properly handle unknown message types",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#465542",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Unknown",
      sources: [
         {
            db: "BID",
            id: "9899",
         },
         {
            db: "BID",
            id: "13139",
         },
      ],
      trust: 0.6,
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.